-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should the timestamp be signed? #112
Comments
@snej The timestamp in Pkarr design is unsigned, but indeed the Mainline DHT's BEP_0044 As for replay attacks, it is not doable, because the timestamp (the If you prefer, you can see the implementation of preparing the thing that is being signed here |
I meant signed as in "digital signature", not as in "two's complement integer" :) |
Yeah just realized that now ... sorry it is a bit late here :D I should have said "It is indeed signed" instead of this long paragraph. |
According to the spec, the timestamp is not signed:
The detailed verification instructions also say the signed data starts 104 bytes from the start of the packet, I.e. after the timestamp. So either the spec needs to be updated, or there may be a vulnerability with the timestamp. |
Yeah, it looks like the actual signing code is quite different from what the spec says. |
Yes the spec isn't clear here, and even if it said The signature is over the the Bencoded dictionary containing the timestamp ( I will update the |
In the spec I noticed that the DNS record is signed, but the timestamp isn’t. Doesn't that permit replay attacks, like a bad actor publishing someone's obsolete record with a new timestamp?
The text was updated successfully, but these errors were encountered: