Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

The Fedi Forum

  1. Home
  2. Fediverse
  3. Can we make federation less dependent on domain names?

Can we make federation less dependent on domain names?

Scheduled Pinned Locked Moved Fediverse
fediverse
18 Posts 13 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G gammaray@sh.itjust.works

    It looks like some issues may arise if/when an instance's domain name changes. Is there any way we can change federation so that we don't need to rely on such a central point of failure?

    T This user is from outside of this forum
    T This user is from outside of this forum
    thefogan@programming.dev
    wrote last edited by
    #5

    I mean DNS is always the issue... but then that's kind of the double edged sword as well isn't it?

    Conceptually 4 options come to mind.

    1. DNS as current - weakness domain name changes or DNS outages or poisoning

    2. IP address - Issues, migration etc... some instances may need to move services etc....

    3. SSL private/public keys - probably the strongest I'd imagine. only real weakness I can see is... 1. it has no ability to find a server, and I guess if a server is hacked and it's private key is stolen, federated servers would not be able to spot the imposter.

    I do think 3 might be the strongest option. I don't know anything on how lemmy etc.. works. I'd imagine a strategy would be, When A and B federate with eachother, A records B's Domain name, IP, and public key (and B gets A's as well), if DNS goes down attempt recorded IP. If neither work wait for an incoming connection and if the new connections public key matches an existing public key, it assumes the identity.

    But as far as the user side I don't really know. Obviously we can only match users as their domains. I can't imagine how I could find you again with gammaray@sh.itjust.works when sh.itjust.works domain is unregistered.

    G 1 Reply Last reply
    6
    • silverpillS This user is from outside of this forum
      silverpillS This user is from outside of this forum
      silverpill
      wrote last edited by
      #6

      That's correct.

      did: prefix is used to denote cryptographic identifiers, in theory one could even take a did:plc identifier from Bluesky and then use it as identity for an ActivityPub application:

      https://github.com/bluesky-social/atproto/pull/3943

      1 Reply Last reply
      8
      • T thefogan@programming.dev

        I mean DNS is always the issue... but then that's kind of the double edged sword as well isn't it?

        Conceptually 4 options come to mind.

        1. DNS as current - weakness domain name changes or DNS outages or poisoning

        2. IP address - Issues, migration etc... some instances may need to move services etc....

        3. SSL private/public keys - probably the strongest I'd imagine. only real weakness I can see is... 1. it has no ability to find a server, and I guess if a server is hacked and it's private key is stolen, federated servers would not be able to spot the imposter.

        I do think 3 might be the strongest option. I don't know anything on how lemmy etc.. works. I'd imagine a strategy would be, When A and B federate with eachother, A records B's Domain name, IP, and public key (and B gets A's as well), if DNS goes down attempt recorded IP. If neither work wait for an incoming connection and if the new connections public key matches an existing public key, it assumes the identity.

        But as far as the user side I don't really know. Obviously we can only match users as their domains. I can't imagine how I could find you again with gammaray@sh.itjust.works when sh.itjust.works domain is unregistered.

        G This user is from outside of this forum
        G This user is from outside of this forum
        gammaray@sh.itjust.works
        wrote last edited by
        #7

        I was also considering something along the lines of option 3. I'm not sure of a foolproof solution, even DNS has the potential for imposters and being revoked.

        L 1 Reply Last reply
        2
        • nocturneN nocturne

          Are instances changing names that often? Hexbear is the only one I have heard of and iirc that was only temporary.

          e0qdk@reddthat.comE This user is from outside of this forum
          e0qdk@reddthat.comE This user is from outside of this forum
          e0qdk@reddthat.com
          wrote last edited by
          #8

          Instances go down a lot -- often permanently. e.g. kbin.social, lemm.ee, etc.

          When an instance goes down, it takes out all the user accounts and communities on it, and it's hit or miss if you can find copies of the posts on other instances.

          1 Reply Last reply
          9
          • G gammaray@sh.itjust.works

            I was also considering something along the lines of option 3. I'm not sure of a foolproof solution, even DNS has the potential for imposters and being revoked.

            L This user is from outside of this forum
            L This user is from outside of this forum
            lambalicious@lemmy.sdf.org
            wrote last edited by
            #9

            Yeah, the weakness of SSL is basically the same as the weakness of DNS: that someone can remotely impersonate you or revoke your identity. But there is a major difference: DNS is designed so that your identity is taken away as part of the system: you can not ever declare your identity yourself, you have to rent it from an external entity controlled by corporate, government or both. Whereas in SSL if your identity is taken away for the most part it's purely your fault (only you should be having your private keys).

            1 Reply Last reply
            4
            • ? Offline
              ? Offline
              Guest
              wrote last edited by
              #10

              DIDs aren't unique to Bluesky

              AusterA 1 Reply Last reply
              2
              • G gammaray@sh.itjust.works

                It looks like some issues may arise if/when an instance's domain name changes. Is there any way we can change federation so that we don't need to rely on such a central point of failure?

                RimuR This user is from outside of this forum
                RimuR This user is from outside of this forum
                Rimu
                wrote last edited by
                #11

                Hypothetically an instance could federate an activity telling all other instances about it's new domain name.

                But once we get post, community and user migration working there will be much less need for it - everyone could just move themselves.

                rglullis@communick.newsR 1 Reply Last reply
                5
                • RimuR Rimu

                  Hypothetically an instance could federate an activity telling all other instances about it's new domain name.

