Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding a description of the Slowloris attack in security section #448

Merged
merged 8 commits into from Apr 24, 2017
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
6 changes: 3 additions & 3 deletions draft-ietf-quic-transport.md
Expand Up @@ -78,7 +78,7 @@ informative:
- ins: J. Roskind
date: 2013-12-02
target: "https://goo.gl/dMVtFi"

SLOWLORIS:
title: "Welcome to Slowloris..."
author:
Expand Down Expand Up @@ -2754,8 +2754,8 @@ data on an open stream, slowly opening the flow control windows in order
to limit the sender rate, or possibly manufacturing QUIC ACK that
simulate a high loss rate and slow down sending by the other endpoint.

QUIC implementers SHOULD implement
mitigations of the Slowloris attack, such as increasing the maximum
QUIC deployments SHOULD provide
mitigations of the Slowloris attacks, such as increasing the maximum
number of clients the server will allow,
limiting the number of connections
a single IP address is allowed to make,
Expand Down