Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security issues #2

Open
PlasmaPower opened this issue May 18, 2020 · 3 comments
Open

Security issues #2

PlasmaPower opened this issue May 18, 2020 · 3 comments

Comments

@PlasmaPower
Copy link

Creating this issue to hopefully unify my posts in discord:

@unyieldinggrace
Copy link
Owner

@PlasmaPower thanks for the code-review and feedback points. I'm taking a couple of days off from coding to give myself rest, but will certainly get on them. There are some bits that I consider as belonging in the "won't fix" pile (or at least "not my problem" pile). Masking IP addresses is a great idea, but I think it's something that realistically needs to be left to the end user, not baked into NanoFusion. I'm prepared to be persuaded otherwise, but that's my thinking for now.

I hadn't quite worked out the point of the zValue. The scheme "works" if zValues are all empty, which is why I thought it was fine to calculate deterministically (also helped me with debugging, because output was consistent each time I ran it). I see now that it's meant to be a random variable to prevent key re-use attacks. Thanks for pointing that out.

@unyieldinggrace
Copy link
Owner

The issues with R commitments not being validated should now be fixed in the mixing context. The PhaseTracker should prevent moving on to signing until all commitments are checked.

@PlasmaPower
Copy link
Author

Thanks, I'm liking the new phase architecture a lot better :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants