This document gives an overview over the ICRC standards related to signer interactions and transaction approval flows. It explains the motivation behind the standards and how they relate to each other.
The following diagram presents the interactions between the different components and shows which standards cover the respective parts of the interactions:
graph LR
RP[Relying<br>Party]
User((User))
Signer[Signer]
Canister[(Target<br>Canister)]
Messages[/"JSON-RPC Messages<br>(ICRC-25 incl. extensions)"/]
Calls[/Canister Calls:<br>- ICRC-21<br>- ICRC-49/]
subgraph Transport["Transport#nbsp;Channel#nbsp;e.g.#nbsp;ICRC#8209;29"]
Messages
end
subgraph HTTP[IC HTTP Interface]
Calls
end
subgraph IC["Internet Computer"]
Canister
end
RP <--> Messages <---> Signer
Signer <--> Calls <--> Canister
User <-- Interactions:<br>- Account selection<br>- Permission requests<br>- User approvals --> Signer
User <-- Interactions --> RP
%% Padding so that GitHub controls don't overlap graph
BottomPadding["<br><br><br><br><br><br>"]
style RP fill:#26cc26,stroke:transparent,color:#000001
style Transport fill:#025df255,stroke:transparent
style Messages fill:#bb1414,stroke:transparent,color:#fffffe
style Signer fill:#ffc100,stroke:transparent,color:#000001
style HTTP fill:#cccccc22,stroke:transparent
style IC fill:#cccccc22,stroke:transparent
style Calls fill:#553520,text-align:left,stroke:transparent,color:#fffffe
style Canister fill:#dd70ff,text-align:left,stroke:#8f38a7,color:#000001
style BottomPadding fill:transparent,stroke:transparent
linkStyle 4 text-align:left
A component that holds a private key and can sign messages. In addition, the signer needs to be able to interact with the IC to send messages and receive responses. It can be a hardware wallet, a mobile app, a browser extension, or any other component that can sign messages.
A signer is not required to do any form of asset management, such as showing balances or manage staked funds.
A service that interacts with a signer.
This service can be a webapp (either hosted on-chain (dapp) or using the classical web 2.0 model), a mobile app, or any other service.
The target canister is a canister hosted on the IC. The target canister is chosen by the relying party as the recipient of a message that is signed by the signer.
For example, the target might be a canister that holds assets, such as the ICP ledger canister, and a relying party might want to request a transfer of ICP to some specific account.
Standards that describe interactions between relying parties and signers through JSON-RPC messages.
Standards that describe how the communication channel between a relying party and signer is established.
Standards that describe canister call interfaces used by signers.
Currently, it is very cumbersome to manage assets in the IC ecosystem. The reason is, that there are no established standards on how to interact with wallets / signers. On top of that, the privacy-preserving model of authorizing dapps by issuing delegations (as used by Internet Identity and other identity providers) makes it challenging to manage assets that are shared across many different services.
The standards referenced in this document aim to provide a lightweight framework for signers to interact with services under a common, shared identity. The standards are split in different parts to allow projects to pick and chose the parts that they need. Care was taken to make the standards extensible to open up the space to the community to define the extensions they need and prove useful in practice.
If these standards are adopted, the vision is to foster a vibrant and diverse ecosystem of signers, dapps, and canisters that can interact with each other, without having to specifically integrate with any particular component (or even know about each others existence prior to the interaction). To help with this, services maintained by DFINITY will be upgraded to support these standards, when they are adopted.
The signer standards are meant as an extension of the current delegation based model (and not as a replacement). There is a lot of value in having authenticated sessions and being able to make many transactions non-interactively, leveraging the high throughput of the IC. For security critical / high-value transactions and for interactions that require a stable identity across applications the signer standards provide a better alternative.
From a user perspective, the delegation based session identity should be a technical detail. The user should not have to know the principal of that identity (or even be aware of its existence). In contrast, the signer identities are explicitly and directly managed by the user.
Application developers should take advantage of that distinction by handing over the responsibility over valuable assets to the signer identities (and hence the user). This is especially important for assets that are shared across many different services. By doing so, the applications can focus on the business logic and user experience, while the signer takes care of the security of the assets.
