Table of Contents
- NOSTR = Notes and Other Stuff Transmitted by Relays
- nostr - Notes and Other Stuff Transmitted by Relays
- Very short summary of how it works, if you don't plan to read anything else:
- This is needed because other solutions are broken:
- The problem with Twitter
- The problem with Mastodon and similar programs
- The problem with SSB (Secure Scuttlebutt)
- The problem with other solutions that require everybody to run their own server
- How does Nostr work?
- How does it solve the problems the networks above can't?
- FAQ
- Protocol specification
- Software
- License
- NIPs
- List
- Event Kinds
- Event Kind Ranges
- Message types
- Client to Relay
- Relay to Client
- Standardized Tags
- Criteria for acceptance of NIPs
- License
- NIP-01
- Basic protocol flow description
- Events and signatures
- Communication between clients and relays
- From client to relay: sending events and creating subscriptions
- From relay to client: sending events and notices
- Basic Event Kinds
- Other Notes:
- NIP-02
- Contact List and Petnames
- Uses
- Contact list backup
- Profile discovery and context augmentation
- Relay sharing
- Petname scheme
- NIP-03
- OpenTimestamps Attestations for Events
- NIP-04
- Encrypted Direct Message
- Security Warning
- Client Implementation Warning
- NIP-05
- Mapping Nostr keys to DNS-based internet identifiers
- Example
- Finding users from their NIP-05 identifier
- Notes
- Clients must always follow public keys, not NIP-05 addresses
- Public keys must be in hex format
- User Discovery implementation suggestion
- Showing just the domain as an identifier
- Reasoning for the /.well-known/nostr.json?name=<local-part> format
- Allowing access from JavaScript apps
- Security Constraints
- NIP-06
- Basic key derivation from mnemonic seed phrase
- NIP-07
- window.nostr capability for web browsers
- Implementation
- NIP-08
- Handling Mentions
- NIP-09
- Event Deletion
- Client Usage
- Relay Usage
- Deleting a Deletion
- NIP-10
- On "e" and "p" tags in Text Events (kind 1).
- Abstract
- Positional "e" tags (DEPRECATED)
- Marked "e" tags (PREFERRED)
- The "p" tag
- NIP-11
- Relay Information Document
- Field Descriptions
- Name
- Description
- Pubkey
- Contact
- Supported NIPs
- Software
- Version
- Extra Fields
- Server Limitations
- Event Retention
- Content Limitations
- Community Preferences
- Pay-To-Relay
- NIP-12
- Generic Tag Queries
- Example Subscription Filter
- Client Behavior
- Rationale
- Suggested Use Cases
- NIP-13
- Proof of Work
- Mining
- Example mined note
- Validating
- Querying relays for PoW notes
- Delegated Proof of Work
- NIP-14
- Subject tag in Text events.
- NIP-15
- Nostr Marketplace (for resilient marketplaces)
- Terms
- Nostr Marketplace Clients
- Merchant admin
- Marketplace
- Merchant publishing/updating products (event)
- Event 30017: Create or update a stall.
- Event 30018: Create or update a product
- Checkout events
- Step 1: customer order (event)
- Step 2: merchant request payment (event)
- Step 3: merchant verify payment/shipped (event)
- Customer support events
- Additional
- NIP-16
- Event Treatment
- Regular Events
- Replaceable Events
- Ephemeral Events
- Client Behavior
- Suggested Use Cases
- NIP-18
- Reposts
- Quote Reposts
- NIP-19
- bech32-encoded entities
- Bare keys and ids
- Shareable identifiers with extra metadata
- Examples
- Notes
- NIP-20
- Command Results
- Examples
- Client Handling
- Future Extensions
- NIP-21
- nostr: URL scheme
- Examples
- NIP-22
- Event created_at Limits
- Client Behavior
- Motivation
- Python (pseudocode) Example
- NIP-23
- Long-form Content
- Format
- Metadata
- Editability
- Linking
- References
- Example Event
- NIP-25
- Reactions
- Tags
- NIP: 26
- Delegated Event Signing
- Introducing the 'delegation' tag
- Delegation Token
- Conditions Query String
- Example
- Relay & Client Support
- NIP-27
- Text Note References
- Example of a profile mention process
- Verbose and probably unnecessary considerations
- NIP-28
- Public Chat
- Kind 40: Create channel
- Kind 41: Set channel metadata
- Kind 42: Create channel message
- Kind 43: Hide message
- Kind 44: Mute user
- NIP-10 relay recommendations
- Motivation
- Additional info
- NIP-33
- Parameterized Replaceable Events
- Implementation
- Referencing and tagging
- Client Behavior
- NIP-36
- Sensitive Content / Content Warning
- Spec
- Example
- NIP-39
- External Identities in Profiles
- Abstract
- i tag on a metadata event
- Claim types
- github
- mastodon
- telegram
- NIP-40
- Expiration Timestamp
- Spec
- Example
- Client Behavior
- Relay Behavior
- Suggested Use Cases
- Warning
- NIP-42
- Authentication of clients to relays
- Motivation
- Definitions
- Protocol flow
- Signed Event Verification
- NIP-45
- Event Counts
- Motivation
- Filters and return values
- NIP-46
- Nostr Connect
- Rationale
- Terms
- TL;DR
- Signer Protocol
- Messages
- Request
- Response
- Methods
- Mandatory
- optional
- Nostr Connect URI
- JavaScript
- Example
- Flows
- Connect
- Disconnect (from App)
- Disconnect (from Signer)
- Get Public Key
- Sign Event
- Delegate
- NIP-50
- Search Capability
- Abstract
- search filter field
- Extensions
- NIP-51
- Lists
- Replaceable List Event Example
- Parameterized Replaceable List Event Example
- List Event Kinds
- Mute List
- Pin List
- Categorized People List
- Categorized Bookmarks List
- NIP-56
- Reporting
- Tags
- Example events
- Client behavior
- Relay behavior
- NIP-57
- Lightning Zaps
- Protocol flow
- Reference and examples
- Appendix A: Zap Request Event
- Appendix B: Zap Request HTTP Request
- Appendix C: LNURL Server Configuration
- Appendix D: LNURL Server Zap Request Validation
- Appendix E: Zap Receipt Event
- Appendix F: Validating Zap Receipts
- Appendix G: zap tag on zapped event
- Future Work
- NIP-58
- Badges
- Badge Definition event
- Badge Award event
- Profile Badges Event
- Motivation
- Recommendations
- Example of a Badge Definition event
- Example of Badge Award event
- Example of a Profile Badges event
- NIP-65
- Relay List Metadata
- The meaning of read and write
- Motivation
- Purposes
- Suggestions
- Why not in kind 0 Metadata
- Example
- NIP-78
- Arbitrary custom app data
- Nostr event
- Some use cases
- NIP-94
- File Metadata
- Event format
- Suggested use cases
NOSTR = Notes and Other Stuff Transmitted by Relays
A truly censorship-resistant alternative to Twitter that has a chance of working
nostr - Notes and Other Stuff Transmitted by Relays
Very short summary of how it works, if you don't plan to read anything else:
This is needed because other solutions are broken:
The problem with Twitter
- Twitter has ads;
- Twitter uses bizarre techniques to keep you addicted;
- Twitter doesn't show an actual historical feed from people you follow;
- Twitter bans people;
- Twitter shadowbans people;
- Twitter has a lot of spam.
The problem with Mastodon and similar programs
- User identities are attached to domain names controlled by third-parties;
- Server owners can ban you, just like Twitter; Server owners can also block other servers;
- Migration between servers is an afterthought and can only be accomplished if servers cooperate. It doesn't work in an adversarial environment (all followers are lost);
- There are no clear incentives to run servers, therefore, they tend to be run by enthusiasts and people who want to have their name attached to a cool domain. Then, users are subject to the despotism of a single person, which is often worse than that of a big company like Twitter, and they can't migrate out;
- Since servers tend to be run amateurishly, they are often abandoned after a while — which is effectively the same as banning everybody;
- It doesn't make sense to have a ton of servers if updates from every server will have to be painfully pushed (and saved!) to a ton of other servers. This point is exacerbated by the fact that servers tend to exist in huge numbers, therefore more data has to be passed to more places more often;
- For the specific example of video sharing, ActivityPub enthusiasts realized it would be completely impossible to transmit video from server to server the way text notes are, so they decided to keep the video hosted only from the single instance where it was posted to, which is similar to the Nostr approach.
The problem with SSB (Secure Scuttlebutt)
- It doesn't have many problems. I think it's great. I was going to use it as a basis for this, but
- its protocol is too complicated because it wasn't thought about being an open protocol at all. It was just written in JavaScript in probably a quick way to solve a specific problem and grew from that, therefore it has weird and unnecessary quirks like signing a JSON string which must strictly follow the rules of ECMA-262 6th Edition;
- It insists on having a chain of updates from a single user, which feels unnecessary to me and something that adds bloat and rigidity to the thing — each server/user needs to store all the chain of posts to be sure the new one is valid. Why? (Maybe they have a good reason);
- It is not as simple as Nostr, as it was primarily made for P2P syncing, with "pubs" being an afterthought;
- Still, it may be worth considering using SSB instead of this custom protocol and just adapting it to the client-relay server model, because reusing a standard is always better than trying to get people in a new one.
The problem with other solutions that require everybody to run their own server
- They require everybody to run their own server;
- Sometimes people can still be censored in these because domain names can be censored.
How does Nostr work?
- There are two components: clients and relays. Each user runs a client. Anyone can run a relay.
- Every user is identified by a public key. Every post is signed. Every client validates these signatures.
- Clients fetch data from relays of their choice and publish data to other relays of their choice. A relay doesn't talk to another relay, only directly to users.
- For example, to "follow" someone a user just instructs their client to query the relays it knows for posts from that public key.
- On startup, a client queries data from all relays it knows for all users it follows (for example, all updates from the last day), then displays that data to the user chronologically.
- A "post" can contain any kind of structured data, but the most used ones are going to find their way into the standard so all clients and relays can handle them seamlessly.
How does it solve the problems the networks above can't?
- Users getting banned and servers being closed
- A relay can block a user from publishing anything there, but that has no effect on them as they can still publish to other relays. Since users are identified by a public key, they don't lose their identities and their follower base when they get banned.
- Instead of requiring users to manually type new relay addresses (although this should also be supported), whenever someone you're following posts a server recommendation, the client should automatically add that to the list of relays it will query.
- If someone is using a relay to publish their data but wants to migrate to another one, they can publish a server recommendation to that previous relay and go;
- If someone gets banned from many relays such that they can't get their server recommendations broadcasted, they may still let some close friends know through other means with which relay they are publishing now. Then, these close friends can publish server recommendations to that new server, and slowly, the old follower base of the banned user will begin finding their posts again from the new relay.
- All of the above is valid too for when a relay ceases its operations.
- Censorship-resistance
- Each user can publish their updates to any number of relays.
- A relay can charge a fee (the negotiation of that fee is outside of the protocol for now) from users to publish there, which ensures censorship-resistance (there will always be some Russian server willing to take your money in exchange for serving your posts).
- Spam
- If spam is a concern for a relay, it can require payment for publication or some other form of authentication, such as an email address or phone, and associate these internally with a pubkey that then gets to publish to that relay — or other anti-spam techniques, like hashcash or captchas. If a relay is being used as a spam vector, it can easily be unlisted by clients, which can continue to fetch updates from other relays.
- Data storage
- For the network to stay healthy, there is no need for hundreds of active relays. In fact, it can work just fine with just a handful, given the fact that new relays can be created and spread through the network easily in case the existing relays start misbehaving. Therefore, the amount of data storage required, in general, is relatively less than Mastodon or similar software.
- Or considering a different outcome: one in which there exist hundreds of niche relays run by amateurs, each relaying updates from a small group of users. The architecture scales just as well: data is sent from users to a single server, and from that server directly to the users who will consume that. It doesn't have to be stored by anyone else. In this situation, it is not a big burden for any single server to process updates from others, and having amateur servers is not a problem.
- Video and other heavy content
- It's easy for a relay to reject large content, or to charge for accepting and hosting large content. When information and incentives are clear, it's easy for the market forces to solve the problem.
- Techniques to trick the user
- Each client can decide how to best show posts to users, so there is always the option of just consuming what you want in the manner you want — from using an AI to decide the order of the updates you'll see to just reading them in chronological order.
FAQ
- This is very simple. Why hasn't anyone done it before?
- How do I find people to follow?
- How do I find relays? What happens if I'm not connected to the same relays someone else is?
- Can I know how many people are following me?
- What incentive is there for people to run relays?
- Nostr enables you to move between server relays or use multiple relays but if these relays are just on AWS or Azure what’s the difference?
Protocol specification
Software
License
NIPs
List
- NIP-08: Handling Mentions --- unrecommended: deprecated in favor of NIP-27
Event Kinds
kind | description | NIP |
0 | Metadata | |
1 | Short Text Note | |
2 | Recommend Relay | |
3 | Contacts | |
4 | Encrypted Direct Messages | |
5 | Event Deletion | |
6 | Reposts | |
7 | Reaction | |
8 | Badge Award | |
40 | Channel Creation | |
41 | Channel Metadata | |
42 | Channel Message | |
43 | Channel Hide Message | |
44 | Channel Mute User | |
1063 | File Metadata | |
1984 | Reporting | |
9734 | Zap Request | |
9735 | Zap | |
10000 | Mute List | |
10001 | Pin List | |
10002 | Relay List Metadata | |
22242 | Client Authentication | |
24133 | Nostr Connect | |
30000 | Categorized People List | |
30001 | Categorized Bookmark List | |
30008 | Profile Badges | |
30009 | Badge Definition | |
30017 | Create or update a stall | |
30018 | Create or update a product | |
30023 | Long-form Content | |
30078 | Application-specific Data |
Event Kind Ranges
range | description | NIP |
1000 --9999 | Regular Events | |
10000 --19999 | Replaceable Events | |
20000 --29999 | Ephemeral Events | |
30000 --39999 | Parameterized Replaceable Events |
Message types
Client to Relay
type | description | NIP |
AUTH | used to send authentication events | |
CLOSE | used to stop previous subscriptions | |
COUNT | used to request event counts | |
EVENT | used to publish events | |
REQ | used to request events and subscribe to new updates |
Relay to Client
type | description | NIP |
AUTH | used to send authentication challenges | |
COUNT | used to send requested event counts to clients | |
EOSE | used to notify clients all stored events have been sent | |
EVENT | used to send events requested to clients | |
NOTICE | used to send human-readable messages to clients | |
OK | used to notify clients if an EVENT was successful |
Standardized Tags
name | value | other parameters | NIP |
a | coordinates to an event | relay URL | |
d | identifier | -- | |
e | event id (hex) | relay URL, marker | |
g | geohash | -- | |
i | identity | proof | |
p | pubkey (hex) | relay URL | |
r | a reference (URL, etc) | -- | |
t | hashtag | -- | |
amount | millisats | -- | |
bolt11 | bolt11 invoice | -- | |
challenge | challenge string | -- | |
content-warning | reason | -- | |
delegation | pubkey, conditions, delegation token | -- | |
description | badge description | -- | |
description | invoice description | -- | |
expiration | unix timestamp (string) | -- | |
image | image URL | dimensions in pixels | |
lnurl | bech32 encoded lnurl | -- | |
name | badge name | -- | |
nonce | random | -- | |
preimage | hash of bolt11 invoice | -- | |
published_at | unix timestamp (string) | -- | |
relay | relay url | -- | |
relays | relay list | -- | |
subject | subject | -- | |
summary | article summary | -- | |
thumb | badge thumbnail | dimensions in pixels | |
title | article title | -- | |
zap | profile name | type of value |
Criteria for acceptance of NIPs
- They should be implemented in at least two clients and one relay -- when applicable.
- They should make sense.
- They should be optional and backwards-compatible: care must be taken such that clients and relays that choose to not implement them do not stop working when interacting with the ones that choose to.
- There should be no more than one way of doing the same thing.
- Other rules will be made up when necessary.
License
NIP-01
Basic protocol flow description
draft
mandatory
author:fiatjaf
author:distbit
author:scsibug
author:kukks
author:jb55
author:semisol
Events and signatures
secp256k1
.event
, which has the following format on the wire:{
"id": <32-bytes lowercase hex-encoded sha256 of the serialized event data>
"pubkey": <32-bytes lowercase hex-encoded public key of the event creator>,
"created_at": <unix timestamp in seconds>,
"kind": <integer>,
"tags": [
["e", <32-bytes hex of the id of another event>, <recommended relay URL>],
["p", <32-bytes hex of a pubkey>, <recommended relay URL>],
... // other kinds of tags may be included later
],
"content": <arbitrary string>,
"sig": <64-bytes hex of the signature of the sha256 hash of the serialized event data, which is the same as the "id" field>
}
event.id
, we sha256
the serialized event. The serialization is done over the UTF-8 JSON-serialized string (with no white space or line breaks) of the following structure:[
0,
<pubkey, as a (lowercase) hex string>,
<created_at, as a number>,
<kind, as a number>,
<tags, as an array of arrays of non-null strings>,
<content, as a string>
]
Communication between clients and relays
From client to relay: sending events and creating subscriptions
["EVENT", <event JSON as defined above>]
, used to publish events.
["REQ", <subscription_id>, <filters JSON>...]
, used to request events and subscribe to new updates.
["CLOSE", <subscription_id>]
, used to stop previous subscriptions.
<subscription_id>
is an arbitrary, non-empty string of max length 64 chars, that should be used to represent a subscription.<filters>
is a JSON object that determines what events will be sent in that subscription, it can have the following attributes:{
"ids": <a list of event ids or prefixes>,
"authors": <a list of pubkeys or prefixes, the pubkey of an event must be one of these>,
"kinds": <a list of a kind numbers>,
"#e": <a list of event ids that are referenced in an "e" tag>,
"#p": <a list of pubkeys that are referenced in a "p" tag>,
"since": <an integer unix timestamp, events must be newer than this to pass>,
"until": <an integer unix timestamp, events must be older than this to pass>,
"limit": <maximum number of events to be returned in the initial query>
}
REQ
message, the relay SHOULD query its internal database and return events that match the filter, then store that filter and send again all future events it receives to that same websocket until the websocket is closed. The CLOSE
event is received with the same <subscription_id>
or a new REQ
is sent using the same <subscription_id>
, in which case it should overwrite the previous subscription.ids
, kinds
, or #e
) are JSON arrays with one or more values. At least one of the array's values must match the relevant field in an event for the condition itself to be considered a match. For scalar event attributes such as kind
, the attribute from the event must be contained in the filter list. For tag attributes such as #e
, where an event may have multiple values, the event and filter condition values must have at least one item in common.ids
and authors
lists contain lowercase hexadecimal strings, which may either be an exact 64-character match, or a prefix of the event value. A prefix match is when the filter string is an exact string prefix of the event value. The use of prefixes allows for more compact filters where a large number of values are queried, and can provide some privacy for clients that may not want to disclose the exact authors or events they are searching for.&&
conditions.REQ
message may contain multiple filters. In this case, events that match any of the filters are to be returned, i.e., multiple filters are to be interpreted as ||
conditions.limit
property of a filter is only valid for the initial query and can be ignored afterward. When limit: n
is present it is assumed that the events returned in the initial query will be the latest n
events. It is safe to return less events than limit
specifies, but it is expected that relays do not return (much) more events than requested so clients don't get unnecessarily overwhelmed by data.From relay to client: sending events and notices
["EVENT", <subscription_id>, <event JSON as defined above>]
, used to send events requested by clients.
["EOSE", <subscription_id>]
, used to indicate the end of stored events and the beginning of events newly received in real-time.
["NOTICE", <message>]
, used to send human-readable error messages or other things to clients.
NOTICE
messages should be sent or treated.EVENT
messages MUST be sent only with a subscription ID related to a subscription previously initiated by the client (using the REQ
message above).Basic Event Kinds
0
:set_metadata
: thecontent
is set to a stringified JSON object{name: <username>, about: <string>, picture: <url, string>}
describing the user who created the event. A relay may delete pastset_metadata
events once it gets a new one for the same pubkey.
1
:text_note
: thecontent
is set to the plaintext content of a note (anything the user wants to say). Markdown links ([]()
stuff) are not plaintext.
2
:recommend_server
: thecontent
is set to the URL (e.g.,wss://somerelay.com
) of a relay the event creator wants to recommend to its followers.
Other Notes:
- Clients should not open more than one websocket to each relay. One channel can support an unlimited number of subscriptions, so clients should do that.
- The
tags
array can store a tag identifier as the first element of each subarray, plus arbitrary information afterward (always as strings). This NIP defines"p"
— meaning "pubkey", which points to a pubkey of someone that is referred to in the event —, and"e"
— meaning "event", which points to the id of an event this event is quoting, replying to or referring to somehow. See NIP-10 for a detailed description of "e" and "p" tags.
- The
<recommended relay URL>
item present on the"e"
and"p"
tags is an optional (could be set to""
) URL of a relay the client could attempt to connect to fetch the tagged event or other events from a tagged profile. It MAY be ignored, but it exists to increase censorship resistance and make the spread of relay addresses more seamless across clients.
NIP-02
Contact List and Petnames
final
optional
author:fiat7jaf
author:arcbtc
3
, meaning "contact list" is defined as having a list of p
tags, one for each of the followed/known profiles one is following.["p", <32-bytes hex key>, <main relay URL>, <petname>]
. The content
can be anything and should be ignored.{
"kind": 3,
"tags": [
["p", "91cf9..4e5ca", "wss://alicerelay.com/", "alice"],
["p", "14aeb..8dad4", "wss://bobrelay.com/nostr", "bob"],
["p", "612ae..e610f", "ws://carolrelay.com/ws", "carol"]
],
"content": "",
...other fields
}
Uses
Contact list backup
Profile discovery and context augmentation
Relay sharing
Petname scheme
[
["p", "21df6d143fb96c2ec9d63726bf9edc71", "", "erin"]
]
21df6d143fb96c2ec9d63726bf9edc71
that says[
["p", "a8bb3d884d5d90b413d9891fe4c4e46d", "", "david"]
]
a8bb3d884d5d90b413d9891fe4c4e46d
that says[
["p", "f57f54057d2a7af0efecc8b0b66f5708", "", "frank"]
]
21df6d143fb96c2ec9d63726bf9edc71
the client can show erin instead; When the user sees a8bb3d884d5d90b413d9891fe4c4e46d
the client can show david.erin instead; When the user sees f57f54057d2a7af0efecc8b0b66f5708
the client can show frank.david.erin instead.NIP-03
OpenTimestamps Attestations for Events
draft
optional
author:fiatjaf
ots
key:{
"id": ...,
"kind": ...,
...,
...,
"ots": <base64-encoded OTS file data>
}
NIP-04
Encrypted Direct Message
final
optional
author:arcbtc
4
, meaning "encrypted direct message". It is supposed to have the following attributes:content
MUST be equal to the base64-encoded, aes-256-cbc encrypted string of anything a user wants to write, encrypted using a shared cipher generated by combining the recipient's public-key with the sender's private-key; this appended by the base64-encoded initialization vector as if it was a querystring parameter named "iv". The format is the following: "content": "<encrypted_text>?iv=<initialization_vector>"
.tags
MUST contain an entry identifying the receiver of the message (such that relays may naturally forward this event to them), in the form ["p", "<pubkey, as a hex string>"]
.tags
MAY contain an entry identifying the previous message in a conversation or a message we are explicitly replying to (such that contextual, more organized conversations may happen), in the form ["e", "<event_id>"]
.hashfp
argument in secp256k1_ecdh
. See here.import crypto from 'crypto'
import * as secp from '@noble/secp256k1'
let sharedPoint = secp.getSharedSecret(ourPrivateKey, '02' + theirPublicKey)
let sharedX = sharedPoint.slice(1, 33)
let iv = crypto.randomFillSync(new Uint8Array(16))
var cipher = crypto.createCipheriv(
'aes-256-cbc',
Buffer.from(sharedX),
iv
)
let encryptedMessage = cipher.update(text, 'utf8', 'base64')
encryptedMessage += cipher.final('base64')
let ivBase64 = Buffer.from(iv.buffer).toString('base64')
let event = {
pubkey: ourPubKey,
created_at: Math.floor(Date.now() / 1000),
kind: 4,
tags: [['p', theirPublicKey]],
content: encryptedMessage + '?iv=' + ivBase64
}
Security Warning
AUTH
to restrict who can fetch your kind:4
events.Client Implementation Warning
.content
. If processed like a regular text note (where @npub...
is replaced with #[0]
with a ["p", "..."]
tag) the tags are leaked and the mentioned user will receive the message in their inbox.NIP-05
Mapping Nostr keys to DNS-based internet identifiers
final
optional
author:fiatjaf
author:mikedilger
0
(set_metadata
) one can specify the key "nip05"
with an internet identifier (an email-like address) as the value. Although there is a link to a very liberal "internet identifier" specification above, NIP-05 assumes the <local-part>
part will be restricted to the characters a-z0-9-_.
, case insensitive.<local-part>
and <domain>
and use these values to make a GET request to https://<domain>/.well-known/nostr.json?name=<local-part>
."names"
that should then be a mapping of names to hex formatted public keys. If the public key for the given <name>
matches the pubkey
from the set_metadata
event, the client then concludes that the given pubkey can indeed be referenced by its identifier.Example
{
"pubkey": "b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9",
"kind": 0,
"content": "{\"name\": \"bob\", \"nip05\": \"[email protected]\"}"...
}
https://example.com/.well-known/nostr.json?name=bob
and get back a response that will look like{
"names": {
"bob": "b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9"
}
}
"relays"
attribute:{
"names": {
"bob": "b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9"
},
"relays": {
"b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9": [ "wss://relay.example.com", "wss://relay2.example.com" ]
}
}
"names"
(as in the example above) that means the association is right and the "nip05"
identifier is valid and can be displayed."relays"
attribute may contain an object with public keys as properties and arrays of relay URLs as values. When present, that can be used to help clients learn in which relays that user may be found. Web servers which serve /.well-known/nostr.json
files dynamically based on the query string SHOULD also serve the relays data for any name they serve in the same reply when that is available.Finding users from their NIP-05 identifier
0
event for that user and check if it has a matching "nip05"
.Notes
Clients must always follow public keys, not NIP-05 addresses
[email protected]
has the public key abc...def
, the user clicks a button to follow that profile, the client must keep a primary reference to abc...def
, not [email protected]
. If, for any reason, the address https://bob.com/.well-known/nostr.json?name=bob
starts returning the public key 1d2...e3f
at any time in the future, the client must not replace abc...def
in his list of followed profiles for the user (but it should stop displaying "[email protected]" for that user, as that will have become an invalid "nip05"
property).Public keys must be in hex format
npub
format are only meant to be used for display in client UIs, not in this NIP.User Discovery implementation suggestion
Showing just the domain as an identifier
_@domain
as the "root" identifier, and choose to display it as just the <domain>
. For example, if Bob owns bob.com
, he may not want an identifier like [email protected]
as that is redundant. Instead, Bob can use the identifier [email protected]
and expect Nostr clients to show and treat that as just bob.com
for all purposes.Reasoning for the /.well-known/nostr.json?name=<local-part>
format
<local-part>
as a query string instead of as part of the path the protocol can support both dynamic servers that can generate JSON on-demand and static servers with a JSON file in it that may contain multiple names.Allowing access from JavaScript apps
/.well-known/nostr.json
on the user's domain. When CORS prevents JS from loading a resource, the JS program sees it as a network failure identical to the resource not existing, so it is not possible for a pure-JS app to tell the user for certain that the failure was caused by a CORS issue. JS Nostr apps that see network failures requesting /.well-known/nostr.json
files may want to recommend to users that they check the CORS policy of their servers, e.g.:$ curl -sI https://example.com/.well-known/nostr.json?name=bob | grep -i ^Access-Control
Access-Control-Allow-Origin: *
/.well-known/nostr.json
is served with the HTTP header Access-Control-Allow-Origin: *
to ensure it can be validated by pure JS apps running in modern browsers.Security Constraints
/.well-known/nostr.json
endpoint MUST NOT return any HTTP redirects./.well-known/nostr.json
endpoint.NIP-06
Basic key derivation from mnemonic seed phrase
draft
optional
author:fiatjaf
m/44'/1237'/<account>'/0/0
(according to the Nostr entry on SLIP44).account
of 0
to derive a single key. For more advanced use-cases you can increment account
, allowing generation of practically infinite keys from the 5-level path with hardened derivation.NIP-07
window.nostr
capability for web browsers
draft
optional
author:fiatjaf
window.nostr
object may be made available by web browsers or extensions and websites or web-apps may make use of it after checking its availability.async window.nostr.getPublicKey(): string // returns a public key as hex
async window.nostr.signEvent(event: Event): Event // takes an event object, adds `id`, `pubkey` and `sig` and returns it
async window.nostr.getRelays(): { [url: string]: {read: boolean, write: boolean} } // returns a basic map of relay urls to relay policies
async window.nostr.nip04.encrypt(pubkey, plaintext): string // returns ciphertext and iv as specified in nip-04
async window.nostr.nip04.decrypt(pubkey, ciphertext): string // takes ciphertext and iv as specified in nip-04
Implementation
- horse (Chrome and derivatives)
- nos2x (Chrome and derivatives)
- Alby (Chrome and derivatives, Firefox, Safari)
- Blockcore (Chrome and derivatives)
- nos2x-fox (Firefox)
- Flamingo (Chrome and derivatives)
Warning unrecommended: deprecated in favor of NIP-27
NIP-08
Handling Mentions
final
unrecommended
optional
author:fiatjaf
author:scsibug
text_note
s.27866e9d854c78ae625b867eefdfa9580434bc3e675be08d2acb526610d96fbe
, the client MUST add that pubkey to the .tags
with the tag p
, then replace its textual reference (inside .content
) with the notation #[index]
in which "index" is equal to the 0-based index of the related tag in the tags array.text_note
event with such #[index]
mentions in its .content
CAN do a search-and-replace using the actual contents from the .tags
array with the actual pubkey or event ID that is mentioned, doing any desired context augmentation (for example, linking to the pubkey or showing a preview of the mentioned event contents) it wants in the process.#[index]
has an index
that is outside the range of the tags array or points to a tag that is not an e
or p
tag or a tag otherwise declared to support this notation, the client MUST NOT perform such replacement or augmentation, but instead display it as normal text.NIP-09
Event Deletion
draft
optional
author:scsibug
5
, meaning "deletion" is defined as having a list of one or more e
tags, each referencing an event the author is requesting to be deleted.content
field MAY contain a text note describing the reason for the deletion.{
"kind": 5,
"pubkey": <32-bytes hex-encoded public key of the event creator>,
"tags": [
["e", "dcd59..464a2"],
["e", "968c5..ad7a4"],
],
"content": "these posts were published by accident",
...other fields
}
pubkey
as the deletion request. Clients SHOULD hide or otherwise indicate a deletion status for referenced events.Client Usage
content
field MAY also be used to replace the deleted events' own content, although a user interface should clearly indicate that this is a deletion reason, not the original content.pubkey
referenced in the e
tag of the deletion request is identical to the deletion request pubkey
, before hiding or deleting any event. Relays can not, in general, perform this validation and should not be treated as authoritative.Relay Usage
pubkey
as the deletion itself, however this is not required since relays may not have knowledge of all referenced events.Deleting a Deletion
NIP-10
On "e" and "p" tags in Text Events (kind 1).
draft
optional
author:unclebobmartin
Abstract
Positional "e" tags (DEPRECATED)
This scheme is in common use; but should be considered deprecated.
["e", <event-id>, <relay-url>]
as per NIP-01.<event-id>
is the id of the event being referenced.
<relay-url>
is the URL of a recommended relay associated with the reference. Many clients treat this field as optional.
- No "e" tag:
- One "e" tag:
["e", <id>]
: The id of the event to which this event is a reply.- Two "e" tags:
["e", <root-id>]
,["e", <reply-id>]
<root-id>
is the id of the event at the root of the reply chain. <reply-id>
is the id of the article to which this event is a reply.- Many "e" tags:
["e", <root-id>]
["e", <mention-id>]
, ...,["e", <reply-id>]
<mention-ids>
. These are the ids of events which may, or may not be in the reply chain.root-id
and reply-id
are as above.This scheme is deprecated because it creates ambiguities that are difficult, or impossible to resolve when an event references another but is not a reply.
Marked "e" tags (PREFERRED)
["e", <event-id>, <relay-url>, <marker>]
<event-id>
is the id of the event being referenced.
<relay-url>
is the URL of a recommended relay associated with the reference. Clients SHOULD add a valid<relay-URL>
field, but may instead leave it as""
.
<marker>
is optional and if present is one of"reply"
,"root"
, or"mention"
.
"reply"
denote the id of the reply event being responded to. Those marked with "root"
denote the root id of the reply thread being responded to. For top level replies (those replying directly to the root event), only the "root"
marker should be used. Those marked with "mention"
denote a quoted or reposted event id.This scheme is preferred because it allows events to mention others without confusing them with <reply-id> or <root-id>.
The "p" tag
"pubkey"
of the event being replied to.a1
with "p" tags [p1
, p2
, p3
] then the "p" tags of the reply should be [a1
, p1
, p2
, p3
] in no particular order.NIP-11
Relay Information Document
draft
optional
author:scsibug
author:doc-hex
author:cameri
Accept
header of application/nostr+json
to a URI supporting WebSocket upgrades, they SHOULD return a document with the following structure.{
"name": <string identifying relay>,
"description": <string with detailed information>,
"pubkey": <administrative contact pubkey>,
"contact": <administrative alternate contact>,
"supported_nips": <a list of NIP numbers supported by the relay>,
"software": <string identifying relay software URL>,
"version": <string version identifier>
}
Access-Control-Allow-Origin
, Access-Control-Allow-Headers
, and Access-Control-Allow-Methods
headers.Field Descriptions
Name
name
for use in client software. This is a string, and SHOULD be less than 30 characters to avoid client truncation.Description
description
string. It is recommended that this contain no markup, formatting or line breaks for word wrapping, and simply use double newline characters to separate paragraphs. There are no limitations on length.Pubkey
pubkey
, in the same format as Nostr events (32-byte hex for a secp256k1
public key). If a contact is listed, this provides clients with a recommended address to send encrypted direct messages (See NIP-04
) to a system administrator. Expected uses of this address are to report abuse or illegal content, file bug reports, or request other technical assistance.Contact
contact
field as well, with the same purpose as pubkey
. Use of a Nostr public key and direct message SHOULD be preferred over this. Contents of this field SHOULD be a URI, using schemes such as mailto
or https
to provide users with a means of contact.Supported NIPs
NIP
. This field is an array of the integer identifiers of NIP
s that are implemented in the relay. Examples would include 1
, for "NIP-01"
and 9
, for "NIP-09"
. Client-side NIPs
SHOULD NOT be advertised, and can be ignored by clients.Software
software
attribute. If present, this MUST be a URL to the project's homepage.Version
Extra Fields
Server Limitations
{
...
"limitation": {
"max_message_length": 16384,
"max_subscriptions": 20,
"max_filters": 100,
"max_limit": 5000,
"max_subid_length": 100,
"min_prefix": 4,
"max_event_tags": 100,
"max_content_length": 8196,
"min_pow_difficulty": 30,
"auth_required": true,
"payment_required": true,
}
...
}
max_message_length
: this is the maximum number of bytes for incoming JSON that the relay will attempt to decode and act upon. When you send large subscriptions, you will be limited by this value. It also effectively limits the maximum size of any event. Value is calculated from[
to]
and is after UTF-8 serialization (so some unicode characters will cost 2-3 bytes). It is equal to the maximum size of the WebSocket message frame.
max_subscriptions
: total number of subscriptions that may be active on a single websocket connection to this relay. It's possible that authenticated clients with a (paid) relationship to the relay may have higher limits.
max_filters
: maximum number of filter values in each subscription. Must be one or higher.
max_subid_length
: maximum length of subscription id as a string.
min_prefix
: forauthors
andids
filters which are to match against a hex prefix, you must provide at least this many hex digits in the prefix.
max_limit
: the relay server will clamp each filter'slimit
value to this number. This means the client won't be able to get more than this number of events from a single subscription filter. This clamping is typically done silently by the relay, but with this number, you can know that there are additional results if you narrowed your filter's time range or other parameters.
max_event_tags
: in any event, this is the maximum number of elements in thetags
list.
max_content_length
: maximum number of characters in thecontent
field of any event. This is a count of unicode characters. After serializing into JSON it may be larger (in bytes), and is still subject to themax_message_length
, if defined.
min_pow_difficulty
: new events will require at least this difficulty of PoW, based on NIP-13, or they will be rejected by this server.
auth_required
: this relay requires NIP-42 authentication to happen before a new connection may perform any other action. Even if set to False, authentication may be required for specific actions.
payment_required
: this relay requires payment before a new connection may perform any action.
Event Retention
null
indicating infinity. If zero is provided, this means the event will not be stored at all, and preferably an error will be provided when those are received.{
...
"retention": [
{ "kinds": [0, 1, [5, 7], [40, 49]], "time": 3600 },
{ "kinds": [[40000, 49999]], "time": 100 },
{ "kinds": [[30000, 39999]], "count": 1000 },
{ "time": 3600, "count": 10000 }
]
...
}
retention
is a list of specifications: each will apply to either all kinds, or a subset of kinds. Ranges may be specified for the kind field as a tuple of inclusive start and end values. Events of indicated kind (or all) are then limited to a count
and/or time period.kind
number, by giving a retention time of zero for those kind
values. While that is unfortunate, it does allow clients to discover servers that will support their protocol quickly via a single HTTP fetch.Content Limitations
{
...
"relay_countries": [ "CA", "US" ],
...
}
relay_countries
: a list of two-level ISO country codes (ISO 3166-1 alpha-2) whose laws and policies may affect this relay.EU
may be used for European Union countries.
Community Preferences
{
...
"language_tags": [ "en", "en-419" ],
"tags": [ "sfw-only", "bitcoin-only", "anime" ],
"posting_policy": "https://example.com/posting-policy.html",
...
}
language_tags
is an ordered list of IETF language tags indicating the major languages spoken on the relay.
tags
is a list of limitations on the topics to be discussed. For examplesfw-only
indicates that only "Safe For Work" content is encouraged on this relay. This relies on assumptions of what the "work" "community" feels "safe" talking about. In time, a common set of tags may emerge that allow users to find relays that suit their needs, and client software will be able to parse these tags easily. Thebitcoin-only
tag indicates that any altcoin, "crypto" or blockchain comments will be ridiculed without mercy.
posting_policy
is a link to a human-readable page which specifies the community policies for the relay. In cases wheresfw-only
is True, it's important to link to a page which gets into the specifics of your posting policy.
description
field should be used to describe your community goals and values, in brief. The posting_policy
is for additional detail and legal terms. Use the tags
field to signify limitations on content, or topics to be discussed, which could be machine processed by appropriate client software.Pay-To-Relay
{
...
