How CloudFlare defends against TLS-Random Query attacks


It was found that DDoS attacks using TLS-Random Query will penetrate Cloudflare and put a certain amount of pressure on the server!

Even if it’s just a 502 error:

139.196.44.148 - [15/Mar/2024:11:26:40 +0800] “GET /RT8dBUq00V8uNFxV HTTP/1.1” 502 552 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36” Gzip=-

It may also reach the server due to large volume. How should we deal with such a situation?

This topic was automatically closed 15 days after the last reply. New replies are no longer allowed.