Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replicated Security - support key assignment feature #135

Closed
jmc000 opened this issue Apr 18, 2023 · 0 comments · Fixed by #144
Closed

Replicated Security - support key assignment feature #135

jmc000 opened this issue Apr 18, 2023 · 0 comments · Fixed by #144

Comments

@jmc000
Copy link

jmc000 commented Apr 18, 2023

For Replicated Security there are 2 ways to sign blocks. The first and simplest one is to use the same priv_validator_key.json for provider and consumer chains. The problem with this solution is that it increases the insecurity of the Hub, and more in the future as RS scale.

As describe in this blog post:

validators should use the key assignment feature so that they can keep their provider chain and consumer chain keys separated.

Key assignment feature allows validators to use different keys for consumer and provider chains by broadcasting to the network which consensus key they will be using to validate a consumer chain (providerd tx provider assign-consensus-key <consumer_pub_key>)

For the launch of first consumer chain (Neutron) its still manageable to use the same key, but I think in the future it could be great that Horcrux supports RS key assignment!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant