-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
POSSIBLE THREATS - copied from cothority e-voting #282
Comments
Blocks created by shuffle and decrypt are signed with a useless signature #2510The election information, which is stored on-chain and therefore signed by a quorum of nodes, contains the roster. We therefore have a signature that is uniq per-election and contains the roster. A re-use on the same chain is excluded thanks to the properties of the blockchain, which makes every signature unique by including the block's hash. Leader requests for shuffle and decrypt are not trustworthy #2509The authentication process is simpler than in Cothority. It is not performed on-chain. Nodes delegate the authentication/authorization process to a third party via a shared secret key. Nodes only check the validity of the message based on the shared secret. Note that this is a big shortcut, as it brings a single point of failure, but that's a tradeoff we were willing to accept. Decentralized authentication is a topic on its own. evoting: hashMap creates wrong hash #2508The handling of transactions and blocks (where signatures are needed) is not done by d-voting itself, but the underlying blockchain: Dela. So if there is any concern on this point it would happen in Dela, not d-voting. User authentication is flawed #2507Again, the authentication process is simpler here. Users authenticate via Tequilla, and the session is kept by the Webbackend, which is trusted by the blockchain nodes via a shared secret and forward requests from users. However, we require that the connection between the Webbackend and the blockchain nodes is encrypted with TLS, otherwise we are not safe against replay-attack. In summary, while there may still have undiscovered vulnerabilities in d-voting, we are not concerned by the aforementioned issues. For more details about the security you can refer to our last security audit report. |
Thanks a lot for your comments. I'm currently out of the office until mid-August, but if you have some time afterwards, I would very much like you to walk me through how the authentication of the user works, and how the transactions are stored in Dela. I tried to follow the code, but didn't take enough time yet. So help there would be appreciated! |
Reading through these once again, I'm happy to see that #2508 to #2510 are not a problem. I'll discuss with Pierluca #2507 - I'm still not sure I understand your attack model and whom you trust for what part. |
I would be happy to chat about that, I'm always looking for opportunities to pass by Sat' 😄 |
That's an offer! However, Sat is closed until 30th of August :( Anything free in the week of 4th of September? |
@ineiti can this ticket be closed? |
Some issues I found while working on the cothority e-voting, and which need to be made sure that are not present in d-voting:
shuffle
anddecrypt
are signed with a useless signature cothority#2510shuffle
anddecrypt
are not trustworthy cothority#2509The text was updated successfully, but these errors were encountered: