Skip to content

Verifiable HTTP Gateway Responses #128

@lidel

Description

@lidel

Summary

Various organizations are exposing IPFS content via Public HTTP Gateways (eg. Cloudflare).

There are users who can't run local IPFS node, but still could get some guarantees provided by content-addressing if they have software capable of re-calculating CIDs from arbitratry payloads.

This issue tracks ways we could do that.

Problem statement

Use Cases

  • (UC1) Package Manager fetching archive from HTTP Gateway
  • (UC2) User running ipfs-companion or other browser extension
  • (UC3) IoT / low power devices that are unable to use true p2p, but can reach HTTP gateways
  • (UC4) Web browser that wants to natively delegate IPFS handling to public gateways, but provide users with integrity guarantees of IPFS

Work

Resources

Prior Art

  • (UC2) Cloudflare

  • https://tools.ietf.org/html/rfc6249: Metalink/HTTP: Mirrors and Hashes
    Very relevant RFC, which provides HTTP-native semantics for returning Digest with the payload:

     Link: <http://example.com/example.ext.asc>; rel=describedby;
     type="application/pgp-signature"
     Digest: SHA-256=MWVkMWQxYTRiMzk5MDQ0MzI3NGU5NDEyZTk5OWY1ZGFmNzgyZTJlO
     DYzYjRjYzFhOTlmNTQwYzI2M2QwM2U2MQ==
    

IPFS

Metadata

Metadata

Assignees

No one assigned

    Labels

    epicstatus/deferredConscious decision to pause or backlog

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions