Update rate-limit.md (#27138)
parent
55c9056c8c
commit
138a18003a
|
@ -187,4 +187,9 @@ Before deploying an app using rate limiting to production, stress test the app t
|
|||
|
||||
Creating partitions with user input makes the app vulnerable to [Denial of Service](https://www.cisa.gov/uscert/ncas/tips/ST04-015) (DoS) Attacks. For example, creating partitions on client IP addresses makes the app vulnerable to Denial of Service Attacks that employ IP Source Address Spoofing. For more information, see [BCP 38 RFC 2827 Network Ingress Filtering: Defeating Denial of Service Attacks that employ IP Source Address Spoofing](https://www.rfc-editor.org/info/bcp38).
|
||||
|
||||
## Additional resources
|
||||
|
||||
* [Rate limiting middleware](https://blog.maartenballiauw.be/post/2022/09/26/aspnet-core-rate-limiting-middleware.html) by Maarten Balliauw
|
||||
* [Rate limit an HTTP handler in .NET](/dotnet/core/extensions/http-ratelimiter)
|
||||
|
||||
:::moniker-end
|
||||
|
|
Loading…
Reference in New Issue