chunkloris: falcon (on async-http / protocol-http1)

published: May 22, 2026 β€’

part of the chunkloris per-chunk amplification survey. this page is the per-server record for falcon (on async-http / protocol-http1) under http/1.1 chunked transfer encoding.

at a glance

  • server: falcon (on async-http / protocol-http1) 0.49.0
  • runtime: ruby-3.3.11
  • ecosystem: ruby
  • concurrency model: fiber-per-connection (async gem)
  • parser: Protocol::HTTP1::Body::Chunked (pure Ruby, async-http gem)
  • delivery granularity: per-chunk-streaming-to-handler
  • chunk-limit helper: none exposed by the framework
  • verdict: per-chunk β€” the parser/dispatcher boundary delivers one event per wire chunk. cpu cost under paced mode b is measurable per chunk.
  • scaling exponent (mode a): 1.00 (wall time vs N, log-log slope across common cells)

measurements

all cells run on a 1-vcpu docker container. cpu cost is derived from the target container’s cgroup v2 cpu.stat usage_usec delta around each cell.

modeNwall (s)server cpu %Β΅s / chunkbasisok
A-bridge-coalesced50,0000.096133.42.565server-cpu-cgroupβœ“
A-bridge-coalesced100,0000.176118.72.085server-cpu-cgroupβœ“
A-bridge-coalesced?0.606β€”2.420wallβœ“
B-paced-100us50,0005.1308.89.062server-cpu-cgroupβœ“
B-paced-100us100,00010.2458.68.761server-cpu-cgroupβœ“
B-paced-100us?26.08410.010.400server-cpu-overheadβœ“

parser path β€” source citations

  • chunked-decoder β€” protocol-http1 gem: lib/protocol/http1/body/chunked.rb
  • rack-input-bridge β€” protocol-rack gem: lib/protocol/rack/input.rb (#sysread)

what this means

the parser/dispatcher path on this server delivers one event per chunked-transfer-encoding chunk, so an attacker who sends a body as N one-byte chunks consumes roughly N Γ— (mode-b Β΅s/chunk) of server cpu on a single core. amplification scales linearly with N until the framework’s max_request_body_size (or equivalent) is hit.

what to do today

  • if this server runs as an origin behind nginx with the default proxy_request_buffering on, the per-chunk attack shape does not reach this server β€” nginx delivers one content-length-framed body to the upstream in a single recv().
  • if deployed direct-exposed, behind haproxy with default streaming, or behind any reverse proxy with proxy_request_buffering off, the per-chunk cost reaches this server.
  • there is no framework-level chunk-count limit in the default config; use a frontend buffer, transport-layer rate limiting, or a wrapping middleware that imposes a chunk-count cap before draining the body.

reproducer

the full reproducer for this server is in the paper repo. the docker container pins falcon (on async-http / protocol-http1) 0.49.0 and constrains the test container to a single cpu (--cpus=1). the prober script implements mode a (bridge-coalesced) and mode b (paced 100 Β΅s) per the methodology section.

see the draft pdf for the full per-framework discussion.

on this page