-
-
Notifications
You must be signed in to change notification settings - Fork 35.4k
http2: treat non-EOF empty frames like other invalid frames #37875
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 2 commits
fd15502
515cab2
752cb85
a087881
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -1335,7 +1335,11 @@ int Http2Session::HandleDataFrame(const nghttp2_frame* frame) { | |
| frame->hd.flags & NGHTTP2_FLAG_END_STREAM) { | ||
| stream->EmitRead(UV_EOF); | ||
| } else if (frame->hd.length == 0) { | ||
| return 1; // Consider 0-length frame without END_STREAM an error. | ||
| if (invalid_frame_count_++ > js_fields_->max_invalid_frames) { | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Should invalid_frame_count be reset if valid frames come through? Pertaining to #37849, if an end server is sending EOF frames after every valid frame, would this solution only allow for single requests in a session?
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. So... I don't think we'd want to reset after every valid frame, or at least I think that would be a bit separate from this PR. What would makes sense to me is to make this a ratio of invalid frames/total frames that is being limited, rather than the total # of invalid frames ... but that feels a bit out of scope here :/ In any case, users who do wish to allow for a large number of invalid frames can set the |
||
| Debug(this, "rejecting empty-frame-without-END_STREAM flood\n"); | ||
| // Consider a flood of 0-length frames without END_STREAM an error. | ||
| return 1; | ||
| } | ||
| } | ||
| return 0; | ||
| } | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,39 @@ | ||
| 'use strict'; | ||
| const common = require('../common'); | ||
| if (!common.hasCrypto) | ||
| common.skip('missing crypto'); | ||
| const { readSync } = require('../common/fixtures'); | ||
| const net = require('net'); | ||
| const http2 = require('http2'); | ||
| const { once } = require('events'); | ||
|
|
||
| async function main() { | ||
| const blobWithEmptyFrame = readSync('emptyframe.http2'); | ||
| const server = net.createServer((socket) => { | ||
| socket.end(blobWithEmptyFrame); | ||
| }).listen(0); | ||
| await once(server, 'listening'); | ||
|
|
||
| for (const maxSessionInvalidFrames of [0, 2]) { | ||
| const client = http2.connect(`http://localhost:${server.address().port}`, { | ||
| maxSessionInvalidFrames | ||
| }); | ||
| const stream = client.request({ | ||
| ':method': 'GET', | ||
| ':path': '/' | ||
| }); | ||
| if (maxSessionInvalidFrames) { | ||
| stream.on('error', common.mustNotCall()); | ||
| client.on('error', common.mustNotCall()); | ||
| } else { | ||
| stream.on('error', common.mustCall()); | ||
| client.on('error', common.mustCall()); | ||
| } | ||
| stream.resume(); | ||
| await once(stream, 'end'); | ||
| client.close(); | ||
| } | ||
| server.close(); | ||
| } | ||
|
|
||
| main().then(common.mustCall()); |
Uh oh!
There was an error while loading. Please reload this page.