Table of contents of the article:
Introduction
Recently, tech giants such as Google, Amazon, Microsoft, and Cloudflare have revealed that they have faced massive DDoS attacks against their cloud infrastructure. The attacks were as unique as they were dangerous, exploiting a vulnerability in a key web protocol: HTTP/2. This article aims to explain the severity of the situation and what it means for businesses and individuals using web services.
What is HTTP/2 Rapid Reset?
The vulnerability known as “HTTP/2 Rapid Reset” was reported with the identifier CVE-2023-44487 and exploits a weakness in the HTTP/2 protocol. It does not allow you to take remote control of a server or exfiltrate data, but it does allow attackers to carry out Denial of Service (DoS) attacks. According to Emil Kiner and Tim April of Google Cloud, such a loss of availability can have a “large-scale impact on victim organizations, including loss of business and unavailability of mission-critical applications.”
How Does the Attack Work?
The attack exploits HTTP/2's stream cancellation feature to continuously send and cancel requests, overloading the target server or application and imposing a DoS state. Malicious actors have been using this technique since August to send a barrage of HTTP/2 requests and resets (RST_Stream frames) to a server, asking the server to process them and perform quick resets, thus exceeding its ability to respond to new incoming requests .
Ineffective Safeguards
HTTP/2 includes a security measure in the form of a parameter that limits the number of simultaneously active flows to prevent DoS attacks. However, this measure is not always effective. The protocol's developers introduced a more efficient measure called request cancellation, which does not interrupt the entire connection, but can be abused.
Technical details
As Google explains in its post on the topic, “the protocol does not require the client and server to coordinate deletion in any way; the client can do it unilaterally.” This means that the client can assume that the deletion will take effect immediately when the server receives the RST_STREAM frame, before any other data is processed from that TCP connection.
Where Does Vulnerability Come From?
The vulnerability is inherent in the specification of the HTTP/2 protocol, developed by the Internet Engineering Task Force (IETF). This protocol has been widely adopted and is the fastest and most efficient successor to the classic HTTP protocol. The vulnerability is therefore relevant for “every modern web server”, as highlighted by Cloudflare's Lucas Pardue and Julien Desgats.
Why is it so Hard to Fix?
Unlike a bug in specific software, which can be fixed by a single entity, a vulnerability in a protocol requires a much more widespread approach to mitigate. Each website implements the specification in its own way, and therefore each organization or individual must work on their own protections.
Open Source as an Advantage
Dan Lorenc, an expert on open source software, suggests that the availability of open source code is an advantage in situations like this. Many web servers have probably copied their HTTP/2 implementation from another source, thus facilitating the deployment of security patches.
What Should Companies Do?
For companies focused on web performance, like us, it is crucial to stay updated on these emerging threats and implement the necessary security patches as soon as possible. It is crucial to consult official resources for the latest patches and apply them to your web servers. However, full adoption of these patches will take years, and some services that have implemented HTTP/2 from scratch may remain vulnerable in the long term.
Conclusion
While recent DDoS attacks were successfully repelled, they revealed the existence of a protocol vulnerability that now needs to be addressed on a global scale. It's a powerful reminder of how crucial it is to maintain a proactive approach to cybersecurity and protecting your digital assets.
For more information on how to protect your infrastructure, please contact us or check out our other blog resources, where we discuss topics such as Linux systems engineering, MySQL, Databases, AWS Cloud and performance optimization.