See discussion
Send few pretty large headers(huffman encoded), then cause RST_STREAM(by client or by error), repeat this in other streams. Hpack is per connection, and if we allocate memory for hpack processing it could be not freed until keep-alive connection closing (notice, RST_STREAM not cause connection closing).
It depends on 1196
for tempesta-tech/tempesta#1346
See discussion
handle_readmethod.“Ping Flood” and CVE-2019-9515 “Settings Flood” - just send a many frames usingAdded in Implement more tests to check Tempesta FW under flood #729send_bytesmethod from DeproxyClientH2. We need a new directive in frang.send_bytesmethod from DeproxyClientH2. I think we need 2 tests: first - without end_stream in requests, second - with a large response body.“Reset Flood” - just open many streams and sending invalid HEADERS frame viaAdded in Implement more tests to check Tempesta FW under flood #729send_bytesfrom DeproxyClientH2“0-Length Headers Leak” - please check discussion. We need to check for "0-Length Headers Leak" andadded in test OOM by header leak #616socket,ssland `h2 libraries and check as Tempesta use memory and CPU. (You must not read a data from a socket)It depends on 1196
for tempesta-tech/tempesta#1346