Skip to content

Commit 4600099

Browse files
committed
Explain gateway security vulnerability
Ref #93
1 parent 72a0648 commit 4600099

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

content/guides/concepts/ipfs-gateway.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The discussion above illustrated the use of read-only HTTP(S) gateways to fetch
7575
<!-- Generic use cases -->
7676
<!-- Which kind of gateway should be used when -->
7777

78-
## 5. When not to provide a gateway
78+
## 5. When not to employ a gateway
7979

8080
### 5.1 Delay-sensitive applications
8181
Any gateway introduces delay in completing desired actions.
@@ -86,8 +86,20 @@ Faster execution occurs when using methods at the top of the following list:
8686
from app to the local service.
8787
* public/private gateways.
8888

89+
### 5.2 End-to-end cyptographic validation required
90+
Because of third-party gateway vulnerabilities outlined in §6.1 below, apps requiring end-to-end validation of content read/write should avoid gateways when possible.
91+
If the app must employ an extenal gateway, such apps should use ipfs.io or a trusted third-party.
92+
8993
## 6. Limitations
9094

95+
### 6.1 Third-party gateway security vulnerabilities
96+
An IPFS node cryptographically validates content it fetches.
97+
Employing a third-party public or private HTTP(S) gateway sacrifices end-to-end cryptographic validation of delivery of the correct content.
98+
An inability to guarantee the proper behavior of such gateways undermines trust in fetched content.
99+
The public gateway ipfs.io serves as an independent reference for returned content.
100+
101+
Similarly, guarantee of proper behavior when writing content via a third-party HTTP(S) writable gateway requires a fetch of written content via a native IPFS node or the ipfs.io public gateway.
102+
91103

92104
## 7. Implementation status
93105
<!-- current state of technology -->

0 commit comments

Comments
 (0)