Slowloris (cyber attack)
Original author(s) | RSnake |
---|---|
Initial release | 17 June 2009 |
Stable release | 0.7
|
Written in | Perl |
Size | 36 kb |
Website | ha.ckers.org/slowloris/ |
Slowloris is a piece of software written by Robert "RSnake" Hansen which allows a single machine to take down another machine's web server with minimal bandwidth and side effects on unrelated services and ports.[1]
Slowloris tries to keep many connections to the target web server open and hold them open as long as possible. It accomplishes this by opening connections to the target web server and sending a partial request. Periodically, it will send subsequent HTTP headers, adding to—but never completing—the request. Affected servers will keep these connections open, filling their maximum concurrent connection pool, eventually denying additional connection attempts from clients.[1]
Affected web servers
This section needs expansion. You can help by adding to it. (December 2009) |
There are a number of web servers that are vulnerable to Slowloris' form of attack. Some of the vulnerable web servers include Apache 1.x, Apache 2.x, dhttpd, and the GoAhead WebServer software.[1]
Mitigating the Slowloris attack
While there are no reliable configurations of the affected web servers that will prevent the Slowloris attack, there are ways to mitigate or reduce the impact of such an attack. In general these involve increasing the maximum number of clients the webserver will allow, limiting the number of connections a single IP address is allowed to make, imposing restrictions on the minimum transfer speed a connection is allowed to have, and restricting the length of time a client is allowed to stay connected.
In the Apache web server, a number of modules can be used to limit the damage caused by the Slowloris attack; the Apache modules mod_limitipconn, mod qos, mod_evasive, mod_security, mod_noloris, and mod_antiloris have all been suggested as means of reducing the likelihood of a successful Slowloris attack.[1][2]
Other mitigating techniques involve setting up reverse proxies, firewalls, load balancers or content switches.[3] Administrators could also change the affected web server to software that is unaffected by this form of attack. For example, lighttpd and nginx do not succumb to this specific attack.[1]
Notable usage
This section needs expansion. You can help by adding to it. (December 2009) |
During the protests that erupted in the wake of the 2009 Iranian presidential election, Slowloris arose as a prominent tool used to leverage DoS attacks against sites run by the Iranian government.[4] The belief was that using a DDoS attack would affect internet access for the government and protesters equally, due to the significant bandwidth they can use. The Slowloris attack was chosen instead, because of its high impact and relatively low bandwidth.[5] A number of government run sites were targeted during these attacks, including gerdab.ir, leader.ir, and president.ir.[6]
Similar software
Since its release, a number of programs have appeared that mimic the function of Slowloris while providing additional functionality, or running in different environments:[7]
- PyLoris - A protocol-agnostic python implementation supporting TOR and SOCKS proxies.[8]
- QSlowloris - An executable form of Slowloris designed to run on Windows, featuring a Qt front end.[9]
- An unnamed PHP version which can be run from an HTTP server.[10]
- slowhttptest - highly configurable slow attacks simulator, written in C++[11]
See also
References
- ^ a b c d e "Slowloris HTTP DoS". ha.ckers.org. Retrieved 7 January 2012.
- ^ "mod_noloris: defending against DoS". niq's soapbox. Retrieved 7 January 2012.
- ^ Breedijk, Frank (22 June 2009). "Slowloris and Nkiller2 vs. the Cisco CSS load balancer". Cupfighter.net. Retrieved 7 January 2012.
- ^ Zdrnja, Bojan (23 June 2009). "ISC Diary | Slowloris and Iranian DDoS attacks". Isc.sans.org. Retrieved 7 January 2012.
- ^ [1][dead link ]
- ^ [2][dead link ]
- ^ Robert “RSnake” Hansen. "Slowloris" (PDF). SecTheory. Retrieved 7 January 2012.
- ^ "PyLoris". MotomaSTYLE. 19 June 2009. Retrieved 7 January 2012.
- ^ "How to help take down gerdab.ir in 5 easy steps". cyberwar4iran. 28 June 2009. Retrieved 7 January 2012.
- ^ "Full Disclosure: apache and squid dos". Seclists.org. 19 June 2009. Retrieved 7 January 2012.
- ^ "Testing Web Servers for Slow HTTP Attacks". qualys.com. 19 September 2011. Retrieved 13 January 2012.
External links
- Slowloris HTTP DoS
- hackaday on Slowloris
- Apache attacked by a "slow loris" article on LWN.net
- Slowloris - a short video (including a demo)