-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secp256k1 support #13
base: master
Are you sure you want to change the base?
Conversation
I am stuck on this because there seems to be no way to tell hpack that secp256k1-haskell needs to be built with the ECDH build flag, see sol/hpack#372 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would prefer to not have Lightning network specific logic in the main code base. Shouldn't it be as simple as dropping in a new module, as you've done in src/Crypto/Noise/DH/Secp256k1.hs
?
@centromere Thanks for taking a look Alex! I would be happy to change the code, but I don't know how to accomplish this, since the rekeying scheme of Lightning makes the chaining keys diverge between sending/receiving. The codebase, as it is, only has one chaining key |
@centromere Any suggestions how I can proceed? |
I am trying to understand the Lightning spec a bit more, in relation to the proposed change. Is this what I should be reading? |
Yep, that is the spec and the relevant section. |
@centromere If there is any way I can help, please let me know. |
I see two separate issues to be considered. The first is whether to include secp256k1. The second is to have independent chaining keys for sending and receiving. I am okay with adding secp256k1. I am not yet sold on the idea of changing something this fundamental (a single CK) about Noise's design, but I am willing to listen. Will you be at RWC2020? |
@centromere I asked on #lightning-dev @ Freenode (IRC) and Roasbeef replied (he is one of the spec authors): http://gnusha.org/lightning-dev/2019-12-23.log (see around 11:25) I'll copy it here:
Also note that this protocol is being used on a lot of public nodes on the internet, that are indexed by sites such as https://1ml.com/ |
@ysangkok Would you make a dedicated post on the mailing list regarding having separate chaining keys for sending and receiving? I do not feel qualified to evaluate the soundness of this approach. |
@centromere I have sent a mail to the list, but it may take a few days to appear because of greylisting. |
@centromere as always, please let me know if you have any questions |
Regarding new functions and datatypes, I would encourage you to add |
This needs to be squashed, and there are some minors issues, but I thought you might want to comment on the approach.