From 138a18003af8984c817a866571f3b011443c14cf Mon Sep 17 00:00:00 2001 From: Rick Anderson <3605364+Rick-Anderson@users.noreply.github.com> Date: Thu, 29 Sep 2022 11:21:54 -1000 Subject: [PATCH] Update rate-limit.md (#27138) --- aspnetcore/performance/rate-limit.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/aspnetcore/performance/rate-limit.md b/aspnetcore/performance/rate-limit.md index 5d9746210c..86675e4ccd 100644 --- a/aspnetcore/performance/rate-limit.md +++ b/aspnetcore/performance/rate-limit.md @@ -187,4 +187,9 @@ Before deploying an app using rate limiting to production, stress test the app t Creating partitions with user input makes the app vulnerable to [Denial of Service](https://www.cisa.gov/uscert/ncas/tips/ST04-015) (DoS) Attacks. For example, creating partitions on client IP addresses makes the app vulnerable to Denial of Service Attacks that employ IP Source Address Spoofing. For more information, see [BCP 38 RFC 2827 Network Ingress Filtering: Defeating Denial of Service Attacks that employ IP Source Address Spoofing](https://www.rfc-editor.org/info/bcp38). +## Additional resources + +* [Rate limiting middleware](https://blog.maartenballiauw.be/post/2022/09/26/aspnet-core-rate-limiting-middleware.html) by Maarten Balliauw +* [Rate limit an HTTP handler in .NET](/dotnet/core/extensions/http-ratelimiter) + :::moniker-end