Crates.io | payjoin-directory |
lib.rs | payjoin-directory |
version | |
source | src |
created_at | 2024-12-05 16:43:46.60996 |
updated_at | 2024-12-05 16:43:46.60996 |
description | A directory server for Payjoin V2 coordination |
homepage | |
repository | https://github.com/payjoin/rust-payjoin |
max_upload_size | |
id | 1473381 |
Cargo.toml error: | TOML parse error at line 18, column 1 | 18 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include` |
size | 0 |
Payjoin v2 peers store and forward HTTP client messages via a directory server in order to cordinate an asynchronous Payjoin transaction. Version 1 Requires the receiver to host a public HTTP server and to set up security using either HTTPS or Onion Services above and beyond typical HTTP client operation.
V2 clients use Hybrid Pubkey Encryption established in the bitcoin URI payment request for security instead, allowing lightweight clients secure communication without the burden of setup, which is done by the operator of this third-party directory server. This directory only sees OHTTP encapsulated, encrypted requests to prevent it from collecting metadata to break the privacy benefits of payjoin for messages who follow the spec.
This directory only accepts v2 payloads via Oblivious HTTP (OHTTP) and requests used to bootstrap OHTTP, preventing it from identifying IP addresses of clients.
The directory is a simple store-and-forward server. Receivers may enroll by making a request to a pubkey identified subdirectory. After success response, they may share this subdirectory as payjoin endpoint to the sender in a bitcoin URI. The sender may poll the subdirectory with a request posting their encrypted Fallback PSBT expecting a Payjoin Proposal PSBT response. The receiver may poll the enroll endpoint to await a request, later posting their Payjoin Proposal PSBT for the sender to receive, sign, and broadcast.
The directory does depend on a second independent Oblivious HTTP Relay server to help secure request/response metadata from the Payjoin Directory.