9.7 KiB
Parrhesia Relay Sync
1. Purpose
This document defines the Parrhesia proposal for relay-to-relay event synchronization.
It is intentionally transport-focused:
- manage remote relay peers,
- catch up on matching events,
- keep a live stream open,
- expose health and basic stats.
It does not define application data semantics.
Parrhesia syncs Nostr events. Callers decide which events matter and how to apply them.
2. Boundary
Parrhesia is responsible for
- storing and validating events,
- querying and streaming events,
- running outbound sync workers against remote relays,
- tracking peer configuration, worker health, and sync counters,
- exposing peer management through
Parrhesia.API.Sync.
Parrhesia is not responsible for
- resource mapping,
- trusted node allowlists for an app profile,
- mutation payload validation beyond normal event validation,
- conflict resolution,
- replay winner selection,
- database upsert/delete semantics.
For Tribes, those remain in TRIBES-NOSTRSYNC and AshNostrSync.
3. Security Foundation
Default posture
The baseline posture for sync traffic is:
- no access to sync events by default,
- no implicit trust from ordinary relay usage,
- no reliance on plaintext confidentiality from public relays.
For the first implementation, Parrhesia should protect sync data primarily with:
- authenticated server identities,
- ACL-gated read and write access,
- TLS with certificate pinning for outbound peers.
Server identity
Parrhesia owns a low-level server identity used for relay-to-relay authentication.
This identity is separate from:
- TLS endpoint identity,
- application event author pubkeys.
Recommended model:
- Parrhesia has one local server-auth pubkey,
- sync peers authenticate as server-auth pubkeys,
- ACL grants are bound to those authenticated server-auth pubkeys,
- application-level writer trust remains outside Parrhesia.
Identity lifecycle:
- use configured/imported key if provided,
- otherwise use persisted local identity,
- otherwise generate once during initial startup and persist it.
Private key export should not be supported.
ACLs
Sync traffic should use a real ACL layer, not moderation allowlists.
Initial ACL model:
- principal: authenticated pubkey,
- capabilities:
sync_read,sync_write, - match: event/filter shape such as
kinds: [5000]and namespace tags.
This is enough for now. We do not need a separate user ACL model and server ACL model yet.
A sync peer is simply an authenticated principal with sync capabilities.
TLS pinning
Each outbound sync peer must include pinned TLS material.
Recommended pin type:
- SPKI SHA-256 pins
Multiple pins should be allowed to support certificate rotation.
4. Sync Model
Each configured sync server represents one outbound worker managed by Parrhesia.
Minimum behavior:
- connect to the remote relay,
- run an initial catch-up query for the configured filters,
- ingest received events into the local relay through the normal API path,
- switch to a live subscription for the same filters,
- reconnect with backoff when disconnected.
The worker treats filters as opaque Nostr filters. It does not interpret app payloads.
Initial implementation mode
Initial implementation should use ordinary NIP-01 behavior:
- catch-up via
REQ-style query, - live updates via
REQsubscription.
This is enough for Tribes and keeps the first version simple.
NIP-77
NIP-77 is not required for the first sync implementation.
Reason:
- Parrhesia currently only has
NEG-*session tracking, not real negentropy reconciliation. - The current Tribes sync profile already assumes catch-up plus live replay, not negentropy.
NIP-77 should be treated as a later optimization for bandwidth-efficient reconciliation once Parrhesia has a real reusable implementation.
5. API Surface
Primary control plane:
Parrhesia.API.Identity.get/1Parrhesia.API.Identity.ensure/1Parrhesia.API.Identity.import/2Parrhesia.API.Identity.rotate/1Parrhesia.API.ACL.grant/2Parrhesia.API.ACL.revoke/2Parrhesia.API.ACL.list/1Parrhesia.API.Sync.put_server/2Parrhesia.API.Sync.remove_server/2Parrhesia.API.Sync.get_server/2Parrhesia.API.Sync.list_servers/1Parrhesia.API.Sync.start_server/2Parrhesia.API.Sync.stop_server/2Parrhesia.API.Sync.sync_now/2Parrhesia.API.Sync.server_stats/2Parrhesia.API.Sync.sync_stats/1Parrhesia.API.Sync.sync_health/1
These APIs are in-process. HTTP management may expose them through Parrhesia.API.Admin or direct routing to Parrhesia.API.Sync.
6. Server Specification
put_server/2 is an upsert.
Suggested server shape:
%{
id: "tribes-primary",
url: "wss://relay-a.example/relay",
enabled?: true,
auth_pubkey: "<remote-server-auth-pubkey>",
mode: :req_stream,
filters: [
%{
"kinds" => [5000],
"authors" => ["<trusted-node-pubkey-a>", "<trusted-node-pubkey-b>"],
"#r" => ["tribes.accounts.user", "tribes.chat.tribe"]
}
],
overlap_window_seconds: 300,
auth: %{
type: :nip42
},
tls: %{
mode: :required,
hostname: "relay-a.example",
pins: [
%{type: :spki_sha256, value: "<pin-a>"},
%{type: :spki_sha256, value: "<pin-b>"}
]
},
metadata: %{}
}
Required fields:
idurlauth_pubkeyfilterstls
Recommended fields:
enabled?modeoverlap_window_secondsauthmetadata
Rules:
idmust be stable and unique locally.urlis the remote relay websocket URL.auth_pubkeyis the expected remote server-auth pubkey.filtersmust be valid NIP-01 filters.- filters are owned by the caller; Parrhesia only validates filter shape.
modedefaults to:req_stream.tls.modedefaults to:required.tls.pinsmust be non-empty for synced peers.
7. Runtime State
Each server should have both configuration and runtime status.
Suggested runtime fields:
%{
server_id: "tribes-primary",
state: :running,
connected?: true,
last_connected_at: ~U[2026-03-16 10:00:00Z],
last_disconnected_at: nil,
last_sync_started_at: ~U[2026-03-16 10:00:00Z],
last_sync_completed_at: ~U[2026-03-16 10:00:02Z],
last_event_received_at: ~U[2026-03-16 10:12:45Z],
last_eose_at: ~U[2026-03-16 10:00:02Z],
reconnect_attempts: 0,
last_error: nil
}
Parrhesia should keep this state generic. It is about relay sync health, not app state convergence.
8. Stats and Health
Per-server stats
server_stats/2 should return basic counters such as:
events_receivedevents_acceptedevents_duplicateevents_rejectedquery_runssubscription_restartsreconnectslast_remote_eose_atlast_error
Aggregate sync stats
sync_stats/1 should summarize:
- total configured servers,
- enabled servers,
- running servers,
- connected servers,
- aggregate event counters,
- aggregate reconnect count.
Health
sync_health/1 should be operator-oriented, for example:
%{
"status" => "degraded",
"servers_total" => 3,
"servers_connected" => 2,
"servers_failing" => [
%{"id" => "tribes-secondary", "reason" => "connection_refused"}
]
}
This is intentionally simple. It should answer “is sync working?” without pretending to prove application convergence.
9. Event Ingest Path
Events received from a remote sync worker should enter Parrhesia through the same ingest path as any other accepted event.
That means:
- validate the event,
- run normal write policy,
- persist or reject,
- fan out locally,
- rely on duplicate-event behavior for idempotency.
This avoids a second ingest path with divergent behavior.
Before normal event acceptance, the sync worker should enforce:
- pinned TLS validation for the remote endpoint,
- remote server-auth identity match,
- local ACL grant permitting the peer to perform sync reads and/or writes.
The sync worker may attach request-context metadata such as:
%Parrhesia.API.RequestContext{
caller: :sync,
metadata: %{sync_server_id: "tribes-primary"}
}
That metadata is for telemetry and audit only. It must not become app sync semantics.
10. Persistence
Parrhesia should persist enough sync control-plane state to survive restart:
- local server identity reference,
- configured ACL rules for sync principals,
- configured servers,
- whether a server is enabled,
- optional catch-up cursor or watermark per server,
- basic last-error and last-success markers.
Parrhesia does not need to persist application replay heads or winner state. That remains in the embedding application.
11. Relationship to Current Features
BEAM cluster fanout
Parrhesia.Fanout.MultiNode is a separate feature.
It provides best-effort live fanout between connected BEAM nodes. It is not remote relay sync and is not a substitute for Parrhesia.API.Sync.
Management stats
Current admin stats is relay-global and minimal.
Sync adds a new dimension:
- peer config,
- worker state,
- per-peer counters,
- sync health summary.
That should be exposed without coupling it to app-specific sync semantics.
12. Tribes Usage
For Tribes, AshNostrSync should be able to:
- rely on Parrhesia’s local server identity,
- register one or more remote relays with
Parrhesia.API.Sync.put_server/2, - grant sync ACLs for trusted server-auth pubkeys,
- provide narrow Nostr filters for
kind: 5000, - observe sync health and counters,
- consume events via the normal local Parrhesia ingest/query/stream surface.
Tribes should not need Parrhesia to know:
- what a resource namespace means,
- which node pubkeys are trusted for Tribes,
- how to resolve conflicts,
- how to apply an upsert or delete.
That is the key boundary.