Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Private networks: graduate to stable feature #7086

Open
hsanjuan opened this issue Apr 3, 2020 · 4 comments
Open

Private networks: graduate to stable feature #7086

hsanjuan opened this issue Apr 3, 2020 · 4 comments
Labels
kind/enhancement A net-new feature or improvement to an existing feature
Milestone

Comments

@hsanjuan
Copy link
Contributor

hsanjuan commented Apr 3, 2020

After someone complained about how reliable it is to use this experimental feature I can only say that we should graduate it to stable.

The docs say the criteria is

  • A) More people using it and reporting how it works
  • B) Better docs

I think A is fulfilled. We recommend using IPFS private networks when the usecase arises and I'm not aware of any really bad issues for ipfs itself. As a libp2p feature it is even more used. With cluster it never gave me issues.

I can get some work done on B).

(post 0.5.0)

@hsanjuan hsanjuan added the kind/enhancement A net-new feature or improvement to an existing feature label Apr 3, 2020
@hsanjuan hsanjuan self-assigned this Apr 3, 2020
@benhylau
Copy link

benhylau commented Apr 8, 2020

I have use cases for this in a couple projects with a 3-6 month roadmap. Would appreciate docs about how it works, particularly:

  • what private means in a content addressable network
  • how it is implemented
  • what are the risks (e.g. content gets leaked into public ipfs if x happens, any forward secret guarantees)

Having timelines and existing resources (perhaps on this issue) would be useful. Thanks!

@Stebalien
Copy link
Member

Stebalien commented Apr 9, 2020

Basically, everyone on the network uses the same symmetric key to encrypt all traffic (on top of the other encryption we do). This means you can't join without this symmetric key.


Forward secrecy: connections are already encrypted and secured with a Diffie-Hellman handshake before they're re-encrypted with this shared secret. So yes, it does have forward secrecy.

However, if you leak the secret key, anyone with access to the secret key can now join the network unless you rotate the secret key first.


Timeline: We plan on marking this feature "stable" in 0.6.0, once we have support for QUIC on private networks as well.

@hsanjuan
Copy link
Contributor Author

hsanjuan commented Apr 9, 2020

Timeline: We plan on marking this feature "stable" in 0.6.0, once we have support for QUIC on private networks as well.

Can we put it on the milestone?

@Stebalien Stebalien added this to the go-ipfs 0.6 milestone Apr 9, 2020
@Stebalien
Copy link
Member

Stebalien commented Apr 9, 2020

Done.

@Stebalien Stebalien modified the milestones: go-ipfs 0.6, go-ipfs 0.7 Jun 11, 2020
@jacobheun jacobheun modified the milestones: go-ipfs 0.7, go-ipfs 0.8 Aug 18, 2020
@BigLep BigLep modified the milestones: go-ipfs 0.8, go-ipfs 0.10 May 17, 2021
@BigLep BigLep added this to Backlog in Go IPFS Roadmap Jul 1, 2021
@BigLep BigLep moved this from Backlog to Old Backlog (Clean Up) in Go IPFS Roadmap Jul 8, 2021
@BigLep BigLep moved this from Old Backlog (Clean Up) to Future Release Backlog in Go IPFS Roadmap Aug 5, 2021
@BigLep BigLep modified the milestones: go-ipfs 0.12, go-ipfs 0.13 Sep 2, 2021
@BigLep BigLep moved this from Next Release Backlog to Next Next Release in Go IPFS Roadmap Sep 2, 2021
@BigLep BigLep modified the milestones: go-ipfs 0.13, TBD Mar 3, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement A net-new feature or improvement to an existing feature
Projects
Status: 🥞 Todo
Go IPFS Roadmap
  
Next Next Release
Development

No branches or pull requests

5 participants