Hi Daniel,
Thanks for the detailed report. I think it makes sense to add some
basic forms of rate limiting like you've proposed in your fork. Consul
probably wouldn't get anything fancier (per endpoint, per client,
etc.) - for that you'd probably want to place some other proxy in
front of Consul's HTTP and DNS and implement it there, but it makes
sense to give operators a basic mechanism to prevent abusive clients
from causing the cluster to become unstable. We'd welcome a PR for
this.
The WAN behavior should be better in the 0.8.x series with the new WAN
soft fail. We allow requests to go through as long as there are no
errors (even if other servers in the WAN think things might be
failed), but once we are getting errors from all the servers in the
remote DC, we will start sending immediate feedback about the whole
datacenter being down, and requests should start to fail with "No path
to datacenter" errors. Can you run any tests with your scenario and a
newer version of Consul to see if this is still a vulnerability?
-- James
> --
> This mailing list is governed under the HashiCorp Community Guidelines -
>
https://www.hashicorp.com/community-guidelines.html. Behavior in violation
> of those guidelines may result in your removal from this mailing list.
>
> GitHub Issues:
https://github.com/hashicorp/consul/issues
> IRC: #consul on Freenode
> ---
> You received this message because you are subscribed to the Google Groups
> "Consul" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
consul-tool...@googlegroups.com.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/consul-tool/73157afc-05e2-4bf6-9d89-b707d7d27281%40googlegroups.com.
>
> For more options, visit
https://groups.google.com/d/optout.