Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Do not reuse signature keys #227

Closed
ekr opened this issue Nov 8, 2023 · 2 comments
Closed

Do not reuse signature keys #227

ekr opened this issue Nov 8, 2023 · 2 comments

Comments

@ekr
Copy link
Collaborator

ekr commented Nov 8, 2023

RECOMMENDATION: Do not use the same signature keypair across
groups. Update all keys for all groups on a regular basis. Do not preserve
keys in different groups when suspecting a compromise.

Does anyone actually do this? This seems like a real challenge for KT.

@Bren2010
Copy link
Contributor

Bren2010 commented Nov 8, 2023

This seems like an unnecessary recommendation. If handshake messages are unencrypted, then you don't need to infer membership from signatures. You can see the Add proposal for any member, containing the credential with their identity. If handshake messages are encrypted, the signature isn't visible.

@beurdouche
Copy link
Member

This was originally a general cryptographic key separation consideration. I removed it from that privacy section.
The issue of reusing the same key across groups is that you can cross reference but there is already a sentence about this somewhere else. Fixed by in 241

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

3 participants