Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

registrar: split TTC and NAC registrar services #16

Open
redpig opened this issue Jun 19, 2023 · 1 comment
Open

registrar: split TTC and NAC registrar services #16

redpig opened this issue Jun 19, 2023 · 1 comment

Comments

@redpig
Copy link
Collaborator

redpig commented Jun 19, 2023

And have the TTC get configured with NAC gpks and have NAC able to configure client TTC URIs/etc.

@redpig
Copy link
Collaborator Author

redpig commented Nov 7, 2023

This one requires careful consideration of the nonces and binding. I think the right outcome is for the NAC and TTC keys to be generated at the same time in the secure wallet environment such that the platform specific attestation to the NAC registrar can attest to both keys (and could use the TTC pub key hash as a nonce and the TTC-Join could use the NAC pub key as a nonce) such that when the NAC-Join happens the registrar can return a signed assertion binding the TTC public key to the verified-by-NAC-registrar hardware attestation which is presented to the TTC registrar on TTC-Join - along with either a NAC registrar generated identifier for the client. The TTC registrar must just check that the NAC used to call is valid and from the NAC registrar which signed the assertion.

This allows the TTC registrar to go back to the NAC registrar if any problems arise as unbounded issuance of NACs would not be readily apparent to the TTC registrar without some form of stable identifier. This then acts as an anchor for future nym/basename-based detection to ensure compromised wallets can be effectively excluded (and can't piggyback TTC issuance on valid NACs, etc).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant