-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
document DNS discovery/registration procedures in the security section #127
Comments
I think this is an important addition. I think the DNS concerns haven't been addressed very publicly because the informal plan has been to move to an improved DHT or gossip protocol or whatever better thing ASAP, but it has been a long time and we should acknowledge existing behavior. Would title this "Can others see who I connect to on the Dat network?", as the scope here is discovery and not ISP-style surveillance. Second point: "the operators the custom DNS discovery servers (the Dat project and a small number of trusted institutions) [...]" The term I have used is "centralized DNS", not "custom DNS". The former probably sounds redundant to a technical person (like "ATM Machine"), but communicates that it's not a distributed system, while also hinting that it isn't regular (hierarchical) DNS. What do other think? I can create a PR. |
i think "centralized DNS" is confusing. it's a misnomer: DNS is distributed by default and even here it's not necessarily centralized - you could run your private one, actually. i think "custom DNS" outlines it's not just any DNS server that can be used, as it need to accept registrations and does some validation on its own. this could be outlined better with "dynamic DNS" but maybe at this point we just drop the qualifier and talk about the "DNS servers" instead of trying to describe too many things at once... |
Yes this sounds good, please open a pull request (if you haven't already) and we can get it approved. |
+1 to just talk about DNS servers |
Currently, the security FAQ does not mention anything about DNS discovery. There's some mention that others in your swarm may know what you download, but those privacy concerns are always toned down by the "key requirement":
The document then links to this blog post which explains the various "reader privacy" tradeoffs in p2p architectures, but never explicitly mentions DNS discovery problems in themselves.
I've documented briefly my concerns with the protocol in this review of the protocol, but I will try to explain them here in the form of a Q/A so it can be adapted in the documentation.
This could certainly be improved, but I figured I would start with something to get the ball rolling and have a better idea of what I am getting at here.
Thanks!
The text was updated successfully, but these errors were encountered: