From @ThomasWaldmann on Sat Jul 04 2015 11:10:40 GMT+0000 (UTC)
@dylanPowers having uPnP active is considered a security risk by many people. So while it is “plug and play” (and thus easier / more comfortable), malware could use it to open additional ports for itself (or maybe reconfigure your router otherwise).
From @cryptix on Sat Jul 04 2015 11:48:22 GMT+0000 (UTC)
I’m with Thomas on this one, there were also cases of plastic home routers answering upnp requests on the outside WAN (netgear for instance IIRC). If we advise to do this we need a big warning sign, imho.
From @xloem on Sun Jan 08 2017 20:49:11 GMT+0000 (UTC)
@pyhedgehog you should edit your .ipfs/config file for each node to give it a different swarm port from the others, and forward that port to that box in your firewall.
I installed IPFS node and got the daemon up and running. In the connections section I see 768 peers. Does that mean that I don’t have to do anything with the firewall? Or should I still open the ports in my router?
From what I understand by reading the forum, IPFS runs on libp2p and libp2p doesn’t need any port forwarding. Correct me if I am wrong.
How do I know if it is an incoming or outgoing connection?