-
Notifications
You must be signed in to change notification settings - Fork 275
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: fully switch to signed peer records, deprecate un-signed address announcements #552
Comments
At the moment, they are actually undocumented in the specs. See #347. We should fix the specs first before we make them mandatory for other implementations. (I do support this proposal in general.) |
I understand that this is what signed peer records give us. When we can be certain they originate from the right peer, what simplifications or attack mitigations does that provide us in the code? Apologies if this is obvious. I'm not against the work, but trying to understand what enables or protects against. |
One benefit for the DHT here is that they also improve adoption for new transports. Currently DHT nodes filter out addresses they don't understand. By using signed peer records the requesting node gets all the addresses. |
We've already supported signed peer records in Identify for the longest time. Signed peer records are superior, because we know they originate from the right peer (which, with AutoNAT v2, should have a pretty good grasp on its addresses).
We should fully switch to using them everywhere. This includes:
The text was updated successfully, but these errors were encountered: