-
Notifications
You must be signed in to change notification settings - Fork 232
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feedback for the Suborigin working group #131
Comments
Wrong about this one. I'll try and figure out what the actual milestones for suborigin are. Their website lists Dec-2015 for the respective recommendation milestone, so that's clearly out of date. |
I think Suborigins still fit our use case and I don't have pressing feedback right now. What's breaking the current suborigins implementation in go-ipfs is the recent requirement that identifiers be lowercase, in order to be able to construct RFC6454-compatible origins. It looks like we'll need HSHCA here, a "multihash encoded in Base32 RFC 4648, downcased and stripped of its padding", which is fit to be used in hostnames and should yield RFC6454-compatible suborigin-names. Thanks @kyledrake :):)
Here's a reading list:
|
Thanks @lgierth for this! I will read through the links this week and comment afterwards. |
We use base32 without padding in the datastore already so it shouldn't be hard to implement. As we do that we should support both ipns and ipfs. So maybe we should do base32 encode whole first two segments of canonical path so we don't limit our self in future. Suborgin is either way an unique ID and doesn't have to have clear text meaning. |
Mh my thinking was it's not neccessary because there's provably no ipfs object for a given peerid hash and vice versa. And if that assumption falls it's still forward-compatible because we can easily just change the suborigin value since it's opaque to the user-agent. Also since it's opaque, user-agents must not infer information from it, like whether it's /ipfs or /ipns. The upside I see with just simple v1 CIDs in base32, is that the same value works with |
Yes but it should also work for dns names and in future with ipld space and view transformations. Also changing the suborgin will have side-effect of removing all locally stored data like user settings, keys and other browser stored data. |
@lgierth for 0.4.5 we should either: disable suborgins (the only browser implementing them refuses to work with them) or fix it and publish to 0.4.5. See: ipfs/kubo#3209 I think the suborgins spec is still WIP so maybe we should just disable them for time being. |
The Suborigins spec was changed and we have to adjust, the spec is still unstable and it might change in future. Currently the only browser supporting it (Chrome) errors out on it as it doesn't confront spec it uses. See ipfs/specs#131 License: MIT Signed-off-by: Jakub Sztandera <[email protected]>
The Suborigins spec was changed and we have to adjust, the spec is still unstable and it might change in future. Currently the only browser supporting it (Chrome) errors out on it as it doesn't confront spec it uses. See ipfs/specs#131 License: MIT Signed-off-by: Jakub Sztandera <[email protected]>
The Suborigins spec was changed and we have to adjust, the spec is still unstable and it might change in future. Currently the only browser supporting it (Chrome) errors out on it as it doesn't confront spec it uses. See ipfs/specs#131 License: MIT Signed-off-by: Jakub Sztandera <[email protected]> This commit was moved from ipfs/kubo@912a972
@jbenet mentioned in Lisbon that now is the time to direct feedback at the Suborigin working group [1]. In fact it might already be too late as their 31-Jul-2016 was the "recommendation" milestone date. Anyhow I wanna write up our use case and requirements and possible need for changes, and send it their way.
Let me know if this repo is not a good place for this.
[1] https://www.w3.org/2014/12/webappsec-charter-2015.html
The text was updated successfully, but these errors were encountered: