Does this issue still exist? Given that the guys has mentioned that a fix would involve a lot code change.
And is there a PoC for it?
Does this issue still exist? Given that the guys has mentioned that a fix would involve a lot code change.
And is there a PoC for it?
I didn’t watch the talk in full, skimmed through it, and it sounds like a few issues were discussed, but at the start it was mentioned that some patches were created per issues the speaker found. If I can find the time I can double back and watch the video in full or perhaps you can ask more specific questions? Maybe someone from OTP team who was involved with the patches at the time can comment further.
That said, you should follow the manual and :
The cookie is not a security measure, it’s meant to prevent distinct clusters from crossing each other on a local and secure network. The documentation states that it’s there to prevent accidental misuse, not a deliberate attack.
We never considered this a security issue in and of itself because no one in their right mind would run the unencrypted and unauthenticated Erlang distribution unsecured over the internet.
There is nothing to fix other than for people who do that, to stop doing that.