-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict Network Access #81
Comments
IMHO this could be tackled outside of the Rust code, in a set of guidelines or documentations for different setups (docker provides it, k8s provides it, standard linux distributions as well via ufw or similar:
If guidelines are well written and explained, it's even better as it can harden the security of other components in the stack (i.e: someone who wants to commit-boost following a guide, might realize their existing validator client could be hardened in the same way). Another point on security: if it's done via Rust and needs to play with iptables or similar, it will need root access to do so, then you have a component in your stack that needs high-privileges, and it's a no-go if say, it has to run on the same machine as validators. |
It would be nice to be able to register gateways via smart contract by the protocol team or similar such that the validator operators don't have to manually add or remove gateway IP addresses every time a gateway is added or removed. Initially the gateway set can be trusted to not DDOS (or be semitrusted entities with some request priviledges but not others). DDOS protection could be managed by cloudflare or similar. Would validator operators be okay with a script that reads from a smart contract and adds / removes IPs from the cloudflare/similar allowlist automatically? The alternative route is to allowlist a fixed set of IPs managed by the protocol team, the protocol team would then allow gateways to send requests via this fixed set of IPs. |
To enhance security, restrict network access to trusted IPs or networks only. This reduces the risk of unauthorized access and protects sensitive data by limiting interactions to specific, authorized entities.
The text was updated successfully, but these errors were encountered: