Skip to content

Latest commit

 

History

History
69 lines (43 loc) · 2.78 KB

File metadata and controls

69 lines (43 loc) · 2.78 KB

See roman_attestation.sig and roman_attestation.txt in this directory for Roman Semenov's (@poma) signed attestation.

Challenge file: https://ppot.blob.core.windows.net/public/challenge_0003

Blake2b hash of challenge_0003: 9ff247f138a1175105137aced8c9766c5eeccef35b892c62c55eae787301991b05b66649b00c48f27501b30d1538f5d80e2da3edf163a9785fba5b47352f7d04

Generated response file: https://ppot.blob.core.windows.net/public/response_0003_poma

Blake2b hash of response_0003_poma: 65c6c7bdf97d1259ccac23b02fc35af47381899193a0b9d382c5bee52159d5d11ceaa64cf85584713e954bdfa5c0e628ab75b48d0fda7dfb6d1690d95361201c

Blake2b hash of the new_challenge file for participant #4: 01401c5e781fc7c8aae99b160f14a86b16a0a5e319d48fd04eaba3db8a0fefa7bf0854bc9bf6789336b8680f261151bc1d2aca163aa74c5019c817bfdbc4d21d

The above new_challenge file: https://ppot.blob.core.windows.net/public/challenge_0004

Hi everyone,

I finished computing a response file for the third round. This is a test contribution from tornado.cash team.

Date: 13-15 September 2019

Name: Roman Semenov

Location: N/A

Device(s): My server in 3rd party datacenter in Moscow (colocation)

Challenge hash:

        9ff247f1 38a11751 05137ace d8c9766c
        5eeccef3 5b892c62 c55eae78 7301991b
        05b66649 b00c48f2 7501b30d 1538f5d8
        0e2da3ed f163a978 5fba5b47 352f7d04

Challenge file claims it's based on the response hash:

        edec0294 eb450803 ec0ef7e1 7573f238
        5663016b 6b47b9cc 8c9396cb 5ed36732
        fcc6b6e3 abf5f8ac 61d6761d d565b203
        936e475a 00f6e9ba 047e5991 4340fd1f

Response hash:

        65c6c7bd f97d1259 ccac23b0 2fc35af4
        73818991 93a0b9d3 82c5bee5 2159d5d1
        1ceaa64c f8558471 3e954bdf a5c0e628
        ab75b48d 0fda7dfb 6d1690d9 5361201c

Software used: https://github.com/kobigurk/phase2-bn254/commit/bf852c168676a7afc5dd17b47ff9b8f394aeab8a

Entropy sources: concatenated bytes from /dev/urandom from 5 different machines (including my laptop, google cloud, aws cloud, own server)

Time taken: ~10 hours

Side channel defenses: 
* Left batch job processor (not a webserver, jobs are not interactive) for my other unrelated service running. This has both positive (additional unrelated work is happening on the server) and negative (larger attack surface) sides

Other defenses:
* Have not used swap space

Post processing:
* Uploaded the response file to AWS instance and then Wei Jie transferred it to Azure
* Rebooted the the machine

While there were some security measures, there is no guarantee that the machine was not compromised as it works as a public webserver. I intend to participate again later in a much more secure environment.

Attached the attestation as a file and a GPG signature. The signature can be verified with gpg --verify roman_attestation.sig roman_attestation.txt.