Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

E2E Encryption: Support more keyring strategies #1585

Open
om26er opened this issue Jul 28, 2022 · 1 comment
Open

E2E Encryption: Support more keyring strategies #1585

om26er opened this issue Jul 28, 2022 · 1 comment

Comments

@om26er
Copy link
Contributor

om26er commented Jul 28, 2022

We have a platform which runs a WAMP router, that system also has a secure element. each user (mobile phone / website) has their own public/private key generated on login. The current implementation in autobahn ties the Key (mix of originator and responder keys) to a URI.

This is mostly fine however in our case it is desired to have 1 responder and multiple originators, the originators can dynamically change as people are added/removed from the system.

From the look of it, it is currently not possible with the autobahn-python API. There are two changes that I think will make the above possible

  1. The Key object should support multiple originators (a list)
  2. the enc_key in the Invocation should be used to determine if the originator is "expected"
@om26er om26er changed the title E2E Encryption: Support custom keyring strategies E2E Encryption: Support more keyring strategies Jul 28, 2022
@oberstet
Copy link
Contributor

pls see my comments #1586 (comment) - which roughly apply here as well. "E2Ev2" is the way forward, not "E2Ev1" ... but even more so, we need to have a proper design and spec first (eg wamp-proto/wamp-proto#417) before jumping into moving code around ...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants