mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2024-12-11 05:54:39 +00:00
036fae0ec9
In order to offer DoS protection, it may be required to lower the maximum accepted time to receive a complete HTTP request without affecting the client timeout. This helps protecting against established connections on which nothing is sent. The client timeout cannot offer a good protection against this abuse because it is an inactivity timeout, which means that if the attacker sends one character every now and then, the timeout will not trigger. With the HTTP request timeout, no matter what speed the client types, the request will be aborted if it does not complete in time. |
||
---|---|---|
.. | ||
active-sh.cfg | ||
active-srv.cfg | ||
backup-all-sh.cfg | ||
backup-all.cfg | ||
backup-first.cfg | ||
backup-second-sh.cfg | ||
backup-second.cfg | ||
basic-test.cfg | ||
defaults.cfg | ||
filltab25.c | ||
hash_results.txt | ||
httpterm-basic.cfg | ||
io_limits.txt | ||
sessionhash_test.c | ||
sockstat.txt | ||
test_hashes.c | ||
test_pools.c | ||
test-backlog.cfg | ||
test-balance.cfg | ||
test-check-cpu.cfg | ||
test-disable-404.cfg | ||
test-fwrr.cfg | ||
test-log.cfg | ||
test-retries.cfg | ||
test-status.cfg | ||
test-time.cfg | ||
test-timeout.cfg | ||
test-url-hash.cfg | ||
test-valid-names.cfg | ||
test.c | ||
testinet.c | ||
uri_hash.c |