-
Notifications
You must be signed in to change notification settings - Fork 499
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
exp/services/recoverysigner: add use of unique signing keys per registered account #2343
Comments
This comment has been minimized.
This comment has been minimized.
Merged
7 tasks
#2627 is going to create code conflicts I'm sure for this, so it'd be good for it to be merged when this work is started. |
leighmcculloch
added a commit
that referenced
this issue
May 28, 2020
…ltiple signing keys (#2627) ### What Add support for configuring and using multiple signing keys where the first signing key in the list is the default used for signing and the others can be selected according to SEP-30 v0.3.0. ### Why The reference implementation adheres to the API changes defined in SEP-30 v0.3.0 that supported multiple signing keys per registered account for the purpose of rotating signing keys, however the reference implementation does not actually support multiple signing keys being configured at one time. ### Note Much of this code is possibly going to be rewritten for #2343 where global keys will be supplemented with unique keys for each account that get stored in the database. ### Known limitations There is some code duplicity in this PR that I don't think is worth optimizing on until unique keys are implemented as trying to abstract commonalities may make @howardtw's job harder if the abstraction doesn't quite align with the logic he inserts. I think we should revisit any duplicate code once the unique key logic is added.
7 tasks
I believe this one is specifically about updating the endpoints to be using the encrypter and decrypter? |
This is the parent issue for the entire unique signing keys work. |
@shanzzam We need to discuss the priorities around this change. |
Closing all recoverysigner issues |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
What
Add use of unique signing keys that are randomly generated for each account at registration, storing the signing secret key in Postgres, and using AWS KMS to encrypt the signing secret key.
Why
The application uses a single signing key for all accounts that are registered. The issue with this is that anyone who knows that single signer can determine what accounts are registered with a recoversigner server. This public association may be undesirable for a user using a recoverysigner.
The text was updated successfully, but these errors were encountered: