
Rapid Reset HTTP/2 vulnerability: When streaming leads to flooding
The Rapid Reset vulnerability is yet another weakness in the HTTP/2 protocol that allows for DDoS attacks on a massive scale. This post summarizes how the attack works, why it’s possible, what mitigations are available, and why it likely won’t be the last scare related to HTTP/2.