You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Recently I was told ed25519 are preferable for IPNS over other keys due to their smaller size. However it is not in the list of supported algorithms in web platform requiring bundling crypto libraries etc...
This got me thinking about potential ways to address this problem, especially since is safe to assume that over time longer keys may proof necessary.
Idea 1.
Right now public keys are endoded IpnsEntry protobuf (which is presumably where we small size is desired). In practice chances are node receiving a record already has a public key because:
IPFS default is to use self key so it was used in handshake.
Recipient has some interest in a IPNS record so key was previously obtained.
If thees assumptions holds, we could make next version of IpnsEntry encode CID for the public key instead. Furthermore small keys and rare keys could use identity hash CIDs. It is also assumed that Sequence 0 record will use identity hash.
Idea 2.
What if instead of basing mutable namespace on the public key we based it on mutex block (genesis block) CID instead that use designated muticodec code. Mutex blocks could encode multiple public keys allowed to perform updates, and also be fairly open ended to allow new or domain specific metadata to be added e.g.
peer ids of nodes that are likely to have latest record.
DNS alias(es)
I think this would also neatly combine IPFS and IPNS namespaces where /ipfs/$cid represents content on creation and /ipns/$cid represents content now. For /ipns/$cid where cid is not for mutex it would be identical to /ipfs/$cid because it's not a mutex so it could never change.
Additional benefit of such mutexes would be that they could cleanly integrate into IPLD as they are addresses by CID.
The text was updated successfully, but these errors were encountered:
The core issue is that DHT servers need to be able to verify IPNS records without making any network requests. IPNS records used to not include the key (just the peer ID).
Also note: it's not just the key. RSA signatures are the same size as RSA keys (i.e., massive).
IMO, the best solution would be to either:
Convince browsers to support ed25519.
Use ECDSA. go-libp2p, at least, supports this out of the box.
Is a stand-alone ed25519 library really that big? I understand lots of js-crypto libraries are, but I assume a stand-alone unbundled algorithm isn't terrible.
Recently I was told ed25519 are preferable for IPNS over other keys due to their smaller size. However it is not in the list of supported algorithms in web platform requiring bundling crypto libraries etc...
This got me thinking about potential ways to address this problem, especially since is safe to assume that over time longer keys may proof necessary.
Idea 1.
Right now public keys are endoded
IpnsEntry
protobuf (which is presumably where we small size is desired). In practice chances are node receiving a record already has a public key because:self
key so it was used in handshake.If thees assumptions holds, we could make next version of
IpnsEntry
encode CID for the public key instead. Furthermore small keys and rare keys could use identity hash CIDs. It is also assumed that Sequence 0 record will use identity hash.Idea 2.
What if instead of basing mutable namespace on the public key we based it on mutex block (genesis block) CID instead that use designated muticodec code. Mutex blocks could encode multiple public keys allowed to perform updates, and also be fairly open ended to allow new or domain specific metadata to be added e.g.
I think this would also neatly combine IPFS and IPNS namespaces where
/ipfs/$cid
represents content on creation and/ipns/$cid
represents content now. For/ipns/$cid
where cid is not for mutex it would be identical to/ipfs/$cid
because it's not a mutex so it could never change.Additional benefit of such mutexes would be that they could cleanly integrate into IPLD as they are addresses by CID.
The text was updated successfully, but these errors were encountered: