Performance Impact of OpenResty XRay when Tracing PHP Apps (using OpenResty XRay)
OpenResty 22.214.171.124 is a patch release addressing a security vulnerability in the NGINX HTTP/2 processing that could be exploited by an attacker by rapidly creating and cancelling a large number of HTTP/2 streams. This vulnerability, referred to as the HTTP/2 Rapid Reset Attack, bypasses the server's limits on concurrent streams because reset streams are processed faster than new ones can be established, thus potentially allowing an attacker to overload the server. (CVE-2023-4487)
The (portable) source code distribution, the Win32/Win64 binary distributions, and the pre-built binary Linux packages for Ubuntu, Debian, Fedora, CentOS, RHEL, OpenSUSE, Amazon Linux are provided on this Download page.
This is the third OpenResty release based on the nginx 1.21.4 core.
- Applied the patch for security advisory to NGINX cores (CVE-2023-44487).
We have run extensive testing on our Amazon EC2 test cluster and ensured that all the components (including the Nginx core) play well together. The latest test report can always be found here:
We also always run our OpenResty Edge commercial software based on the latest open source version of OpenResty in our own global CDN network (dubbed "mini CDN") powering our openresty.org and openresty.com websites. See https://openresty.com/ for more details.
See the Community Page.
Commercial technical support and real-time noninvasive online monitoring and profiling solution is provided through the official OpenResty XRay product.