https://issues.apache.org/bugzilla/show_bug.cgi?id=56751

            Bug ID: 56751
           Summary: Fails to properly mitigate Slow Post DoS attack
           Product: Apache httpd-2
           Version: 2.5-HEAD
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: major
          Priority: P2
         Component: mod_reqtimeout
          Assignee: [email protected]
          Reporter: [email protected]

DETAILS:

The recommended/default mod_reqtimeout configuration allows a remote attacker
to consume all Apache connections while sending part of the post body in time
intervals (AKA SlowPost attack) with a byte-rate greater than the configured
MinRate (500 by default).

Example: Sending 10Kb of the body each 5 seconds will bypass recommended
configuration.

References to recommended conf:
1. http://publib.boulder.ibm.com/httpserv/manual60/mod/mod_reqtimeout.html
2. http://docs.cpanel.net/twiki/bin/view/EasyApache/Apache/SlowlorisAttacks
3.
http://blog.spiderlabs.com/2011/07/advanced-topic-of-the-week-mitigating-slow-http-dos-attacks.html#Mitigating
Slow Request Attacks with Mod_Reqtimeout and ModSecurity

IMPACT:

Vulnerable are most of the Apache users who rely on the mod_reqtimeout module
to mitigate the SlowPost DoS attack.

SOLUTION:
Add to the default configuration an upper bound (maxtimeout) for the "body"
parameter.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to