Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 89469 invoked from network); 24 Jun 2009 09:36:53 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 24 Jun 2009 09:36:53 -0000 Received: (qmail 75089 invoked by uid 500); 24 Jun 2009 09:37:03 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 75002 invoked by uid 500); 24 Jun 2009 09:37:03 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 74993 invoked by uid 99); 24 Jun 2009 09:37:00 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 24 Jun 2009 09:37:00 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: local policy) Received: from [85.10.201.4] (HELO mail.bitware.at) (85.10.201.4) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 24 Jun 2009 09:36:49 +0000 Received: from localhost (localhost [127.0.0.1]) by mail.bitware.at (Postfix) with ESMTP id 382AF8180EE for ; Wed, 24 Jun 2009 11:36:27 +0200 (CEST) Received: from mail.bitware.at ([127.0.0.1]) by localhost (mail.bitware.at [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l29whjF1Up7A for ; Wed, 24 Jun 2009 11:36:27 +0200 (CEST) Received: from synflood.at (e178055085.adsl.alicedsl.de [85.178.55.85]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by mail.bitware.at (Postfix) with ESMTP id E58958180C2 for ; Wed, 24 Jun 2009 11:36:26 +0200 (CEST) Date: Wed, 24 Jun 2009 11:36:21 +0200 From: Andreas Krennmair To: dev@httpd.apache.org Subject: Re: Mitigating the Slowloris DoS attack Message-ID: <20090624093621.GF5742@synflood.at> References: <20090621111038.GA5742@synflood.at> <4239a4320906222148h1121a43ck99698939f8f8ed6d@mail.gmail.com> <20090624091858.GA5086@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Disposition: inline In-Reply-To: <20090624091858.GA5086@redhat.com> X-Operating-System: Linux 2.6.26-2-486 User-Agent: Mutt/1.5.18 (2008-05-17) X-Virus-Checked: Checked by ClamAV on apache.org * Joe Orton [2009-06-24 11:20]: >Meh. There will always be a maximum to the number of concurrent >connections a server can handle - be that hardware, kernel, or server >design. If you allow a single client to establish that number of >connections it will deny service to other clients. > >That is all that "slowloris" does, and you will always have to mitigate >that kind of attack at network/router/firewall level. It can be done >today on Linux with a single trivial iptables rule, I'm sure the same is >true of other kernels. I think you confuse the PoC tool with the fundamental problem. You can't fend off this kind of attack at TCP level, at least not in cases where the n connections that block Apache are made by not 1 but n hosts. Regards, Andreas