user/dev discussion of public-inbox itself
 help / color / mirror / code / Atom feed
* [PATCH 0/3] http: some DoS prevention
@ 2016-03-06  2:09 Eric Wong
  2016-03-06  2:09 ` [PATCH 1/3] http: reject excessive headers Eric Wong
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Eric Wong @ 2016-03-06  2:09 UTC (permalink / raw)
  To: meta

Since public-inbox-httpd is may face untrusted clients directly
without a reverse proxy like haproxy/nginx; we should have some
basic protection to avoid DoS attacks involving excessive
resource use.

Eric Wong (3):
      http: reject excessive headers
      http: ensure errors are printable before PSGI env
      http: reject excessively large HTTP request bodies

 lib/PublicInbox/HTTP.pm | 23 ++++++++++++++++++++---
 t/httpd-corner.t        | 33 +++++++++++++++++++++++++++++++++
 2 files changed, 53 insertions(+), 3 deletions(-)

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2016-03-06  2:09 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-03-06  2:09 [PATCH 0/3] http: some DoS prevention Eric Wong
2016-03-06  2:09 ` [PATCH 1/3] http: reject excessive headers Eric Wong
2016-03-06  2:09 ` [PATCH 2/3] http: ensure errors are printable before PSGI env Eric Wong
2016-03-06  2:09 ` [PATCH 3/3] http: reject excessively large HTTP request bodies Eric Wong

Code repositories for project(s) associated with this public inbox

	https://80x24.org/public-inbox.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).