-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Clearing up the reason behind "Ethereum Signed Message" #8828
Conversation
It looks like @elichai hasn't signed our Contributor License Agreement, yet.
You can read and sign our full Contributor License Agreement at the following URL: https://cla.parity.io Once you've signed, please reply to this thread with Many thanks, Parity Technologies CLA Bot |
[clabot:check]. |
It looks like @elichai signed our Contributor License Agreement. 👍 Many thanks, Parity Technologies CLA Bot |
rpc/src/v1/helpers/dispatch.rs
Outdated
@@ -237,7 +237,7 @@ pub fn fetch_gas_price_corpus( | |||
|
|||
/// Returns a eth_sign-compatible hash of data to sign. | |||
/// The data is prepended with special message to prevent | |||
/// chosen-plaintext attacks. | |||
/// malicious DApps from using the function to sign forge transactions. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
forged transactions?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed. Don't know how it happened 👍
rpc/src/v1/helpers/dispatch.rs
Outdated
@@ -223,7 +223,7 @@ pub fn fetch_gas_price_corpus( | |||
.map(move |prices| { | |||
// produce a corpus from the vector and cache it. | |||
// It's later used to get a percentile for default gas price. | |||
let corpus: ::stats::Corpus<_> = prices.into(); | |||
let corpus: ::stats::Corpus<_> =forge prices.into(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I guess this is mistake?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Revert the changes in rpc/src/v1/helpers/dispatch.rs
and it's good to merge!
bb675e4
to
46bf82e
Compare
Reverted. now it's good and clean. |
* master: Fix subcrate test compile (#8862) network-devp2p: downgrade logging to debug, add target (#8784) Clearing up a comment about the prefix for signing (#8828) Disable parallel verification and skip verifiying already imported txs. (#8834) devp2p: Move UDP socket handling from Discovery to Host. (#8790) Fixed AuthorityRound deadlock on shutdown, closes #8088 (#8803) Specify critical release flag per network (#8821) Fix `deadlock_detection` feature branch compilation (#8824) Use system allocator when profiling memory (#8831) added from and to to Receipt (#8756)
I think this makes more sense.
First because there aren't really chosen-plaintext attacks against asymmetric encryption keys out there.
Second because faking a transaction to be signed by the user is a viable attack vector.