61
Too much open-source AI is exposing itself to the web
(www.theregister.com)
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
I like self hosting, but I won't do AI.
It's not an issue if you block it from accessing the Internet.
This applies to a lot of services. Only expose something publicly if the public need to access it, and make sure it's properly secured. If it's just for you or your family (or friends) to use, use a peer-to-peer / mesh VPN like Tailscale.
I mean, the article is talking about providing public inbound access, rather than having the software go outbound.
I suspect that in some cases, people just aren't aware that they are providing access to the world, and it's unintentional. Or maybe they just don't know how to set up a VPN or SSH tunnel or some kind of authenticated reverse proxy or something like that, and want to provide public access for remote use from, say, a phone or laptop or something, which is a legit use case.
ollama targets being easy to set up. I do kinda think that there's an argument that maybe it should try to facilitate configuration for that setup, even though it expands the scope of what they're doing, since I figure that there are probably a lot of people without a lot of, say, networking familiarity who just want to play with local LLMs setting these up.
EDIT: I do kind of think that there's a good argument that the consumer router situation plus personal firewall situation is kind of not good today. Like, "I want to have a computer at my house that I want to access remotely via some secure, authenticated mechanism without dicking it up via misconfiguration" is something that people understandably want to do and should be more straightforward.
I mean, we did it with Bluetooth, did a consumer-friendly way to establish secure communication over insecure airwaves. We don't really have that for accessing hardware remotely via the Internet.
You generally have to intentionally make changes to your router's firewall to allow inbound traffic through, though. I followed the ollama guides and I don't remember any firewall changes.
Oh, yeah, it's not that ollama itself is opening holes (other than adding something listening on a local port), or telling people to do that. I'm saying that the ollama team is explicitly promoting bad practices. I'm just saying that I'd guess that there are a number of people who are doing things like fully-exposing or port-forwarding to ollama or whatever because they want to be using the parallel compute hardware on their computer remotely. The easiest way to do that is to just expose ollama without setting up some kind of authentication mechanism, so...it's gonna happen.
I remember someone on here who had their phone and desktop set up so that they couldn't reach each other by default. They were fine with that, but they really wanted their phone to be able to access the LLM on their computer, and I was helping walk them through it. It was hard and confusing for them
they didn't really have a background in the stuff, but badly wanted the functionality. In their case, they just wanted local access, while the phone was on their home WiFi network. But...I can say pretty confidently that there are people who want access all the time, to access the thing remotely.