Skip to content

Rate-limiting the endpoints #2

@fyyv

Description

@fyyv

The following command will spam the console with access logs if logging is enabled in config.yml. Note: The below command assumes the server is running on localhost.

for n in {1..50}; do curl http://localhost:27192/api/list/; done

If the logging feature is to be used explicitly for development purposes, this is working as intended. I believe that logging could also be useful for maintenance/auditing purposes, in which case server owners would likely leave logging enabled permanently.

Where DoS attacks are a concern, server owners can deploy their own more robust solutions. However, for the sake of keeping logs readable, it could be beneficial to implement at least a primitive form of rate-limiting.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions