Skip to content

Conversation

@kdenhartog
Copy link
Contributor

Some options to use here would be UUIDv4 (122 bits of entropy - 128 bits with 6 bits fixed), a SHA-256 hash of the ephemeral public key, or a CSPRNG generated number.

Some options to use here would be UUIDv4 (122 bits of entropy - 128 bits with 6 bits fixed), a SHA-256 hash of the ephemeral public key, or a CSPRNG generated number.
@kdenhartog
Copy link
Contributor Author

cc @pedrouid @haardikk21 @bumblefudge related to #206

@bumblefudge
Copy link
Collaborator

Makes sense. I can add a security considerations section to 171 if the group agrees on this req.

Where does "randomness-aaS" fit in the threat model? Hehe

@kdenhartog
Copy link
Contributor Author

Where does "randomness-aaS" fit in the threat model? Hehe

In my mind that seems like a valid way to generate a session Id, but likely an implementation detail.

@bumblefudge bumblefudge merged commit db6f1ba into ChainAgnostic:master Feb 23, 2023
@kdenhartog kdenhartog deleted the patch-1 branch February 28, 2023 20:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants