Follow-up on the HTTP/2 Rapid Reset Exploit: NGINX also describes the mechanism they have in place to prevent this.
Google and Cloudflare should have written "the typical web server is not affected, but the typical Cloud implemenetation is."
Blaming the exploit on the protocol standard is lame.
When you implement 100% of an RFC you are not done with your work.
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0033.html