1. 22 6月, 2020 1 次提交
  2. 20 4月, 2020 1 次提交
  3. 18 4月, 2020 1 次提交
  4. 16 3月, 2020 2 次提交
  5. 07 1月, 2020 1 次提交
  6. 17 12月, 2019 1 次提交
  7. 19 11月, 2019 1 次提交
  8. 07 11月, 2019 1 次提交
  9. 15 10月, 2019 1 次提交
  10. 08 10月, 2019 2 次提交
    • Y
      TLS: Configuration options. · 61733ded
      Yossi Gottlieb 提交于
      Add configuration options for TLS protocol versions, ciphers/cipher
      suites selection, etc.
      61733ded
    • Y
      TLS: Connections refactoring and TLS support. · b087dd1d
      Yossi Gottlieb 提交于
      * Introduce a connection abstraction layer for all socket operations and
      integrate it across the code base.
      * Provide an optional TLS connections implementation based on OpenSSL.
      * Pull a newer version of hiredis with TLS support.
      * Tests, redis-cli updates for TLS support.
      b087dd1d
  11. 27 2月, 2019 2 次提交
  12. 18 1月, 2019 1 次提交
  13. 10 1月, 2019 3 次提交
  14. 31 10月, 2018 2 次提交
    • A
      Add support for Sentinel authentication. · fa675256
      antirez 提交于
      So far it was not possible to setup Sentinel with authentication
      enabled. This commit introduces this feature: every Sentinel will try to
      authenticate with other sentinels using the same password it is
      configured to accept clients with.
      
      So for instance if a Sentinel has a "requirepass" configuration
      statemnet set to "foo", it will use the "foo" password to authenticate
      with every other Sentinel it connects to. So basically to add the
      "requirepass" to all the Sentinels configurations is enough in order to
      make sure that:
      
      1) Clients will require the password to access the Sentinels instances.
      2) Each Sentinel will use the same password to connect and authenticate
         with every other Sentinel in the group.
      
      Related to #3279 and #3329.
      fa675256
    • A
      Disable protected mode in Sentinel mode. · 666b3437
      antirez 提交于
      Sentinel must be exposed, so protected mode is just an issue for users
      in case Redis was started in Sentinel mode.
      
      Related to #3279 and #3329.
      666b3437
  15. 11 9月, 2018 1 次提交
    • A
      Slave removal: replace very few things in Sentinel. · ca6aed02
      antirez 提交于
      SENTINEL REPLICAS was added as an alias, in the configuration rewriting
      now it uses known-replica, however all the rest is basically at API
      level of logged events and messages having to do with the protocol, so
      there is very little to do here compared to the Redis core itself, to
      preserve compatibility.
      ca6aed02
  16. 26 8月, 2018 1 次提交
  17. 04 7月, 2018 1 次提交
  18. 28 6月, 2018 2 次提交
  19. 26 6月, 2018 1 次提交
  20. 25 6月, 2018 9 次提交
  21. 15 6月, 2018 1 次提交
    • A
      Sentinel: add an option to deny online script reconfiguration. · 6a66b93b
      antirez 提交于
      The ability of "SENTINEL SET" to change the reconfiguration script at
      runtime is a problem even in the security model of Redis: any client
      inside the network may set any executable to be ran once a failover is
      triggered.
      
      This option adds protection for this problem: by default the two
      SENTINEL SET subcommands modifying scripts paths are denied. However the
      user is still able to rever that using the Sentinel configuration file
      in order to allow such a feature.
      6a66b93b
  22. 23 5月, 2018 1 次提交
    • A
      Sentinel: fix delay in detecting ODOWN. · 8631e647
      antirez 提交于
      See issue #2819 for details. The gist is that when we want to send INFO
      because we are over the time, we used to send only INFO commands, no
      longer sending PING commands. However if a master fails exactly when we
      are about to send an INFO command, the PING times will result zero
      because the PONG reply was already received, and we'll fail to send more
      PINGs, since we try only to send INFO commands: the failure detector
      will delay until the connection is closed and re-opened for "long
      timeout".
      
      This commit changes the logic so that we can send the three kind of
      messages regardless of the fact we sent another one already in the same
      code path. It could happen that we go over the message limit for the
      link by a few messages, but this is not significant. However now we'll
      not introduce delays in sending commands just because there was
      something else to send at the same time.
      8631e647
  23. 21 2月, 2017 1 次提交
    • A
      Use SipHash hash function to mitigate HashDos attempts. · adeed29a
      antirez 提交于
      This change attempts to switch to an hash function which mitigates
      the effects of the HashDoS attack (denial of service attack trying
      to force data structures to worst case behavior) while at the same time
      providing Redis with an hash function that does not expect the input
      data to be word aligned, a condition no longer true now that sds.c
      strings have a varialbe length header.
      
      Note that it is possible sometimes that even using an hash function
      for which collisions cannot be generated without knowing the seed,
      special implementation details or the exposure of the seed in an
      indirect way (for example the ability to add elements to a Set and
      check the return in which Redis returns them with SMEMBERS) may
      make the attacker's life simpler in the process of trying to guess
      the correct seed, however the next step would be to switch to a
      log(N) data structure when too many items in a single bucket are
      detected: this seems like an overkill in the case of Redis.
      
      SPEED REGRESION TESTS:
      
      In order to verify that switching from MurmurHash to SipHash had
      no impact on speed, a set of benchmarks involving fast insertion
      of 5 million of keys were performed.
      
      The result shows Redis with SipHash in high pipelining conditions
      to be about 4% slower compared to using the previous hash function.
      However this could partially be related to the fact that the current
      implementation does not attempt to hash whole words at a time but
      reads single bytes, in order to have an output which is endian-netural
      and at the same time working on systems where unaligned memory accesses
      are a problem.
      
      Further X86 specific optimizations should be tested, the function
      may easily get at the same level of MurMurHash2 if a few optimizations
      are performed.
      adeed29a
  24. 14 9月, 2016 1 次提交
  25. 12 9月, 2016 1 次提交