Ник | Пост | Дата |
---|---|---|
ValdikSS | Some time ago I had an idea: how DPI would handle uncommonly large amount of HTTP header data, if the Let’s see the size of HTTP header buffer of common web servers. NginxNginx has 32KiB overall buffer, each header line can’t be longer than 8KiB.
https://nginx.org/en/docs/http/ngx_http_core_module.html#large_client_header_buffers Apache httpdHttpd has 8190 bytes limit for each header and no(?) overall limit.
https://httpd.apache.org/docs/2.4/mod/core.html#limitrequestfieldsize IISAccording to iis 7 - Is there a practical HTTP Header length limit? - Stack Overflow, IIS 6 has 16 KiB limit for each header. TomcatAccording to iis 7 - Is there a practical HTTP Header length limit? - Stack Overflow, Tomcat 7 has 8190 overall limit. Testing top 10000 sitesI decided to perform test on Alexa top 10000 websites and see which would stop working correctly with 14k and 18k padding data. Common CURL HTTP request
14 KB of padding data
As we can see, with 14k padding data 3.4% websites started to return either 5xx or 4xx error code compared to non-padded request. 18 KB of padding data
Going beyond 16KiB limit breaks a lot of websites: about 16.8% servers responded with either 4xx or 5xx error codes, compared to stock curl request. ResultThis method could be used in some cases, either with DPI systems with less than 16 KiB reassembly buffer or with some websites/web servers with lax configuration. The scripts I used: http-padding-test.7z (5.3 MB) Note: this test did not move | 2019-10-12T20:12:42.374Z |
ValdikSS | TLS Padding ExtensionWe can apply the same principle for HTTPS data, using TLS Padding Extension. This extension was introduced as a workaround of F5 SSLv3/TLS code, which incorrectly handled ClientHello packets between 256 byte and 512 byte size. Padding extension allows to include up to 16 KiB of null-byte padding data in TLS ClientHello packet. To perform this test, I’ve patched OpenSSL to include ~12KB of padding data to each ClientHello packet and to move Server Name Indication extension to the end of the packet, after padding. Did not forget it this time. I tested only TLS connection establishment, with certificate validation. Did not test underlying protocol (HTTP request). The padded handshake looks as follows:
The command used to check common HTTPS request is: And for padded request patched OpenSSL was used: Which produced the following result:
And for padded handshake:
Large TLS Padding Extension may disrupt only about 0.9% of top web sites. ResultThis method could be used in most cases and is compatible with large amount of CDNs, web servers and encryption stacks, but still may break some websites. https-padding-test.7z (105.7 KB) | 2019-10-12T21:37:20.699Z |
ValdikSS | Turns out this could be used to perform denial of service attacks over cloud proxy services. | 2019-10-27T13:11:51.651Z |
hookz(Talya) | I think we’re dealing with the first victims. And it doesn’t seem like a coincidence. | 2019-10-28T19:36:38.813Z |