Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Apache DoS attack

  • 18-06-2009 7:50pm
    #1
    Closed Accounts Posts: 1,567 ✭✭✭


    Yesterday an interesting HTTP DoS tool has been released. The tool performs a Denial of Service attack on Apache (and some other, see below) servers by exhausting available connections. While there are a lot of DoS tools available today, this one is particularly interesting because it holds the connection open while sending incomplete HTTP requests to the server.

    In this case, the server will open the connection and wait for the complete header to be received. However, the client (the DoS tool) will not send it and will instead keep sending bogus header lines which will keep the connection allocated.
    The initial part of the HTTP request is completely legitimate:

    GET / HTTP/1.1\r\n
    Host: host\r\n
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n
    Content-Length: 42\r\n
    

    After sending this the client waits for certain time – notice that it is missing one CRLF to finish the header which is otherwise completely legitimate. The bogus header line the tools sends is currently:
    X-a: b\r\n
    

    Which obviously doesn't mean anything to the server so it keeps waiting for the rest of the header to arrive.

    Its funny how something like this wasn't exploited before..

    http://isc.sans.org/


Comments

  • Closed Accounts Posts: 752 ✭✭✭JimmyCrackCorn!


    It takes someone special in security to think outside the norm.

    C was over 10 yeas old before someone thought of putting %s %f into its input buffers to make it poo itself. After that everyone tried it.


  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    i'm convinced this was documented long before yesterday, just surprised versions of apache server were vulnerable to it.


Advertisement