Skip to content

DoS attack vectors on kami RPC endpoint #66

@zemse

Description

@zemse
  • A Kami should cache responses to compute bunch proposal in some way urgently
  • There is a method that computes a bunch proposal. It should only do that from the next start block number instead of any random one. This can prevent lot of possibilities of computation. Like it could be triggered for every block.
  • Make fetch blocks RPC method private if it isn't
  • Store the cache in storage later on.

These precautions majorly reduce DoS attack damage, but past this, there is still some scope that can be seen later on as it requires more thought.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions