Site icon FastNetMon DDoS Detection Tool

MadeYouReset: The New HTTP/2 DDoS Threat and Mitigation Strategies

 MadeYouReset is a new HTTP/2 DDoS vector related to 2023’s Rapid Reset. By provoking the server to reset streams with malformed frames, an attacker keeps backend request processing alive while freeing the stream from HTTP/2 accounting. One TCP connection can drive an effectively unbounded number of in-flight requests through a proxy to origins. Patching affected implementations and enforcing request and control-frame rate limits are the fastest mitigations.

What’s new vs. Rapid Reset?

Imperva and Tel Aviv University disclosed the issue; CERT/CC described it as a mismatch between HTTP/2 stream accounting and actual backend activity. At the time of disclosure, no exploitation in the wild was reported. The attack also blends with normal traffic, so naïve RPS or connection counters may not light up.

Affected software and patch status

The underlying flaw (CVE-2025-8671) impacts a wide set of HTTP/2 stacks and proxies/projects, including AMPHP, Apache Tomcat, Eclipse Foundation projects, F5, Fastly, gRPC, Mozilla, Netty, SUSE Linux, Varnish Software, Wind River, and Zephyr Project.
Patches have been released by Apache Tomcat, F5, Fastly, and Varnish; others are investigating or preparing fixes. Some vendors track the issue under their own CVE IDs. (Mozilla noted Firefox itself is not affected; their hosted services are being patched.)

Root cause (why this works)

HTTP/2 allows either endpoint to cancel a stream at any time. Many implementations continue processing a request that has already been reset, because work has already been scheduled upstream (cache lookup, origin forward, buffering, etc.). Meanwhile the stream no longer counts against SETTINGS_MAX_CONCURRENT_STREAMS. The attacker exploits this gap:

Frames that can trigger server-side resets:

Frames that force a connection error are less useful to the attacker (they close the TCP session).

Attack walk-through 

Left: normal operation bounded by MAX_CONCURRENT_STREAMS.

Right: repeated invalid frames force server RST_STREAM; streams drop from accounting while origin work continues, so the proxy/origin collapses under queued responses.

Why proxies and origins suffer

What to monitor (practical signals)

Even if you don’t parse HTTP/2 frames on the wire, you can watch for these effects:

From a FastNetMon perspective (flow/packet telemetry):

Mitigation checklist

1) Patch first

Upgrade affected servers, proxies, and libraries. Many vendors have shipped updates; others are in progress. Apply vendor-specific CVEs as they appear.

2) Drop on invalid frames (prefer connection errors)

Where policy allows, treat malformed WINDOW_UPDATE/PRIORITY/illegal frame sequences as connection-fatal instead of stream-fatal. This removes the accounting gap.

3) Request-rate and concurrency controls

4) Control-frame rate limiting

If your HTTP/2 stack supports it, enforce small sliding-window limits on control frames to blunt both Rapid Reset and MadeYouReset. Reasonable starting baselines reported by one vendor’s testing:

Tune with production telemetry; browsers usually reconnect automatically if a connection is dropped by policy.

5) WINDOW_UPDATE sanity

Aim to prevent abusive WINDOW_UPDATE patterns:

(If your platform exposes multipliers or counters for these, monitor and tune them under load testing.)

6) Backpressure and buffering hygiene

7) Detection → automation

8) Consider HTTP/3 policies

Operators often fall back to HTTP/2 during HTTP/3 incidents. Track draft efforts like “Using HTTP/3 Stream Limits in HTTP/2” and prefer connection-fatal handling for invalid sequences where compliant.

Key takeaways

Visibility matters: correlate proxy/origin metrics with network telemetry to catch the pattern early and automate response.

MadeYouReset exploits a design/implementation gap: backend work continues after a stream reset while stream accounting drops to zero.

It can hide inside a single connection and look like normal traffic until the origin buckles.

Patching, tighter control-frame handling, and rate limits are the most effective immediate defenses.


About FastNetMon

FastNetMon is a leading solution for network security, offering advanced DDoS detection and mitigation. With real-time analytics and rapid response capabilities, FastNetMon helps organisations protect their infrastructure from evolving cyber threats.For more information, visit https://fastnetmon.com

Exit mobile version