-
Notifications
You must be signed in to change notification settings - Fork 97
multiaddr design discussion #102
Comments
cc @leif (typo) |
In Calendar for 1pm San Francisco // 4pm New York // 9pm London // 10pm Berlin. Right after the go-ipfs sprint hangout on Monday. |
Everyone involved: since no one has commented here nor put links to relevant discussions, we have not had a chance to review the relevant material for each protocol, thus this conversation will be close to useless. I am postponing it to next Tuesday 4/26 (i am not available next monday). If you're interested in (a) tor and/or i2p support, (b) websocket + webrtc support, (c) dns support, please join the conversation now, and help us outline all the design constraints and considerations here, in writing, well before this call happens. |
There might have been some kind of glitch with github notifications, because I've been online and checking my notifications everyday and I only learned about this repo now (first time I saw the notification). Like it happened to me, it might have happened to others. Yes, I'm interested :) |
re tor/i2p: prev discussions of the top of my head: ipfs/notes#37 (also ipfs/kubo#1118) as stated in these, by me and others: Slapping these networks on top of ipfs and advertising this as user privacy preserving is quite a stretch, if not negligent. BTW: I just saw this in my mail inbox and 4 days in advance is short in my book. |
Moved event on Calendar to same time, Tuesday 26th. |
@cryptix Thanks for those references. I hadn't seen them! The core issue as far as multiaddr is concerned seems to be whether a protocol address can have multiple components, with the concrete example of onion addresses coming bundled with their hidden service port (e.g. /onion/aaimaq4ygg2iegci:80 ) /onion/$hash/tcp/$port isn't strictly correct as it isn't a tcp port, just an arbitrary label (virtual port) which the hidden service uses to lookup the actual target. This leaves us with /onion/$hash/$port which requires Protocols to support more than one address component, or inventing a new protocol just for the hidden port, like /hiddenport/$port or /virtualport/$port Are there any other examples of a protocol addresses fundamentally needing more than one component? |
Thanks @cryptix ! :) 👍
Yeah, it is, also through a weekend. was best to move it till later. (this meeting was following up conversations on IRC and over email with a few people) |
@cryptix is the current time good for you? (not sure if its past 7pm your time) |
Reopen as needed. |
This is still very much needed, and at least /dns, /http, /https are high priority and blocking stuff. We'll also need to discuss multiaddr in the context of fc00. |
@lgierth Cool. What needs to move forward for this to happen? |
The multiaddr for Tor onion addresses will need to somehow at least reference the filesystem location of a 1024 bit RSA private key. That is what is needed by the listener side. The dialer side of course only needs the onion address and port number. |
|
@jbenet the onion address is valid addressing information from anywhere in the Tor network. what do you mean "should only be seen locally"?
|
Let's bring DNS and TLS (as in, baked transports with TLS such as https/wss) to multiaddr, we need it more than ever because it is kind of hard to do apps in JS without HTTPS, as cross domain scripts just won't load //cc @lgierth UpdateWe have adopted a format for |
We didn't get to discussing it this week, let"s do it on Monday. |
|
Notes from the discussion: https://hackmd.io/KbAcFYGYEME4AYC0BjALAMwEyI9YjYAjebVARgHZR5x1VoA2C2IA# |
To make sure that no one accidently deletes the notes, pasting them here: multiaddr discussionDNS
TLS
(0) host the signalling server behind a reverse proxy with https/ws (for the demos) (1) host the signalling server behind a reverse proxy with https/wss (2) get js-ipfs do use it behind a page that is loaded from https (can be the gateway) (3) create "libp2p" key in ipfs/config.json and create an array of "listenAddrs" and "advertiseAddrs" |
multiaddr design discussion
I'm calling a meeting together to discuss multiaddr protocol specs for:
not everyone has to come, but please come if you can. or at least drop your thoughts and insights into this issue.
Goals
onion, dns, ws
Pre-work
please dump down here in this issue all links to relevant discussions, and any further materials you would like everyone to be aware of. lets do as much work now before the conversation so that we just bikeshed/hash out and decide real-time.
Candidate coordinates
The text was updated successfully, but these errors were encountered: