-
Notifications
You must be signed in to change notification settings - Fork 21
Open
Description
I've been reading through the README and issues with the question label, and while it solved some loose ends, I do have some questions regarding some cases and details:
- In case someone is just running a server locally and just connecting it through multiplayer, as long as the server is not exposed to the internet (the case for most people, even more so if server-ip=127.0.0.1), it mostly works the same as the singleplayer case, correct?
- When it comes to protecting a server, does a client have to successfully connect to the server in order to exploit the vulnerability or could it be also done through querying or just without connecting to the server at all? In other words, would something like a whitelist effectively protect a public facing server?
- Related to feat(scanallclasses): create a scan all classes boolean #15 and What about potentially vulnerable classes that *aren't* in the config? #18 , is there still plans to implement a generic fix as to not rely on knowledge of which mods are affected? I'm aware that you mentioned that some launchers are still shipping absolutely abhorrently old versions of Java 8, but, if it means that it can kill all birds with one stone, it would be worth having at least an alternate version that implements such thing? And, would such fix actually patch the large, if not the entirety of the entry points?
- Did CurseForge/Modrinth ever get back to you over possibly scanning for mods which suffer from the same issues?
Regardless, I thank you for your work on bringing this to everyone's attention and providing a fix for it!
Metadata
Metadata
Assignees
Labels
No labels