DDOS crash #1823
Replies: 1 comment 5 replies
-
Yeah, that's pretty unexpected; Rust programs and Rocket web servers are typically robust. I don't recognize 255 as an error code that either Rocket (or a typical Rust application) would normally produce, either. This could potentially be caused by something outside of Rocket's direct control, such as an out-of-memory error, application or library code calling
That's even more unfortunate. Do you have other information you could correlate with Rocket's log, such as logs of incoming requests before they reach Rocket? You could also try using a more detailed log level to try and narrow down the issue.
I don't understand this part; is there some reason you think the logging is causing the crashes? What you are asking for here seems impossible on its face: the path pretty much must be parsed first, in order to do anything with it - including determining whether not it exists. |
Beta Was this translation helpful? Give feedback.
-
I wrote a public website using Rocket.
That application gets targetted by people trying to find vulnerabilities (from SQLInjection to XSS and other stuff).
The app is hosted within a Docker environment and once in a while, the container ends with "Error(255)", which means that Rocket terminated with error code 255.
When I check the logs, there's nothing out of the ordinary (except for all those requests); no errors, just end of the log.
I was wondering if there's a way to switch to a different logging or somehow disable parsing of the paths that don't exist.
Whenever they're trying to access
/
, and they append tons of GET parameters, it just passes normally, but I'm unsure how that weighs the system down.Beta Was this translation helpful? Give feedback.
All reactions