-
-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
server profile should not include non-global IPv6 ranges #6284
Comments
Long discussion here: libp2p/go-libp2p#436 But yes, the server profile should block all non-routable addresses. Patches most welcome! (https://github.com/ipfs/go-ipfs-config/blob/master/profile.go) |
Thank you! I went ahead and opened a pull request. https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml I had pretty mixed feelings on what to add. We could have Teredo, 6to4, etc. But I think that could break desired connectivity in some cases. I hope this is at least a start. I can see the swarm announcements being a potential privacy issue as well. Especially if say you're a client on a laptop and you really just want outbound connections. If you have IPv6 privacy mode enabled, you hand out every last one of your globally routable addresses. Of cousre this PR doesn't impact that, but I think it may be something to think about more. |
That's a good enough start for now. We can always adjust this later.
I agree. That's a large part of that libp2p issue I listed. |
fixes #6284 License: MIT Signed-off-by: Steven Allen <steven@stebalien.com>
Gotcha. Thank you for merging! |
fixes #6284 License: MIT Signed-off-by: Steven Allen <steven@stebalien.com>
Closes: ipfs#6284 Add appropriate IPv6 ranges to defaultServerFilters
…ultServerFilters
Closes: ipfs#6284 Add appropriate IPv6 ranges to defaultServerFilters
…ultServerFilters
Closes: ipfs#6284 Add appropriate IPv6 ranges to defaultServerFilters
…ultServerFilters
Closes: ipfs#6284 Add appropriate IPv6 ranges to defaultServerFilters
Version information:
Type: bug
Description:
If you have a private IPv6 address, say such as fec0::, ipfs will announce this. If you do
ipfs init --profile server
, there's a very hefty list of IPv4s to avoid, but not the same for IPv6.https://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv6
This seems like a pretty easy patch to write up. If you can confirm this is not intended behavior, I can open a PR.
(I also see swarm announcements for 127.0.0.1, I'm not sure if that's a bad thing or not.)
The text was updated successfully, but these errors were encountered: