Do you want to take control and manage your outgoing connections? A tool like Smokescreen could help as it can block some of the trickier destinations for your GET requests. We’ve got an example of how you can deploy it on Fly.
And now this example has had a revamp, with added basic authentication and proxy passwords. We’ll have a fuller write up on it in the blog, but for now head over to fly-examples/smokescreen-example and check out the updated README for details.
Hey folks, quick question about this: could I use this to block ANY outbound traffic from an application?
My use-case is that I want to run a “worker” application that only processes some files and will be called through an .internal URL from another application. However, the files are user-provided, so potentially malicious. We want to prevent that any malicious code “phones home”, so would it be possible to restrict all traffic from and to an application to only allow inbound traffic and also that only on the specific port for HTTP calls through the ‘.internal’ URL?
Fly, I don’t think, has a built-in firewall. One could setup firewall rules with iptables / nftables?
You can also go nuclear and delete the default routes when VM starts up (do not recommend unless you know what you’re doing):
ip route del default
ip -6 route del default
@thomas / @wjordan can confirm if 6pn would continue to work in that case? I am not so sure… but I know for sure that you’d lose all connectivity to that VM!