You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please, add more information to frang documentation on working with ip_block and block_action directives.
Also, for the block_action directive I don't understand what event will call 'frang' with ip_block on\off. I think, it's "attack", but it's not written.
For example:
what should client receive on 3rd connection?
document that Frang remembers bursts only for 1.5 seconds
connection-level limits can not be used with block_action attack reply
discuss reasonable limits (e.g. burst of 6 connections/s and concurrent connections)
RST in case of 2 pipelined malicious requests and ip_block off; http_ct_vals text/*; block_action attack reply; config. It does make sense to reset a malicious connection and do not spend resources on it
Basically ip_block on; block_action attack reply; is a misconfiguration: Frang limits immediately call the filter blocking on IP layer and the HTTP layer will just put an HTTP response to the socket send buffer, which hung forever.
A new issue #1751 is created to avoid (5) and reset connections on the filter.c layer.
Motivation
Please, add more information to
frang
documentation on working withip_block
andblock_action
directives.Also, for the
block_action
directive I don't understand what event will call 'frang' withip_block on\off
. I think, it's "attack", but it's not written.For example:
what should client receive on 3rd connection?
ip_block off; connection_burst 2; block_action attack reply;
- 403 or not?ip_block off; connection_burst 2; block_action attack drop;
- none?ip_block on; connection_burst 2; block_action attack drop;
- none?ip_block on; connection_burst 2; block_action attack reply;
- three 403 responses?Documentation
https://github.com/tempesta-tech/tempesta/wiki/HTTP-security
The text was updated successfully, but these errors were encountered: