Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Attacker re-using a peer DID in a different context: Problematic or not? #119

Closed
SvenHammann90 opened this issue Feb 11, 2020 · 1 comment

Comments

@SvenHammann90
Copy link
Contributor

SvenHammann90 commented Feb 11, 2020

Hi all,

I have encountered a peculiarity about peer DIDs in combination with the current version of DID Exchange, where I am unsure whether it poses a problem or not.

Suppose A and B have a connection, for which A uses peer DID (didA@B).

I believe that it is currently possible for an attacker who knows (didA@B) and its DID Doc to register (didA@B) with that DID Doc as its own peer DID with a third party C.
The reason is that, in an exchange request, the requester does not have to prove control of the secret key in the initial DID Doc's public key - at least, this is not the case in the current version of DID Exchange. I realize that this may be an issue of the DID Exchange spec, and might be addressed in the DID Comm WG or Aries WG (I'm not sure whether DID Exchange is part of the DID Comm WG)

However, I wonder if this is even a problem. Would a "re-use" of a peer DID between A and B in another context (involving a third party C) even pose any problem? Or are peer DIDs only "meaningful" between the two parties for which they were set up?

I do not see how such a re-use could directly hurt A or B, but it still allows the attacker to register a peer DID they do not control...

@dhh1128
Copy link
Collaborator

dhh1128 commented Jul 15, 2020

Closing now that the ticket has moved to its new repo home at decentralized-identity/peer-did-method-spec#17.

@dhh1128 dhh1128 closed this as completed Jul 15, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants