Skip to content

Commit 468817c

Browse files
committed
Update p2p.go to use tabs
1 parent 417fa50 commit 468817c

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

hermes/src/network/p2p.go

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -99,20 +99,20 @@ func RegisterObservationCallback(f C.callback_t, network_id, bootstrap_addrs, li
9999
// https://github.com/libp2p/go-libp2p/blob/master/p2p/transport/quicreuse/reuse.go#L97
100100
//
101101
// By disabling this we get correct Close() behaviour.
102-
//
103-
// IMPORTANT: Normally re-use allows libp2p to dial on the same port that is used to listen for traffic
104-
// and by disabling this dialing uses a random high port (32768-60999) which causes the nodes that we
105-
// connect to by dialing (instead of them connecting to us) will respond on the high range port instead
106-
// of the specified Dial port. This requires firewalls to be configured to allow (UDP 32768-60999) which
107-
// should be specified in our documentation.
108-
//
109-
// The best way to securely enable this range is via the conntrack module, which can statefully allow
110-
// UDP packets only when a sent UDP packet is present in the conntrack table. This rule looks roughly
111-
// like this:
112-
//
113-
// iptables -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
114-
//
115-
// Which is a standard rule in many firewall configurations (RELATED is the key flag).
102+
//
103+
// IMPORTANT: Normally re-use allows libp2p to dial on the same port that is used to listen for traffic
104+
// and by disabling this dialing uses a random high port (32768-60999) which causes the nodes that we
105+
// connect to by dialing (instead of them connecting to us) will respond on the high range port instead
106+
// of the specified Dial port. This requires firewalls to be configured to allow (UDP 32768-60999) which
107+
// should be specified in our documentation.
108+
//
109+
// The best way to securely enable this range is via the conntrack module, which can statefully allow
110+
// UDP packets only when a sent UDP packet is present in the conntrack table. This rule looks roughly
111+
// like this:
112+
//
113+
// iptables -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
114+
//
115+
// Which is a standard rule in many firewall configurations (RELATED is the key flag).
116116
libp2p.QUICReuse(libp2pquicreuse.NewConnManager, libp2pquicreuse.DisableReuseport()),
117117
libp2p.Transport(libp2pquic.NewTransport),
118118
libp2p.ConnectionManager(mgr),

0 commit comments

Comments
 (0)