"payments_url": "https://my-relay/payments",
"fees": {
"admission": [{ "amount": 1000000, "unit": "msats" }],
"subscription": [{ "amount": 5000000, "unit": "msats", "period": 2592000 }],
"publication": [{ "kinds": [4], "amount": 100, "unit": "msats" }],
},
...
}
NIP-12
Generic Tag Queries
draft
optional
author:scsibug
author:fiatjaf
NIP-01
requires relays to respond to queries for e
and p
tags. This NIP allows any single-letter tag present in an event to be queried.<filters>
object described in NIP-01
is expanded to contain arbitrary keys with a #
prefix. Any single-letter key in a filter beginning with #
is a tag query, and MUST have a value of an array of strings. The filter condition matches if the event has a tag with the same name, and there is at least one tag value in common with the filter and event. The tag name is the letter without the #
, and the tag value is the second element. Subsequent elements are ignored for the purposes of tag queries.Example Subscription Filter
1
with an r
tag set to either foo
or bar
.{
"kinds": [1],
"#r": ["foo", "bar"]
}
Client Behavior
supported_nips
field to learn if a relay supports generic tag queries. Clients MAY send generic tag queries to any relay, if they are prepared to filter out extraneous responses from relays that do not support this NIP.Rationale
Suggested Use Cases
- Decentralized Commenting System: clients can comment on arbitrary web pages, and easily search for other comments, by using a
r
("reference", in this case an URL) tag and value.
- Location-specific Posts: clients can use a
g
("geohash") tag to associate a post with a physical location. Clients can search for a set of geohashes of varying precisions near them to find local content.
- Hashtags: clients can use simple
t
("hashtag") tags to associate an event with an easily searchable topic name. Since Nostr events themselves are not searchable through the protocol, this provides a mechanism for user-driven search.
NIP-13
Proof of Work
draft
optional
author:jb55
author:cameri
difficulty
is defined to be the number of leading zero bits in the NIP-01
id. For example, an id of 000000000e9d97a1ab09fc381030b346cdd7a142ad57e6df0b46dc9bef6c7e2d
has a difficulty of 36
with 36
leading 0 bits.002f...
is 0000 0000 0010 1111...
in binary, which has 10 leading zeroes. Do not forget to count leading zeroes for hex digits <= 7
.Mining
NIP-01
note, a nonce
tag is used:{"content": "It's just me mining my own business", "tags": [["nonce", "1", "21"]]}
created_at
as well during this process.SHOULD
contain the target difficulty. This allows clients to protect against situations where bulk spammers targeting a lower difficulty get lucky and match a higher difficulty. For example, if you require 40 bits to reply to your thread and see a committed target of 30, you can safely reject it even if the note has 40 bits difficulty. Without a committed target difficulty you could not reject it. Committing to a target difficulty is something all honest miners should be ok with, and clients MAY
reject a note matching a target difficulty if it is missing a difficulty commitment.Example mined note
{
"id": "000006d8c378af1779d2feebc7603a125d99eca0ccf1085959b307f64e5dd358",
"pubkey": "a48380f4cfcc1ad5378294fcac36439770f9c878dd880ffa94bb74ea54a6f243",
"created_at": 1651794653,
"kind": 1,
"tags": [
[
"nonce",
"776797",
"21"
]
],
"content": "It's just me mining my own business",
"sig": "284622fc0a3f4f1303455d5175f7ba962a3300d136085b9566801bc2e0699de0c7e31e44c81fb40ad9049173742e904713c3594a1da0fc5d2382a25c11aba977"
}
Validating
#include <stdio.h>
#include <stdlib.h>
#include <string.h>int countLeadingZeroes(const char *hex) {
int count = 0;
for (int i = 0; i < strlen(hex); i++) {
int nibble = (int)strtol((char[]){hex[i], '\0'}, NULL, 16);
if (nibble == 0) {
count += 4;
} else {
count += __builtin_clz(nibble) - 28;
break;
}
}
return count;
}
int main(int argc, char *argv[]) {
if (argc != 2) {
fprintf(stderr, "Usage: %s <hex_string>\n", argv[0]);
return 1;
}
const char *hex_string = argv[1];
int result = countLeadingZeroes(hex_string);
printf("Leading zeroes in hex string %s: %d\n", hex_string, result);
return 0;
}
// hex should be a hexadecimal string (with no 0x prefix)
function countLeadingZeroes(hex) {
let count = 0;
for (let i = 0; i < hex.length; i++) {
const nibble = parseInt(hex[i], 16);
if (nibble === 0) {
count += 4;
} else {
count += Math.clz32(nibble) - 28;
break;
}
}
return count;
}
Querying relays for PoW notes
$ echo '["REQ", "subid", {"ids": ["000000000"]}]' | websocat wss://some-relay.com | jq -c '.[2]'
{"id":"000000000121637feeb68a06c8fa7abd25774bdedfa9b6ef648386fb3b70c387", ...}
Delegated Proof of Work
NIP-01
note id does not commit to any signature, PoW can be outsourced to PoW providers, perhaps for a fee. This provides a way for clients to get their messages out to PoW-restricted relays without having to do any work themselves, which is useful for energy-constrained devices like mobile phones.NIP-14
Subject tag in Text events.
draft
optional
author:unclebobmartin
["subject": <string>]
NIP-15
Nostr Marketplace (for resilient marketplaces)
draft
optional
author:fiatjaf
author:benarc
author:motorina0
author:talvasconcelos
Based on https://github.com/lnbits/Diagon-Alley
Implemented here https://github.com/lnbits/nostrmarket
Terms
merchant
- seller of products with NOSTR key-pair
customer
- buyer of products with NOSTR key-pair
product
- item for sale by themerchant
stall
- list of products controlled bymerchant
(amerchant
can have multiple stalls)
marketplace
- clientside software for searchingstalls
and purchasingproducts
Nostr Marketplace Clients
Merchant admin
merchant
creates, updates and deletes stalls
and products
, as well as where they manage sales, payments and communication with customers
.merchant
admin software can be purely clientside, but for convenience
and uptime, implementations will likely have a server client listening for NOSTR events.Marketplace
Marketplace
software should be entirely clientside, either as a stand-alone app, or as a purely frontend webpage. A customer
subscribes to different merchant NOSTR public keys, and those merchants
stalls
and products
become listed and searchable. The marketplace client is like any other ecommerce site, with basket and checkout. Marketplaces
may also wish to include a customer
support area for direct message communication with merchants
.Merchant
publishing/updating products (event)
Kind | ㅤ | Description | NIP |
0 | set_meta | The merchant description (similar with any nostr public key). | |
30017 | set_stall | Create or update a stall. | NIP33 (Parameterized Replaceable Event) |
30018 | set_product | Create or update a product. | NIP33 (Parameterized Replaceable Event) |
4 | direct_message | Communicate with the customer. The messages can be plain-text or JSON. | |
5 | delete | Delete a product or a stall. |
Event 30017
: Create or update a stall.
{
"id": <String, UUID generated by the merchant. Sequential IDs (`0`, `1`, `2`...) are discouraged>,
"name": <String, stall name>,
"description": <String (optional), stall description>,
"currency": <String, currency used>,
"shipping": [
{
"id": <String, UUID of the shipping zone, generated by the merchant>,
"name": <String (optional), zone name>,
"cost": <float, cost for shipping. The currency is defined at the stall level>,
"countries": [<String, countries included in this zone>],
}
]
}
shipping
:- an array with possible shipping zones for this stall. The customer MUST choose exactly one shipping zone.
- shipping to different zones can have different costs. For some goods (digital for example) the cost can be zero.
- the
id
is an internal value used by the merchant. This value must be sent back as the customer selection.
"tags": [["d", <String, id of stall]]
- the
d
tag is required by NIP33. Its value MUST be the same as the stallid
.
Event 30018
: Create or update a product
{
"id": <String, UUID generated by the merchant.Sequential IDs (`0`, `1`, `2`...) are discouraged>,
"stall_id": <String, UUID of the stall to which this product belong to>,
"name": <String, product name>,
"description": <String (optional), product description>,
"images": <[String], array of image URLs, optional>,
"currency": <String, currency used>,
"price": <float, cost of product>,
"quantity": <int, available items>,
"specs": [
[ <String, spec key>, <String, spec value>]
]
}
specs
:- an array of key pair values. It allows for the Customer UI to present present product specifications in a structure mode. It also allows comparison between products
- eg:
[["operating_system", "Android 12.0"], ["screen_size", "6.4 inches"], ["connector_type", "USB Type C"]]
spec
in the tags
section of the event? "tags": [
["d", <String, id of product],
["t", <String (optional), product category],
["t", <String (optional), product category],
...
]
- the
d
tag is required by NIP33. Its value MUST be the same as the productid
.
- the
t
tag is as searchable tag (NIP12). It represents different categories that the product can be part of (food
,fruits
). Multiplet
tags can be present.
Checkout events
merchant
and the customer
can exchange JSON messages that represent different actions. Each JSON
message MUST
have a type
field indicating the what the JSON represents. Possible types:Message Type | Sent By | Description |
0 | Customer | New Order |
1 | Merchant | Payment Request |
2 | Merchant | Order Status Update |
Step 1: customer
order (event)
{
"id": <String, UUID generated by the customer>,
"type": 0,
"name": <String (optional), ???>,
"address": <String (optional), for physical goods an address should be provided>
"message": "<String (optional), message for merchant>,
"contact": {
"nostr": <32-bytes hex of a pubkey>,
"phone": <String (optional), if the customer wants to be contacted by phone>,
"email": <String (optional), if the customer wants to be contacted by email>,
},
"items": [
{
"product_id": <String, UUID of the product>,
"quantity": <int, how many products the customer is ordering>
}
],
"shipping_id": <String, UUID of the shipping zone>
}
contact.nostr
required?Step 2: merchant
request payment (event)
content
of NIP04.payment_options
/type
include:url
URL to a payment page, stripe, paypal, btcpayserver, etc
btc
onchain bitcoin address
ln
bitcoin lightning invoice
lnurl
bitcoin lnurl-pay
{
"id": <String, UUID of the order>,
"type": 1,
"message": <String, message to customer, optional>,
"payment_options": [
{
"type": <String, option type>,
"link": <String, url, btc address, ln invoice, etc>
},
{
"type": <String, option type>,
"link": <String, url, btc address, ln invoice, etc>
},
{
"type": <String, option type>,
"link": <String, url, btc address, ln invoice, etc>
}
]
}
Step 3: merchant
verify payment/shipped (event)
content
of NIP04.{
"id": <String, UUID of the order>,
"type": 2,
"message": <String, message to customer>,
"paid": <Bool, true/false has received payment>,
"shipped": <Bool, true/false has been shipped>,
}
Customer support events
Additional
NIP-16
Event Treatment
draft
optional
author:Semisol
Regular Events
1000 <= n < 10000
. Upon a regular event being received, the relay SHOULD send it to all clients with a matching filter, and SHOULD store it. New events of the same kind do not affect previous events in any way.Replaceable Events
10000 <= n < 20000
. Upon a replaceable event with a newer timestamp than the currently known latest replaceable event with the same kind and author being received, the old event SHOULD be discarded, effectively replacing what gets returned when querying for author:kind
tuples.Ephemeral Events
20000 <= n < 30000
. Upon an ephemeral event being received, the relay SHOULD send it to all clients with a matching filter, and MUST NOT store it.Client Behavior
supported_nips
field to learn if a relay supports this NIP. Clients SHOULD NOT send ephemeral events to relays that do not support this NIP; they will most likely be persisted. Clients MAY send replaceable events to relays that may not support this NIP, and clients querying SHOULD be prepared for the relay to send multiple events and should use the latest one.Suggested Use Cases
- States: An application may create a state event that is replaced every time a new state is set (such as statuses)
- Typing indicators: A chat application may use ephemeral events as a typing indicator.
- Messaging: Two pubkeys can message over nostr using ephemeral events.
