Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

multisig: mitigate fund-burning attack #8432

Conversation

UkoeHB
Copy link
Contributor

@UkoeHB UkoeHB commented Jul 13, 2022

To solve this issue (@kayabaNerve), obtain the ephemeral secrets for a multisig tx's outputs from a hash chain starting with a 32-byte entropy provided by the tx initiator plus the key images of the tx's inputs.

@UkoeHB UkoeHB mentioned this pull request Jul 13, 2022
if (not collect_tx_secret_keys(all_tx_secret_keys, tx_secret_key_temp, tx_aux_secret_keys_temp))
return false;

if (reconstruction)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fine as a sanity check, yet could be removed and decrease bandwidth + a source of potential manipulation.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

They can only be removed by introducing a new pending_tx_multisig struct, which is too much for this PR.

multisig_tx_key_entropy = crypto::null_skey;
return true;
}
FIELD(multisig_tx_key_entropy)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Didn't 8149 simply ban old objects when deserializing? Why not do the same here?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It banned old multisig_sig structs, this is a change to pending_tx which is more generic (used for more than just multisig afaik).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the clarification. And then the multisig builder itself will ban old versions where this is null. Makes sense.

@kayabaNerve
Copy link

Approved, once the serialization discussion happens. Rest looks good 👍

@luigi1111 luigi1111 merged commit 02cbccc into monero-project:master Jul 15, 2022
@UkoeHB UkoeHB deleted the multisig_signfixes_deterministic_secrets branch June 28, 2023 14:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants