-
Notifications
You must be signed in to change notification settings - Fork 84
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request from GHSA-qppj-fm5r-hxr3
* Limit rate of permitted RST frames Motivation: Large number of stream reset frames may be used as a DoS (Denial of Service) vector in an attempt to overload the CPU of the handling server. Modifications: Introduce an additional DoS heuristic which evaluates the rate of incoming stream reset frames. If the rate exceeds that which is permitted then the connection is closed and a `GOAWAY` issued. The allowed rate is configurable but defaults to 200 resets within 30 seconds. This should be acceptable for most applications. Result: Excessive reset frames result in the connection being closed. * review comments * further review comments * add integration test
- Loading branch information
Showing
5 changed files
with
309 additions
and
13 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.