-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Specify OHTTP relay <-> directory opt-in mechanism #472
Comments
We must write the OHTTP mailing list with any solution we come up with in case others might be interested. |
Is there any difference beetwen the TXT record approach and the |
Hmm, still mulling this over. Technically yes, as depending on whether or not a relay uses a recursive resolver to obtain the TXT record, whereas to delegate fetching over HTTP i suppose a relay could use another relay. But i'm still struggling to figure out why this would really matter? Is the scenario under consideration a directory forcing clients to only use specific relays assuming other honest relays would self censor based? Since this is about protecting the |
RFC 9540 specifies the gateway be at This raises the question of the degree to which the The best idea I have for this is introducing a |
Instead of having relays maintain a list of directories they are authorized to relay for, directories could opt in via a TXT record or a
.well-known/
URI.This relaxes the anti-DoS semantics of OHTTP (where the concern is a malicious client getting a relay to DoS random servers on the open internet) from per-endpoint opt-in to per-protocol opt-in, which seems appropriate in this context.
Upon receiving an OHTTP request, a payjoin specific OHTTP relay would first check that the host is opting in to receiving OHTTP requests from such relays for the purpose of facilitating payjoin transactions.
The text was updated successfully, but these errors were encountered: