[ 
https://issues.apache.org/jira/browse/CASSANDRA-2274?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13141726#comment-13141726
 ] 

David Allsopp commented on CASSANDRA-2274:
------------------------------------------

@Mark - There's a convenience/security trade-off there. Giving each node a 
security token is easier and more flexible than configuring every node with a 
list of all other nodes (it's a bit of a pain to have to update all existing 
nodes each time you want to add a node). However, the security in this scenario 
is to deal with a semi-insider attack. Getting hold of the token might be 
easier for the attacker than having to somehow modify the access list on all 
existing nodes.

However, what stops an attacker from modifying the access list on all existing 
nodes? Only the login/password for those nodes. So in either case the weakest 
link is the protection of a single password/token (maybe multiple passwords if 
you have a different login for each node, but is that commonplace??).

Care would also be needed to make sure the shared secret isn't exposed over the 
network, either as plaintext, or via replay of messages from existing nodes.

So whilst I think your proposal is appealing from the operational efficiency 
point of view, it is probably harder to implement securely.

Trying to protect against an insider who might even have physical access to 
your servers is a very tough game...
                
> Restrict Cassandra cluster node joins to a list of named hosts
> --------------------------------------------------------------
>
>                 Key: CASSANDRA-2274
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-2274
>             Project: Cassandra
>          Issue Type: Improvement
>          Components: Core
>    Affects Versions: 0.7.2
>         Environment: All
>            Reporter: Andrew Schiefelbein
>
> Because firewalls and employees are not infallible it would be nice to 
> restrict the ability of any node to join a cluster to a list of named hosts 
> in the configuration so that someone would be unable to start a node and 
> replicate all the data locally.  I understand that in order to do this the 
> person must know the seed servers and the cluster name and to extract the 
> data they will need a userid and password but another level of security would 
> be to force them to execute any brute force attack from a locked down server 
> instead of replicating all the data locally.  

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to