                  But once we get post, community and user migration working there will be much less need for it - everyone could just move themselves.

                  rglullis@communick.newsR This user is from outside of this forum
                  rglullis@communick.newsR This user is from outside of this forum
                  rglullis@communick.news
                  wrote last edited by rglullis@communick.news
                  #12

                  I still don't understand how this is not akin to falsifying data. If we normalize servers copying data from other instances and just rewriting the URL, there is little in the way for malicious actors to create piefed instances to scam others pretending to be someone they are not.

                  P 1 Reply Last reply
                  2
                  • ? Guest

                    DIDs aren't unique to Bluesky

                    AusterA This user is from outside of this forum
                    AusterA This user is from outside of this forum
                    Auster
                    wrote last edited by
                    #13

                    Didn't mean it was. Just mentioned it as it was the most common example I knew. But thanks for the link! Reading it now.

                    1 Reply Last reply
                    7
                    • G gammaray@sh.itjust.works

                      It looks like some issues may arise if/when an instance's domain name changes. Is there any way we can change federation so that we don't need to rely on such a central point of failure?

                      L This user is from outside of this forum
                      L This user is from outside of this forum
                      lordnikon@lemmy.world
                      wrote last edited by
                      #14

                      Irc solved this by having list servers domains that give a list of irc servers so instead of having random servers that go down you have a network of distributed servers that work together.

                      1 Reply Last reply
                      7
                      • rglullis@communick.newsR rglullis@communick.news

                        I still don't understand how this is not akin to falsifying data. If we normalize servers copying data from other instances and just rewriting the URL, there is little in the way for malicious actors to create piefed instances to scam others pretending to be someone they are not.

                        P This user is from outside of this forum
                        P This user is from outside of this forum
                        Pamasich
                        wrote last edited by pamasich@kbin.earth
                        #15

                        Is Piefed implementing this in some weird way?

                        Iirc previous work on this in the fediverse involved a very clear way of doing it that makes sure to address the issue you're bringing up there.

                        The idea is that you send activities to announce the move and mark the original actor as having moved to the new actor (and the new actor as being the new home of the original actor). Instances then verify this by whether that actor relationship is specified correctly on both sides (does going new actor -> origin actor -> new actor lead back to where we started from?).

                        Is that not also Piefed's implementation? Because if it is, I don't see your scenario being viable. Since the move needs to be acknowledged by both sides, it cannot just be faked.

                        1 Reply Last reply
                        0
                        • rglullis@communick.newsR This user is from outside of this forum
                          rglullis@communick.newsR This user is from outside of this forum
                          rglullis@communick.news
                          wrote last edited by
                          #16

                          AFAIK, "community migration" is done in PieFed by having the target instance making a request to the source one to change, and if the owner authorizes it then it PieFed recreates the actor and its objects on the target instance. Then it is up to the owner of the source community to delete the/close the source community.

                          My objection is to this recreation of the objects. If someone creates a post on "community@alpha" and the moderator decides to move to "community@beta", history is being recreated and it makes "beta" with activity that is not original. Also, having the consent from the community owner is not enough, because it ignores the fact that the members of the alpha community might not be interested in being associated with beta.

                          P cracks_inthewalls@sh.itjust.worksC 2 Replies Last reply
                          0
                          • rglullis@communick.newsR rglullis@communick.news

                            AFAIK, "community migration" is done in PieFed by having the target instance making a request to the source one to change, and if the owner authorizes it then it PieFed recreates the actor and its objects on the target instance. Then it is up to the owner of the source community to delete the/close the source community.

                            My objection is to this recreation of the objects. If someone creates a post on "community@alpha" and the moderator decides to move to "community@beta", history is being recreated and it makes "beta" with activity that is not original. Also, having the consent from the community owner is not enough, because it ignores the fact that the members of the alpha community might not be interested in being associated with beta.

                            P This user is from outside of this forum
                            P This user is from outside of this forum
                            Pamasich
                            wrote last edited by pamasich@kbin.earth
                            #17

                            Oh yeah, this does not sound okay.

                            If user@delta creates a post on community@alpha, their post lives on delta, not alpha. Community@alpha should not be able to unilaterally decide that the post should instead live on beta. Delta needs to be the one to decide that.

                            Sorry for the political analogy, but this sounds to me like Russia and the US deciding on Ukraine's future without involving the latter.

                            1 Reply Last reply
                            2
                            • rglullis@communick.newsR rglullis@communick.news

                              AFAIK, "community migration" is done in PieFed by having the target instance making a request to the source one to change, and if the owner authorizes it then it PieFed recreates the actor and its objects on the target instance. Then it is up to the owner of the source community to delete the/close the source community.

                              My objection is to this recreation of the objects. If someone creates a post on "community@alpha" and the moderator decides to move to "community@beta", history is being recreated and it makes "beta" with activity that is not original. Also, having the consent from the community owner is not enough, because it ignores the fact that the members of the alpha community might not be interested in being associated with beta.

                              cracks_inthewalls@sh.itjust.worksC This user is from outside of this forum
                              cracks_inthewalls@sh.itjust.worksC This user is from outside of this forum
                              cracks_inthewalls@sh.itjust.works
                              wrote last edited by cracks_inthewalls@sh.itjust.works
                              #18

                              I almost feel like someone needs to do a write-up of the 196@lemmy.blahaj.zone debacle - while not a 1-for-1 example (it wasn't a migration attempt that functioned the exact same way as it would with PieFed), it's a good case study for userbase-community owner-instance dynamics that should be considered, specifically the bit in your last sentence.

                              1 Reply Last reply
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              Powered by NodeBB Contributors
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World