Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make HTTP_MAX_HEADER_SIZE configurable #24692

Closed
elmarx opened this issue Nov 28, 2018 · 36 comments · Fixed by #24811
Closed

Make HTTP_MAX_HEADER_SIZE configurable #24692

elmarx opened this issue Nov 28, 2018 · 36 comments · Fixed by #24811
Labels
http_parser Issues and PRs related to the HTTP Parser dependency or the http_parser binding. http Issues or PRs related to the http subsystem.

Comments

@elmarx
Copy link

elmarx commented Nov 28, 2018

Is your feature request related to a problem? Please describe.

The recent limitation to HTTP_MAX_HEADER_SIZE (1860352) to mitigate CVE-2018-12121 is a problem for us.

We use headers internally to communicate the users' session, and sometimes (legitimate) requests from "outside" exceeed the 8 kb limit, too.
Given that JWT-strings easily exceed 1kb, I think the 8kb limit might be too little for others, too.
Or referrer-headers (especially in combination with payment-systems back-and-forth) tend to exceed 1kb, too.

Describe the solution you'd like
Have the possibility to configure the HTTP_MAX_HEADER_SIZE — at least via configuration-flag (at node-compile-time).
Setting this at run-time or at startup time would be nice, too.

Is setting this at compile time already possible? I couldn't find the option or best way to do it for node-gyp/gyp.

Describe alternatives you've considered

patching nodejs at compile time… not a good idea.

Reduce headers, yeah, would be nice, but that means completely changing parts of our architecture.

@vsemozhetbyt vsemozhetbyt added http Issues or PRs related to the http subsystem. http_parser Issues and PRs related to the HTTP Parser dependency or the http_parser binding. labels Nov 28, 2018
@mcjfunk
Copy link

mcjfunk commented Nov 28, 2018

Major +1 here. Our large enterprise is not in the position to reduce the possible headers that flow through our infrastructure to 8k. Agree that patching node at compile time is not a good solution for us.

@mpaw
Copy link

mpaw commented Nov 29, 2018

We are running into the same issue. The drop from 80kb to 8kb is forcing us to stick with the previous version of node until this is resolved.

This needs to be configurable either through a command line option, environment variable, or in code. A compile time flag is not a good solution for us (or probably 99% of other devs) either.

@cjihrig
Copy link
Contributor

cjihrig commented Nov 29, 2018

Sorry if I missed the conversation somewhere, but do we have the option of updating http_parser (or floating a patch on it) to make the max header size configurable at the parser level?

I did a little experimenting (definitely not PR ready at this point) at cjihrig@e55765d, and was able to adjust the max header size. It breaks ABI, but I'm not sure if we worry about that with the http parser.

cc: @bnoordhuis

EDIT: I don't think I would attach the max header size to the parser, but maybe add a function that sets the global max header size. That shouldn't break ABI. (cjihrig@fb615c5)

@foo4u
Copy link

foo4u commented Nov 29, 2018

It's also a major issue that this went out as a patch level fix to LTS editions. This is a breaking change.

Ideally this 8K hard limit commit should be reverted and new LTS releases cut.

@brycesteinhoff
Copy link

brycesteinhoff commented Dec 1, 2018

This affects us also, as our headers are right around 8k usually, but sometimes more (we have JWT tokens which account for > half of this).

Our base Docker images were locked to a Node major version, so this breaking change appeared out of nowhere when the upstream image updated the Node minor version.

@bnoordhuis
Copy link
Member

It breaks ABI, but I'm not sure if we worry about that with the http parser.

http-parser does, as do distros that link node to http-parser dynamically.

A possible way forward: split p->nread into two, p->nread and p->nread_max, possibly with better names. :-)

Drawback: there are some downstream projects that read p->nread, even though it's marked as private.

@cjihrig
Copy link
Contributor

cjihrig commented Dec 2, 2018

@bnoordhuis what about a function that would allow setting the global max header size? It's not necessarily the most elegant solution ever, but I don't think it would break anything.

@bnoordhuis
Copy link
Member

That could work. Two issues with the patch:

  • Don't use a k prefix if it's not actually constant.
  • Set the limit once, not every time a new parser is instantiated.

@elad-yosifon
Copy link

A week of debugging finally brought me here....
could of been easily solved if there was a simple debug log line that indicates that the request was blocked

@siboulet
Copy link

siboulet commented Dec 19, 2018

The biggest problem with this 8KB header limit change in my opinion is that it also applies to outbound HTTP requests response header parsing. Without any sort of runtime maximum HTTP header size parameter that can be defined in http request, Node.js will start throwing HPE_HEADER_OVERFLOW exceptions when parsing responses from external HTTP API calls that have large response headers (which isn't so uncommon when you factor in JWT and CSP headers).

@Fishrock123
Copy link
Contributor

Fishrock123 commented Dec 19, 2018

@mcollina Have you seen the above comment?

@mcollina
Copy link
Member

Thanks @Fishrock123 for the ping! I didn't see the message.

The biggest problem with this 8KB header limit change in my opinion is that it also applies to outbound HTTP requests response header parsing. Without any sort of runtime maximum HTTP header size parameter that can be defined in http request, Node.js will start throwing HPE_HEADER_OVERFLOW exceptions when parsing responses from external HTTP API calls that have large response headers (which isn't so uncommon when you factor in JWT and CSP headers)

From a technical perspective, I think we could make this setting per-instance of the http parser once we switch to llhttp. I think should be our target.
Note that #24811 is going to make this configurable with a startup option, which is a step in the right direction.

@siboulet Regarding the default limit, I'm open to increase it to 10KB or 12KB if it's common to have more than 8KB of headers data. Our assumption was that 8KB was plenty. Would you mind opening a new issue about changing the default value, and making some examples of requests that will trigger this?

cjihrig added a commit to cjihrig/node that referenced this issue Dec 20, 2018
This commit adds http_parser_set_max_header_size() to the
http-parser for overriding the compile time maximum HTTP
header size.

PR-URL: nodejs#24811
Fixes: nodejs#24692
Refs: nodejs/http-parser#453
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
Reviewed-By: Myles Borins <myles.borins@gmail.com>
Reviewed-By: Michael Dawson <michael_dawson@ca.ibm.com>
Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Jeremiah Senkpiel <fishrock123@rocketmail.com>
cjihrig added a commit to cjihrig/node that referenced this issue Dec 20, 2018
Allow the maximum size of HTTP headers to be overridden from
the command line.

co-authored-by: Matteo Collina <hello@matteocollina.com>
PR-URL: nodejs#24811
Fixes: nodejs#24692
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: Myles Borins <myles.borins@gmail.com>
Reviewed-By: Michael Dawson <michael_dawson@ca.ibm.com>
Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Jeremiah Senkpiel <fishrock123@rocketmail.com>
cjihrig added a commit to cjihrig/http-parser that referenced this issue Dec 20, 2018
This commit adds http_parser_set_max_header_size(), which can
override the compile time HTTP_MAX_HEADER_SIZE value.

Fixes: nodejs/node#24692
Refs: nodejs/node#24811
PR-URL: nodejs#453
Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
@1I1III1liL1
Copy link

could of been easily solved if there was a simple debug log line that indicates that the request was blocked

I think this is one of the biggest issues with introducing a breaking change without updating the major version. What was working suddenly isn't, and I've yet to see any log files that showed me why the request was being rejected. Sending a 400 with no details and no server-side log doesn't feel like the right way to go about it. Maybe I'm missing where that log would be generated?

MylesBorins pushed a commit that referenced this issue Dec 21, 2018
This commit adds http_parser_set_max_header_size() to the
http-parser for overriding the compile time maximum HTTP
header size.

PR-URL: #24811
Fixes: #24692
Refs: nodejs/http-parser#453
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
Reviewed-By: Myles Borins <myles.borins@gmail.com>
Reviewed-By: Michael Dawson <michael_dawson@ca.ibm.com>
Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Jeremiah Senkpiel <fishrock123@rocketmail.com>
MylesBorins pushed a commit that referenced this issue Dec 21, 2018
Allow the maximum size of HTTP headers to be overridden from
the command line.

co-authored-by: Matteo Collina <hello@matteocollina.com>
PR-URL: #24811
Fixes: #24692
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: Myles Borins <myles.borins@gmail.com>
Reviewed-By: Michael Dawson <michael_dawson@ca.ibm.com>
Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Jeremiah Senkpiel <fishrock123@rocketmail.com>
MylesBorins pushed a commit to MylesBorins/node that referenced this issue Dec 21, 2018
This commit adds http_parser_set_max_header_size() to the
http-parser for overriding the compile time maximum HTTP
header size.

PR-URL: nodejs#24811
Fixes: nodejs#24692
Refs: nodejs/http-parser#453
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
Reviewed-By: Myles Borins <myles.borins@gmail.com>
Reviewed-By: Michael Dawson <michael_dawson@ca.ibm.com>
Reviewed-By: Сковорода Никита Андреевич <chalkerx@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Jeremiah Senkpiel <fishrock123@rocketmail.com>
@oshihirii
Copy link

can anyone please tell me what header and query string limits are in node version v10.16.0?

i am getting 400 errors on requests with long query strings (eg ~15200 bytes) and wondering if it could be caused by some sort of "max limit".

thank you.

@rosswilson
Copy link

@oshihirii The limit for 10.16.0 is 8kb: https://github.com/nodejs/node/blob/v10.16.0/src/node_options.h#L119

@oshihirii
Copy link

thank you very much @rosswilson.

just to clarify - are query strings included in the 8kb header limit?

also, wondering why:

https://nodejs.org/api/http.html#http_http_maxheadersize

states:

http.maxHeaderSize was added in: v11.6.0

whereas the 10.15.0 changelog lists the addition of the maxHeaderSize property as a notable change.

just curious to know when the 80kb limit was decreased to 8kb.

thanks again.

@rosswilson
Copy link

@oshihirii I'm not sure, perhaps someone else here can help you with those questions.

@elmarx
Copy link
Author

elmarx commented Jul 22, 2019

According to my research (i.e. looking at the code) when opening the issue, the request-path (and thus the query-string) does count as header for nodejs, although the RFC for HTTP states otherwise (i.e. path is not a header).
IIRC the Initial Header limit has been introduced with node 10.14.1.

@oshihirii
Copy link

thanks very much @zauberpony.

interesting, when i console.log(req.headers) it doesn't show the query string, but perhaps req.headers does not actually contain all the information included in the header. i tried logging req.header, but that seems to be a function and therefore not loggable :).

@srinath-ragh
Copy link

@oshihirii It does seem like query params are considered headers. Tried a long list of query params (about 10kb) on v10.12.0 vs v10.16.0 and 10.12 responds with a 200 while 10.16 gives a 400.

@lynnic26
Copy link

@oshihirii It does seem like query params are considered headers. Tried a long list of query params (about 10kb) on v10.12.0 vs v10.16.0 and 10.12 responds with a 200 while 10.16 gives a 400.

It is because this change(big header limit) was applied in 10.14.0, so versions (within 10) small than 10.14.0 will return 200。

@lynnic26
Copy link

lynnic26 commented Dec 20, 2019

I tried numbers of node version

  • 8.14.0 no return
  • 10.14.0 return 400
  • 10.12.0 return 200
  • 11.3.0 return 400
  • 12.14.0 return 200
  • 13.6.0 return 200
    I'm confused why version 12 and 13 will return a 200 status?
    One point, header limit feature was added in Noverber 10 2018 when 12 and 13 was not released at all.
    Could someone clarify it?

@cekvenich
Copy link

cekvenich commented Feb 18, 2020

I'm getting these errors with long query strings!
As per spec, querystring can be unlimited in size.
ps, using the latest express both with node 13.8 and node 12.16.
Any suggestions?

@gentlefox
Copy link

gentlefox commented Mar 6, 2020

I'm getting these errors with long query strings!
As per spec, querystring can be unlimited in size.
ps, using the latest express both with node 13.8 and node 12.16.
Any suggestions?

I suggest scrolling up and reading this very informative thread.
querystring may be unlimited in size, but for use within node it combined with url (protocol+hostname+path) combined with headers can have a default max size of 8kB (It appears that the ticket to have this increased to 16kB is still open since May last year).

To find out during runtime what your node instance is set to: http.maxHeaderSize.
To config node to have a different value, the flag is --max-http-header-size.

EDIT:
It appears you can add maxHeaderSize property to the RequestOptions to override this value. Value in bytes. Dafault: 8192.

@cekvenich
Copy link

@gentlefox Where do you set Request options?
I'm looking here: http://expressjs.com/en/4x/api.html#req

Is there an example?

(for sure this needs to be programmatic and not a CLI)

@gentlefox
Copy link

Within your services.
Express "request" and "response" are essentially Node's http(s).request() and http(s).response().
Read the Nodejs documentation:(https://nodejs.org/api/http.html#http_http_request_options_callback) and also the https equivalent, which simply adds these tls.connect() options to the available http.request options: ca, cert, ciphers, clientCertEngine, crl, dhparam, ecdhCurve, honorCipherOrder, key, passphrase, pfx, rejectUnauthorized, secureOptions, secureProtocol, servername, sessionIdContext.

If unsure, compare with the Express.js code:
latest: https://github.com/expressjs/express/blob/master/lib/request.js
v4: https://github.com/expressjs/express/blob/4.x/lib/request.js

You'll see Express.js as a convenience utility that simplifies using native Node.js.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
http_parser Issues and PRs related to the HTTP Parser dependency or the http_parser binding. http Issues or PRs related to the http subsystem.
Projects
None yet
Development

Successfully merging a pull request may close this issue.