This repository has been archived by the owner on Jan 13, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 4.5k
RPC does not rate limit egress traffic #8862
Labels
security
Pull requests that address a security vulnerability
Milestone
Comments
cc: #5778 I see this as mostly an issue for the |
This was referenced Jun 6, 2023
Open
This was referenced Jun 6, 2023
Open
This was referenced Jun 7, 2023
This was referenced Jun 8, 2023
This was referenced Jun 9, 2023
This was referenced Sep 29, 2023
Open
Open
Open
Open
Open
Open
This was referenced Oct 6, 2023
Open
Open
Open
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Problem
An attacker can repeatedly download a snapshot or genesis.tar.bz2 from a validator that has an open RPC port. The Rust web server is highly efficient at serving static files and will happily make use of all of a node's egress bandwidth.
In a high tps network, this could impact cluster performance. In any case, it would result in high egress bandwidth costs and almost zero costs for the attacker since ingress is typically free.
Proposed Solution
--trusted-validators
would probably want to serve genesis/snapshots from a bandwidth-efficient CDN.The text was updated successfully, but these errors were encountered: