You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The text was updated successfully, but these errors were encountered:
JustinAzoff
changed the title
Cache key normalization does not properly distringuish requests
Cache key normalization does not properly distinguish requests
Feb 1, 2018
For a graceful shutdown, the specs requries to discard frames with a
stream ID higher than the advertised last_id. (RFC7540#6.8). Well,
finally for now the code is disabled (see last page of #6.8). Some
frames need to be processed anyway to maintain the compression state
and the flow control window state, but we don't have any trivial way
to do this and ignore them at the same time. For the headers it's
the worst case where we can't parse headers frames without coming
from the streams, and we don't want to create such streams as we'd
have to abort them, and aborting would cause errors to flow back.
Possibly that a longterm solution might involve using some dummy
streams and dummy buffers for this and calling the parsers directly.
Is this a BUG report or FEATURE request?:
Bug
What happened:
The default cache key normalizes different requests to the same cache key
What you expected to happen:
Different requests would use different cache keys
How to reproduce it (as minimally and precisely as possible):
Then make two requests that differ only in the position of the '?':
Anything else we need to know?:
This is similar to what caused this issue: https://rdist.root.org/2009/05/20/amazon-web-services-signature-vulnerability/
The text was updated successfully, but these errors were encountered: