-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Describe cryptographic issues with V when scaling it #21
base: master
Are you sure you want to change the base?
Conversation
(I assume the new changes in this PR are only rows 717-775? The remaining changes looks inherited from other PRs.) Does the new update which makes V stateless (PR #18) have an impact here? What are the scalability issues if message_1 is not stored until received from W? In that context, I suppose that V could optionally rate limit new message_1 from U depending on outstanding EDHOC runs where message_1 passed on to W but not returned. |
Sorry, the diff is hard to read because it was rebased upon the underscore change. |
OK. But you still want to store message_1 to the database when it arrives from U? (It isn't it sufficient to read out LOC_W, encode state and forward to W?) |
Vs can't speak to W (or maybe not the Internet at all), only to the database (and Pledge). |
OK. Then should just mention the removal of message_1 from the database after being sent over Vn. What does this mean for secure storage for private key of CRED_V and secure execution environment for PoP? If Vs has secure storage/execution, then it can do PoP against U but not against W, and v.v. for Vn, but we require PoP to be done against both U and W for the same key. |
If we don't have the time to address this soon, I propose we wait with merging this part. |
No description provided.