Update rate-limit.md (#27138)

pull/27142/head
Rick Anderson 2022-09-29 11:21:54 -10:00 committed by GitHub
parent 55c9056c8c
commit 138a18003a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 5 additions and 0 deletions

View File

@ -187,4 +187,9 @@ Before deploying an app using rate limiting to production, stress test the app t
Creating partitions with user input makes the app vulnerable to [Denial of Service](https://www.cisa.gov/uscert/ncas/tips/ST04-015) (DoS) Attacks. For example, creating partitions on client IP addresses makes the app vulnerable to Denial of Service Attacks that employ IP Source Address Spoofing. For more information, see [BCP 38 RFC 2827 Network Ingress Filtering: Defeating Denial of Service Attacks that employ IP Source Address Spoofing](https://www.rfc-editor.org/info/bcp38).
## Additional resources
* [Rate limiting middleware](https://blog.maartenballiauw.be/post/2022/09/26/aspnet-core-rate-limiting-middleware.html) by Maarten Balliauw
* [Rate limit an HTTP handler in .NET](/dotnet/core/extensions/http-ratelimiter)
:::moniker-end