-
Notifications
You must be signed in to change notification settings - Fork 97
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
routing/http/server: limit response sizes #15
Comments
* disable Travis * add version.json file * add .github/workflows/automerge.yml * add .github/workflows/go-test.yml * add .github/workflows/go-check.yml * add .github/workflows/releaser.yml * add .github/workflows/release-check.yml * add .github/workflows/tagpush.yml * fix: field cid is unused (U1000) https://github.com/ipfs/go-pinning-service-http-client/runs/5594929290?check_suite_focus=true#step:10:31 Co-authored-by: web3-bot <web3-bot@users.noreply.github.com> Co-authored-by: Marcin Rataj <lidel@lidel.org> This commit was moved from ipfs/go-pinning-service-http-client@014aba0
hi @guseggert I'm new to contributing. I saw the recommendation in #9 to use the standard libraries provided functionality for the server but I'm confused at where the default server option should be implemented. Should it be in the handler? |
@guseggert : can you provide pointers here please? |
It feels important to have this, towards productizing The
@hacdias thoughts on making the above configurable and exposing in Kubo in |
@lidel I think it is a good idea to let this options be configurable in Kubo. However, I don't need any additional changes need to be made to Boxo. Let's see:
What do you think? |
(1) and (3) sgtm, for (2) I think the problem is real for server too: someone could publish malicious provider or peer records and then ask routing server to resolve and return them and response could have very long multiaddrs or additional metadata in binary blobs returned for specific protocol (that could act as DoS vector ) |
@lidel still regarding 2: shouldn't that be included in the implementation of |
We've discussed this today, and there nothing left to do on the boxo:
|
Complementary to #9
By default we should limit response sizes of the server to whatever the client can accept by default (which is current 1 MiB).
The text was updated successfully, but these errors were encountered: