Replies: 2 comments 1 reply
-
Just make sure they only open 8447 (farmer) to you on their firewall--that should prevent the wallet attack. Currently the code does assume your harvester to be trusted if you have a cert signed by their CA, so it is a small risk. they will have to trust you. |
Beta Was this translation helpful? Give feedback.
-
If you are still experiencing the issues it is recommended to upgrade to the latest version of chia. Please download it from here: https://www.chia.net/downloads/ Since this issue has been open for a number of years without additional comments, we will be closing this ticket but if we have closed this ticket in error do not hesitate to reach out to us again with any followup questions, comments, or if the issue persists after an update.
The best place to reach our support team is on Discord (https://discord.gg/chia) or by reopening this ticket. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I'm setting up Harvesting as a Service and I'm wondering about the security implications of asking potential customers for their CA folders.
According to this page the recommended way of doing this is sharing the CA folder. However this would also give me access to the Wallet RPC if a customer would, whether initially or by accident, run their wallet bound on 0.0.0.0 or something else publicly facing.
Is this a negligible risk or is there a better way to achieve this and rule out this attack vector?
Beta Was this translation helpful? Give feedback.
All reactions