Pentest-Report Vitess 02.2019D. Weißer, J. Larsson Index Introduction Scope Test Methodology Phase 1. Manual Code Auditing Phase 2. Code-Assisted Penetration Testing Miscellaneous Issues VIT-01-001 MySQL: Comparison of Auth respective fields and have considerable expertise in regard to system complexity, cloud infrastructure, source code auditing, operating system interaction, low-level protocol analysis and multi-angled Kubernetes-based cluster, locally installed systems were also used for testing. Access to all relevant code and documentation was granted. While the first project meeting provided the basis for the audit, a0 码力 | 9 页 | 155.02 KB | 1 年前3
The Vitess 6.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Code Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . availability zone or group of computing resources A cell is a group of servers and network infrastructure collocated in an area, and isolated from failures in other cells. It is typically either a full database or from a replica. By routing each query to the appropriate database, Vitess allows your code to be structured as if it were reading from a single MySQL database. MoveTables MoveTables is a0 码力 | 210 页 | 846.79 KB | 1 年前3
The Vitess 5.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Code Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . availability zone or group of computing resources A cell is a group of servers and network infrastructure collocated in an area, and isolated from failures in other cells. It is typically either a full database or from a replica. By routing each query to the appropriate database, Vitess allows your code to be structured as if it were reading from a single MySQL database. Replication Graph The replication0 码力 | 206 页 | 875.06 KB | 1 年前3
The Vitess 7.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Code Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . availability zone or group of computing resources A cell is a group of servers and network infrastructure collocated in an area, and isolated from failures in other cells. It is typically either a full database or from a replica. By routing each query to the appropriate database, Vitess allows your code to be structured as if it were reading from a single MySQL database. MoveTables MoveTables is a0 码力 | 254 页 | 949.63 KB | 1 年前3
The Vitess 11.0 Documentationavailability zone or group of computing resources A cell is a group of servers and network infrastructure collocated in an area, and isolated from failures in other cells. It is typically either a full database or from a replica. By routing each query to the appropriate database, Vitess allows your code to be structured as if it were reading from a single MySQL database. MoveTables MoveTables is a replication, and then compared against the original to ensure data integrity. Then the live serving infrastructure is shifted to the destination shards, and the source shards are deleted. Related Vitess Documentation0 码力 | 481 页 | 3.14 MB | 1 年前3
The Vitess 10.0 Documentation
availability zone or group of computing resources A cell is a group of servers and network infrastructure collocated in an area, and isolated from failures in other cells. It is typically either a full database or from a replica. By routing each query to the appropriate database, Vitess allows your code to be structured as if it were reading from a single MySQL database. MoveTables MoveTables is a replication, and then compared against the original to ensure data integrity. Then the live serving infrastructure is shifted to the destination shards, and the source shards are deleted. Related Vitess Documentation0 码力 | 455 页 | 3.07 MB | 1 年前3
The Vitess 12.0 Documentationavailability zone or group of computing resources A cell is a group of servers and network infrastructure collocated in an area, and isolated from failures in other cells. It is typically either a full database or from a replica. By routing each query to the appropriate database, Vitess allows your code to be structured as if it were reading from a single MySQL database. MoveTables MoveTables is a replication, and then compared against the original to ensure data integrity. Then the live serving infrastructure is shifted to the destination shards, and the source shards are deleted. Related Vitess Documentation0 码力 | 534 页 | 3.32 MB | 1 年前3
The Vitess 9.0 Documentationavailability zone or group of computing resources A cell is a group of servers and network infrastructure collocated in an area, and isolated from failures in other cells. It is typically either a full database or from a replica. By routing each query to the appropriate database, Vitess allows your code to be structured as if it were reading from a single MySQL database. MoveTables MoveTables is a replication, and then compared against the original to ensure data integrity. Then the live serving infrastructure is shifted to the destination shards, and the source shards are deleted. Related Vitess Documentation0 码力 | 417 页 | 2.96 MB | 1 年前3
The Vitess 8.0 Documentationavailability zone or group of computing resources A cell is a group of servers and network infrastructure collocated in an area, and isolated from failures in other cells. It is typically either a full database or from a replica. By routing each query to the appropriate database, Vitess allows your code to be structured as if it were reading from a single MySQL database. MoveTables MoveTables is a replication, and then compared against the original to ensure data integrity. Then the live serving infrastructure is shifted to the destination shards, and the source shards are deleted. Related Vitess Documentation0 码力 | 331 页 | 1.35 MB | 1 年前3
Vitess security auditgoals: 1. Formalise a threat model of VTAdmin. 2. Manually audit the VTAdmin code. 3. Manually audit the remaining Vitess code base. 4. Assess and improve Vitessʼs fuzzing suite. 5. Carry out a SLSA compliance modelling: ● Vitessʼs documentation including README files from the Vitess repository ● Vitessʼs source code at https://github.com/vitessio/vitess ● Feedback from Vitess maintainers The threat model is aimed is an individual or group that intentionally attempts to exploit vulnerabilities, deploys malicious code, or compromise or disrupt a VTAdmin deployment, o�en for personal gain, espionage, or sabotage. We0 码力 | 41 页 | 1.10 MB | 1 年前3
共 11 条
- 1
- 2













