TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

HTTP/2 rapid reset attack impacting Nginx products

232 点作者 120bits超过 1 年前

14 条评论

sickofparadox超过 1 年前
Important to note that unless your Nginx instance has a special (read: very high) keepalive limit configured, Nginx has a fairly reasonable defense against HTTP/2 rapid reset attack by default, as the article says. Still, interesting to see the response to these attacks.
dang超过 1 年前
Related. Others?<p><i>HAProxy is not affected by the HTTP&#x2F;2 Rapid Reset Attack</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37837043">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37837043</a> - Oct 2023 (31 comments)<p><i>The largest DDoS attack to date, peaking above 398M rps</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37831062">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37831062</a> - Oct 2023 (461 comments)<p><i>HTTP&#x2F;2 Rapid Reset: deconstructing the record-breaking attack</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37831004">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37831004</a> - Oct 2023 (22 comments)<p><i>HTTP&#x2F;2 zero-day vulnerability results in record-breaking DDoS attacks</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37830998">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37830998</a> - Oct 2023 (69 comments)<p><i>The novel HTTP&#x2F;2 &#x27;Rapid Reset&#x27; DDoS attack</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37830987">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37830987</a> - Oct 2023 (103 comments)
评论 #37864927 未加载
评论 #37863438 未加载
评论 #37862401 未加载
评论 #37864330 未加载
评论 #37862324 未加载
ComputerGuru超过 1 年前
I’m stuck trying to figure out if this is technically desired behavior or not. If you were retroactively designing http&#x2F;2 with this knowledge, would you have done anything different?
评论 #37865031 未加载
nimbius超过 1 年前
FYI this is for the commercial nginx product, hastily purchased by F5 a few years back when software load balancers were annihilating their hardware offering.<p>Curious to see f5 still playing games with their own cve disclosure on the bigip product though...assigning it a mitre cw400 is just lying.<p><a href="https:&#x2F;&#x2F;my.f5.com&#x2F;manage&#x2F;s&#x2F;article&#x2F;K000137106" rel="nofollow noreferrer">https:&#x2F;&#x2F;my.f5.com&#x2F;manage&#x2F;s&#x2F;article&#x2F;K000137106</a>
评论 #37864791 未加载
eastdakota超过 1 年前
From some first-hand experience over the last few months… these suggestions and patch will help prevent a single client from overwhelming an NGINX server, but it will do little to stop even a modest botnet from generating enough requests to be a problem. Keeping some state on IPs and downgrading those that exceed limits to HTTP&#x2F;1.1 I believe is the only effective defense. Tuning those thresholds to get them right is… challenging.
评论 #37864347 未加载
codetrotter超过 1 年前
Hehe, when I heard about the attack a couple of days ago I was interested to know if Nginx was affected and did a search on Google for the CVE of that attack followed by the name of Nginx.<p>I didn’t find anything relevant so I assumed that Nginx was not affected.<p>Turns out that was not a good assumption :p
评论 #37862510 未加载
评论 #37862934 未加载
评论 #37862517 未加载
评论 #37867213 未加载
amelius超过 1 年前
&gt; this vulnerability can be exploited to execute a denial-of-service attack<p>Title should contain this info.
getcrunk超过 1 年前
&gt; layer 4 monitoring and alerting tools<p>What do you guys use? Anything foss and not an applicance?
1vuio0pswjnm7超过 1 年前
If someone asked me how to &quot;speed up the web&quot;, I would not suggest &quot;use HTTP&#x2F;2&quot;. I would remove ads and other garbage. As a decades long non-popular browser and TCP client user, I can testify this works very effectively. I prefer to have full control over the resources that I request, whether text or binary, so no auto-loading resources, no Javascript-requested resources and no HTTP&#x2F;2 &quot;server push&quot;. The clients I use do not auto-load resources, run Javascript nor carry out &quot;server push&quot;. Works great for me. Web is not slow.<p>According to HTTP&#x2F;2 proponents, the protocol originated at an online advertising services company and was developed by companies that profit from sale and delivery of online advertising, HTTP&#x2F;2 was designed to &quot;speed up the web&quot;.<p>I respect that opinions on HTTP&#x2F;2 may differ. If someone loves HTTP&#x2F;2, then I respect that opinion. In return I ask that others respect opinions that may differ from their own, including mine. NB. This comment speaks only for the web user submitting it. It does not speak for other web users. IMHO, no HN commenter can speak for other web users either. Thank you.
评论 #37864745 未加载
评论 #37868319 未加载
评论 #37864840 未加载
评论 #37865128 未加载
评论 #37868185 未加载
blackbeans超过 1 年前
What about the old and proven Apache? Is it affected?
phendrenad2超过 1 年前
How does HTTP&#x2F;1.1 stand up to the current attack?
评论 #37863174 未加载
andrewstuart超过 1 年前
Anyone know if it affects Caddy?
评论 #37864146 未加载
bullen超过 1 年前
Just use HTTP&#x2F;1.1, it&#x27;s the final protocol.<p>Nothing Google or Microsoft does will dethrone it.<p>Forget the browser; use a C or Java client and HTTP.<p>If they block port 80, just use another port.<p>They cannot win.
评论 #37868928 未加载
ChrisArchitect超过 1 年前
Why the submission OP?<p>Lots of discussion and submissions related to this over the last few days, not to mention this submitted 2 days ago
评论 #37863854 未加载