-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Simple Waku Relay DoS mitigation #164
Comments
Some discussions around this were started here: #148. Linking it here. |
Quick summary of our meeting(s), regarding simple DoS mitigation for the current MVP (< 6 months) DoS protection can be archived at two different levels:
So the solution to DoS is a mix of both levels. Some application-level identifiers, that allow us to i) prevent sybils and ii) rate limit existing nodes, and some validation built in at the protocol level that allows us to enforce some rules using the said identifiers. The main questions are: where are these identities taken from, and how are they used to avoid DoSing the network. The where sets the entry barrier to waku and the how sets nodes requirements in terms on bandwidth. We currently have 3 ideas on "simple" DoS mitigation techniques. All of them implement message validation in different ways on a gossipsub level, an already exposed interface by libp2p using
|
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
Hey @alrevuelta, adding this document(semaphore for community-level message validation) which may be of relevance to this thread. |
Remember that the Message Unique ID ADR also adds a message integrity check to the Waku Relay protocol: waku-org/pm#9 |
@alrevuelta can this be closed? |
@fryorcraken Yes, closing it. The deliverable of this was the opt-in dos protection designed ad-hoc for status (note that its not meant to be used by the waku network) |
This issue is part of SeM secure scaling and tracks the work on (a) simple Waku Relay DoS mitigation technique(s), which are necessary for the scaling Status to 1 mio users.
actions
more info / related
The text was updated successfully, but these errors were encountered: