Uploaded image for project: 'Core Server'
  1. Core Server
  2. SERVER-43994

Verify configOpTime metadata in message with invalid cluster time signature is ignored with auth on

    • Type: Icon: Task Task
    • Resolution: Fixed
    • Priority: Icon: Major - P3 Major - P3
    • 4.3.1
    • Affects Version/s: None
    • Component/s: Sharding
    • Labels:
      None
    • Fully Compatible
    • Sharding 2019-10-21

      When auth is enabled, the cluster times gossiped throughout a sharded cluster are signed and validated using keys from a collection on the config server. If a node in one cluster with auth enabled receives a message with a cluster time signed using the keys from a different cluster (or not signed at all), that request should be rejected by the node and the node should not advance its understanding of the latest config server opTime. The purpose of this ticket is to verify this with a test.

            Assignee:
            jack.mulrow@mongodb.com Jack Mulrow
            Reporter:
            jack.mulrow@mongodb.com Jack Mulrow
            Votes:
            0 Vote for this issue
            Watchers:
            9 Start watching this issue

              Created:
              Updated:
              Resolved: