nwaku/waku
Alvaro Revuelta dad054d6b3
fix(rln): nullifierlog vulnerability (#2855)
2024-06-28 09:25:10 +02:00
..
common fix: multi nat initialization causing dead lock in waku tests + serialize test runs to avoid timing and port occupied issues (#2799) 2024-06-12 07:49:55 +02:00
discovery chore: Discovery in libwaku (#2711) 2024-05-21 18:37:50 +02:00
factory chore: add TWN parameters for RLNv2 (#2843) 2024-06-27 11:45:21 +02:00
incentivization feat(incentivization): add codec for eligibility proof and status (#2419) 2024-03-26 18:25:42 +01:00
node fix: revert "chore: adding observers for message logging (#2800)" (#2815) 2024-06-17 14:30:30 +02:00
utils chore: generic change to reduce the number of compilation warnings (#2696) 2024-05-16 22:29:11 +02:00
waku_api fix: invalid cursor returning messages (#2724) 2024-05-27 10:54:10 -04:00
waku_archive postgres_driver: better sync lock in partition creation (#2809) 2024-06-14 10:07:41 +02:00
waku_core unifying clusterId to be uint16 (#2777) 2024-06-05 15:32:35 +02:00
waku_enr unifying clusterId to be uint16 (#2777) 2024-06-05 15:32:35 +02:00
waku_filter_v2 chore: set msg_hash logs to notice level (#2737) 2024-06-10 15:56:55 +02:00
waku_keystore feat(rlnv2): clean fork of rlnv2 (#2828) 2024-06-20 14:55:50 +02:00
waku_lightpush feat: RLN proofs as a lightpush service (#2768) 2024-06-13 21:10:00 +04:00
waku_metadata Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_noise Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_peer_exchange refactor: big refactor to add waku component in libwaku instead of onlu waku node (#2658) 2024-05-03 14:07:15 +02:00
waku_relay fix: revert "chore: adding observers for message logging (#2800)" (#2815) 2024-06-17 14:30:30 +02:00
waku_rln_relay fix(rln): nullifierlog vulnerability (#2855) 2024-06-28 09:25:10 +02:00
waku_store chore: generic change to reduce the number of compilation warnings (#2696) 2024-05-16 22:29:11 +02:00
waku_store_legacy chore: generic change to reduce the number of compilation warnings (#2696) 2024-05-16 22:29:11 +02:00
README.md chore: simple link refactor (#2781) 2024-06-07 13:07:15 +05:30
waku_api.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_archive.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_core.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_enr.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_filter_v2.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_keystore.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_lightpush.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_metadata.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_node.nim chore: Separation of node health and initialization state from rln_relay (#2612) 2024-04-23 18:53:18 +02:00
waku_peer_exchange.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_relay.nim chore: remove references to v2 (#1898) 2023-08-09 18:11:50 +01:00
waku_rln_relay.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_store.nim Generic re-style with nph 0.5.1 (#2396) 2024-03-16 00:08:47 +01:00
waku_store_legacy.nim feat: store v3 (#2431) 2024-04-25 09:09:52 -04:00

README.md

Waku

This folder contains code related to Waku, both as a node and as a protocol.

Introduction

This is an implementation in Nim of the Waku suite of protocols.

See specifications.

How to Build & Run

Prerequisites

  • GNU Make, Bash and the usual POSIX utilities. Git 2.9.4 or newer.

Wakunode binary

# The first `make` invocation will update all Git submodules.
# You'll run `make update` after each `git pull`, in the future, to keep those submodules up to date.
make wakunode2

# See available command line options
./build/wakunode2 --help

# Connect the client directly with the Status test fleet
# TODO NYI
#./build/wakunode2 --log-level:debug --discovery:off --fleet:test --log-metrics

Note: building wakunode2 requires 2GB of RAM. The build will fail on systems not fulfilling this requirement.

Setting up a wakunode2 on the smallest digital ocean droplet, you can either

  • compile on a stronger droplet featuring the same CPU architecture and downgrade after compiling, or
  • activate swap on the smallest droplet, or
  • use Docker.

Waku Protocol Test Suite

# Run all the Waku tests
make test

To run a specific test.

# Get a shell with the right environment variables set
./env.sh bash
# Run a specific test
nim c -r ./tests/test_waku_filter_legacy.nim

You can also alter compile options. For example, if you want a less verbose output you can do the following. For more, refer to the compiler flags and chronicles documentation.

nim c -r -d:chronicles_log_level=WARN --verbosity=0 --hints=off ./tests/waku_filter_v2/test_waku_filter.nim

You may also want to change the outdir to a folder ignored by git.

nim c -r -d:chronicles_log_level=WARN --verbosity=0 --hints=off --outdir=build ./tests/waku_filter_v2/test_waku_filter.nim

Waku Protocol Example

There are basic examples of both publishing and subscribing, more limited in features and configuration than the wakunode2 binary, located in examples/.

There is also a more full featured example in apps/chat2/.

Using Metrics

Metrics are available for Waku nodes.

make wakunode2
./build/wakunode2 --metrics-server

Ensure your Prometheus config prometheus.yml contains the targets you care about, e.g.:

scrape_configs:
  - job_name: "waku"
    static_configs:
      - targets: ['localhost:8008', 'localhost:8009', 'localhost:8010']

For visualisation, similar steps can be used as is written down for Nimbus here.

There is a similar example dashboard that includes visualisation of the envelopes available at metrics/waku-grafana-dashboard.json.

Spec support

All Waku RFCs reside at rfc.vac.dev. Note that Waku specs are titled WAKU2-XXX to differentiate them from a previous legacy version of Waku with RFC titles in the format WAKU-XXX. The legacy Waku protocols are stable, but not under active development.

Generating and configuring a private key

By default a node will generate a new, random key pair each time it boots, resulting in a different public libp2p multiaddrs after each restart.

To maintain consistent addressing across restarts, it is possible to configure the node with a previously generated private key using the --nodekey option.

wakunode2 --nodekey=<64_char_hex>

This option takes a Secp256k1 private key in 64 char hexstring format.

To generate such a key on Linux systems, use the openssl rand command to generate a pseudo-random 32 byte hexstring.

openssl rand -hex 32

Example output:

$ openssl rand -hex 32
6a29e767c96a2a380bb66b9a6ffcd6eb54049e14d796a1d866307b8beb7aee58

where the key 6a29e767c96a2a380bb66b9a6ffcd6eb54049e14d796a1d866307b8beb7aee58 can be used as nodekey.

To create a reusable keyfile on Linux using openssl, use the ecparam command coupled with some standard utilities whenever you want to extract the 32 byte private key in hex format.

# Generate keyfile
openssl ecparam -genkey -name secp256k1 -out my_private_key.pem
# Extract 32 byte private key
openssl ec -in my_private_key.pem -outform DER | tail -c +8 | head -c 32| xxd -p -c 32

Example output:

read EC key
writing EC key
0c687bb8a7984c770b566eae08520c67f53d302f24b8d4e5e47cc479a1e1ce23

where the key 0c687bb8a7984c770b566eae08520c67f53d302f24b8d4e5e47cc479a1e1ce23 can be used as nodekey.

wakunode2 --nodekey=0c687bb8a7984c770b566eae08520c67f53d302f24b8d4e5e47cc479a1e1ce23

Configuring a domain name

It is possible to configure an IPv4 DNS domain name that resolves to the node's public IPv4 address.

wakunode2 --dns4-domain-name=mynode.example.com

This allows for the node's publicly announced multiaddrs to use the /dns4 scheme. In addition, nodes with domain name and secure websocket configured, will generate a discoverable ENR containing the /wss multiaddr with /dns4 domain name. This is necessary to verify domain certificates when connecting to this node over secure websocket.

Using DNS discovery to connect to existing nodes

A node can discover other nodes to connect to using DNS-based discovery. The following command line options are available:

--dns-discovery              Enable DNS Discovery
--dns-discovery-url          URL for DNS node list in format 'enrtree://<key>@<fqdn>'
--dns-discovery-name-server  DNS name server IPs to query. Argument may be repeated.
  • --dns-discovery is used to enable DNS discovery on the node. Waku DNS discovery is disabled by default.
  • --dns-discovery-url is mandatory if DNS discovery is enabled. It contains the URL for the node list. The URL must be in the format enrtree://<key>@<fqdn> where <fqdn> is the fully qualified domain name and <key> is the base32 encoding of the compressed 32-byte public key that signed the list at that location.
  • --dns-discovery-name-server is optional and contains the IP(s) of the DNS name servers to query. If left unspecified, the Cloudflare servers 1.1.1.1 and 1.0.0.1 will be used by default.

A node will attempt connection to all discovered nodes.

This can be used, for example, to connect to one of the existing fleets. Current URLs for the published fleet lists:

  • production fleet: enrtree://AIRVQ5DDA4FFWLRBCHJWUWOO6X6S4ZTZ5B667LQ6AJU6PEYDLRD5O@sandbox.waku.nodes.status.im
  • test fleet: enrtree://AOGYWMBYOUIMOENHXCHILPKY3ZRFEULMFI4DOM442QSZ73TT2A7VI@test.waku.nodes.status.im

See the separate tutorial for a complete guide to DNS discovery.

Enabling Websocket

Websocket is currently the only Waku transport supported by browser nodes that uses js-waku. Setting up websocket enables your node to directly serve browser peers.

A valid certificate is necessary to serve browser nodes, you can use letsencrypt:

sudo letsencrypt -d <your.domain.name>

You will need the privkey.pem and fullchain.pem files.

To enable secure websocket, pass the generated files to wakunode2: Note, the default port for websocket is 8000.

wakunode2 --websocket-secure-support=true --websocket-secure-key-path="<letsencrypt cert dir>/privkey.pem" --websocket-secure-cert-path="<letsencrypt cert dir>/fullchain.pem"

Self-signed certificates

Self-signed certificates are not recommended for production setups because:

  • Browsers do not accept self-signed certificates
  • Browsers do not display an error when rejecting a certificate for websocket.

However, they can be used for local testing purposes:

mkdir -p ./ssl_dir/
openssl req -x509 -newkey rsa:4096 -keyout ./ssl_dir/key.pem -out ./ssl_dir/cert.pem -sha256 -nodes
wakunode2 --websocket-secure-support=true --websocket-secure-key-path="./ssl_dir/key.pem" --websocket-secure-cert-path="./ssl_dir/cert.pem"