-
Notifications
You must be signed in to change notification settings - Fork 14
Spam-resistant relay protocol solution #242
Comments
The following is the draft of a solution to incorporate RLN into the relay protocol to prevent spamming. Design parameters: epoch Additional fields for the PubSub messages
SetUp Registration: Publishing: Contract: Peer:
Routing:
Update on the solution The lack of Advantages
Disadvantages
Security Concerns Some thoughts The proof of each message does not have to be verified by all the routing peers (as is the case in the current solution as well), as long as
Potential Enhancements
|
Overall looks good! I think this can be turned into a raw spec already probably. Will need to think about some stuff in moree detail. Some initial questions and comments:
|
@oskarth I see your point, you are right, then we need to add these fields to the payload. Then, the routing peers (talking the Relay protocol) need to parse the payload as well to extract the proof metadata and identify spam messages. |
@oskarth Indeed! it can be cached, this is also mentioned under the first item of the Potential Enhancements of the current issue. From the security perspective, the lack of access to the blockchain does not make any harm, indeed any routing peer with a local |
@oskarth My initial guess is yes, we would probably be able to use these constructs, but I need to spend more time on this, I will get back to you with an informed answer. |
@oskarth Following your question about the usage of topic validators for RLN relay, I created an issue #255 for more concrete investigation. |
Problem
To investigate and research on how to integrate the components of the RLN system (as specified in https://github.com/vacp2p/specs/issues/241) inside the relay protocol system model (as specified in #239) and achieve a realization of the IDEAL world pictured in #240.
This issue is part of #189
Acceptance criteria
The end result shall be a documented solution for the spam-resistant
relay
protocol. The design shall meet all the security/performance constraints and requirements specified in #239 and #240. Moreover, the components of the RLNapp that are needed for the spam protection must be determined at this phase.The text was updated successfully, but these errors were encountered: