Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Describe cryptographic issues with V when scaling it #21

Open
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

mcr
Copy link
Collaborator

@mcr mcr commented May 31, 2023

No description provided.

@gselander
Copy link
Collaborator

gselander commented Jun 1, 2023

(I assume the new changes in this PR are only rows 717-775? The remaining changes looks inherited from other PRs.)

Does the new update which makes V stateless (PR #18) have an impact here? What are the scalability issues if message_1 is not stored until received from W?

In that context, I suppose that V could optionally rate limit new message_1 from U depending on outstanding EDHOC runs where message_1 passed on to W but not returned.

@mcr
Copy link
Collaborator Author

mcr commented Jun 1, 2023

Sorry, the diff is hard to read because it was rebased upon the underscore change.
It would be fine if message_1 is removed from V's database after being sent to W. That retains some of the stateless of the system.

@gselander
Copy link
Collaborator

OK. But you still want to store message_1 to the database when it arrives from U? (It isn't it sufficient to read out LOC_W, encode state and forward to W?)

@mcr
Copy link
Collaborator Author

mcr commented Jun 1, 2023

Vs can't speak to W (or maybe not the Internet at all), only to the database (and Pledge).
Vn can't speak to V, only to the database (and The Internet).

@gselander
Copy link
Collaborator

OK. Then should just mention the removal of message_1 from the database after being sent over Vn.

What does this mean for secure storage for private key of CRED_V and secure execution environment for PoP? If Vs has secure storage/execution, then it can do PoP against U but not against W, and v.v. for Vn, but we require PoP to be done against both U and W for the same key.

@gselander
Copy link
Collaborator

If we don't have the time to address this soon, I propose we wait with merging this part.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants