Apache Potentially Vulnerable to Slowloris Denegation of Service

Description

The Apache server was found to be potentially vulnerable to the Slowloris denial of service attack. These attacks require small amounts of bandwidth and could be successfully carried out from only one computer. A Slowloris denial of service attacks attempt to overload the server by opening and maintaining multiple incomplete HTTP requests to the server at the same time. The following proof of concept shows that it was possible to keep connections opened for as long as 500 seconds, which is long enough to allow a successful DoS attack using Slowloris.

Slowloris慢攻击

To avoid undesired impact, an attack was not attempted. This issue is therefore labelled as a potential denial of service.

Recommendation

Reconfigure the Apache server to limit the timeout of each connection:

<IfModule mod_reqtimeout.c>   
    RequestReadTimeout header=20,MinRate=500 body=20,MinRate=500 
</IfModule> 

The configuration above will terminate the connection if the client fails to send the header or body data within 20 seconds each. Please note that this timeout value should be design to limit the impact on legitimate users with slow connections, as their connections may be affected too.

拒绝Slowloris慢攻击

Slowloris Attack

本文作者:肖云

本文链接:http://www.d7dd.com/2019/4/apache-requestreadtimeout

版权声明:本博客所有文章除特别声明外,均采用CC BY-NC-SA 3.0许可协议。转载请注明出处!

微信H5支付【网络环境未能通过安全验证 请稍后再试】
0 条评论
已登录,注销 取消