I’m experimenting with several machines running nodes with different configs. Home net, port forwarding, without a firewall, and through a VPN with a firewall. (pf)
The only machine that hasn’t stored any records, and earned ANT, is the one with port forwarding through a VPN with a firewall. Two machines with port forwarding, no VPN intermediary, and no firewall have both stored records and earned ANT.
Investigating blocked traffic, I saw a great deal of interesting blocks that look like:
block in on vtnet0: 151.53.80.83.13092 > 103.36.7.190.55657: UDP.
103.36.7.190 is my VPN’s IP. I searched antnode logs and sure enough, 151.53.80.83 shows up in many “Failed to dial” errors.
The nodes are added with:
antctl add --count 500 --node-port 49000-49499 --metrics-port 33000-33499 --rewards-address … evm-arbitrum-one
Traffic from foreign nodes is being blocked because it’s not exclusively using the 49000-49499 range that I’m forwarding. (e.g., 55657) Is that expected behavior? Shouldn’t nodes on the network only attempt to communicate with port-forwarded peers using the ports they explicitly expose?
Another observation, from running antctl status
on the various machines, this machine with no stored records and no earnings, reports half or more nodes having 0 connected peers. All nodes of all other machines report >0 connected peers.
FWIW, my VPN’s firewall rules are:
nat on vtnet0 inet from 103.36.7.190 to any → vtnet0
rdr pass on vtnet inet proto udp from any to 103.36.7.190 port 49000:49499 → 192.168.0.40 port 49000:*
block all
pass in quick on wg0 from 103.36.7.190 to any
pass out quick on wg0 from any to 103.36.7.190
pass out quick on vtnet0 all
I could remove the firewall rules, however my belief is that more secure node machines contributes to a more secure network overall. I’d appreciate any help getting this resolved so we can have known-good firewall rulesets to share.
Update: I removed the block all
rule to observe network behavior, and see if peer connectivity would automatically be established. Predictably, that began to generate many “Limiting icmp unreach response …” system log messages, as the UDP traffic isn’t being blocked, but it’s still to ports that aren’t open. Next I’ll try forwarding everything to 192.168.0.40, and not a specific range.