You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We have a document we can point libp2p operators to in defense of or response to various resource exhaustion attacks (DoS, eclipse).
Why Important
Especially in the heat of battle, every minute reducing response/mitigation times can be significant. Having suggestions/steps prethought outside the fog of war will provide better suggestions in a quicker period of time.
User/customer
Anyone operating a libp2p node in production. This could range from desktop users to system administrators.
Notes
This should range from the full set of knobs available to an operator from implementation-specific items like go-libp2p resource manager config changes to more "nuclear" options like operating system iptable/firewall rules.
It's true system admins won't need coaching on operating system defense mechanisms, but this is relevant to surface for less-trained users.
An important aspect of this document layout is account for the OS items that are implementation agnostic to the implementation specific items. It's possible that implementation-specific docs live in the implementation repos and are linked from this docs.libp2p.io page.
Done Criteria
We have a document we can point libp2p operators to in defense of or response to various resource exhaustion attacks (DoS, eclipse).
Why Important
Especially in the heat of battle, every minute reducing response/mitigation times can be significant. Having suggestions/steps prethought outside the fog of war will provide better suggestions in a quicker period of time.
User/customer
Anyone operating a libp2p node in production. This could range from desktop users to system administrators.
Notes
The text was updated successfully, but these errors were encountered: