-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Authority-discovery should sign its validator key with its PeerIds #8833
Comments
Hey, is anyone still working on this? Due to the inactivity this issue has been automatically marked as stale. It will be closed if no further activity occurs. Thank you for your contributions. |
Issue still relevant and important. |
I have checked the |
@bkchr At the moment the private key for PeerId is parsed from CLI params into a
My personal preference would be 2 or 3, but I might be missing pieces of code that suggest another design. |
Sounds reasonable to me 👍 We probably could create a follow up issue to move sc-networking itself to use You should also create a new |
We need back certs kinda everywhere else too. I'd envisioned doing the session key ones in #7398 but of course transport is different. |
Failing to do so means that it's possible for a malicious validator to cause disruptions on the network.
It would be quite complicated to actually exploit this, plus any validator actually doing that would be easily identified and can't profit from this in any way, so the chances of attack are extremely low, but it doesn't hurt to fix this.
The text was updated successfully, but these errors were encountered: