[ 
https://issues.apache.org/jira/browse/HDFS-945?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12829189#action_12829189
 ] 

Todd Lipcon commented on HDFS-945:
----------------------------------

What's the scope of this? It seems there are a number of DoS scenarios to worry 
about:
- RPC flooding (as you noted above)
- Malformed packets (it's probably not too hard to find a spot where you can 
make the NN allocate way too much memory and crash some important thread)
- Open socket limit exhaustion - what if a client just opened thousands of 
connections to the NN's RPC ports without actually sending commands? At some 
point you'll hit the ulimit -n
- lots of others

I imagine some of these are high priority and others less so. Focusing on 
non-malicious clients first is probably easiest. Although bugs can make 
non-malicious clients act like malicious ones for sure, I think your point is 
good that we should focus on well-meaning but stupid applications first :)

> Make NameNode resilient to DoS attacks (malicious or otherwise)
> ---------------------------------------------------------------
>
>                 Key: HDFS-945
>                 URL: https://issues.apache.org/jira/browse/HDFS-945
>             Project: Hadoop HDFS
>          Issue Type: Improvement
>          Components: name-node
>            Reporter: Arun C Murthy
>
> We've seen defective applications cause havoc on the NameNode, for e.g. by 
> doing 100k+ 'listStatus' on very large directories (60k files) etc.
> I'd like to start a discussion around how we prevent such, and possibly 
> malicious applications in the future, taking down the NameNode.
> Thoughts?

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to