Template:Networking rutos manual firewall: Difference between revisions
Template:Networking rutos manual firewall (view source)
Revision as of 14:20, 15 December 2023
, 15 December 2023→HTTP Attack Prevention
Line 903: | Line 903: | ||
An <b>HTTP attack</b> sends a complete, legitimate HTTP header, which includes a 'Content-Length' field to specify the size of the message body to follow. However, the attacker then proceeds to send the actual message body at an extremely slow rate (e.g. 1 byte/100 seconds.) Due to the entire message being correct and complete, the target server will attempt to obey the 'Content-Length' field in the header, and wait for the entire body of the message to be transmitted, hence slowing it down. | An <b>HTTP attack</b> sends a complete, legitimate HTTP header, which includes a 'Content-Length' field to specify the size of the message body to follow. However, the attacker then proceeds to send the actual message body at an extremely slow rate (e.g. 1 byte/100 seconds.) Due to the entire message being correct and complete, the target server will attempt to obey the 'Content-Length' field in the header, and wait for the entire body of the message to be transmitted, hence slowing it down. | ||
[[File: | [[File:Networking_rutos_manual_firewall_attack_prevention_http_attack_prevention_v2.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 924: | Line 924: | ||
<td>Limit</td> | <td>Limit</td> | ||
<td>integer; default: <b>5</b></td> | <td>integer; default: <b>5</b></td> | ||
<td>Maximum HTTP connections during the set period< | <td>Maximum HTTP connections during the set period.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> |