NIP-18
Reposts
draft
optional
author:jb55
author:fiatjaf
author:arthurfranca
kind 6
note that is used to signal to followers that another event is worth reading.content
of a repost event is empty. Optionally, it MAY contain the stringified JSON of the reposted note event for quick look up.e
tag with the id
of the note that is being reposted. That tag MUST include a relay URL as its third entry to indicate where it can be fetched.p
tag with the pubkey
of the event being reposted.Quote Reposts
kind 1
events with an embedded e
tag (see NIP-08 and NIP-27). Because a quote repost includes an e
tag, it may show up along replies to the reposted note.NIP-19
bech32-encoded entities
draft
optional
author:jb55
author:fiatjaf
author:Semisol
Bare keys and ids
npub
: public keys
nsec
: private keys
note
: note ids
3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d
translates to npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
.Shareable identifiers with extra metadata
TLV
(type-length-value), with T
and L
being 1 byte each (uint8
, i.e. a number in the range of 0-255), and V
being a sequence of bytes of the size indicated by L
.TLV
:nprofile
: a nostr profile
nevent
: a nostr event
nrelay
: a nostr relay
naddr
: a nostr parameterized replaceable event coordinate (NIP-33)
TLV
types are indicated here:0
:special
- depends on the bech32 prefix:
- for
nprofile
it will be the 32 bytes of the profile public key - for
nevent
it will be the 32 bytes of the event id - for
nrelay
, this is the relay URL - for
naddr
, it is the identifier (the"d"
tag) of the event being referenced
1
:relay
- for
nprofile
,nevent
andnaddr
, optionally, a relay in which the entity (profile or event) is more likely to be found, encoded as ascii - this may be included multiple times
2
:author
- for
naddr
, the 32 bytes of the pubkey of the event - for
nevent
, optionally, the 32 bytes of the pubkey of the event
3
:kind
- for
naddr
, the 32-bit unsigned integer of the kind, big-endian - for
nevent
, optionally, the 32-bit unsigned integer of the kind, big-endian
Examples
npub10elfcs4fr0l0r8af98jlmgdh9c8tcxjvz9qkw038js35mp4dma8qzvjptg
should decode into the public key hex7e7e9c42a91bfef19fa929e5fda1b72e0ebc1a4c1141673e2794234d86addf4e
and vice-versa
nsec1vl029mgpspedva04g90vltkh6fvh240zqtv9k0t9af8935ke9laqsnlfe5
should decode into the private key hex67dea2ed018072d675f5415ecfaed7d2597555e202d85b3d65ea4e58d2d92ffa
and vice-versa
nprofile1qqsrhuxx8l9ex335q7he0f09aej04zpazpl0ne2cgukyawd24mayt8gpp4mhxue69uhhytnc9e3k7mgpz4mhxue69uhkg6nzv9ejuumpv34kytnrdaksjlyr9p
should decode into a profile with the following TLV items:- pubkey:
3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d
- relay:
wss://r.x.com
- relay:
wss://djbas.sadkb.com
Notes
npub
keys MUST NOT be used in NIP-01 events or in NIP-05 JSON responses, only the hex format is supported there.
- When decoding a bech32-formatted string, TLVs that are not recognized or supported should be ignored, rather than causing an error.
NIP-20
Command Results
draft
optional
author:jb55
["OK", <event_id>, <true|false>, <message>]
true
when the event is a duplicate and has already been saved. The message
SHOULD start with duplicate:
in this case.false
when the event was rejected and not saved.message
SHOULD provide additional information as to why the command succeeded or failed.message
SHOULD start with blocked:
if the pubkey or network address has been blocked, banned, or is not on a whitelist.message
SHOULD start with invalid:
if the event is invalid or doesn't meet some specific criteria (created_at is too far off, id is wrong, signature is wrong, etc)message
SHOULD start with pow:
if the event doesn't meet some proof-of-work difficulty. The client MAY consult the relay metadata at this point to retrieve the required posting difficulty.message
SHOULD start with rate-limited:
if the event was rejected due to rate limiting techniques.message
SHOULD start with error:
if the event failed to save due to a server issue.EVENT
command is malformed and could not be parsed, a NOTICE message SHOULD be used instead of a command result. This NIP only applies to non-malformed EVENT commands.Examples
["OK", "b1a649ebe8b435ec71d3784793f3bbf4b93e64e17568a741aecd4c7ddeafce30", true, ""]
["OK", "b1a649ebe8b435ec71d3784793f3bbf4b93e64e17568a741aecd4c7ddeafce30", true, "pow: difficulty 25>=24"]
["OK", "b1a649ebe8...", false, "blocked: tor exit nodes not allowed"]
["OK", "b1a649ebe8...", false, "blocked: you are banned from posting here"]
["OK", "b1a649ebe8...", false, "blocked: please register your pubkey at https://my-expensive-relay.example.com"]
["OK", "b1a649ebe8...", false, "rate-limited: slow down there chief"]
created_at
too far off["OK", "b1a649ebe8...", false, "invalid: event creation date is too far off from the current time. Is your system clock in sync?"]
["OK", "b1a649ebe8...", false, "pow: difficulty 26 is less than 30"]
["OK", "b1a649ebe8...", false, "error: could not connect to the database"]
Client Handling
messages
are meant for humans, with reason:
prefixes so that clients can be slightly more intelligent with what to do with them. For example, with a rate-limited:
reason the client may not show anything and simply try again with a longer timeout.pow:
prefix it may query relay metadata to get the updated difficulty requirement and try again in the background.invalid:
and blocked:
prefix the client may wish to show these as styled error popups.:
and trimming it.Future Extensions
NIP-21
nostr:
URL scheme
draft
optional
author:fiatjaf
nostr:
.nsec
).Examples
nostr:npub1sn0wdenkukak0d9dfczzeacvhkrgz92ak56egt7vdgzn8pv2wfqqhrjdv9
nostr:nprofile1qqsrhuxx8l9ex335q7he0f09aej04zpazpl0ne2cgukyawd24mayt8gpp4mhxue69uhhytnc9e3k7mgpz4mhxue69uhkg6nzv9ejuumpv34kytnrdaksjlyr9p
nostr:note1fntxtkcy9pjwucqwa9mddn7v03wwwsu9j330jj350nvhpky2tuaspk6nqc
nostr:nevent1qqstna2yrezu5wghjvswqqculvvwxsrcvu7uc0f78gan4xqhvz49d9spr3mhxue69uhkummnw3ez6un9d3shjtn4de6x2argwghx6egpr4mhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet5nxnepm
NIP-22
Event created_at
Limits
draft
optional
author:jeffthibault
author:Giszmo
created_at
to be acceptable. Both the upper and lower limits MUST be unix timestamps in seconds as defined in NIP-01.created_at
timestamp not being within the permitted limits.Client Behavior
supported_nips
field to learn if a relay uses event created_at
time limits as defined by this NIP.Motivation
created_at
field is just a unix timestamp and can be set to a time in the past or future. Relays accept and share events dated to 20 years ago or 50,000 years in the future. This NIP aims to define a way for relays that do not want to store events with any timestamp to set their own restrictions.Python (pseudocode) Example
import time
TIME = int(time.time())
LOWER_LIMIT = TIME - (60 * 60 * 24) # Define lower limit as 1 day into the past
UPPER_LIMIT = TIME + (60 * 15) # Define upper limit as 15 minutes into the future
if event.created_at not in range(LOWER_LIMIT, UPPER_LIMIT):
ws.send('["OK", event.id, False, "invalid: the event created_at field is out of the acceptable range (-24h, +15min) for this relay"]')
NIP-23
Long-form Content
draft
optional
author:fiatjaf
kind:30023
(a parameterized replaceable event according to NIP-33) for long-form text content, generally referred to as "articles" or "blog posts".kind:1
notes should not be expected to implement this NIP.Format
.content
of these events should be a string text in Markdown syntax.Metadata
.created_at
field should be used, for "tags"/"hashtags" (i.e. topics about which the event might be of relevance) the "t"
event tag should be used, as per NIP-12."title"
, for the article title
"image"
, for a URL pointing to an image to be shown along with the title
"summary"
, for the article summary
"published_at"
, for the timestamp in unix seconds (stringified) of the first time the article was published
Editability
"d"
tag with an identifier for the article. Clients should take care to only publish and read these events from relays that implement that. If they don't do that they should also take care to hide old versions of the same article they may receive.Linking
naddr
code along with the "a"
tag (see NIP-33 and NIP-19).References
nostr:...
links and optionally adding tags for these (see example below).Example Event
{
"kind": 30023,
"created_at": 1675642635,
"content": "Lorem [ipsum][nostr:nevent1qqst8cujky046negxgwwm5ynqwn53t8aqjr6afd8g59nfqwxpdhylpcpzamhxue69uhhyetvv9ujuetcv9khqmr99e3k7mg8arnc9] dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.\n\nRead more at nostr:naddr1qqzkjurnw4ksz9thwden5te0wfjkccte9ehx7um5wghx7un8qgs2d90kkcq3nk2jry62dyf50k0h36rhpdtd594my40w9pkal876jxgrqsqqqa28pccpzu.",
"tags": [
["d", "lorem-ipsum"],
["title", "Lorem Ipsum"],
["published_at", "1296962229"],
["t", "placeholder"],
["e", "b3e392b11f5d4f28321cedd09303a748acfd0487aea5a7450b3481c60b6e4f87", "wss://relay.example.com"],
["a", "30023:a695f6b60119d9521934a691347d9f78e8770b56da16bb255ee286ddf9fda919:ipsum", "wss://relay.nostr.org"]
],
"pubkey": "...",
"id": "..."
}
NIP-25
Reactions
draft
optional
author:jb55
kind 7
note that is used to react to other notes.content
set to a +
string, SHOULD be interpreted as a "like" or "upvote".content
set to -
SHOULD be interpreted as a "dislike" or "downvote". It SHOULD NOT be counted as a "like", and MAY be displayed as a downvote or dislike on a post. A client MAY also choose to tally likes against dislikes in a reddit-like system of upvotes and downvotes, or display them as separate tallies.content
MAY be an emoji, in this case it MAY be interpreted as a "like" or "dislike", or the client MAY display this emoji reaction on the post.Tags
e
and p
tags from the note the user is reacting to. This allows users to be notified of reactions to posts they were mentioned in. Including the e
tags enables clients to pull all the reactions associated with individual posts or all the posts in a thread.e
tag MUST be the id
of the note that is being reacted to.p
tag MUST be the pubkey
of the event being reacted to.func make_like_event(pubkey: String, privkey: String, liked: NostrEvent) -> NostrEvent {
var tags: [[String]] = liked.tags.filter {
tag in tag.count >= 2 && (tag[0] == "e" || tag[0] == "p")
}
tags.append(["e", liked.id])
tags.append(["p", liked.pubkey])
let ev = NostrEvent(content: "+", pubkey: pubkey, kind: 7, tags: tags)
ev.calculate_id()
ev.sign(privkey: privkey)
return ev
}
NIP: 26
Delegated Event Signing
draft
optional
author:markharding
author:minds
Introducing the 'delegation' tag
delegation
which is formatted as follows:[
"delegation",
<pubkey of the delegator>,
<conditions query string>,
<delegation token: 64-byte Schnorr signature of the sha256 hash of the delegation string>
]
Delegation Token
nostr:delegation:<pubkey of publisher (delegatee)>:<conditions query string>
Conditions Query String
kind
- Operators:
=${KIND_NUMBER}
- delegatee may only sign events of this kind
created_at
- Operators:
<${TIMESTAMP}
- delegatee may only sign events created before the specified timestamp>${TIMESTAMP}
- delegatee may only sign events created after the specified timestamp
&
.kind=1&created_at<1675721813
kind=0&kind=1&created_at>1675721813
kind=1&created_at>1674777689&created_at<1675721813
created_at
after condition reflecting the current time, to prevent the delegatee from publishing historic notes on the delegator's behalf.Example
# Delegator:
privkey: ee35e8bb71131c02c1d7e73231daa48e9953d329a4b701f7133c8f46dd21139c
pubkey: 8e0d3d3eb2881ec137a11debe736a9086715a8c8beeeda615780064d68bc25dd
# Delegatee:
privkey: 777e4f60b4aa87937e13acc84f7abcc3c93cc035cb4c1e9f7a9086dd78fffce1
pubkey: 477318cfb5427b9cfc66a9fa376150c1ddbc62115ae27cef72417eb959691396
1674834236
.nostr:delegation:477318cfb5427b9cfc66a9fa376150c1ddbc62115ae27cef72417eb959691396:kind=1&created_at>1674834236&created_at<1677426236
6f44d7fe4f1c09f3954640fb58bd12bae8bb8ff4120853c4693106c82e920e2b898f1f9ba9bd65449a987c39c0423426ab7b53910c0c6abfb41b30bc16e5f524
{
"id": "e93c6095c3db1c31d15ac771f8fc5fb672f6e52cd25505099f62cd055523224f",
"pubkey": "477318cfb5427b9cfc66a9fa376150c1ddbc62115ae27cef72417eb959691396",
"created_at": 1677426298,
"kind": 1,
"tags": [
[
"delegation",
"8e0d3d3eb2881ec137a11debe736a9086715a8c8beeeda615780064d68bc25dd",
"kind=1&created_at>1674834236&created_at<1677426236",
"6f44d7fe4f1c09f3954640fb58bd12bae8bb8ff4120853c4693106c82e920e2b898f1f9ba9bd65449a987c39c0423426ab7b53910c0c6abfb41b30bc16e5f524"
]
],
"content": "Hello, world!",
"sig": "633db60e2e7082c13a47a6b19d663d45b2a2ebdeaf0b4c35ef83be2738030c54fc7fd56d139652937cdca875ee61b51904a1d0d0588a6acd6168d7be2909d693"
}
kind=1
, created_at>1674834236
and created_at<1677426236
in this example) and, upon validation of the delegation token, are found to be unchanged from the conditions in the original delegation string.Relay & Client Support
["REQ", "", {"authors": ["A"]}]
by querying both the pubkey
and delegation tags [1]
value.NIP-27
Text Note References
draft
optional
author:arthurfranca
author:hodlbod
author:fiatjaf
.content
of any event that has readable text in its .content
(such as kinds 1 and 30023)..content
using NIP-21 codes, such as nostr:nprofile1qqsw3dy8cpu...6x2argwghx6egsqstvg
.["e", <hex-id>, <relay-url>, <marker>]
) for each reference is optional, clients should do it whenever they want the profile being mentioned to be notified of the mention, or when they want the referenced event to recognize their mention as a reply.nostr:...
mentions in its .content
can do any desired context augmentation (for example, linking to the profile or showing a preview of the mentioned event contents) it wants in the process. If turning such mentions into links, they could become internal links, NIP-21 links or direct links to web clients that will handle these references.Example of a profile mention process
@
."hello @mat"
the client will prompt him to autocomplete with mattn's profile, showing a picture and name."hello @mattn"
, @mattn
is highlighted, indicating that it is a mention. Internally, however, the event looks like this:{
"content": "hello nostr:nprofile1qqszclxx9f5haga8sfjjrulaxncvkfekj097t6f3pu65f86rvg49ehqj6f9dh",
"created_at": 1679790774,
"id": "f39e9b451a73d62abc5016cffdd294b1a904e2f34536a208874fe5e22bbd47cf",
"kind": 1,
"pubkey": "79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798",
"sig": "f8c8bab1b90cc3d2ae1ad999e6af8af449ad8bb4edf64807386493163e29162b5852a796a8f474d6b1001cddbaac0de4392838574f5366f03cc94cf5dfb43f4d",
"tags": [
[
"p",
"2c7cc62a697ea3a7826521f3fd34f0cb273693cbe5e9310f35449f43622a5cdc"
]
]
}
nostr:npub1...
