That’s where Sikka is going help us. It’ll protect your app from such kind of attacks.
Just add Sikka into your app. This is just the first version, we’ve a lot more to come.
It doesn’t matter. In this case, I’m targeting a Meteor method. Likewise we can target any publication and so on.
Every meteor app needs some kind of protection like this.
If you look at the tables where the Meteor.settings.keys are, there are two “sikka.times.blockIpFor”, one for the environment var SIKKA_BLOCK_IP_FOR_MILLIS, and the other SIKKA_PER_HUMAN_MAX_RPS.
This is just our first release. We have a list of features for detecting various kinds of Meteor-related threats and anomalies. We’ll add them as we go.
We are also looking to integrate both Kadira and Cloudflare with Sikka. Then you will be able to see a list of potential threats in Kadira and click a button to ban that IP directly from Cloudflare. You’ll be able to add rules to ban IPs automatically.
We expect to release the Kadira/Cloudflare integration before the end of this year or sooner. Stay tuned!
The latest commit on github is from 27th Mar15 + 28 open issues…
So, is this proj no more in development?
I would also like to know what happened to this project and future integrations with Kadira, which sound pretty cool. Also I gues that with DDPRateLimiter a lot of features could be reimplemented easier and in a less hacky way. @arunoda