Le 9/17/21 à 1:20 PM, Stefan Behte a écrit :
Hi everyone,

surely many on this list have heard about the meris botnet (https://krebsonsecurity.com/2021/09/krebsonsecurity-hit-by-huge-new-iot-botnet-meris/) which uses HTTP/1.1 pipelining for layer 7 attacks.

As far as I can see, it's not possible to disallow HTTP pipelining in haproxy, so the best possibility could be "option httpclose"?

Of course, this does not solve everything when a ~100k botnet is attacking, but it could ease the initial load / mitigate the pipelining vector a bit, as the attack clients have longer RTT.

Or maybe I am missing something?

Hi,

HAproxy does not support HTTP pipelining. But it may be configured to mitigate ddos attack. There are several mechanisms that you can use, depending on your applications. A quick search on the net about "haproxy ddos prevention" will give you several hints.

Regards,
--
Christopher Faulet

Reply via email to