Delegation Identity | Signer Identity | |
---|---|---|
User Experience |
|
|
Recommended usage |
|
|
Examples |
|
|
Security Properties |
|
|
This section explains the trust assumptions that are made by the standards. In the context of these standards, one party trusting another party means that the trusting party relies on the trusted party to behave honestly and according to the standards. In particular, if trust is misplaced then the trusting party cannot detect or prevent the malicious behaviour by the trusted party.
For example, if a user were to try to manage their assets using a malicious signer, there is no way for the user to prevent the signer from stealing their assets.
The trust assumptions are as follows:
- The signer is trusted by the user.
- The target canister is trusted by the user. Interactions with malicious canisters are not covered by the standards. In particular, interacting with a malicious canister can produce arbitrary outcomes regardless of how the calls were signed.
- The relying party is not trusted by the user nor the signer and might be malicious.
- The signer is not trusted by the relying party. The relying party must be able to detect malicious behaviour from a signer with respect to the relying party. This property is important for an open ecosystem where relying parties openly interact with any standard compliant signer.
This section lists the use cases that are covered by the standards.
In this use case the relying party does not require signing canister calls, but only information about the identities ( and potentially subaccounts) managed by the signer.
To exchange this information, the relying party establishes a connection with the signer and requests the information
using the appropriate messages, such as icrc31_get_principals
message as specified
by ICRC-31. The
information that is shared this way is subject to user approval on the signer side.
Currently, the following information can be shared:
- The list of identities managed by the signer, as specified by ICRC-31.
- The list of ICRC-1 subaccounts associated with the identities managed by the signer, as specified by ICRC-27
More extensions can be added in the future.
In this use case the relying party initiates canister calls (transactions) on behalf of an identity controlled by a signer. The user can approve or reject the transaction on the signer UI. After user approval, the signer signs the call and submits it to the IC. Upon receiving the result of the canister call, the signer must forward the result to the relying party.
This flow (described in ICRC-49) is one of the main use cases for ICRC-25. It offers an alternative interaction model to the currently used session delegations. In particular, it allows multiple relying parties to securely interact with the IC using the same signer controlled identity without being restricted to a disjoint set of target canisters.
In the future, batch transactions could be a possible extensions to this flow.
The signer architecture is not part of the standards. Any component that fulfills the following requirements can act as a signer:
- Ability to sign messages with an IC supported signature scheme
- Ability to verify messages signed with an IC supported signature scheme
- Ability to interact with the IC to send messages and receive responses
- Implementation of an appropriate transport channel to communicate with a relying party
User interaction is not mandated as developers should be able to build signers that don't interact directly with users. However, the most common implementation is expected to be a signer that is interactive and displays transaction information to the user and receives user input synchronously.
This section gives an overview over the different types that were considered when designing the standards.
This is a signer whose private keys to sign messages are stored off-chain.
Examples of such signers would be:
- a mobile app
- a browser extension
- a webapp that signs message using a WebAuthn credential
A canister signer is a signer that uses IC canister signatures to sign messages. Such a canister signer requires an off-chain component to interact with the relying party and to orchestrate the signing process. This component can be a front-end hosted by the signer canister and run in the users' browser.
Note that while the canister is holding all the assets, it is not using the canister id directly to do so. Instead, the self-authenticating principal derived from the canister signature public key is the owner of the assets.
This indirection is required because of the different trust models for external parties as opposed to canisters:
- A canister can trust the responses it receives from other canister because the execution is replicated
- cross-subnet calls are validated by the receiving subnet
- An external party always communicates with a single, untrusted boundary node. Therefore, the responses are certified by the subnet to prove authenticity.
ICRC-49 requires the certified response to be relayed to the relying party as the signer is not trusted by the relying party.
The above approach also sidesteps another issues that arise from holding assets using a canister id principal: calling untrusted canisters is generally unsafe as it can prevent upgrades of the calling canister.
An air-gapped signer is a signer that is not connected to the internet. As ICRC-49 requires signers to have a connection to the IC, air-gapped signers are only supported by this extension standard if they provide a chain-connected component as well.
The chain-connected component must be trusted by the user.