Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Basic DoS protection #1057

Open
hugusmaximus opened this issue Jan 7, 2024 · 1 comment
Open

Basic DoS protection #1057

hugusmaximus opened this issue Jan 7, 2024 · 1 comment
Labels

Comments

@hugusmaximus
Copy link

Hi, I can see there's a "max_connections" parameter that can be configured to limit "maximum number of connections to a worker", anyway, this will not stop a single attacker IP to trivially flood Sozu... is there any way to configure a limit of connections "per source IP"? This is a very basic feature that only stop most naive DoS attacks but it is very powerful protection mechanism. Any plan to implement this?

@Keksoj
Copy link
Member

Keksoj commented Jan 8, 2024

It is not yet implemented, nor is it in the roadmap, but this is a relevant issue.

A first naive implementation of a simple IP tracker would be good. It would gather information about a client accross several connections. Such an IP tracker could be used to trigger safety mechanisms, such as downgrading protocol from HTTP2 to HTTP1 (which offers exploit vulnerabilities) and tarpitting (slowing down connections for a given IP address).

The Clever Cloud team, responsible for most development on Sōzu, has yet to convene to decide about where to put such a feature in the roadmap. This issue will be updated.

@Keksoj Keksoj added the security label Jan 8, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants