Skip to content
This repository has been archived by the owner on May 26, 2022. It is now read-only.

Custom length certificate changes #21

Closed
Stebalien opened this issue Jul 13, 2018 · 1 comment
Closed

Custom length certificate changes #21

Stebalien opened this issue Jul 13, 2018 · 1 comment
Assignees
Labels
kind/enhancement A net-new feature or improvement to an existing feature

Comments

@Stebalien
Copy link
Member

Currently, we require length two chains where the bottom key (the one used directly in the handshake) is ephemeral. However, RSA signature verification is a bit expensive, especially when rapidly forming many connections (e.g., in the DHT).

It would be nice if we could instead make this configurable:

  • By default, we'd start out with this two key system.
  • By default, we'd allow anywhere from 1 to 4 certificates in the chain (restricted to 4 to prevent clients from tricking servers into validating long certificate chains).

Motivation:

  • Certificate verification can be expensive (depending on the algorithm).
  • In the future, peers will likely have an outer "ephemeral" peer ID (generated on boot) and will likely negotiate additional sub-peer IDs later (per application). When using these ephemeral peer IDs, the current two-certificate system doesn't provide any additional security.
@Stebalien Stebalien added the kind/enhancement A net-new feature or improvement to an existing feature label Jul 13, 2018
@ghost ghost assigned marten-seemann Nov 15, 2018
@ghost ghost added the status/in-progress In progress label Nov 15, 2018
@Stebalien
Copy link
Member Author

Deprecated in favor of ephemeral IDs from the start.

@ghost ghost removed the status/in-progress In progress label Nov 21, 2018
@Stebalien Stebalien reopened this Dec 3, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
kind/enhancement A net-new feature or improvement to an existing feature
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants