Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: Update keychain info #1803

Merged
merged 2 commits into from
Jun 15, 2023
Merged

docs: Update keychain info #1803

merged 2 commits into from
Jun 15, 2023

Conversation

marcus-pousette
Copy link
Contributor

No description provided.

@marcus-pousette marcus-pousette changed the title fix: Update keychain documentation docs: Update keychain info Jun 10, 2023
Copy link
Member

@maschad maschad left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for updating this! We will soon have doc verification to catch these types of issues #1505. I have made some suggestions, almost there.

doc/CONFIGURATION.md Outdated Show resolved Hide resolved
doc/CONFIGURATION.md Show resolved Hide resolved
@marcus-pousette
Copy link
Contributor Author

marcus-pousette commented Jun 12, 2023

I am not sure about the pass config, it does not seem to be used for exporting and importing peerIds ? I wonder whether the description would be misleading in this case, when I think about it now.

@maschad
Copy link
Member

maschad commented Jun 13, 2023

I am not sure about the pass config, it does not seem to be used for exporting and importing peerIds ? I wonder whether the description would be misleading in this case, when I think about it now.

I would say the key management is separate from the exporting of peerIds associated with those keys. A password isn't required because the key isn't being exported in a format that is typically password-protected as Peer IDs are derived from public keys.

@marcus-pousette
Copy link
Contributor Author

marcus-pousette commented Jun 14, 2023

I would say the key management is separate from the exporting of peerIds associated with those keys. A password isn't required because the key isn't being exported in a format that is typically password-protected as Peer IDs are derived from public keys.

I see. Well I got initially confused as I assumed the password would make anything I import to the keychain, encrypted at rest with the password provided in the config. But there is a different case for these PeerIds I guess then.

But I am ok with how it is now, if you are ok. I guess the documentation can improve further more in the future iteratively.

Would it make sense that I create a separate issue for safely encrypting PeerIds at rest? It is kind of important if you want to protect yourself against supply chain attacks, especially in the browser.

@maschad
Copy link
Member

maschad commented Jun 15, 2023

Would it make sense that I create a separate issue for safely encrypting PeerIds at rest? It is kind of important if you want to protect yourself against supply chain attacks, especially in the browser.

This is a separate issue so feel free to open one, but I am not sure that encrypting PeerIds alone would prevent a supply chain attack in the browser, especially if the public key is known. I would suspect that preventing such an attack would require a more comprehensive approach that addresses the whole networking stack.

@maschad maschad merged commit b641490 into libp2p:master Jun 15, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants