Replay attacks of proof-authorised account updates across multiple networks #13689
MartinOndejka
started this conversation in
Ideas
Replies: 2 comments 4 replies
-
How? Can you elaborate on that? |
Beta Was this translation helpful? Give feedback.
2 replies
-
No.
No. The easiest way would be to add domain separation for the account update hash prefix, which would be exactly analogous to what we do for signatures |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
In the zkapp MIP, the replay attacks measures mostly revolve around correct nonce. Currently to prevent replaying of signed commands from berkeley to mainnet, there is a custom salt for hashing, which will create unique signature for any network. This will work also for signature-authorised account updates because of the unique signature, but what about the proof-authorised account updates? The nonce precondition can be bypassed easily. Does the
use_full_commitment
play role in the proof in some way so the fee payer hash (with network salt) is included? If not is there some another plan to prevent replaying of berkeley account updates on mainnet after hardfork?Beta Was this translation helpful? Give feedback.
All reactions