... It works by sending tons of HTTP requests using different paramater value pairs each time, to bypass caching servers like Varnish. Ultimately it’s not a good idea to ever use this kind of code as an adversary because it would be flooding from their own IP address. ....
Hiawatha already has several flood-blocking options, so this should not be much of a problem.
J. Lambrecht
18 December 2014, 11:00
Thanks, i got curious if there would be anything to learn from this 'novel attack'.
Hugo Leisink
19 December 2014, 08:06
Perhaps that every feature and functionality you add to your application potentially introduces a weakness.
J. Lambrecht
19 December 2014, 13:41
True Which is why I'm advocating hiawatha, it has clear functional goals, a manageable code-base and proves able to perform. It might not be perfect but it's damn close imho.
In the light of the next-web ( nosql etc ) i think manageable and secure components will prove essential to providing security as promised.