URL.).content
as it is, but later it will parse the .content
and see that there is a nostr:
URL in there, decode it, extract the public key from it (and possibly relay hints), fetch that profile from its internal database or relays, then replace the full URL with the name @mattn
, with a link to the internal page view for that profile.Verbose and probably unnecessary considerations
- The example above was very concrete, but it doesn't mean all clients have to implement the same flow. There could be clients that do not support autocomplete at all, so they just allow users to paste raw NIP-19 codes into the body of text, then prefix these with
nostr:
before publishing the event.
- The flow for referencing other events is similar: a user could paste a
note1...
ornevent1...
code and the client will turn that into anostr:note1...
ornostr:nevent1...
URL. Then upon reading such references the client may show the referenced note in a preview box or something like that -- or nothing at all.
- Other display procedures can be employed: for example, if a client that is designed for dealing with only
kind:1
text notes sees, for example, akind:30023
nostr:naddr1...
URL reference in the.content
, it can, for example, decide to turn that into a link to some hardcoded webapp capable of displaying such events.
- Clients may give the user the option to include or not include tags for mentioned events or profiles. If someone wants to mention
mattn
without notifying them, but still have a nice augmentable/clickable link to their profile inside their note, they can instruct their client to not create a["p", ...]
tag for that specific mention.
- In the same way, if someone wants to reference another note but their reference is not meant to show up along other replies to that same note, their client can choose to not include a corresponding
["e", ...]
tag for any givennostr:nevent1...
URL inside.content
. Clients may decide to expose these advanced functionalities to users or be more opinionated about things.
NIP-28
Public Chat
draft
optional
author:ChristopherDavid
author:fiatjaf
author:jb55
author:Cameri
40 - channel create
41 - channel metadata
42 - channel message
43 - hide message
44 - mute user
Kind 40: Create channel
content
field, Client SHOULD include basic channel metadata (name
, about
, picture
as specified in kind 41).{
"content": "{\"name\": \"Demo Channel\", \"about\": \"A test channel.\", \"picture\": \"https://placekitten.com/200/200\"}",
...
}
Kind 41: Set channel metadata
metadata
events.name
- string - Channel name
about
- string - Channel description
picture
- string - URL of channel picture
{
"content": "{\"name\": \"Updated Demo Channel\", \"about\": \"Updating a test channel.\", \"picture\": \"https://placekitten.com/201/201\"}",
"tags": [["e", <channel_create_event_id>, <relay-url>]],
...
}
Kind 42: Create channel message
{
"content": <string>,
"tags": [["e", <kind_40_event_id>, <relay-url>, "root"]],
...
}
{
"content": <string>,
"tags": [
["e", <kind_40_event_id>, <relay-url>, "root"],
["e", <kind_42_event_id>, <relay-url>, "reply"],
["p", <pubkey>, <relay-url>],
...
],
...
}
Kind 43: Hide message
content
may optionally include metadata such as a reason
.id
.{
"content": "{\"reason\": \"Dick pic\"}",
"tags": [["e", <kind_42_event_id>]],
...
}
Kind 44: Mute user
content
may optionally include metadata such as a reason
.pubkey
.{
"content": "{\"reason\": \"Posting dick pics\"}",
"tags": [["p", <pubkey>]],
...
}
NIP-10 relay recommendations
Motivation
Additional info
NIP-33
Parameterized Replaceable Events
draft
optional
author:Semisol
author:Kukks
author:Cameri
author:Giszmo
d
tag and kind unlike NIP-16 which only replaced by kind.Implementation
30000 <= n < 40000
. Upon a parameterized replaceable event with a newer timestamp than the currently known latest replaceable event with the same kind, author and first d
tag value being received, the old event SHOULD be discarded, effectively replacing what gets returned when querying for author:kind:d-tag
tuples.d
tag with no value should be interpreted equivalent to a d
tag with the value as an empty string. Events from the same author with any of the following tags
replace each other:"tags":[["d",""]]
"tags":[]
: implicitd
tag with empty value
"tags":[["d"]]
: implicit empty value""
"tags":[["d",""],["d","not empty"]]
: only firstd
tag is considered
"tags":[["d"],["d","some value"]]
: only firstd
tag is considered
"tags":[["e"]]
: same as no tags
"tags":[["d","","1"]]
: only the first value is considered (""
)
d
tags with multiple values and SHOULD include the d
tag even if it has no value to allow querying using the #d
filter.Referencing and tagging
"p"
tag is used for referencing public keys and the "e"
tag for referencing event ids and the note
, npub
, nprofile
or nevent
are their equivalents for event tags (i.e. an nprofile
is generally translated into a tag ["p", "<event hex id>", "<relay url>"]
).naddr
code is introduced on NIP-19. It includes the public key of the event author and the d
tag (and relays) such that the referenced combination of public key and d
tag can be found.tags
to the naddr
code is the tag "a"
, comprised of ["a", "<kind>:<pubkey>:<d-identifier>", "<relay url>"]
.Client Behavior
supported_nips
field to learn if a relay supports this NIP. Clients MAY send parameterized replaceable events to relays that may not support this NIP, and clients querying SHOULD be prepared for the relay to send multiple events and should use the latest one and are recommended to send a #d
tag filter. Clients should account for the fact that missing d
tags or ones with no value are not returned in tag filters, and are recommended to always include a d
tag with a value.NIP-36
Sensitive Content / Content Warning
draft
optional
author:fernandolguevara
content-warning
tag enables users to specify if the event's content needs to be approved by readers to be shown. Clients can hide the content until the user acts on it.Spec
tag: content-warning
options:
- [reason]: optional
Example
{
"pubkey": "<pub-key>",
"created_at": 1000000000,
"kind": 1,
"tags": [
["t", "hastag"],
["content-warning", "reason"] /* reason is optional */
],
"content": "sensitive content with #hastag\n",
"id": "<event-id>"
}
NIP-39
External Identities in Profiles
draft
optional
author:pseudozach
author:Semisol
Abstract
i
tag on a metadata event
i
tag is introduced for kind 0
metadata event contents in addition to name, about, picture fields as included in NIP-01:{
"id": <id>,
"pubkey": <pubkey>,
...
"tags": [
["i", "github:semisol", "9721ce4ee4fceb91c9711ca2a6c9a5ab"],
["i", "twitter:semisol_public", "1619358434134196225"],
["i", "mastodon:bitcoinhackers.org/@semisol", "109775066355589974"]
["i", "telegram:1087295469", "nostrdirectory/770"]
]
}
i
tag will have two parameters, which are defined as the following:platform:identity
: This is the platform name (for examplegithub
) and the identity on that platform (for examplesemisol
) joined together with:
.
proof
: String or object that points to the proof of owning this identity.
i
tags with more than 2 values for future extensibility.a-z
, 0-9
and the characters ._-/
and MUST NOT include :
.Claim types
github
<identity>
with a single file that has the text Verifying that I control the following Nostr public key: <npub encoded public key>
.https://gist.github.com/<identity>/<proof>
.twitter
<identity>
and have the text Verifying my account on nostr My Public Key: "<npub encoded public key>"
.https://twitter.com/<identity>/status/<proof>
.mastodon
<instance>/@<username>
.<username>@<instance>
and have the text Verifying that I control the following Nostr public key: "<npub encoded public key>"
. This can be located at https://<identity>/<proof>
.telegram
<ref>/<id>
which points to a message published in the public channel or group with name <ref>
and message ID <id>
. This message should be sent by user ID <identity>
and have the text Verifying that I control the following Nostr public key: "<npub encoded public key>"
.https://t.me/<proof>
.NIP-40
Expiration Timestamp
draft
optional
author:0xtlt
expiration
tag enables users to specify a unix timestamp at which the message SHOULD be considered expired (by relays and clients) and SHOULD be deleted by relays.Spec
tag: expiration
values:
- [UNIX timestamp in seconds]: required
Example
{
"pubkey": "<pub-key>",
"created_at": 1000000000,
"kind": 1,
"tags": [
["expiration", "1600000000"]
],
"content": "This message will expire at the specified timestamp and be deleted by relays.\n",
"id": "<event-id>"
}
Client Behavior
supported_nips
field to learn if a relay supports this NIP. Clients SHOULD NOT send expiration events to relays that do not support this NIP.Relay Behavior
Suggested Use Cases
- Temporary announcements - This tag can be used to make temporary announcements. For example, an event organizer could use this tag to post announcements about an upcoming event.
- Limited-time offers - This tag can be used by businesses to make limited-time offers that expire after a certain amount of time. For example, a business could use this tag to make a special offer that is only available for a limited time.
Warning
NIP-42
Authentication of clients to relays
draft
optional
author:Semisol
author:fiatjaf
Motivation
- A relay may request payment or other forms of whitelisting to publish events -- this can naïvely be achieved by limiting publication to events signed by the whitelisted key, but with this NIP they may choose to accept any events as long as they are published from an authenticated user;
- A relay may limit access to
kind: 4
DMs to only the parties involved in the chat exchange, and for that it may require authentication before clients can query for that kind.
- A relay may limit subscriptions of any kind to paying users or users whitelisted through any other means, and require authentication.
Definitions
AUTH
, which relays can send when they support authentication and clients can send to relays when they want to authenticate. When sent by relays, the message is of the following form:["AUTH", <challenge-string>]
["AUTH", <signed-event-json>]
kind: 22242
and it should have at least two tags, one for the relay URL and one for the challenge string as received from the relay. Relays MUST exclude kind: 22242
events from being broadcasted to any client. created_at
should be the current time. Example:{
"id": "...",
"pubkey": "...",
"created_at": 1669695536,
"kind": 22242,
"tags": [
["relay", "wss://relay.example.com/"],
["challenge", "challengestringhere"]
],
"content": "",
"sig": "..."
}
Protocol flow
AUTH
message to the client containing a challenge. After receiving that the client may decide to authenticate itself or not. The challenge is expected to be valid for the duration of the connection or until a next challenge is sent by the relay.kind: 4
chat messages --, or it may do right on connection start or at some other moment it deems best. The authentication is expected to last for the duration of the WebSocket connection.NOTICE
or OK
message with a standard prefix "restricted: "
that is readable both by humans and machines, for example:["NOTICE", "restricted: we can't serve DMs to unauthenticated users, does your client implement NIP-42?"]
OK
message noting the reason an event was not written using the same prefix:["OK", <event-id>, false, "restricted: we do not accept events from unauthenticated users, please sign up at https://example.com/"]
Signed Event Verification
AUTH
messages, relays must ensure:- that the
kind
is22242
;
- that the event
created_at
is close (e.g. within ~10 minutes) of the current time;
- that the
"challenge"
tag matches the challenge sent before;
- that the
"relay"
tag matches the relay URL: - URL normalization techniques can be applied. For most cases just checking if the domain name is correct should be enough.
NIP-45
Event Counts
draft
optional
author:staab
COUNT
verb, which provides a mechanism for obtaining event counts.Motivation
Filters and return values
COUNT
, which accepts a subscription id and filters as specified in NIP 01.["COUNT", <subscription_id>, <filters JSON>...]
COUNT
response in the form {count: <integer>}
. Relays may use probabilistic counts to reduce compute requirements.["COUNT", <subscription_id>, {"count": <integer>}]
# Followers count
["COUNT", <subscription_id>, {"kinds": [3], "#p": [<pubkey>]}]
["COUNT", <subscription_id>, {"count": 238}]
# Count posts and reactions
["COUNT", <subscription_id>, {"kinds": [1, 7], "authors": [<pubkey>]}]
["COUNT", <subscription_id>, {"count": 5}]
NIP-46
Nostr Connect
draft
optional
author:tiero
author:giowe
author:vforvalerio87
Rationale
Terms
- App: Nostr app on any platform that requires to act on behalf of a nostr account.
- Signer: Nostr app that holds the private key of a nostr account and can sign on its behalf.
