You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 29, 2020. It is now read-only.
Recently, I've been on a network over which IPFS couldn't connect to anything, because of agressive outgoing port filtering, and the inability to punch through the NAT.
It did allow SSH (didn't filter port 22), so I'm wondering, whether it's possible to use IPFS over a SOCKS proxy, with an additional reverse-forwarded port for incoming connections.
ipfs config Swarm.AdditionalAdvertised '["/ip4/remote/tcp/4001"]'
# and
ipfs swarm advertise /ip4/remote/tcp/4001
# (similarly to how `ipfs swarm filters` works)
Something along those lines should send everything through the localhost:1080 SOCKS proxy, and advertise /ip4/remote/tcp/4001/ipfs/QmPeerID to the swarm additionally to the regular addresses.
The text was updated successfully, but these errors were encountered:
Since IPFS is just opening and using ports it is definitely configurable to use proxies or virtual networks with your OS networking stack.
I recommend the vpn / cjdns approach to things -- where it's not a single proxy, but all traffic is routed over a special network.
It may or may not make sense to enable go-ipfs to follow proxy settings from a config -- not sure.
I like the Swarm.AdditionalAdvertised idea. something like that makes sense. if you'd like to propose it, prototype the whole feature in https://github.com/ipfs/go-ipfs
just as an issue in text is fine, just how it work in full. it can be tweaked and refined once it's being considered.
Recently, I've been on a network over which IPFS couldn't connect to anything, because of agressive outgoing port filtering, and the inability to punch through the NAT.
It did allow SSH (didn't filter port 22), so I'm wondering, whether it's possible to use IPFS over a SOCKS proxy, with an additional reverse-forwarded port for incoming connections.
An example solution would be:
and
Something along those lines should send everything through the localhost:1080 SOCKS proxy, and advertise /ip4/remote/tcp/4001/ipfs/QmPeerID to the swarm additionally to the regular addresses.
The text was updated successfully, but these errors were encountered: