add DSA to pycryptopp - serialize pubkeys with less fluff #331
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#331
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This is necessary for #217 -- "DSA-based mutable files -- small URLs, fast file creation".
done
I need to actually make the new version of pycryptopp available and packaged and so forth, which I'm going to do, actually, by automating that process with buildslaves -- #281 (buildslaves for pycryptopp).
Then I'll reclose this.
we're still waiting on no-overhead serialization: http://allmydata.org/trac/pycryptopp/ticket/3 , since I think we need this for DSA-based mutable files.
Hm, I suppose the best way to make progress on this is to write up some unit tests which exactly specify the sort of DSA features we require out of pycryptopp. I suppose:
It looks like pycryptopp trunk (and 0.5.1) has almost everything I want, the only piece left is for serialized verifier keys to be small (I'm expecting 48 bytes, I observe 246 bytes).
I've attached a patch with some new test cases, including one that checks the size of the serialized verifier key. This test case fails.
EC-DSA-192 is nice and fast! On my workstation (fluxx):
Attachment size-tests.patch (37379 bytes) added
additional tests, including a failing "serialized verifying key is too fluffy" test
add DSA to pycryptoppto add DSA to pycryptopp - serialize pubkeys with less fluffdo we have an ETA on this? I want to look at signed-introducer-announcements,
and I need the pubkey serialization scheme to be nailed down before I can
finalize the certificate format.
#68, #466, #295, #467, #217, and Accounting are all blocked on this one.
Let's see, I have the following other things that are currently sort of ahead of this one in my queue: immutable file checking, contributing a bunch of patches or bug reports or so on to nevow, setuptools, pyflakes, etc., and writing up a proposal for the SHA-3 project. Oh, and automating the building of binaries of pycryptopp. And contributing to the project of automating darcs benchmarking and building packages.
However, I am highly motivated by this ticket -- I enjoy hacking on pycryptopp. I already have written some code for this but it isn't complete and tested.
So, um, I need to think more carefully and schedule the order of these things. Perhaps Brian and I should pair-program on immutable file checker.
So, could you condense your decision tree down into a date that you can commit to? Two weeks from now? Four weeks? That would help me organize my own schedule.
Yes I can. I will so condense and commit soon.
Any luck with this? Could you provide a meta-ETA? :)
How about this: if you do lots of work on release management of Tahoe v1.3.0 next week (Sept. 8-12), then I'll work on pycryptopp and it will be ready for you to use by the following Monday -- Sept. 15.
ok, it's a deal. thanks!
Well, I'm sorry to say that this isn't done yet. It is mostly done, but there is a bug in my use of the Crypto++ API/memory management which makes it unusable until I debug it.
Furthermore, I think I should prioritize immutable checking and repair (#483 ?) over getting this working. So I now predict that I will have this working next Monday, the 22nd.
On the bright side, it occurs to me that you could proceed with the other tickets that you mentioned using the current ecdsa implementation in pycryptopp. The keys will be unnecessarily large, and I intend to change the API, but the basic functionality is already implemented so you might be able to go ahead and use it to implement those other features.
True, if I put a version identifier in the container format (to indicate that this value is a "fluffy" ECDSA-192 pubkey instead of an "unfluffy" one), then I can get started with the current code. There will be less code if I don't have to support both formats, so I might stall on starting that work until you've got this ticket done.
Speaking of which, please consider adding a one-byte version prefix to the serialized form. I think that may help later versions of the code, so tahoe can just pass a string to pycryptopp.ecdsa.pubkey_from_string() and not need to know that it has a fluffy, unfluffy, or expanded other-than-192bits alternate-serialization-scheme-of-the-future -serialized pubkey.
Monday the 22nd will be fine. Thanks!
It seems like this versioning should be done by the higher-layer code that uses pycryptopp and not by pycryptopp. This is because putting it in pycryptopp would add a byte (or so) the serialized forms, which might be unacceptable for some users of pycryptopp (including me), and because the higher-layer code knows better about related issues, such as if there are other changes that are all versioned together (Tahoe would use different pycryptopp serialization as well as different crypto, different capability formatting, etc.), or if it no longer cares about certain old versions, etc.
Ok, do you plan to support multiple APIs for deserializing pubkeys from
various eras of pycryptopp? A higher layer can remember which serialization
function it used to create the pubkey string, and it can record that in a
wrapper, but we need a clear (and stable) definition of what that function
means for that to be at all useful. I don't see how, say, Tahoe could manage
this without something like:
I can't write deployable code that uses the existing (fluffy) pubkey form if
that form is going to disappear.
(incidentally, I still don't know how to get this whole versioning thing
"right", but I'm starting to learn that it's important to leave some room in
the parse tree space, and that it's important to make early assumptions clear
so that later you can define that set of assumptions as "version 1" and build
a new "version 2" on top of it).
No, my plan was just to tell everyone who used the current pycryptopp API that if they upgraded to the new version of pycryptopp then their ECDSA-using code would break.
Probably "everyone" in that sentence would just be you and me.
ok, so that means I shouldn't ship (or push, really) any ECDSA-using code until you've finished with the defluffing work, because I have no way to make it forwards-compatible.
I'll refer to the current implementation of create_verifying_key_from_string() and its converse as "v0", and the implementation that you're working on as "v1". If we ever change it again in the future (say, to add support for non-192-bit keys), then I'll need you to retain the v1 code (possibly under a different function name, but preferably under the same name), and to add a new method with whatever "v2" implementation that you come up with later. Otherwise, I will have no way to make it backwards-compatible, and users will experience a "flag day" when everybody has to upgrade at the same time.
#466 is now blocked on this one.. the #466 code is ready to be pushed into trunk, as soon as #331 is closed (with the release of a new version of pycryptopp), and some brief catch-up-to-the-new-API work is done.
This is urgently important to allow Brian to do other tickets.
pycryptopp-0.5.13, released a week or two ago, added ecdsa! But then it got yanked, because the KDF (the code that interprets the random string you pass into
SigningKey
) is not yet in a form that Zooko feels comfortable supporting in the long run (and it's a significant compatibility issue, to make sure that generating a key from string ABC will keep generating the same key in the future).So close!
moving to code-mutable so I can find it more easily.
Zooko floated a KDF proposal to tahoe-dev last week, and nobody objected! That's progress, right?
We're abandoning implementation of ECDSA in favor of Ed25519: https://tahoe-lafs.org/trac/pycryptopp/ticket/75