HTTP/2 Zero-Day Vulnerability Results in Record-Breaking DDoS Attacks

L: https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/

C: https://news.ycombinator.com/item?id=37830998

Reply to this note

Please Login to reply.

Discussion

Cc nostr:npub1yxprsscnjw2e6myxz73mmzvnqw5kvzd5ffjya9ecjypc5l0gvgksh8qud4 nostr:npub1qqqqqqyz0la2jjl752yv8h7wgs3v098mh9nztd4nr6gynaef6uqqt0n47m

Curious to any nostr relay dev opinion. What do you think about this attack? Especially if it happened to Nostr relay.

Dealing with DDoS attacks is just apart of running Internet services in general. Whether relying primarily on third party infrastructure (like cloudflare) or your own, mitigating these attacks without (extended) downtime is important.

True, what is your practical tips to handle this (for now)? Especially since common affected software like Nginx and Caddy haven't fully solve this issue (yet) if i'm not mistaken.

I've heard that Nginx is currently preparing to issue a new patch that will be released to handle this CVE https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/