Skip to content

Make rand a dev-dependency #353

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 6 commits into from
Jul 23, 2019

Conversation

TheBlueMatt
Copy link
Collaborator

This moves the two places we called rand in regular operation into parameters, making rand a dev-dependency and (hopefully) fully supporting WASM. There's still a few things to do tomorrow, but this is 95% there.

@TheBlueMatt
Copy link
Collaborator Author

Alternative to #352.

@elichai
Copy link
Contributor

elichai commented Jul 19, 2019

Looks cool :)
if you want you use use this opportunity to replace the rand crate with a smaller one because you only use the fill_bytes anyway so there's no need to import and compile all of the different random sources you can just import rand_os for example (which is 10th the size of rand)

@TheBlueMatt
Copy link
Collaborator Author

I think for portability (eg hardware wallets or possible mobile devices or other embedding) reasons we probably don't want to use rand at all.

@elichai
Copy link
Contributor

elichai commented Jul 19, 2019

I meant in the dev dependencies

@TheBlueMatt TheBlueMatt added this to the 0.0.11 milestone Jul 19, 2019
@TheBlueMatt TheBlueMatt changed the title (WIP) Make rand a dev-dependency Make rand a dev-dependency Jul 19, 2019
@TheBlueMatt
Copy link
Collaborator Author

Should be ready for review now.

Copy link
Contributor

@elichai elichai left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Other than the things I commented ACK 2a1813b

let ephemeral_key = match SecretKey::from_slice(get_slice!(32)) {
Ok(key) => key,
Err(_) => return,
};

let mut crypter = if get_slice!(1)[0] != 0 {
let their_pubkey = match PublicKey::from_slice(get_slice!(33)) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This will fail a lot.
Every time the first byte won't be 0x02 or 0x03 it will fail.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe add a function that generates a Secret Key and creates a Public Key from it.
or hard code 0x02 and randomize the other 32 bytes. (the first one will at least guarantee success)

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yea, this test isnt really great, but its also testing very small surface area, so Im not gonna worry too much about it.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Edit: As you told me before, get_slice!() doesn't use randomness.
So maybe using 0x02/0x03 as the first byte and the rest from the provided data should cover most errors.

@@ -1309,7 +1308,8 @@ fn do_channel_reserve_test(test_recv: bool) {
let secp_ctx = Secp256k1::new();
let session_priv = SecretKey::from_slice(&{
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same.
You can use SecretKey::new(&mut Rng)

@TheBlueMatt TheBlueMatt force-pushed the 2019-07-no-rand branch 3 times, most recently from 56b2398 to 630a3ba Compare July 22, 2019 21:38
Copy link

@ariard ariard left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm just a bit skeptical about starting_time in the KeysManager interface. That's said that just our own KeysManager and I'm pretty sure users will come with their own KeysInterface, but we should be at least more clear on seed storage requirements.

Just slightly review the changes on the fuzzing tests.

/// starting_time isn't strictly required to actually be a time, but it must absolutely,
/// without a doubt, be unique to this instance. ie if you start multiple times with the same
/// seed, starting_time must be unique to each run. Thus, the easiest way to achieve this is to
/// simply use the current time (with very high precision).
Copy link

@ariard ariard Jul 23, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmmm isn't this change making starting time part of user channel keys ? And now he would have to backup the provided current time, maybe with nanos precision, that's not great.. Furthermore I understand why you want a unique seed + nonce for every lightning instance but not for multiple run of the same instance. You want to be able to derive channel_keys again

Reading this whole interface again, IMO we should do better to explain to the user what he need to reliably backup his funds.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cleaned up the comment. Is it better now?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Well I would add a last sentence like "You MUST backup the seed. Your seed is needed to recover outpoints closing the channel (destination_key, shutdown_pubkey). The seed alone can't recover in-channel funds, so you MUST backup individual channel too. Starting time reason is to get new ephemeral key data but can't help you to know channel state."

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we also ask user to backup software version in case we update our derivation scheme?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ehh, dont really want to commit to a versioning scheme just yet, updated the docs to indicate that we will have something in the future, but for now, expect funds loss when upgrading.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Okay, seems good for me, that's clear enough for users they are on their own here!

