a long time ago, someone found out you could flood IRC networks using HTTP clients (browsers): https://www.theregister.com/2010/01/30/firefox_interprotocol_attack/

we do not immediately find any RFCs that address this issue. browsers mitigated the issue by blocking certain ports, while IRC networks... we're not sure what IRC networks did, honestly.

and that is part of the problem. what can protocol authors do to ensure their protocols are not vulnerable to such attacks? and what can implementers do about protocols that were never designed with such attacks in mind? we don't currently have these answers.

if anyone can point us to something, it would be appreciated.

thanks.

--
plural system (tend to say 'we'), it/she/they, it instead of you

--
Witarea mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to