11/WAKU-RELAY: Simplify

This commit is contained in:
Oskar Thoren 2021-03-29 17:20:51 +08:00
parent fcdce5ebbc
commit efb8d4b05e
No known key found for this signature in database
GPG Key ID: B2ECCFD3BC2EF77E

View File

@ -1,33 +1,13 @@
---
title: Waku Relay
version: 2.0.0-beta2
status: Draft
authors: Oskar Thorén <oskar@status.im>, Sanaz Taheri <sanaz@status.im>
slug: 11
title: 11/WAKU2-RELAY
name: Waku v2 Relay
status: draft
editor: Oskar Thorén <oskar@status.im>
contributors:
- Sanaz Taheri <sanaz@status.im>
---
# Table of Contents
- [Abstract](#abstract)
- [Security Requirements](#security-requirements)
- [Terminology](#terminology)
- [Adversarial Model](#adversarial-model)
- [Wire Specification](#wire-specification)
- [Protobuf](#protobuf)
- [RPC](#rpc)
- [Message](#message)
- [SubOpts](#subopts)
- [Signature Policy](#signature-policy)
- [Security Analysis](#security-analysis)
- [Future work](#future-work)
- [Changelog](#changelog)
- [Next](#next)
- [2.0.0-beta2](#200-beta2)
- [2.0.0-beta1](#200-beta1)
- [Copyright](#copyright)
- [References](#references)
# Abstract
`WakuRelay` is part of the gossip domain for Waku. It is a thin layer on top of GossipSub.
**Protocol identifier***: `/vac/waku/relay/2.0.0-beta2`
@ -142,11 +122,11 @@ However, note that the `WakuRelay` supports the use of more than one topic. In t
- Providing **Unlinkability**, **Integrity** and **Authenticity** simultaneously: Integrity and authenticity are typically addressed through digital signatures and Message Authentication Code (MAC) schemes, however, the usage of digital signatures (where each signature is bound to a particular peer) contradicts with the unlinkability requirement (messages signed under a certain signature key are verifiable by a verification key that is bound to a particular publisher). As such, integrity and authenticity are missing features in the `WakuRelay` protocol in the interest of unlinkability. In future work, advanced signature schemes like group signatures can be utilized to enable authenticity, integrity, and unlinkability simultaneously. In a group signature scheme, a member of a group can anonymously sign a message on behalf of the group as such the true signer is indistinguishable from other group members. <!-- TODO: shall I add a reference for group signatures?-->
# Changelog
### Next
- Added initial threat model and security analysis
### 2.0.0-beta2
Next version. Changes:
@ -154,7 +134,6 @@ Next version. Changes:
- Moved WakuMessage to separate spec and made it mandatory
- StrictNoSign
### 2.0.0-beta1
Initial draft version. Released [2020-09-17](https://github.com/vacp2p/specs/commit/a57dad2cc3d62f9128e21f68719704a0b358768b)
@ -179,7 +158,6 @@ Copyright and related rights waived via
5. [Whisper spec (EIP627)](https://eips.ethereum.org/EIPS/eip-627)
<!--
TODO: Don't quite understand this scenario [key field], to clarify. Wouldn't it always be in `from`?
> The key field contains the signing key when it cannot be inlined in the source peer ID. When present, it must match the peer ID. -->