You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I noticed that when doing an update to the solo machine (to change its public key or diversifier), it uses the new diviersifier in the sign bytes. This is incorrect, it should use the current public key/diversifier to verify signature data that contains the new diversifier and new public key. The bug impact is low, the only security consideration would be around accidental misbehaviour (resulting in frozen solo machines), but the accidental misbehaviour would have to be from using a new diversifier on a sequence on which that diversifier is already being used. It is extremely unlikely and hard to even explain when this incident would occur
For Admin Use
Not duplicate issue
Appropriate labels applied
Appropriate contributors tagged/assigned
The text was updated successfully, but these errors were encountered:
Summary of Bug
I noticed that when doing an update to the solo machine (to change its public key or diversifier), it uses the new diviersifier in the sign bytes. This is incorrect, it should use the current public key/diversifier to verify signature data that contains the new diversifier and new public key. The bug impact is low, the only security consideration would be around accidental misbehaviour (resulting in frozen solo machines), but the accidental misbehaviour would have to be from using a new diversifier on a sequence on which that diversifier is already being used. It is extremely unlikely and hard to even explain when this incident would occur
For Admin Use
The text was updated successfully, but these errors were encountered: