URL variation DOS attack protection

Created on 10 August 2011, over 13 years ago
Updated 4 November 2024, 5 months ago

Right now, the result of every URL requested by anyonymous users gets stored in cache_page - including invalid urls (page not found). This is a possible attack vector for DOS attacks in two ways:

1) If an attacker just called random pages or the same page with varying bogus GET params, he can quickly produce many thousands of cache entries, which can potentially clog up the system.

2) Since only known URLs are fetched from cache, an attacker can produce increased system load by submitting random GET params with each request, thus eluding the cache entirely.

An effective but not very pretty countermeasure (e.g. implemented by Typo3) is to append every URL with a salted hash string of the URL. If the system receives a request in which the hash does not match the preceding params, the link obviously has been tempered with, and the result is just an error message.

There's probably other ways of doing this as well.

🐛 Bug report
Status

Closed: duplicate

Version

9.3

Component

page_cache.module

Created by

🇩🇪Germany ralf.strobel

Live updates comments and jobs are added and updated live.
Sign in to follow issues

Comments & Activities

Not all content is available!

It's likely this issue predates Contrib.social: some issue and comment data are missing.

  • The ideas from #27 are interesting enough (especially from an optimization standpoint if you don't want to integrate a reverse proxy for caching purposes).

    The https://www.drupal.org/project/page_cache_query_ignore module seems to address a subset of the functionality without the necessary granularity for controlling the query strings supported for specific routes. The ideas proposed here can be potentially incorporated in that module.

  • 🇫🇷France fgm Paris, France

    @catch Do you have the reference of any issue of which this might be a duplicate ?

    I agree that the mechanisms you mention may be part of the solution to the problem, but they are not sufficient on their own and do not reduce load as much as this would unless adding a lot more off-Drupal configuration.

    If this issue was marked as a duplicate only because of these mechanisms, it does not seems like it is actually a duplicate, and would merit being pursued on its own.

  • 🇫🇷France dakwamine

    If this issue is resolved only by requiring external systems, I agree with @fgm to not mark this as duplicate.

    The module shared by @codebymikey in the comment #29 implements some of the ideas from here, and can be augmented with other ones.

    Listing some of the ideas gathered here so far for a quick recap:

    - work within an early http.middleware service.
    - ensure a consistent order for the query parameters.
    - ignore query parameters based on an allow/disallow list.
    - read this allow/disallow list set by the routing definition, gathered by a Routing listener service into KV records for quick checks.
    - perform a single (1 per request?) preemptive (DB table size [better IMO] OR rows count) check before inserting an item into the cache, and (ignore until the next cron run OR prune) if full, instead of pruning AFTER the limit was exceeded.
    - partial pruning using a popularity index, instead of the current max rows approach.

    Maybe some of them have been addressed in the recent core releases.

Production build 0.71.5 2024