Security Update

Resilience Against HTTP/2 Rapid Reset

An in-depth analysis of CVE-2023-44487 and nBalance's robust defense mechanisms.

HTTP/2 Vulnerability Graph
Tech Team 5 Min Read Cybersecurity

Recent developments surrounding CVE-2023-44487, a vulnerability detected within the HTTP/2 protocol, have raised concerns about potential denial-of-service attacks targeting web servers and reverse proxies.

However, nBalance emerges unscathed from these threats, thanks to its robust architecture and proactive measures.

Why nBalance is Unaffected

nBalance remains impervious to CVE-2023-44487 due to its robust design. This vulnerability exploits the HTTP/2 protocol's stream multiplexing to manipulate the request cancellation function, enabling attackers to inundate servers with minimal resource cost.

While HTTP/2 implements a request concurrency limit, nBalance, configurable to default 100 active streams per connection, automatically rejects attempts to exceed this limit using RST_STREAM frames, safeguarding against excessive stream openings.

The minimal message size required to create and reset a stream renders this method appealing to attackers, as taking down an unprotected server demands negligible bandwidth. nBalance's immunity to such exploits stems from its meticulous resource tracking and efficient stream management.

Safeguarded by Design

nBalance is inherently safeguarded by its design against vulnerabilities such as those posed by malicious client behavior. Recognizing the potential impact of such issues on load balancers, nBalance prioritizes resilience.

Versions 1.9 and beyond have fortified nBalance's defenses by enhancing its handling of HTTP/2 protocol stream multiplexing. In contrast to merely tallying established streams at the protocol level, nBalance meticulously tracks allocated resources.

Security Shield

A stream remains accounted for until its resources are fully released, effectively enforcing the streaming limit. Consequently, new stream creation is deferred until nBalance falls below the configured stream limit again.

Ensuring Unaffected Status (Internal Testing)

In response to CVE-2023-44487, we have conducted thorough internal testing employing diverse test cases and simulated attacks.

Furthermore, we executed a comparative analysis between the number of calls to various functions within the process during attack simulations and under h2load. The numbers remained practically identical, indicating unsuccessful attack penetration.

Conclusion

Drawing from previous advancements and recent evaluations, nBalance stands resilient against the HTTP/2 Rapid Reset Attack. Our performance remains unaffected by DoS attacks exploiting stream multiplexing, ensuring that the servers supported by nBalance do not experience anomalous traffic surges.

Our clientele can have confidence in our commitment to crafting products with resource optimization at the forefront. This dedication accounts for nBalance's immunity to CPU, memory, and overall resource-related vulnerabilities.