Open strangeman opened 2 years ago
I think this may be related to libpnp not segregating routes ( private vs public ) , I remember some similar problems with ipfs.
I would suggest iptables etc to block 3569 TCP connections to private network range ( 10.0.0.0 subnet ) in your case.
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
🐞 Bug Report
We launched an access node in the last spork and yesterday got abuse from our hoster, which detected netscan activity from this server. Looks like Flow Node tries to scan all IP addresses in the hoster network for a Flow Node port.
It provides unnecessary load in the hoster's network, violates terms of service, and can lead to blocking our account. How can I disable this behavior of the Access Node?
What is the severity of this bug?
Critical - Urgent: We can't do anything if this isn't actioned immediately (product doesn't function without this, it's blocking us or users, or it resolves a high severity security issue). Whole team should drop what they're doing and work on this.
Currently, we cannot use this node, because it produces abuse reports from the hoster.
Specifications