River doesn't currently offer constraints for DGC, it's currently vulnerable to attacks where the attacker knows the clientID, an attacker makes clean calls, clients are removed and the service is garbage collected, a simple DOS attack.

Should DGC be disabled in environments where security is a concern?

Wouldn't it be better to use constraints?

In reality DGC is just a service, used to preserve liveliness of remote objects by holding a strong reference (to another arbitrary service associated by using the same server jvm), while clients hold a lease or explicitly clean it.

DGC already uses the same endpoint as the associated service it provides the DGC service for.

Can anyone see a technical reason why constraints and Subject authentication cannot or should not be utilised?

Cheers,

Peter.










Reply via email to