Skip to content

Commit 7604f42

Browse files
gobengomsporny
andauthored
add security consideration about how noCache can lead to DDOS so clients should expect that servers may deny cache bypass (#171)
* add security consideration about how noCache can lead to DDOS so clients should expect that servers may deny cache bypass * Update index.html Co-authored-by: Manu Sporny <[email protected]> --------- Co-authored-by: Manu Sporny <[email protected]>
1 parent d640c02 commit 7604f42

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

index.html

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2457,7 +2457,14 @@ <h2>Caching</h2>
24572457
<p>Caching behavior can be controlled by configuration of the <a>DID resolver</a>,
24582458
by the <code>noCache</code> resolution option, or by contents of the DID document
24592459
(e.g., a `cacheMaxTtl` field), or by a combination of these properties.</p>
2460-
<p class="issue" data-number="10">See corresponding open issue.</p>
2460+
2461+
<p>Resolvers that implement noCache might be more vulnerable to denial of service attacks,
2462+
as malicious clients can bypass caching to force expensive network requests and resource consumption.
2463+
Clients requesting resolution with <code>noCache</code> expect that some resolvers will reject resolution requests that bypass caching.
2464+
Resolvers that deny resolution without caching can respond with an error that makes it clear that bypassing the cache was not permitted
2465+
so the client can attempt to resolve without using <code>noCache</code>.</p>
2466+
2467+
<p class="issue" data-number="10">See corresponding open issue.</p>
24612468
<p class="issue">Perhaps we can re-use caching mechanisms of other protocols such as HTTP.</p>
24622469
</section>
24632470
<section id="json-ld-integrity">

0 commit comments

Comments
 (0)