Re: [PATCH] Exponential backoff for auth_delay - Mailing list pgsql-hackers

From Daniel Gustafsson
Subject Re: [PATCH] Exponential backoff for auth_delay
Date
Msg-id F043D4E9-C115-4FA1-8A86-05351BE94214@yesql.se
Whole thread Raw
In response to Re: [PATCH] Exponential backoff for auth_delay  (Jacob Champion <jacob.champion@enterprisedb.com>)
Responses Re: [PATCH] Exponential backoff for auth_delay
List pgsql-hackers
> On 20 Mar 2024, at 22:21, Jacob Champion <jacob.champion@enterprisedb.com> wrote:
>
> On Wed, Mar 20, 2024 at 2:15 PM Jacob Champion
> <jacob.champion@enterprisedb.com> wrote:
>> I think solutions for case 1 and case 2 are necessarily at odds under
>> the current design, if auth_delay relies on slot exhaustion to do its
>> work effectively. Weakening that on purpose doesn't make much sense to
>> me; if a DBA is uncomfortable with the DoS implications then I'd argue
>> they need a different solution. (Which we could theoretically
>> implement, but it's not my intention to sign you up for that. :D )
>
> The thread got quiet, and I'm nervous that I squashed it unintentionally. :/
>
> Is there consensus on whether the backoff is useful, even without the
> host tracking? (Or, alternatively, is the host tracking helpful in a
> way I'm not seeing?) Failing those, is there a way forward that could
> make it useful in the future?

I actually wrote more or less the same patch with rudimentary attacker
fingerprinting, and after some off-list discussion decided to abandon it for
the reasons discussed in this thread.  It's unlikely to protect against the
attackers we wan't to protect the cluster against since they won't wait for the
delay anyways.

--
Daniel Gustafsson




pgsql-hackers by date:

Previous
From: Andres Freund
Date:
Subject: Re: Trying to build x86 version on windows using meson
Next
From: Bharath Rupireddy
Date:
Subject: Re: Introduce XID age and inactive timeout based replication slot invalidation