Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Validator key encryption #151

Open
edisonz0718 opened this issue Sep 27, 2024 · 1 comment
Open

Validator key encryption #151

edisonz0718 opened this issue Sep 27, 2024 · 1 comment
Assignees
Labels
security security fix or enhancement

Comments

@edisonz0718
Copy link
Contributor

Description and context

story client and cosmos clients in general use un-encrypted validator key files. This can be a security risk especially for bigger validators. We should provide better options for validators to safeguard their keys.

Suggested solution

There are certain existing solutions in cosmos ecosystem. But some of them only support ed25519 keys. tmkms can be an initial option since it requires no changes to the story client code. But the remote signing may not be reliable especially in unreliable network and faulty hardware.

A better approach is to load the encrypted keys and a separate passphrase from a remote server during the node startup and use the passphrase to decrypt and store the keys in memory.

Definition of done

Explore and find or design the right solution
Fully implement and test the solution

@LeoHChen LeoHChen assigned 0xHansLee and unassigned leeren Feb 23, 2025
@LeoHChen LeoHChen added the security security fix or enhancement label Feb 23, 2025
@LeoHChen
Copy link
Member

In this document, we also recommended plaintext private key in .env file, which should be avoided. Please research and add support of encrypted key support.

https://docs.story.foundation/docs/validator-operations#overview

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security security fix or enhancement
Projects
None yet
Development

No branches or pull requests

4 participants