Skip to content
This repository has been archived by the owner on Jan 22, 2025. It is now read-only.

RPC vulnerable to DoS #5778

Closed
rob-solana opened this issue Sep 4, 2019 · 1 comment
Closed

RPC vulnerable to DoS #5778

rob-solana opened this issue Sep 4, 2019 · 1 comment
Labels
security Pull requests that address a security vulnerability
Milestone

Comments

@rob-solana
Copy link
Contributor

Problem

RPC is unauthenticated, free, and probably not hardened against DoS attacks, like slow clients, infinite requests, infinite connections, etc.

Proposed Solution

audit and fix? add authentication to RPC?

@mvines
Copy link
Contributor

mvines commented Feb 20, 2020

For now we mitigate this by recommending that staked validators not expose an RPC port, and instead provide RPC from an unstaked "api node"

@mvines mvines modified the milestones: Rincon v0.24.0, v0.25.0 Feb 20, 2020
@mvines mvines modified the milestones: v1.1.0, v1.2.0 Mar 16, 2020
@mvines mvines modified the milestones: v1.2.0, The Future! Apr 19, 2020
@leoluk leoluk added the security Pull requests that address a security vulnerability label Feb 15, 2021
@mvines mvines closed this as completed Feb 14, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
security Pull requests that address a security vulnerability
Projects
None yet
Development

No branches or pull requests

3 participants