mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-04-20 06:02:24 +00:00
Opt-In for SentryPeer DHT mode, fixes #1110
This commit is contained in:
parent
a28dfec046
commit
dcf15ca489
5 changed files with 22 additions and 1 deletions
|
@ -17,4 +17,4 @@ RUN apk -U add --no-cache -X http://dl-cdn.alpinelinux.org/alpine/edge/testing \
|
||||||
# Set workdir and start sentrypeer
|
# Set workdir and start sentrypeer
|
||||||
STOPSIGNAL SIGKILL
|
STOPSIGNAL SIGKILL
|
||||||
USER sentrypeer:sentrypeer
|
USER sentrypeer:sentrypeer
|
||||||
CMD /usr/bin/sentrypeer -warpj -f /var/log/sentrypeer/sentrypeer.db -l /var/log/sentrypeer/sentrypeer.json
|
CMD /usr/bin/sentrypeer -jar -f /var/log/sentrypeer/sentrypeer.db -l /var/log/sentrypeer/sentrypeer.json
|
||||||
|
|
|
@ -12,6 +12,12 @@ services:
|
||||||
restart: always
|
restart: always
|
||||||
# cpu_count: 1
|
# cpu_count: 1
|
||||||
# cpus: 0.25
|
# cpus: 0.25
|
||||||
|
environment:
|
||||||
|
- SENTRYPEER_WEB_GUI=1
|
||||||
|
- SENTRYPEER_PEER_TO_PEER=1
|
||||||
|
- SENTRYPEER_BOOTSTRAP_NODE=bootstrap.sentrypeer.org
|
||||||
|
- SENTRYPEER_VERBOSE=1
|
||||||
|
- SENTRYPEER_DEBUG=1
|
||||||
networks:
|
networks:
|
||||||
- sentrypeer_local
|
- sentrypeer_local
|
||||||
ports:
|
ports:
|
||||||
|
|
|
@ -374,6 +374,11 @@ services:
|
||||||
sentrypeer:
|
sentrypeer:
|
||||||
container_name: sentrypeer
|
container_name: sentrypeer
|
||||||
restart: always
|
restart: always
|
||||||
|
## SentryPeer offers to exchange bad actor data via DHT / P2P mode by setting the ENV to true (1)
|
||||||
|
## In some cases (i.e. internally deployed T-Pots) this might be confusing as SentryPeer will show
|
||||||
|
## the bad actors in its logs. Therefore this option is opt-in based.
|
||||||
|
environment:
|
||||||
|
- SENTRYPEER_PEER_TO_PEER=0
|
||||||
networks:
|
networks:
|
||||||
- sentrypeer_local
|
- sentrypeer_local
|
||||||
ports:
|
ports:
|
||||||
|
|
|
@ -374,6 +374,11 @@ services:
|
||||||
sentrypeer:
|
sentrypeer:
|
||||||
container_name: sentrypeer
|
container_name: sentrypeer
|
||||||
restart: always
|
restart: always
|
||||||
|
## SentryPeer offers to exchange bad actor data via DHT / P2P mode by setting the ENV to true (1)
|
||||||
|
## In some cases (i.e. internally deployed T-Pots) this might be confusing as SentryPeer will show
|
||||||
|
## the bad actors in its logs. Therefore this option is opt-in based.
|
||||||
|
environment:
|
||||||
|
- SENTRYPEER_PEER_TO_PEER=0
|
||||||
networks:
|
networks:
|
||||||
- sentrypeer_local
|
- sentrypeer_local
|
||||||
ports:
|
ports:
|
||||||
|
|
|
@ -374,6 +374,11 @@ services:
|
||||||
sentrypeer:
|
sentrypeer:
|
||||||
container_name: sentrypeer
|
container_name: sentrypeer
|
||||||
restart: always
|
restart: always
|
||||||
|
## SentryPeer offers to exchange bad actor data via DHT / P2P mode by setting the ENV to true (1)
|
||||||
|
## In some cases (i.e. internally deployed T-Pots) this might be confusing as SentryPeer will show
|
||||||
|
## the bad actors in its logs. Therefore this option is opt-in based.
|
||||||
|
environment:
|
||||||
|
- SENTRYPEER_PEER_TO_PEER=0
|
||||||
networks:
|
networks:
|
||||||
- sentrypeer_local
|
- sentrypeer_local
|
||||||
ports:
|
ports:
|
||||||
|
|
Loading…
Reference in a new issue