vacp2p / research

Thinking in code
MIT License
63 stars 4 forks source link

Experimental Tor/SOCKS5 support for req/resp protocols #90

Open oskarth opened 3 years ago

oskarth commented 3 years ago

Problem

For request/reply protocols used by restricted nodes (https://rfc.vac.dev/spec/30/) such as lightpush (connectivity), filter (bandwidth), store (uptime), there are currently few metadata protection guarantees.

Suggested sketch

Enable SOCKS5 proxy support https://github.com/status-im/nim-libp2p/issues/358, then do a PoC using e.g. store protocol for hardcoded/discovered onion address.

Why

Doing this would provide better metadata protection for lighter nodes using e.g. desktop. It'd also give users flexibility, give more credibility in terms of working with other projects and not just doing our own thing, and will give us.

It'll also be a stepping stone towards better understanding of privacy guarantees Waku should focus on, making the Waku use case and story even more clear in terms of how it compares with / complements Tor, etc.

Also see

-OpenBazaar go-onion-transport https://github.com/OpenBazaar/go-onion-transport

Acceptance criteria

Menduist commented 2 years ago

Tor support as been merged in libp2p: https://github.com/status-im/nim-libp2p/pull/765