You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The cluster can get flooded by repair request/response. This can happen due to
A malicious node, that's generating spurious repair requests targeting one valid node or the whole cluster
Network behavior such that alternate paths are not available, routing and/or spanning loops exist, or network partitions exist between responding and requesting nodes
Reference section 6.4.2.1.1
Proposed Solution
Write tests that simulate such conditions.
More intelligence in repair service, that can detect excessive repair requests from a node, and throttle that node's repairs
Filter malicious node's IP/ports via kernel filters (e.g. iptables)
Validators can deploy firewalls that can be configured dynamically.
More thoughts are needed to find a comprehensive solution for such attacks.
The text was updated successfully, but these errors were encountered:
Problem
The cluster can get flooded by repair request/response. This can happen due to
Reference section 6.4.2.1.1
Proposed Solution
More thoughts are needed to find a comprehensive solution for such attacks.
The text was updated successfully, but these errors were encountered: