Derived keys should have different authentication levels #115
Replies: 3 comments 3 replies
-
|
I think keys with different permission levels is a great idea. At the moment, derived keys can have any expiration but Identity will only issue keys with a 1-4 week expiration time. I think I would prefer a more granular access level but I'm not positive. |
Beta Was this translation helpful? Give feedback.
-
|
What about something like this? 1 "Profile": update profile only. |
Beta Was this translation helpful? Give feedback.
-
|
Doesnt the change @lazynina committed partially do this ? Ive not looked at the code in detail yet but I believe it offers different limits per transaction type. Seems its freq limit per type though.
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
First of all, thank you very much to @AeonSw4n and @maebeam for the great work they are doing.
Continuing the discussion on Discord, I think that current plans for one-size-fits-all derived keys should be improved.
A derived key that expires shortly (maybe a few weeks or a month) resolves the problem of limiting the attack surface inherent to derived keys.
But this isn't practical for third-party apps that only need to create "social" transactions (post, like, etc.).
A social third-party app (think Hootsuite or Buffer) would need to request a newly derived key to all its user every few weeks.
I propose that derived keys should have at least two authentication levels. Let's name them "coin" and "social".
Transactions signed with a "social" derived key wouldn't be posted to the blockchain unless they are social-network related only, and vice versa.
The expiration date for "coin" derived keys should be a few weeks/a month. The expiration date for "social" derived keys should be a few months/a year.
Beta Was this translation helpful? Give feedback.
All reactions