Plus, it's just too big a can of worms for solr to handle. You could protect up to a small point, but a real ddos attack is not going to be defended against by solr. At best we could put in 'kiddie' protection against.

- Mark


On Nov 16, 2008, at 5:51 PM, Erik Hatcher <[EMAIL PROTECTED]> wrote:


On Nov 16, 2008, at 5:41 PM, Ian Holsman wrote:
First thing I would look at is disabling write access, or writing a servlet that sits on top of the write handler to filter your data.

We can turn off all the update handlers, but how does that affect replication? Can a Solr replicant be entirely read-only in the HTTP request sense?

Second thing I would be concerned about is people writing DoS queries that bypass the cache.


so you may need to write your own custom request handler to filter out that kind of thing.

Is this a concern that can be punted to what you'd naturally be putting in front of Solr anyway or a proxy tier that can have DoS blocking rules? I mean, if you're deploying a Struts that hits Solr under the covers, how do you prevent against DoS on that? A malicious user could keep sending queries indirectly to a Solr through a whole lot of public apps now. In other words, another tier in front of Solr doesn't add (much) to DoS protection to an underlying Solr, no?

   Erik

Reply via email to