Hi. Brought this up on IRC, but I think there should be some public record of it as well. **How well does Varnish handle the Rapid Reset attack?** Consensus seems to be that some new rate limiting should be added to Varnish. Links: * https://ubuntu.com/security/CVE-2023-44487 * https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack Related fixes: * https://github.com/h2o/h2o/commit/28fe15117b909588bf14269a0e1c6ec4548579fe