> > > Security is, as Shrek would say, like an onion. I think the FDB approach > is not really very different to clustered Couch today, except that the > clustering layer is visibly separate instead of "just another impenetrable > erlang layer". You'll still have the 127.0.0.1 loopback connection needing > to be secured, on your laptop or elsewhere.
I see the main differences are: 1) if I don't turn on clustering, because i'm single node, the only network way into Couch data is via the HTTP layer (at least so I would assume) 2) if I do turn on clustering, and I manually connect in to the cluster, I haven't been given tools in every scripting language to directly query and rewrite the entire dataset. There's still a lot of internal workings I need to understand. With the FDB approach, as a single machine instance, I seem to have no choice but to allow every program/script on my machine access to the backend of the Couch data. File level user privileges can't apply, all security to the underlying backend data becomes "was the source IP 127.0.0.1" or more generally "did the connection come from the right IP address". I am certainly going to find that very useful for my own "explorations" to poke around the insides, but it just feels like a step backward securitywise. I'm confident the issue will be addressed somehow, and perhaps the TLS stuff is all that's really required, but I would think it's really important for a server to be able to specify what/who its legitimate peers are. I think this is definitely going to become more of an issue as these kinds of decentralized services mature more. It'd be awesome if FDB had the option to be/do something like a SQLite library or work over a spawned PIPE or something to lock it down so only the Couch server instance that launched it could use it... I guess I'm simply not clear for even myself on exactly how big a deal/concern this actually is. I think it would definitely suck if business folks came in one day to find their entire Couch cluster's data wiped due to disgruntled employee or something similar like ransomware. Thanks, Mike