• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Tomcat Range attacks

 
Ranch Hand
Posts: 820
IntelliJ IDE VI Editor Tomcat Server
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thanks, author of Tomcat 7, for appearing on this forum.

I'm trying to figure out if Tomcat is still vulnerable to Slowloris attacks.

and, if Tomcat is (or was) vulnerable to so-called Range attacks (http://serverfault.com/questions/317226/tomcat-denial-of-service) where a connection can be held open longer than expected because client has specified a range of bytes that overlap.




 
author
Posts: 37
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Tim,

Sorry for the delay in reply
DOS (denial of services) is fixed in tomcat; can you please elaborate your question?
 
Tim McGuire
Ranch Hand
Posts: 820
IntelliJ IDE VI Editor Tomcat Server
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thank you for the reply. I think you are asking me to elaborate on slowloris.

Slowloris holds connections open by sending partial HTTP requests. It continues to send subsequent headers at regular intervals to keep the sockets from closing. In this way webservers can be quickly tied up. In particular, servers that have threading will tend to be vulnerable, by virtue of the fact that they attempt to limit the amount of threading they'll allow.



When it first came out (in 2009), I tested Slowloris against Tomcat and found that it indeed tied up Tomcat and made it unresponsive. I became curious about it again these past few weeks and I've been searching for how Tomcat (and apacheHTTPD) have dealt with it. I can't find much written about it recently, so I thought I would ask.

I found these two articles, which explain the problem, but don't seem to offer a foolproof solution:

http://www.cert.org/blogs/certcc/2009/07/slowloris_vs_your_webserver.html

http://www.funtoo.org/wiki/Slowloris_DOS_Mitigation_Guide
reply
    Bookmark Topic Watch Topic
  • New Topic