Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wire: add previous revealed secrets hashes to RS message #3239

Merged
merged 1 commit into from
May 8, 2024

Conversation

jrick
Copy link
Member

@jrick jrick commented Apr 30, 2024

For proper blaming behavior, peers who publish their secrets are blamed and removed from the following run if all secrets were revealed, but no other misbehavior was detected.

In order to correctly pin the blame on the peers who disrupted the mix by initially revealing their secrets messages, this blaming will only be triggered when a reveal secrets message is received that does not reference any other received secrets messages.

Because the secrets message hash now commits to these previous hashes by its signature, an additional method is added to return the commitment hash (to be published and verified in key exchange messages) that does not hash the previous messages (as they do not exist at the time of creating the key exchange).

While here, an issue was discovered and corrected in the serialization of the MixVect type. When the vector has zero length, deserializing would return early after reading the first 0 dimension, but serialization was writing both the count and message size dimensions. This was corrected by changing the serialization method to return early if the count is zero.

For proper blaming behavior, peers who publish their secrets are blamed and
removed from the following run if all secrets were revealed, but no other
misbehavior was detected.

In order to correctly pin the blame on the peers who disrupted the mix by
initially revealing their secrets messages, this blaming will only be
triggered when a reveal secrets message is received that does not reference
any other received secrets messages.

Because the secrets message hash now commits to these previous hashes by its
signature, an additional method is added to return the commitment hash (to be
published and verified in key exchange messages) that does not hash the
previous messages (as they do not exist at the time of creating the key
exchange).

While here, an issue was discovered and corrected in the serialization of the
MixVect type. When the vector has zero length, deserializing would return
early after reading the first 0 dimension, but serialization was writing both
the count and message size dimensions. This was corrected by changing the
serialization method to return early if the count is zero.
@davecgh davecgh merged commit 565a184 into decred:master May 8, 2024
2 checks passed
@jrick jrick deleted the prev_rs branch May 8, 2024 03:17
@davecgh davecgh added this to the 1.9.0 milestone May 9, 2024
@davecgh davecgh added the wire protocol change Discussion and pull requests regarding items that require changes to the wire protocol. label May 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
wire protocol change Discussion and pull requests regarding items that require changes to the wire protocol.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants