Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New NIP to lock user #1411

Open
wants to merge 6 commits into
base: master
Choose a base branch
from

Conversation

anurag-l1nt
Copy link

This PR defines a new NIP that allows users to block their keys when they suspect or are certain that their keys have been stolen.

Relays implementing this NIP will not accept events from blocked keys, and Clients will hide or visually mark events emitted by blocked keys.

This will mitigate the impact of key theft by preventing identity impersonation.

Copy link
Member

@staab staab left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I actually quite like this, but because it relies on wide adoption to be effective, I'd like to see a version that covers key rotation and maybe delegation as well. @pablof7z specced one a while back #829, but it didn't get traction (probably because of the OTS requirement). This is a huge need with nostr, so if this is an area of interest for you I encourage you to push forward on it.

100.md Outdated
Comment on lines 68 to 69
The operation of the Relays and C
lients in the event of receiving an event using [NIP-59](./59.md) will be the same as described in the previous sections, except that the signer of the `seal` event (`kind:13`) will be used to validate whether the event should be accepted (in the case of Relays) or hidden/marked (in the case of Clients).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is impossible for relays to enforce if they don't have the key to decrypt the wrapper.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, you're right. My mistake. I will remove this part.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, you're right. My mistake. I will remove this part.

Done in 45b863d

@vitorpamplona
Copy link
Collaborator

vitorpamplona commented Aug 6, 2024

This is a weird one because it can be used in the attacker's favor. If I have somebody's private key, I can create events in the past and in the future and send to the relay before locking the account. I can lock the account in some relays, but keep creating events in the past and future on other relays, generating some confusion of what's locked and what's not, what's real and what's not.

That's the main reason I wrote on #1056 that clients should disqualify anything from that pubkey as soon as one of these events are seen anywhere and followers should repost with a stringified version of the lock/migration event to make sure it is spread everywhere and, most importantly, never gets deleted.

@fiatjaf
Copy link
Member

fiatjaf commented Aug 6, 2024

Pablo's proposal is still better. I don't think OTS had anything to do with it not getting traction. It's just that it won't be priority until a catastrophic event occurs, but the OTS requirement isn't that hard to solve, we just need some nice service doing it on our behalf. It's in my list of things to do.

@mleku
Copy link

mleku commented Aug 6, 2024

if the cancel event includes a reasonably long link of recent event IDs it could prove precedence, but the concept of chaining events altogether hasn't seen very much use yet, except as necessary for replies, this is an example of how it could be useful, as proof of causality

@vitorpamplona
Copy link
Collaborator

OTS isn't hard, but it does create a dependency on a Blockchain lookup service and the need to wait for confirmations from the request to the response time. Requesting OTS events and waiting for confirmations could be better solved in a DVM.

@alexgleason
Copy link
Member

This almost the same as #377, just different semantics.

@anurag-l1nt
Copy link
Author

I actually quite like this, but because it relies on wide adoption to be effective, I'd like to see a version that covers key rotation and maybe delegation as well. @pablof7z specced one a while back #829, but it didn't get traction (probably because of the OTS requirement). This is a huge need with nostr, so if this is an area of interest for you I encourage you to push forward on it.

I like Pablo's proposal. In fact, when I wrote this NIP, I had thought about including key replacement and some kind of OTS proof, but I ultimately preferred to keep it simpler in this version and didn't work much on those points.

@anurag-l1nt
Copy link
Author

This is a weird one because it can be used in the attacker's favor. If I have somebody's private key, I can create events in the past and in the future and send to the relay before locking the account. I can lock the account in some relays, but keep creating events in the past and future on other relays, generating some confusion of what's locked and what's not, what's real and what's not.

Yes, that can happen. That's why I also wrote that clients should discard (hide or visually mark in some way) the events of a key that has been blocked. I like the idea of clients republishing the events on their relays. This would make propagation faster.

@anurag-l1nt
Copy link
Author

Pablo's proposal is still better. I don't think OTS had anything to do with it not getting traction. It's just that it won't be priority until a catastrophic event occurs, but the OTS requirement isn't that hard to solve, we just need some nice service doing it on our behalf. It's in my list of things to do.

Key replacement requires action from the user before the key is compromised. Key blocking could help mitigate issues for those users who haven't taken that action.

I believe the best alternative would be a combination of both: blocking the key with the option to perform a replacement.

@anurag-l1nt
Copy link
Author

This almost the same as #377, just different semantics.

Yes, it’s very similar. The main difference with mine is that you propose deleting all previous events, while I only suggest hiding/marking them. I'm not sure which option is more desirable, so possibly the best approach would be to let the user choose what they prefer to do.

@anurag-l1nt anurag-l1nt requested a review from staab August 10, 2024 10:44
Copy link
Contributor

@dluvian dluvian left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I prefer this over #377. The latter reuses kind 5 which makes it harder to request all my friends who nuked themselves as I have to set authors and #p in the subscription filter and then filter the responses to make sure that p tag == pubkey. With this nip I only have to set authors in the filter which is much more efficient.

100.md Outdated Show resolved Hide resolved
100.md Outdated Show resolved Hide resolved
@anurag-l1nt anurag-l1nt requested a review from dluvian August 16, 2024 11:15
100.md Outdated Show resolved Hide resolved
@pablof7z
Copy link
Member

OTS isn't hard, but it does create a dependency on a Blockchain lookup service and the need to wait for confirmations from the request to the response time. Requesting OTS events and waiting for confirmations could be better solved in a DVM.

I already wrote that DVM when I was working on the NIP-41 stuff.

https://github.com/pablof7z/dvm-references/blob/d3b2405b12e967c07bc5345f11b8d23956187e4e/apps/dvms/src/dvms/notary.ts#L4

You send an event id as the input, it resolves when the stamp has been confirmed with the event id of the NIP-03 that was published

@dluvian
Copy link
Contributor

dluvian commented Aug 21, 2024

We shouldn't use kind 1000 for this because it's already used by users like snort and waterblower.

I'm using kind 398

@dluvian
Copy link
Contributor

dluvian commented Aug 27, 2024

FYI I implemented this in the latest Voyage release with kind 398

@anurag-l1nt
Copy link
Author

We shouldn't use kind 1000 for this because it's already used by users like snort and waterblower.

I'm using kind 398

Used for what? I don't know the implementation for which they are using kind: 1000

Thank you!

@dluvian
Copy link
Contributor

dluvian commented Sep 8, 2024

Used for what? I don't know the implementation for which they are using kind: 1000

I have no idea but there are many kind:1000 events

@anurag-l1nt Can you replace kind:1000 with kind:398 ?

@anurag-l1nt
Copy link
Author

Used for what? I don't know the implementation for which they are using kind: 1000

I have no idea but there are many kind:1000 events

@anurag-l1nt Can you replace kind:1000 with kind:398 ?

OK. Yes, I change it

@anurag-l1nt
Copy link
Author

Used for what? I don't know the implementation for which they are using kind: 1000

I have no idea but there are many kind:1000 events
@anurag-l1nt Can you replace kind:1000 with kind:398 ?

OK. Yes, I change it

Done @dluvian

@bezysoftware
Copy link
Contributor

bezysoftware commented Sep 9, 2024

Should relays also not allow AUTH for locked user? Ideally relays should only serve DMs to authed clients who are part of the conversation, but when a user is locked they probably should never serve these events? Therefore AUTH should fail for a locked account

@anurag-l1nt
Copy link
Author

Should relays also not allow AUTH for locked user? Ideally relays should only serve DMs to authed clients who are part of the conversation, but when a user is locked they probably should never serve these events? Therefore AUTH should fail for a locked account

I'm sorry for the delay in responding. You are right. Chaged in 4d58a56.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants