HTTP is "broken" with critical DDOS flaw, say researchers

HTTP is Researchers from Proactive Risk, an IT security firm, will demonstrate at an upcoming application security conference a systemic flaw in the HTTP protocol that can easily be exploited through online gaming and other activities into distributed denial-of-service (DDOS) attacks that can flood web servers -- even through secure connections -- with very slow "POST" traffic that is difficult to distinguish from legitimate traffic, making it hard to prevent.

HTTP is The demonstration will come November 8th at the OWASP 2010 conference in Washington DC and is led by researcher Wong Onn Chee, who first discovered the attack last year in Singapore, according to a report from Dark Reading, a security-focused web site. The technique can crash both IIS and Apache servers using either HTTP or HTTPS protocols, and could conceivably affect anything using a web connection, including SSL, VPN and other "more secure" systems.

Onn Chee and Proactive Risk founder Tom Brennan will show members at the conference how the technique works using a Java applet that runs a game, how it could be used to recruit bots into an "agentless" botnet and attack servers while the players are playing. Brennan and Onn Chee will also solicit for ways to mitigate the risk. The actual fix would involve changing the HTTP protocol, since it is a "critical" flaw in internet infrastructure "by design." The "slow POST" technique could be adapted to also work on SMTP and possibly DNS servers as well.

As described by Onn Chee, the attack works by sending POST headers with legitimate "content-length" fields to let the server know how much data is arriving, but once the headers are sent, the actual body of the message is transmitted at very slow speeds, creating gridlock and tying up resources. In practice, a relatively small quantity of bots doing this (tens of thousands) could disable a server within minutes. Load-balancing software in wide use now to prevent similar DDOS attacks will not be effective against this technique.

So far, this form of attack has been rarely seen outside China, but the "agentless" nature of the attack makes it effective, difficult to prevent and difficult to trace, ensuring it will spread.

Source: electronista

Tags: Internet

Comments
Add comment

Your name:
Sign in with:
or
Your comment:


Enter code:

E-mail (not required)
E-mail will not be disclosed to the third party


Last news

 
Consumer group recommends iPhone 8 over anniversary model
 
LTE connections wherever you go and instant waking should come to regular PCs, too
 
That fiction is slowly becoming a reality
 
The Snapdragon 845 octa-core SoC includes the Snapdragon X20 LTE modem
 
Human moderators can help make YouTube a safer place for everyone
 
Google says Progressive Web Apps are the future of app-like webpages
 
All 2018 models to sport the 'notch'
 
The biggest exchange in South Korea, where the BTC/KRW pair is at $14,700 now
The Samsung Galaxy A5 (2017) Review
The evolution of the successful smartphone, now with a waterproof body and USB Type-C
February 7, 2017 /
Samsung Galaxy TabPro S - a tablet with the Windows-keyboard
The first Windows-tablet with the 12-inch display Super AMOLED
June 7, 2016 /
Keyboards for iOS
Ten iOS keyboards review
July 18, 2015 /
Samsung E1200 Mobile Phone Review
A cheap phone with a good screen
March 8, 2015 / 4
Creative Sound Blaster Z sound card review
Good sound for those who are not satisfied with the onboard solution
September 25, 2014 / 2
Samsung Galaxy Gear: Smartwatch at High Price
The first smartwatch from Samsung - almost a smartphone with a small body
December 19, 2013 /
 
 

News Archive

 
 
SuMoTuWeThFrSa
     12
3456789
10111213141516
17181920212223
24252627282930
31      




Poll

Do you use microSD card with your phone?
or leave your own version in comments (4)