@@ -878,7 +878,8 @@ mod tests {
// - client now sends id 1 update_add_htlc and commitment_signed (CHECK 7 duplicate)
//
// 0c007d - connect a block with one transaction of len 125
// 02000000013f00000000000000000000000000000000000000000000000000000000000000000000000000000080020001000000000000220020e2000000000000000000000000000000000000000000000000000000000000006cc10000000000001600142e0000000000000000000000000000000000000005000020 - the commitment transaction for channel 3f00000000000000000000000000000000000000000000000000000000000000
// 02000000013f0000000000000000000000000000000000000000000000000000000000000000000000000000008002000100000000000022002090000000000000000000000000000000000000000000000000000000000000006cc10000000000001600145c0000000000000000000000000000000000000005000020 - the commitment transaction for channel 3f00000000000000000000000000000000000000000000000000000000000000
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Quick git blame would point towards me with a2b6a76, IIRC with this one, I've added few connect blocks more to hit delay of passing failures backaward. This test has passed the travis, does it the mix of our changes which breaks it ?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably? It doesn't really matter all that much.

let mut key = [0u8; 32];
rng::fill_bytes(&mut key);

pub fn new_outbound(their_node_id: PublicKey, ephemeral_key: SecretKey) -> PeerChannelEncryptor {
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is part of our public interface, shouldn't this get its own comment, specially on what we require in term of entropy for the new parameter ephemeral_key ?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh I saw the comment in peer_handler, but maybe you could invite to read the one there!

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

peer_channel_encryptor is only exposed privately? Otherwise it would be a build failure due to lack of docs.

let high = if low == 0 {
self.peer_counter_high.fetch_add(1, Ordering::AcqRel)
} else {
self.peer_counter_high.load(Ordering::Acquire)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh that's interesting, it means on 32-bit platform, we have a 2^1024 monotonic counter right to use as sha-256 input for ephemeral key generation ?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Where'd you get 2^1024? 2 32-bit counters is a 64-bit counter.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You're right, I've screwed up my calculation

@@ -92,7 +92,10 @@ pub enum Event {
/// Used to indicate that ChannelManager::process_pending_htlc_forwards should be called at a
/// time in the future.
PendingHTLCsForwardable {
/// The amount of time that should be waited prior to calling process_pending_htlc_forwards
/// The minimum amount of time that should be waited prior to calling
/// process_pending_htlc_forwards. To increase the effort required to correlate payments,
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But if you're already on the payment path, you can already do decorrelation attacks with hashes ? You're trying to break what kind of analysis here ?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm...I guess I haven't formalized it, but there's almost certainly some stuff you can learn if the timing is super, super consistent. eg you could learn the number of hops that something took just by looking at the timing. Hiding that at least somewhat or for individual payments.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would argue if you're two spots on the same payment path, you can guess the number of hops by recomputing the per-hop fees between your A and your B given fees are public. Out-of-topic, as you said if user is willingly to wait shouldn't hurt.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Right, but a user could have a more privacy-conscious routing algorithm, and we don't want to reveal info unless we have to. I think its generally a good idea, but agreed more study and a formal threat model would be better.

They were only used for ensuring generated keys were globally
unique (ie in case the user opened the same seed at a different
time, we need generated keys to be globally unique).

Instead, we let the user specify a time in secs/nanos, and provide
a precise meaning for the user to understand.
This removes the bulk of our reliance on the rand crate in non-test
envs, paving a way towards a syscall-less rust-lightning and WASM.
Since this is a breaking change for full_stack_target (and several
fuzz targets), go ahead and make other changes to make things more
distinct.
This removes the last calls to rand outside of test and moves the
dep to a dev-dependency, dropping our fuzz rng wrapper in the
process.
@TheBlueMatt TheBlueMatt merged commit cd8f1de into lightningdevkit:master Jul 23, 2019
@jkczyz jkczyz mentioned this pull request Jan 31, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants