DOS is not possible this way, AUTH is just a common command.
I think a feature like you suggested is not very helpful in this
context. There is no "user" for this password, an human I mean, so all
the sysadmin needs to do to avoid this attack is picking a good very
long password.
Instead the protection can easily become a good excuse to pick a weak
password, or something you can use to actually mount a DOS.
Cheers,
Salvatore
> --
> You received this message because you are subscribed to the Google Groups "Redis DB" group.
> To post to this group, send email to redi...@googlegroups.com.
> To unsubscribe from this group, send email to redis-db+u...@googlegroups.com.
> For more options, visit this group at http://groups.google.com/group/redis-db?hl=en.
>
>
--
Salvatore 'antirez' Sanfilippo
open source developer - VMware
http://invece.org
"We are what we repeatedly do. Excellence, therefore, is not an act,
but a habit." -- Aristotele
The right answer is: the plain-text password situation is not
security. It keeps honest people out, and applications from
accidentally connecting to the wrong database. It's like the lock on
your front door.
Security starts with not leaving Redis accessible to 3rd parties, as
in: don't leave your Redis open to the world (just like people don't
leave MySQL, Postgres, Oracle, etc. databases open to the world, why
does it make sense to leave Redis open?). If someone has network
access to make calls to your Redis and attempt to brute-force the
password, you've got other network security issues, and it may be at
least as easy to gain access to the machine, debug memory regions
looking for the key, copy the dump, set up an ipfilter rule to copy
traffic somewhere else, sniff traffic to/from the box via ARP
poisoning, etc.
Summary: the password was never meant to be secure.
Regards,
- Josiah
If you're not already reading Bruce Schneier, you should be.
> In regards to passwords, here's something just for kicks: "Password
> Strength" from http://xkcd.com/936/
The real answer is to memorize a single very difficult password (12
character upper/lowercase alphanumeric, randomly generated), then use
key escrow in a password agent provider (like ssh-agent in linux). Or
replace that password with public/private key and NFC with a device
under your skin. But that's just the paranoid part of me talking.
Regards,
- Josiah