chunkloris: tornado

part of the chunkloris per-chunk amplification survey. this page is the per-server record for tornado under http/1.1 chunked transfer encoding.

at a glance

  • server: tornado 6.4.2
  • runtime: python-3.12
  • ecosystem: python
  • concurrency model: asyncio-event-loop
  • parser: pure-Python tornado.http1connection (hand-rolled HTTP/1)
  • delivery granularity: per-chunk
  • chunk-limit helper: none exposed by the framework
  • verdict: per-chunk β€” the parser/dispatcher boundary delivers one event per wire chunk. cpu cost under paced mode b is measurable per chunk.
  • scaling exponent (mode a): 1.50 (wall time vs N, log-log slope across common cells)

measurements

all cells run on a 1-vcpu docker container. cpu cost is derived from the target container’s cgroup v2 cpu.stat usage_usec delta around each cell.

modeNwall (s)server cpu %Β΅s / chunkbasisok
A-bridge-coalesced50,0000.257β€”5.140wallβœ“
A-bridge-coalesced100,0000.690β€”6.900wallβœ“
A-bridge-coalesced250,0004.590β€”18.360wallβœ“
B-paced-100us50,0005.230β€”104.600wallβœ“
B-paced-100us100,00010.620β€”106.200wallβœ“
B-paced-100us250,00026.070β€”104.300wallβœ“

parser path β€” source citations

  • chunked-decoder β€” tornado/http1connection.py:657 _read_chunked_body β†’ source
  • iostream-read_bytes β€” tornado/iostream.py:400 β†’ source
  • data_received-delivery β€” tornado/routing.py:262 β†’ source

what this means

the parser/dispatcher path on this server delivers one event per chunked-transfer-encoding chunk, so an attacker who sends a body as N one-byte chunks consumes roughly N Γ— (mode-b Β΅s/chunk) of server cpu on a single core. amplification scales linearly with N until the framework’s max_request_body_size (or equivalent) is hit.

what to do today

  • if this server runs as an origin behind nginx with the default proxy_request_buffering on, the per-chunk attack shape does not reach this server β€” nginx delivers one content-length-framed body to the upstream in a single recv().
  • if deployed direct-exposed, behind haproxy with default streaming, or behind any reverse proxy with proxy_request_buffering off, the per-chunk cost reaches this server.
  • there is no framework-level chunk-count limit in the default config; use a frontend buffer, transport-layer rate limiting, or a wrapping middleware that imposes a chunk-count cap before draining the body.

reproducer

the full reproducer for this server is in the paper repo. the docker container pins tornado 6.4.2 and constrains the test container to a single cpu (--cpus=1). the prober script implements mode a (bridge-coalesced) and mode b (paced 100 Β΅s) per the methodology section.

see the draft pdf for the full per-framework discussion.

on this page