You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
PyTorch creates a `TCPStore` that, by default, listens on all network
68
+
interfaces. This means that unless additional protections are put in place,
69
+
these services may be accessible to any host that can reach your machine via any
70
+
network interface.
71
+
72
+
**From a PyTorch perspective, any use of `torch.distributed` should be
73
+
considered insecure by default.** This is a known and intentional behavior from
74
+
the PyTorch team.
75
+
76
+
### Firewall Configuration Guidance
77
+
78
+
The best way to protect your vLLM system is to carefully configure a firewall to
79
+
expose only the minimum network surface area necessary. In most cases, this
80
+
means:
81
+
82
+
-**Block all incoming connections except to the TCP port the API server is
83
+
listening on.**
84
+
85
+
- Ensure that ports used for internal communication (such as those for
86
+
`torch.distributed` and KV cache transfer) are only accessible from trusted
87
+
hosts or networks.
88
+
89
+
- Never expose these internal ports to the public internet or untrusted
90
+
networks.
91
+
92
+
Consult your operating system or application platform documentation for specific
93
+
firewall configuration instructions.
94
+
56
95
## Reporting Security Vulnerabilities
57
96
58
97
If you believe you have found a security vulnerability in vLLM, please report it following the project's security policy. For more information on how to report security issues and the project's security policy, please see the [vLLM Security Policy](https://github.com/vllm-project/vllm/blob/main/SECURITY.md).
0 commit comments