@@ -245,13 +245,13 @@ should return HTTP 400 Bad Request for CIDs longer than 63.
245
245
246
246
### Wildcard TLS certificates
247
247
248
- Wildcard TLS certificates should be set for ` *.ipfs.example.net `
248
+ Wildcard TLS certificates SHOULD be set for ` *.ipfs.example.net `
249
249
and ` *.ipns.example.net ` if a subdomain gateway is to be exposed on the public
250
250
internet.
251
251
252
252
If TLS termination takes place outside of gateway implementation, then setting
253
253
[ ` X-Forwarded-Proto ` ] ( #x-forwarded-proto-request-header ) at a reverse HTTP
254
- proxy can be used for preserving ` https ` protocol.
254
+ proxy is RECOMMENDED for preserving ` https ` protocol.
255
255
256
256
### Public Suffix List and eTLD enforcement
257
257
@@ -263,15 +263,15 @@ software like Safe Browsing
263
263
([ incident example] ( https://web.archive.org/web/20230930054837/https://blog.nft.storage/posts/2022-04-29-gateways-and-gatekeepers ) ).
264
264
265
265
To mitigate this and align with the web’s Same-origin security model, operators
266
- should register a wildcard entry like ` *.example.net `
266
+ SHOULD register a wildcard entry like ` *.example.net `
267
267
with the [ Public Suffix List (PSL)] ( https://publicsuffix.org/ ) .
268
268
269
269
This will make ` ipfs.example.net ` and ` ipns.example.net ` eTLDs, treating each
270
270
identifier (e.g., ` cid.ipfs.example.net ` ) as a distinct top-level Origin.
271
271
The [ public good gateway] ( https://docs.ipfs.tech/concepts/public-utilities/#public-ipfs-gateways ) ,
272
272
listed as ` *.dweb.link ` and ` *.inbrowser.link ` on the PSL, exemplifies this approach.
273
273
274
- Browsers supporting IPFS natively should detect patterns such as
274
+ Browsers supporting IPFS natively SHOULD detect URI patterns such as
275
275
` https://{content-root-id}.ip[f|n]s.example.net ` and dynamically update their
276
276
internal PSL, bolstering security and compatibility without relying solely on
277
277
operator action.
0 commit comments