What are NGINX reverse proxy users doing to prevent HTTP Request smuggling?

Maxim Dounin mdounin at mdounin.ru
Tue Dec 14 22:16:51 UTC 2021


Hello!

On Tue, Dec 14, 2021 at 02:50:19PM +0000, Sai Vishnu Soudri (ssoudri) wrote:

> Thanks a lot for your reply. Just to clarify, by "There are no 
> know vulnerabilities in nginx which make request smuggling 
> possible" you mean after the 1.21.x release right?
> I am using OpenResty and the latest version of OpenResty is 
> based on mainline nginx core 1.19.9.

Supported releases are 1.20.2 stable and 1.21.4 mainline, see 
http://nginx.org/en/download.html.  Though 1.19.9 isn't much 
different.

> Currently, the approach I'm taking to mitigate HTTP Request 
> Smuggling is blocking all incoming HTTP/1.1 requests. I was 
> worried if incoming HTTP/2 requests would pose a vulnerability 
> as nginx converts it before sending upstream, but with your 
> reply I believe that should not be a problem anymore.
> 
> Since OpenResty is not able to leverage the new changes added in 
> 1.21.x, do you suggest I continue with this approach till 
> OpenResty can leverage the changes made in 1.21.x or is it 
> mandatory to use 1.21.x and block HTTP/1.1 requests to prevent 
> request smuggling.

I don't think you need to do anything special to prevent request 
smuggling unless you are using a buggy server in front of nginx.

-- 
Maxim Dounin
http://mdounin.ru/


More information about the nginx mailing list