[ https://issues.apache.org/jira/browse/CASSANDRA-2274?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13145909#comment-13145909 ]
David Allsopp edited comment on CASSANDRA-2274 at 11/7/11 11:55 PM: -------------------------------------------------------------------- D'oh, I hadn't realized encryption was implemented now! Spent too much time on old versions... Verifying IP addresses might still be useful as per the sub-issue, but it's a minor point if proper encryption is in place. was (Author: dallsopp): D'oh, I hadn't realized encryption was implemented now! Spent too much time on old versions... @Richard - Dropping a keyspace is a Thrift operation, and I think you can already define different levels of access for 'normal' read/write access versus 'dangerous' schema operations. The crux of the above issue, however, is that inter-node messaging is separate from the Thrift communications - so even with Thrift authentication enabled, a node can join the cluster and read data. Presumably the inter-node encryption fixes this. Verifying IP addresses might still be useful as per the sub-issue, but it's a minor point if proper encryption is in place. > Restrict Cassandra cluster node joins to a list of named hosts > -------------------------------------------------------------- > > Key: CASSANDRA-2274 > URL: https://issues.apache.org/jira/browse/CASSANDRA-2274 > Project: Cassandra > Issue Type: Improvement > Components: Core > Affects Versions: 0.7.2 > Environment: All > Reporter: Andrew Schiefelbein > > Because firewalls and employees are not infallible it would be nice to > restrict the ability of any node to join a cluster to a list of named hosts > in the configuration so that someone would be unable to start a node and > replicate all the data locally. I understand that in order to do this the > person must know the seed servers and the cluster name and to extract the > data they will need a userid and password but another level of security would > be to force them to execute any brute force attack from a locked down server > instead of replicating all the data locally. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa For more information on JIRA, see: http://www.atlassian.com/software/jira