Go-ipfs: Private networks: graduate to stable feature

Created on 3 Apr 2020  路  4Comments  路  Source: ipfs/go-ipfs

After someone complained about how reliable it is to use this experimental feature I can only say that we should graduate it to stable.

The docs say the criteria is

  • A) More people using it and reporting how it works
  • B) Better docs

I think A is fulfilled. We recommend using IPFS private networks when the usecase arises and I'm not aware of any really bad issues for ipfs itself. As a libp2p feature it is even more used. With cluster it never gave me issues.

I can get some work done on B).

(post 0.5.0)

kinenhancement

Most helpful comment

Basically, everyone on the network uses the same symmetric key to encrypt all traffic (on top of the other encryption we do). This means you can't join without this symmetric key.


Forward secrecy: connections are already encrypted and secured with a Diffie-Hellman handshake before they're re-encrypted with this shared secret. So yes, it does have forward secrecy.

However, if you leak the secret key, anyone with access to the secret key can now join the network unless you rotate the secret key first.


Timeline: We plan on marking this feature "stable" in 0.6.0, once we have support for QUIC on private networks as well.

All 4 comments

I have use cases for this in a couple projects with a 3-6 month roadmap. Would appreciate docs about how it works, particularly:

  • what _private_ means in a content addressable network
  • how it is implemented
  • what are the risks (e.g. content gets leaked into public ipfs if x happens, any forward secret guarantees)

Having timelines and existing resources (perhaps on this issue) would be useful. Thanks!

Basically, everyone on the network uses the same symmetric key to encrypt all traffic (on top of the other encryption we do). This means you can't join without this symmetric key.


Forward secrecy: connections are already encrypted and secured with a Diffie-Hellman handshake before they're re-encrypted with this shared secret. So yes, it does have forward secrecy.

However, if you leak the secret key, anyone with access to the secret key can now join the network unless you rotate the secret key first.


Timeline: We plan on marking this feature "stable" in 0.6.0, once we have support for QUIC on private networks as well.

Timeline: We plan on marking this feature "stable" in 0.6.0, once we have support for QUIC on private networks as well.

Can we put it on the milestone?

Done.

Was this page helpful?
0 / 5 - 0 ratings

Related issues

JesseWeinstein picture JesseWeinstein  路  4Comments

jonchoi picture jonchoi  路  3Comments

kallisti5 picture kallisti5  路  3Comments

0x6431346e picture 0x6431346e  路  3Comments

Mikaela picture Mikaela  路  3Comments