TL;DR
24133
, using a relay of choice.content
field must be an encrypted JSONRPC-ish request or response.Signer Protocol
Messages
Request
{
"id": <random_string>,
"method": <one_of_the_methods>,
"params": [<anything>, <else>]
}
Response
{
"id": <request_id>,
"result": <anything>,
"error": <reason>
}
Methods
Mandatory
- describe
- params []
- result
["describe", "get_public_key", "sign_event", "connect", "disconnect", "delegate", ...]
- get_public_key
- params []
- result
pubkey
- sign_event
- params [
event
] - result
event_with_signature
optional
- connect
- params [
pubkey
]
- disconnect
- params []
- delegate
- params [
delegatee
,{ kind: number, since: number, until: number }
] - result
{ from: string, to: string, cond: string, sig: string }
- get_relays
- params []
- result
{ [url: string]: {read: boolean, write: boolean} }
- nip04_encrypt
- params [
pubkey
,plaintext
] - result
nip4 ciphertext
- nip04_decrypt
- params [
pubkey
,nip4 ciphertext
] - result [
plaintext
]
pubkey
and signature
are hex-encoded strings.Nostr Connect URI
nostrconnect://
and base path the hex-encoded pubkey
with the following querystring parameters URL encodedrelay
URL of the relay of choice where the App is connected and the Signer must send and listen for messages.
metadata
metadata JSON of the Appname
human-readable name of the Appurl
(optional) URL of the website requesting the connectiondescription
(optional) description of the Appicons
(optional) array of URLs for icons of the App.
JavaScript
const uri = `nostrconnect://<pubkey>?relay=${encodeURIComponent("wss://relay.damus.io")}&metadata=${encodeURIComponent(JSON.stringify({"name": "Example"}))}`
Example
nostrconnect://b889ff5b1513b641e2a139f661a661364979c5beee91842f8f0ef42ab558e9d4?relay=wss%3A%2F%2Frelay.damus.io&metadata=%7B%22name%22%3A%22Example%22%7D
Flows
Connect
- User clicks on "Connect" button on a website or scan it with a QR code
- It will show an URI to open a "nostr connect" enabled Signer
- In the URI there is a pubkey of the App ie.
nostrconnect://<pubkey>&relay=<relay>&metadata=<metadata>
- The Signer will send a message to ACK the
connect
request, along with his public key
Disconnect (from App)
- User clicks on "Disconnect" button on the App
- The App will send a message to the Signer with a
disconnect
request
- The Signer will send a message to ACK the
disconnect
request
Disconnect (from Signer)
- User clicks on "Disconnect" button on the Signer
- The Signer will send a message to the App with a
disconnect
request
Get Public Key
- The App will send a message to the Signer with a
get_public_key
request
- The Signer will send back a message with the public key as a response to the
get_public_key
request
Sign Event
- The App will send a message to the Signer with a
sign_event
request along with the event to be signed
- The Signer will show a popup to the user to inspect the event and sign it
- The Signer will send back a message with the event including the
id
and the schnorrsignature
as a response to thesign_event
request
Delegate
- The App will send a message with metadata to the Signer with a
delegate
request along with the conditions query string and the pubkey of the App to be delegated.
- The Signer will show a popup to the user to delegate the App to sign on his behalf
- The Signer will send back a message with the signed NIP-26 delegation token or reject it
NIP-50
Search Capability
draft
optional
author:brugeman
author:mikedilger
author:fiatjaf
Abstract
search
filter field
search
field is introduced for REQ
messages from clients:{
...
"search": <string>
}
search
field is a string describing a query in a human-readable form, i.e. "best nostr apps". Relays SHOULD interpret the query to the best of their ability and return events that match it. Relays SHOULD perform matching against content
event field, and MAY perform matching against other fields if that makes sense in the context of a specific kind.key:value
pairs (two words separated by colon), these are extensions, relays SHOULD ignore extensions they don't support.["REQ", "", { "search": "orange" }, { "kinds": [1, 2], "search": "purple" }]
. Clients may include kinds
, ids
and other filter field to restrict the search results to particular event kinds.search
filter. Clients MAY send search
filter queries to any relay, if they are prepared to filter out extraneous responses from relays that do not support this NIP.Extensions
include:spam
- turn off spam filtering, if it was enabled by default
NIP-51
Lists
draft
optional
author:fiatjaf
author:arcbtc
author:monlovesmango
author:eskema
depends:33
tags
. Private tags will be encrypted in the event content
. Encryption for private tags will use NIP-04 - Encrypted Direct Message encryption, using the list author's private and public key for the shared secret. A distinct event kind should be used for each list type created.Replaceable List Event Example
priv: fb505c65d4df950f5d28c9e4d285ee12ffaf315deef1fc24e3c7cd1e7e35f2b1
pub: b1a5c93edcc8d586566fde53a20bdb50049a97b15483cb763854e57016e0fa3d
["p", "3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d"],
["p", "32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245"]
[
["p", "9ec7a778167afb1d30c4833de9322da0c08ba71a69e1911d5578d3144bb56437"],
["p", "8c0da4862130283ff9e67d889df264177a508974e2feb96de139804ea66d6168"]
]
{
"kind": 10000,
"tags": [
["p", "3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d"],
["p", "32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245"],
],
"content": "VezuSvWak++ASjFMRqBPWS3mK5pZ0vRLL325iuIL4S+r8n9z+DuMau5vMElz1tGC/UqCDmbzE2kwplafaFo/FnIZMdEj4pdxgptyBV1ifZpH3TEF6OMjEtqbYRRqnxgIXsuOSXaerWgpi0pm+raHQPseoELQI/SZ1cvtFqEUCXdXpa5AYaSd+quEuthAEw7V1jP+5TDRCEC8jiLosBVhCtaPpLcrm8HydMYJ2XB6Ixs=?iv=/rtV49RFm0XyFEwG62Eo9A==",
...other fields
}
Parameterized Replaceable List Event Example
nostr
people and has keys:priv: fb505c65d4df950f5d28c9e4d285ee12ffaf315deef1fc24e3c7cd1e7e35f2b1
pub: b1a5c93edcc8d586566fde53a20bdb50049a97b15483cb763854e57016e0fa3d
["p", "3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d"],
["p", "32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245"]
[
["p", "9ec7a778167afb1d30c4833de9322da0c08ba71a69e1911d5578d3144bb56437"],
["p", "8c0da4862130283ff9e67d889df264177a508974e2feb96de139804ea66d6168"]
]
{
"kind": 30000,
"tags": [
["d", "nostr"],
["p", "3bf0c63fcb93463407af97a5e5ee64fa883d107ef9e558472c4eb9aaaefa459d"],
["p", "32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245"],
],
"content": "VezuSvWak++ASjFMRqBPWS3mK5pZ0vRLL325iuIL4S+r8n9z+DuMau5vMElz1tGC/UqCDmbzE2kwplafaFo/FnIZMdEj4pdxgptyBV1ifZpH3TEF6OMjEtqbYRRqnxgIXsuOSXaerWgpi0pm+raHQPseoELQI/SZ1cvtFqEUCXdXpa5AYaSd+quEuthAEw7V1jP+5TDRCEC8jiLosBVhCtaPpLcrm8HydMYJ2XB6Ixs=?iv=/rtV49RFm0XyFEwG62Eo9A==",
...other fields
}
List Event Kinds
kind | list type |
10000 | Mute |
10001 | Pin |
30000 | Categorized People |
30001 | Categorized Bookmarks |
Mute List
10000
is defined as a replaceable list event for listing content a user wants to mute. Any standardized tag can be included in a Mute List.Pin List
10001
is defined as a replaceable list event for listing content a user wants to pin. Any standardized tag can be included in a Pin List.Categorized People List
30000
is defined as a parameterized replaceable list event for categorizing people. The 'd' parameter for this event holds the category name of the list. The tags included in these lists MUST follow the format of kind 3 events as defined in NIP-02 - Contact List and Petnames.Categorized Bookmarks List
30001
is defined as a parameterized replaceable list event for categorizing bookmarks. The 'd' parameter for this event holds the category name of the list. Any standardized tag can be included in a Categorized Bookmarks List.NIP-56
Reporting
draft
optional
author:jb55
kind 1984
note that is used to report other notes for spam, illegal and explicit content.Tags
p
tag referencing the pubkey of the user you are reporting.e
tag MUST also be included referencing the note id.report type
string MUST be included as the 3rd entry to the e
or p
tag being reported, which consists of the following report types:nudity
- depictions of nudity, porn, etc.
profanity
- profanity, hateful speech, etc.
illegal
- something which may be illegal in some jurisdiction
spam
- spam
impersonation
- someone pretending to be someone else
impersonation
Example events
{
"kind": 1984,
"tags": [
[ "p", <pubkey>, "nudity"]
],
"content": "",
...
}
{
"kind": 1984,
"tags": [
[ "e", <eventId>, "illegal"],
[ "p", <pubkey>]
],
"content": "He's insulting the king!",
...
}
{
"kind": 1984,
"tags": [
[ "p", <impersonator pubkey>, "impersonation"],
[ "p", <victim pubkey>]
],
"content": "Profile is imitating #[1]",
...
}
Client behavior
Relay behavior
NIP-57
Lightning Zaps
draft
optional
author:jb55
author:kieran
9734
is a zap request
, representing a payer's request to a recipient's lightning wallet for an invoice. 9735
is a zap receipt
, representing the confirmation by the recipient's lightning wallet that the invoice issued in response to a zap request has been paid.Protocol flow
- Client calculates a recipient's lnurl pay request url from the
zap
tag on the event being zapped (see Appendix G), or by decoding their lud06 or lud16 field on their profile according to the lnurl specifications. The client MUST send a GET request to this url and parse the response. IfallowsNostr
exists and it istrue
, and ifnostrPubkey
exists and is a valid BIP 340 public key in hex, the client should associate this information with the user, along with the response'scallback
,minSendable
, andmaxSendable
values.
- Clients may choose to display a lightning zap button on each post or on a user's profile. If the user's lnurl pay request endpoint supports nostr, the client SHOULD use this NIP to request a zap receipt rather than a normal lnurl invoice.
- When a user (the "sender") indicates they want to send a zap to another user (the "recipient"), the client should create a
zap request
event as described in Appendix A of this NIP and sign it.
- Instead of publishing the
zap request
, the9734
event should instead be sent to thecallback
url received from the lnurl pay endpoint for the recipient using a GET request. See Appendix B for details and an example.
- The recipient's lnurl server will receive this request and validate it. See Appendix C for details on how to properly configure an lnurl server to support zaps, and Appendix D for details on how to validate the
nostr
query parameter.
- If the request is valid, the server should fetch a description hash invoice where the description is this note and this note only. No additional lnurl metadata is included in the description. This will be returned in the response according to LUD06.
- On receiving the invoice, the client MAY pay it or pass it to an app that can pay the invoice.
- Once the invoice is paid, the recipient's lnurl server MUST generate a
zap receipt
as described in Appendix E, and publish it to therelays
specified in thezap request
.
- Clients MAY fetch zap notes on posts and profiles, but MUST authorize their validity as described in Appendix F. If the zap request note contains a non-empty
content
, it may display a zap comment. Generally clients should show users thezap request
note, and use thezap note
to show "zap authorized by ..." but this is optional.
Reference and examples
Appendix A: Zap Request Event
zap request
is an event of kind 9734
that is not published to relays, but is instead sent to a recipient's lnurl pay callback
url. This event's content
MAY be an optional message to send along with the payment. The event MUST include the following tags:relays
is a list of relays the recipient's wallet should publish itszap receipt
to. Note that relays should not be nested in an additional list, but should be included as shown in the example below.
amount
is the amount in millisats the sender intends to pay, formatted as a string. This is recommended, but optional.
lnurl
is the lnurl pay url of the recipient, encoded using bech32 with the prefixlnurl
. This is recommended, but optional.
p
is the hex-encoded pubkey of the recipient.
e
is an optional hex-encoded event id. Clients MUST include this if zapping an event rather than a person.
a
is an optional NIP-33 event coordinate that allows tipping parameterized replaceable events such as NIP-23 long-form notes.
{
"kind": 9734,
"content": "Zap!",
"tags": [
["relays", "wss://nostr-pub.wellorder.com"],
["amount", "21000"],
["lnurl", "lnurl1dp68gurn8ghj7um5v93kketj9ehx2amn9uh8wetvdskkkmn0wahz7mrww4excup0dajx2mrv92x9xp"],
["p", "04c915daefee38317fa734444acee390a8269fe5810b2241e5e6dd343dfbecc9"],
["e", "9ae37aa68f48645127299e9453eb5d908a0cbb6058ff340d528ed4d37c8994fb"]
],
"pubkey": "97c70a44366a6535c145b333f973ea86dfdc2d7a99da618c40c64705ad98e322",
"created_at": 1679673265,
"id": "30efed56a035b2549fcaeec0bf2c1595f9a9b3bb4b1a38abaf8ee9041c4b7d93",
"sig": "f2cb581a84ed10e4dc84937bd98e27acac71ab057255f6aa8dfa561808c981fe8870f4a03c1e3666784d82a9c802d3704e174371aa13d63e2aeaf24ff5374d9d"
}
Appendix B: Zap Request HTTP Request
callback
url, which was provided by the recipient's lnurl pay endpoint. This request should have the following query parameters defined:amount
is the amount in millisats the sender intends to pay
nostr
is the9734
zap request event, JSON encoded then URI encoded
lnurl
is the lnurl pay url of the recipient, encoded using bech32 with the prefixlnurl
pr
key, which is the invoice the sender must pay to finalize his zap. Here is an example flow:const senderPubkey // The sender's pubkey
const recipientPubkey = // The recipient's pubkey
const callback = // The callback received from the recipients lnurl pay endpoint
const lnurl = // The recipient's lightning address, encoded as a lnurl
const sats = 21
const amount = sats * 1000
const relays = ['wss://nostr-pub.wellorder.net']
const event = encodeURI(JSON.stringify(await signEvent({
kind: [9734],
content: "",
pubkey: senderPubkey,
created_at: Math.round(Date.now() / 1000),
tags: [
["relays", ...relays],
["amount", amount.toString()],
["lnurl", lnurl],
["p", recipientPubkey],
],
})))
const {pr: invoice} = await fetchJson(`${callback}?amount=${amount}&nostr=${event}&lnurl=${lnurl}`)
Appendix C: LNURL Server Configuration
- Add a
nostrPubkey
to the lnurl-pay static endpoint/.well-known/lnurlp/<user>
, wherenostrPubkey
is the nostr pubkey your server will use to signzap receipt
events. Clients will use this to validate zap receipts.
- Add an
allowsNostr
field and set it to true.
Appendix D: LNURL Server Zap Request Validation
nostr
query parameter where the contents of the event are URI- and JSON-encoded. If present, the zap request event must be validated in the following ways:- It MUST have a valid nostr signature
- It MUST have tags
- It MUST have only one
p
tag
- It MUST have 0 or 1
e
tags
- There should be a
relays
tag with the relays to send thezap
note to.
- If there is an
amount
tag, it MUST be equal to theamount
query parameter.
- If there is an
a
tag, it MUST be a valid NIP-33 event coordinate
Appendix E: Zap Receipt Event
zap receipt
is created by a lightning node when an invoice generated by a zap request
is paid. Zap receipts are only created when the invoice description (committed to the description hash) contains a zap request note.- Get the description for the invoice. This needs to be saved somewhere during the generation of the description hash invoice. It is saved automatically for you with CLN, which is the reference implementation used here.
- Parse the bolt11 description as a JSON nostr event. This SHOULD be validated based on the requirements in Appendix D, either when it is received, or before the invoice is paid.
- Create a nostr event of kind
9735
as described below, and publish it to therelays
declared in the zap request.
- The content SHOULD be empty.
- The
created_at
date SHOULD be set to the invoicepaid_at
date for idempotency.
tags
MUST include thep
tag AND optionale
tag from the zap request.
- The zap receipt MUST have a
bolt11
tag containing the description hash bolt11 invoice.
- The zap receipt MUST contain a
description
tag which is the JSON-encoded invoice description.
SHA256(description)
MUST match the description hash in the bolt11 invoice.
- The zap receipt MAY contain a
preimage
tag to match against the payment hash of the bolt11 invoice. This isn't really a payment proof, there is no real way to prove that the invoice is real or has been paid. You are trusting the author of the zap receipt for the legitimacy of the payment.
{
"id": "67b48a14fb66c60c8f9070bdeb37afdfcc3d08ad01989460448e4081eddda446",
"pubkey": "9630f464cca6a5147aa8a35f0bcdd3ce485324e732fd39e09233b1d848238f31",
"created_at": 1674164545,
"kind": 9735,
"tags": [
["p", "32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245"],
["e", "3624762a1274dd9636e0c552b53086d70bc88c165bc4dc0f9e836a1eaf86c3b8"],
["bolt11", "lnbc10u1p3unwfusp5t9r3yymhpfqculx78u027lxspgxcr2n2987mx2j55nnfs95nxnzqpp5jmrh92pfld78spqs78v9euf2385t83uvpwk9ldrlvf6ch7tpascqhp5zvkrmemgth3tufcvflmzjzfvjt023nazlhljz2n9hattj4f8jq8qxqyjw5qcqpjrzjqtc4fc44feggv7065fqe5m4ytjarg3repr5j9el35xhmtfexc42yczarjuqqfzqqqqqqqqlgqqqqqqgq9q9qxpqysgq079nkq507a5tw7xgttmj4u990j7wfggtrasah5gd4ywfr2pjcn29383tphp4t48gquelz9z78p4cq7ml3nrrphw5w6eckhjwmhezhnqpy6gyf0"],
["description", "{\"pubkey\":\"32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245\",\"content\":\"\",\"id\":\"d9cc14d50fcb8c27539aacf776882942c1a11ea4472f8cdec1dea82fab66279d\",\"created_at\":1674164539,\"sig\":\"77127f636577e9029276be060332ea565deaf89ff215a494ccff16ae3f757065e2bc59b2e8c113dd407917a010b3abd36c8d7ad84c0e3ab7dab3a0b0caa9835d\",\"kind\":9734,\"tags\":[[\"e\",\"3624762a1274dd9636e0c552b53086d70bc88c165bc4dc0f9e836a1eaf86c3b8\"],[\"p\",\"32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245\"],[\"relays\",\"wss://relay.damus.io\",\"wss://nostr-relay.wlvs.space\",\"wss://nostr.fmt.wiz.biz\",\"wss://relay.nostr.bg\",\"wss://nostr.oxtr.dev\",\"wss://nostr.v0l.io\",\"wss://brb.io\",\"wss://nostr.bitcoiner.social\",\"ws://monad.jb55.com:8080\",\"wss://relay.snort.social\"]]}"],
["preimage", "5d006d2cf1e73c7148e7519a4c68adc81642ce0e25a432b2434c99f97344c15f"]
],
"content": "",
"sig": "b0a3c5c984ceb777ac455b2f659505df51585d5fd97a0ec1fdb5f3347d392080d4b420240434a3afd909207195dac1e2f7e3df26ba862a45afd8bfe101c2b1cc"
}
Appendix F: Validating Zap Receipts
zap receipts
on events and pubkeys using a NIP-01 filter, for example {"kinds": [9735], "#e": [...]}
. Zaps MUST be validated using the following steps:- The
zap receipt
event'spubkey
MUST be the same as the recipient's lnurl provider'snostrPubkey
(retrieved in step 1 of the protocol flow).
- The
invoiceAmount
contained in thebolt11
tag of thezap receipt
MUST equal theamount
tag of thezap request
(if present).
- The
lnurl
tag of thezap request
(if present) SHOULD equal the recipient'slnurl
.
Appendix G: zap
tag on zapped event
zap
tag, clients SHOULD calculate the lnurl pay request based on it's value instead of the profile's field. An optional third argument on the tag specifies the type of value, either lud06
or lud16
.{
"tags": [
[ "zap", "[email protected]", "lud16" ]
]
}
Future Work
NIP-58
Badges
draft
optional
author:cameri
- A "Badge Definition" event is defined as a parameterized replaceable event with kind
30009
having ad
tag with a value that uniquely identifies the badge (e.g.bravery
) published by the badge issuer. Badge definitions can be updated.
- A "Badge Award" event is a kind
8
event with a singlea
tag referencing a "Define Badge" event and one or morep
tags, one for each pubkey the badge issuer wishes to award. The value for thea
tag MUST follow the format defined in NIP-33. Awarded badges are immutable and non-transferrable.
- A "Profile Badges" event is defined as a parameterized replaceable event with kind
30008
with ad
tag with the valueprofile_badges
. Profile badges contain an ordered list of pairs ofa
ande
tags referencing aBadge Definition
and aBadge Award
for each badge to be displayed.
Badge Definition event
d
tag with the unique name of the badge.
- A
name
tag with a short name for the badge.
image
tag whose value is the URL of a high-resolution image representing the badge. The second value optionally specifies the dimensions of the image aswidth
xheight
in pixels. Badge recommended dimensions is 1024x1024 pixels.
- A
description
tag whose value MAY contain a textual representation of the image, the meaning behind the badge, or the reason of it's issuance.
- One or more
thumb
tags whose first value is an URL pointing to a thumbnail version of the image referenced in theimage
tag. The second value optionally specifies the dimensions of the thumbnail aswidth
xheight
in pixels.
Badge Award event
- An
a
tag referencing a kind30009
Badge Definition event.
- One or more
p
tags referencing each pubkey awarded.
Profile Badges Event
- A
d
tag with the unique identifierprofile_badges
- Zero or more ordered consecutive pairs of
a
ande
tags referencing a kind30009
Badge Definition and kind8
Badge Award, respectively. Clients SHOULD ignorea
without correspondinge
tag and viceversa. Badge Awards referenced by thee
tags should contain the samea
tag.
Motivation
Recommendations
Example of a Badge Definition event
{
"pubkey": "alice",
"kind": 30009,
"tags": [
["d", "bravery"],
["name", "Medal of Bravery"],
["description", "Awarded to users demonstrating bravery"],
["image", "https://nostr.academy/awards/bravery.png", "1024x1024"],
["thumb", "https://nostr.academy/awards/bravery_256x256.png", "256x256"],
],
...
}
Example of Badge Award event
{
"id": "<badge award event id>",
"kind": 8,
"pubkey": "alice",
"tags": [
["a", "30009:alice:bravery"],
["p", "bob", "wss://relay"],
["p", "charlie", "wss://relay"],
],
...
}
Example of a Profile Badges event
{
"kind": 30008,
"pubkey": "bob",
"tags": [
["d", "profile_badges"],
["a", "30009:alice:bravery"],
["e", "<bravery badge award event id>", "wss://nostr.academy"],
["a", "30009:alice:honor"],
["e", "<honor badge award event id>", "wss://nostr.academy"],
],
...
}
NIP-65
Relay List Metadata
draft
optional
author:mikedilger
10002
having a list of r
tags, one for each relay the author uses to either read or write to.r
tags can have a second parameter as either read
or write
. If it is omitted, it means the author uses the relay for both purposes.The meaning of read and write
Motivation
- Most people are sending their posts to the same most popular relays in order to be more widely seen
- Many people are pulling from a large number of relays (including many duplicate events) in order to get more data
- Events are being copied between relays, oftentimes to many different relays
Purposes
Suggestions
10002
events to many relays, but write their normal feed-related events to a much smaller number of relays (between 2 to 6 relays). It is suggested that clients offer a way for users to spread their kind 10002
events to many more relays than they normally post to.10002
event (optionally with AUTH to verify it is their own) even if they are not otherwise subscribed to the relay because- finding where someone posts is rather important
- these events do not have content that needs management
- relays only need to store one replaceable event per pubkey to offer this service
Why not in kind 0
Metadata
0
in order to keep it small (as it should be widely spread) and to not have content that may require moderation by relay operators so that it is more acceptable to relays.Example
{
"kind": 10002,
"tags": [
["r", "wss://alicerelay.example.com"],
["r", "wss://brando-relay.com"],
["r", "wss://expensive-relay.example2.com", "write"],
["r", "wss://nostr-relay.example.com", "read"],
],
"content": "",
...other fields
NIP-78
Arbitrary custom app data
draft
optional
author:sandwich
author:fiatjaf
Nostr event
30078
(parameterized replaceable event) with a d
tag containing some reference to the app name and context -- or any other arbitrary string. content
and other tags
can be anything or in any format.Some use cases
- User personal settings on Nostr clients (and other apps unrelated to Nostr)
- A way for client developers to propagate dynamic parameters to users without these having to update
- Personal private data generated by apps that have nothing to do with Nostr, but allow users to use Nostr relays as their personal database
NIP-94
File Metadata
draft
optional
author:frbitten
author:kieran
author:lovvtide
author:fiatjaf
author:staab
Event format
1063
event type, having in content
a description of the file content, and a list of tags described below:url
the url to download the file
m
a string indicating the data type of the file. The MIME types format must be used (https://developer.mozilla.org/en-US/docs/Web/HTTP/Basics_of_HTTP/MIME_types/Common_types)
"aes-256-gcm"
(optional) key and nonce for AES-GCM encryption with tagSize always 128bits
x
containing the SHA-256 hexencoded string of the file.
size
(optional) size of file in bytes
dim
(optional) size of file in pixels in the form<width>x<height>
magnet
(optional) URI to magnet file
i
(optional) torrent infohash
blurhash
(optional) the blurhash to show while the file is being loaded by the client
{
"id": <32-bytes lowercase hex-encoded sha256 of the the serialized event data>,
"pubkey": <32-bytes lowercase hex-encoded public key of the event creator>,
"created_at": <unix timestamp in seconds>,
"kind": 1063,
"tags": [
["url",<string with URI of file>],
["aes-256-gcm",<key>, <iv>],
["m", <MIME type>],
["x",<Hash SHA-256>],
["size", <size of file in bytes>],
["dim", <size of file in pixels>],
["magnet",<magnet URI> ],
["i",<torrent infohash>],
["blurhash", <value>]
],
"content": <description>,
"sig": <64-bytes hex of the signature of the sha256 hash of the serialized event data, which is the same as the "id" field>
}
Suggested use cases
- A relay for indexing shared files. For example, to promote torrents.
- A pinterest-like client where people can share their portfolio and inspire others.
- A simple way to distribute configurations and software updates.