Skip to content

Commit

Permalink
docs: how to act on new malicious CIDs reported (#129)
Browse files Browse the repository at this point in the history
  • Loading branch information
vasco-santos committed Jun 2, 2022
1 parent d0a9871 commit 15132ad
Showing 1 changed file with 8 additions and 0 deletions.
8 changes: 8 additions & 0 deletions packages/edge-gateway/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,14 @@ Please note that subdomain resolution is only supported with [CIDv1](https://doc

nft.storage Gateway is currently rate limited at 200 requests per minute to a given IP Address. In the event of a rate limit, the IP will be blocked for 30 seconds.

## Deny List

We rely on [badbits](https://github.com/protocol/badbits.dwebops.pub) denylist together wtth our own denylist to prevent serving malicious content to the nftstorage.link users.

When new malicious content is discovered, it should be reported to [badbits](https://github.com/protocol/badbits.dwebops.pub) denylist given it is shared among multiple gateways. When the reported CIDs are added into badbits, we just need to force our [denylist sync workflow](https://github.com/nftstorage/nftstorage.link/actions/workflows/cron-denylist.yml) to run manually.

As a workaround, or to block content only relevant for nftstorage.link we can simply use our denylist as described in our [CLI documentation](./scripts/README.md).

## Persistence

Several metrics per gateway are persisted to track the performance of each public gateway over time. Moreover, the list of gateways that have previously fetched successfully a given CID are also persisted.

0 comments on commit 15132ad

Please sign in to comment.