-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Last resort key packages + key package expiry #366
Comments
I think there are two remaining tasks here @richardhuaaa @Bren2010.
WDYT the rules should be @richardhuaaa @Bren2010? On client instantiation, if
|
My assumption here is that the old key package is invalidated as soon as the new key package is uploaded.
I believe the property we want (which one-time key packages would have achieved) is that the private key data is deleted from the receiving client as soon as possible after it is consumed (i.e., forward secrecy is achieved as soon as possible after a welcome is received). The non-time-based approach seems to achieve a shorter time window, is more efficient with network resources, as well as requires less book-keeping. Some other thoughts that apply to both approaches:
|
I like the idea of just rotating any time we receive a Welcome. On board for this approach. Agreed that we need some sort of grace period before we delete an old key package. Maybe we keep one past KP around on the client? That guarantees that we've synced Welcomes before we delete anything. I'd also be fine with a time-based approach. In either case I think we'll need to add some bookkeeping on our end. The OpenMLS store doesn't really allow for "list all my key packages" operations, so we'll need to keep track of the KeyPackageRefs in our DB so that we can find the ones to delete. |
No description provided.
The text was updated successfully, but these errors were encountered: