Skip to main content
Jump to: navigation, search



Jetty 7 and Jetty 8 are now EOL (End of Life)


All development and stable releases are being performed with Jetty 9 and Jetty 10.

This wiki is now officially out of date and all content has been moved to the Jetty Documentation Hub

Direct Link to updated documentation:

The Denial of Service (DoS) filter limits exposure to request flooding, whether malicious, or as a result of a misconfigured client. The DoS filter keeps track of the number of requests from a connection per second. If the requests exceed the limit, Jetty rejects, delays, or throttles the request, and sends a warning message. The filter works on the assumption that the attacker might be written in simple blocking style, so by suspending requests you are hopefully consuming the attacker's resources. The DoS filter is related to the QoS filter, using Continuations to prioritize requests and avoid thread starvation.

Using the DoS Filter

Jetty places throttled requests in a priority queue, giving priority first to authenticated users and users with an HttpSession, then to connections identified by their IP addresses. Connections with no way to identify them have lowest priority. To uniquely identify authenticated users, you should implement the The extractUserId(ServletRequest request) function.

Required JARs

To use the DoS Filter, these JAR files must be available in WEB-INF/lib:

  • $JETTY_HOME/lib/ext/jetty-util.jar
  • $JETTY_HOME/lib/ext/jetty-servlets.jar–contains DoSFilter

Sample Configuration

Place the configuration in a webapp's web.xml or jetty-web.xml. The default configuration allows 25 requests per connection at a time, servicing more important requests first, and queuing up the rest. This example allow 30 requests at a time:


Configuring DoS Filter Parameters

The following init parameters control the behavior of the filter:

  • maxRequestsPerSec–Maximum number of requests from a connection per second. Requests in excess of this are first delayed, then throttled. Default is 25.
  • delayMs–Delay imposed on all requests over the rate limit, before they are considered at all:
    • 100 (ms) = Default
    • -1 = Reject request
    • 0 = No delay
    • any other value = Delay in ms
  • maxWaitMs–Length of time, in ms, to blocking wait for the throttle semaphore. Default is 50 ms.
  • throttledRequests–Number of requests over the rate limit able to be considered at once. Default is 5.
  • throttleMs–Length of time, in ms, to async wait for semaphore. Default is 30000L.
  • maxRequestMs–Length of time, in ms, to allow the request to run. Default is 30000L.
  • maxIdleTrackerMs–Length of time, in ms, to keep track of request rates for a connection, before deciding that the user has gone away, and discarding it. Default is 30000L.
  • insertHeaders–If true, insert the DoSFilter headers into the response. Defaults to true.
  • trackSessions–If true, usage rate is tracked by session if a session exists. Defaults to true.
  • remotePort–If true and session tracking is not used, then rate is tracked by IP+port (effectively connection). Defaults to false.
  • ipWhitelist–A comma-separated list of IP addresses that will not be rate limited.
  • managedAttr–If set to true, then this servlet is set as a ServletContext attribute with the filter name as the attribute name. This allows a context external mechanism (for example, JMX via ContextHandler.MANAGED_ATTRIBUTES) to manage the configuration of the filter.

Back to the top