-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proof of IPv4 address #20
Comments
Ideas from @willscott:
|
We should consider supporting IPv6 addresses too. Cross-posting from filecoin-station/spark-api#104 (comment) We rely on Cloudflare to provide IPv4 access only. This is problematic for two reasons:
FWIW, quoting from https://developer.apple.com/support/ipv6/
Cross-posting from filecoin-station/spark-api#110 (comment) CloudFlare's dashboard does not allow you to disable IPv6 support via web UI and the docs say this feature is available to customers on the Enterprise plan only. Yet the REST API allows me to disable IPv6, as explained here: https://www.mediarealm.com.au/articles/cloudflare-disable-ipv6/ Related docs: If this approach does not work, then I'll try the next quick workaround that should be good enough for short term: |
worth noting that ipv6 addresses don't have a quantifiable cost associated with them in the same way that v4 addresses do. as such, not using v4 as a 'scare resource' means the system will need to have a different answer for how sibyl attacks are mitigated. |
Agreed 👍🏻
In our design, we are not using the IPv4/IPv6 address, but a subnet it belongs to. For IPv4, we use the first three bytes as the subnet. Is it possible to define an algorithm that will map IPv6 addresses to reasonable groups? Quoting from Wikipedia:
Let's say for home users, we take the first 48 bits of their address as the subnet (the scarce resource). Would that work?
If we treat the first 48 bits of the IPv6 address as the subnet (the scarce resource), then we will treat all computers in an organisation like the above as a single node operator 🤔 OK, this approach clearly needs more research on the feasibility. Looking for a different mitigation strategy agains sibyl attacks is definitely an alternative to consider too. |
it doesn't really work - as such, if you use a 48 bit subnet as a prefix, then that means it's easy to pretend to be 2^(48-19) ~~ 500 million distinct subnets. that multiplier isn't great. |
ETA: 2024-06-30
We want to use IPv4 addresses of SPARK nodes as the scarce resource that makes it expensive for a single party to run many nodes. ATM, we rely on the trusted spark-api service to record the node's IPv4 address. In the longer term, we want to move to a trust-less model and thus require proof of the node's IPv4 address.
The text was updated successfully, but these errors were encountered: