Skip to content

Commit

Permalink
CIP Domain Validation: Risk of stalling
Browse files Browse the repository at this point in the history
In response to
https://forum.cardano.org/t/cip-draft-domain-validation-for-cardano-addresses/106328/9:
Lots of domain tokens – especially unsolicited ones – and the queries
done because of them could stall an application. Advice to do the
queries asynchronously/concurrently added.
  • Loading branch information
HeptaSean committed Sep 25, 2022
1 parent 891932a commit 4372eed
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions CIP--HeptaSean-DomainValidation/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -209,6 +209,10 @@ between them where appropriate.
Applications can display additional metadata given in the JSON files
obtained by the HTTP(S) validation method.

In order to avoid stalling the application when many domain tokens are
found at an address, implementations should do the queries asynchronously
or concurrently if possible.

## Rationale

### Simplicity
Expand Down Expand Up @@ -301,6 +305,12 @@ A small risk remains that the receiver of the token may be defamed by the
attacker's domain appearing next to the receiver's legitimate domains, when
an application shows all validated domains for an address.

Moreover, the attacker's servers could deliberately stall answers to the
DNS and especially HTTP(S) queries done for the validation.
This problem can to a large extent be attacked by implementations that do
the queries asynchronously or concurrently as already advised in [Discovery
and Verification of Relations](#discovery-and-verification-of-relations).

Address owners should monitor such unsolicited transactions and send such
tokens to unused addresses or back to the sender.

Expand Down

0 comments on commit 4372eed

Please sign in to comment.