-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Attestation secret is shared with DevCon #266
Comments
Looks like its same level of security when Attestation secret or specialZPK shared with DevCon and DevCon and use this value to create email ZPK. |
Yes, issues is that DevCon front end learns both attestation secret and ticket secret. This is not a huge issue. It is an issue we previously accepted as being needed a needed evil with our design. However I realised there is a way to prevent it. |
So we afraid that DevCon_front has secrets , which it use to create ZKP. are those new items limited in time? @jot2re |
The issue is that if DevCon front learns the attestation secret, which means it could use the attestation in other settings (if they exist). |
@jot2re , If DevCon front page will be hacked then it can send any context request to the attestation.id and create any proof. My suggestion is:
|
I think we should have a talk with Sunil or Weiwu about prioritising this issue and related issues of UN's and context in the ZKPs. |
@AW-STJ , @weiwu-zhang what do you think about 2 things to make emailAttestation more secure:
worth to do it? cc @foxgem , @nicktaras |
See section 2.1.1 in the Token-negotiator report.
We note that while not pointed out in the Token-negotiator report, we believe that the problem can be fixed having attestation.id produce a special zero-knowledge proof, which can be validated by DevCon and combined with a zero-knowledge proof the ticket secret by DevCon. The combined zero-knowledge proof can then be verified by Hotel Bogota.
See this Jira issue.
The text was updated successfully, but these errors were encountered: