Skip to content

Commit

Permalink
LUDP GUDP ETCP firewall known issue added (#225)
Browse files Browse the repository at this point in the history
  • Loading branch information
gioblu committed Jul 20, 2018
1 parent 3fc8916 commit 02ab2b5
Showing 3 changed files with 9 additions and 0 deletions.
3 changes: 3 additions & 0 deletions src/strategies/EthernetTCP/README.md
Original file line number Diff line number Diff line change
@@ -67,5 +67,8 @@ The `EthernetTCP` strategy looks simple because most of the implementation is pr

All the other necessary information is present in the general [Documentation](/documentation).

#### Known issues
- Firewall may block `EthernetTCP` packets, edit its configuration to allow them

#### Safety warning
In all cases, when installing or maintaining a PJON network, extreme care must be taken to avoid any danger. When connecting a local bus to the internet using [EthernetTCP](/src/strategies/EthernetTCP) or [GlobalUDP](/src/strategies/GlobalUDP) all connected devices must be considered potentially compromised, potentially manipulated or remotely actuated against your will. It should be considered a good practice not to connect to the internet systems that may create a damage (fire, flood, data-leak) if hacked.
3 changes: 3 additions & 0 deletions src/strategies/GlobalUDP/README.md
Original file line number Diff line number Diff line change
@@ -36,5 +36,8 @@ UDP packets are _not_ broadcast like with the `LocalUDP` strategy, but directed

All the other necessary information is present in the general [Documentation](/documentation).

#### Known issues
- Firewall may block `GlobalUDP` packets, edit its configuration to allow them

#### Safety warning
In all cases, when installing or maintaining a PJON network, extreme care must be taken to avoid any danger. When connecting a local bus to the internet using [EthernetTCP](/src/strategies/EthernetTCP) or [GlobalUDP](/src/strategies/GlobalUDP) all connected devices must be considered potentially compromised, potentially manipulated or remotely actuated against your will. It should be considered a good practice not to connect to the internet systems that may create a damage (fire, flood, data-leak) if hacked.
3 changes: 3 additions & 0 deletions src/strategies/LocalUDP/README.md
Original file line number Diff line number Diff line change
@@ -28,5 +28,8 @@ The strategy will broadcast the packets, and the correct receiver will pick them

All the other necessary information is present in the general [Documentation](/documentation).

#### Known issues
- Firewall may block `LocalUDP` packets, edit its configuration to allow them

#### Safety warning
In all cases, when installing or maintaining a PJON network, extreme care must be taken to avoid any danger. When connecting a local bus to the internet using [EthernetTCP](/src/strategies/EthernetTCP) or [GlobalUDP](/src/strategies/GlobalUDP) all connected devices must be considered potentially compromised, potentially manipulated or remotely actuated against your will. It should be considered a good practice not to connect to the internet systems that may create a damage (fire, flood, data-leak) if hacked.

0 comments on commit 02ab2b5

Please sign in to comment.