Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RFC 9101 implementation #7896

Closed
AAH20 opened this issue Aug 26, 2021 · 8 comments
Closed

RFC 9101 implementation #7896

AAH20 opened this issue Aug 26, 2021 · 8 comments

Comments

@AAH20
Copy link

AAH20 commented Aug 26, 2021

Check the latest RFC 9101 which contains information about JSON Web Algorithms, Encryption,signatures and tokens ,that would ease the implementation and integration of the most secure 3rd party wallets , unlike the vulnerable cakewallet app with its new domain name resolver ,
protect monero's title as the most secure privacy coin before its too late.

@AAH20
Copy link
Author

AAH20 commented Aug 26, 2021

@selsta
Copy link
Collaborator

selsta commented Aug 26, 2021

Maybe better to report this to cake wallet? Monero itself has no integration with unstoppable domains (I assume you refer to that).

@cirocosta
Copy link
Collaborator

I think they're referring to the use of Digest-based auth when using --rpc-login (which is true, cake uses if specified: https://github.com/cake-tech/cake_wallet/blob/a14ea3c3aaf31140985dc7b17133dc3f5f6d7b82/lib/entities/node.dart#L101-L106).

Would you mind elaborating, @AAH20? What is the suggestion here?

@selsta
Copy link
Collaborator

selsta commented Aug 26, 2021

with its new domain name resolver

I assume they are referring to cake-tech/cake_wallet@c7777da

@AAH20
Copy link
Author

AAH20 commented Aug 27, 2021

Its about the idea of a mobile app connecting to a remote node ,that generates an extra attack surface , even if you are connecting with a remote rpc from your secure computer you are vulnerable to man in the middle attacks , must be a way to trust remote nodes internationally, by certificate authority using asymmetric encryption in their signatures.

@AAH20
Copy link
Author

AAH20 commented Aug 27, 2021

@cirocosta thats need an extensive demonstration of the hashmap in dart risk assessment , but briefly hashmaps in general are known for collisions so to prevent that you have to sign in a trustable certificate authority which generates the asymmetric encryption algorithms keys , so your objective is to apply encryption algorithms on the api endpoints before or after the hash algorithms of the message digest functions

@AAH20
Copy link
Author

AAH20 commented Aug 27, 2021

Maybe better to report this to cake wallet? Monero itself has no integration with unstoppable domains (I assume you refer to that).

Thats a case that should be supported by the whole monero project , cause if you are betting on monero's security , privacy and anonymity, then you have to raise the public situational awareness in all aspects of their operational security , KYC , legal identity and law enforcement cases transperency , etc. , hence monero supporting wallets , exchange platforms and latest regulations should be upgraded as soon as possible.

@selsta
Copy link
Collaborator

selsta commented Feb 19, 2022

It isn't clear what you are suggesting. monerod RPC supports SSL, see

  --rpc-ssl arg (=autodetect)           Enable SSL on RPC connections: 
  --rpc-ssl-private-key arg             Path to a PEM format private key
  --rpc-ssl-certificate arg             Path to a PEM format certificate
  --rpc-ssl-ca-certificates arg         Path to file containing concatenated 
  --rpc-ssl-allowed-fingerprints arg    List of certificate fingerprints to 
  --rpc-ssl-allow-chained               Allow user (via --rpc-ssl-certificates)
  --rpc-ssl-allow-any-cert              Allow any peer certificate

@selsta selsta closed this as completed Feb 19, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants