-
-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ipfs swarm filters
seems blacklist-only
#1972
Comments
@nonchip yeah, the original design called for filters to be applied in the typical ordering kind of way.
@whyrusleeping people do want this. let's move to this? |
@jbenet like iptables does it? sounds good. and relatively easy to implement. just add the allow/deny bool in the list of filters, and return that bool as soon as a filter matches. I'm pretty bad in golang, but pseudocode would be:
so e.g. a pure whitelist would be:
(denying everything at the end and causing the |
Yep that's right. What would make it easier for people to contribute to things like this?
|
In my desperation to cut down on bandwidth usage (see #2489) I have started blacklisting (swarm filters) ipfs nodes which seem to send/recv more than the average with my node. A whitelist would probably be better, that way I can block everyone except for a handful of trusted nodes. |
Please implement this. It's really important for gateways to be able to whitelist content. Examples:
In both cases, a blacklist doesn't cut it. You want to whitelist a small amount of hashes and decline all other requests. Will libp2p/go-maddr-filter#1 cover this for us? |
@flyingzumwalt this is not content filter but connection filter. |
Any movement on this? It would be very useful. |
Not yet. This would require some support in libp2p that we don't currently have. See: libp2p/go-libp2p-net#25 (comment). |
there should really be a whitelist (maybe followed by a blacklist, or some sort of rule priority system), because it's virtually impossible to do any local area swarms using the current implementation.
The text was updated successfully, but these errors were encountered: