Account Handling #485
Labels
Component / Proxies
Component / Tooling
Issues that benefit from external tooling
Flag / Security
State / In discussion
Problem Definition
Raiden needs to create signatures on behalf of the user. The interaction model doesn't allow to actively query for account passwords on-demand. This is different from the designed account interaction model in ethereum, where wallets can ask the user for the account unlock password on demand in order to sign transactions.
Keeping the account password and/or privatekey in memory is a potential security risk for the user's funds. We should aim to minimize the exposure.
Solution
There are two potential paths that I can think of at the moment, both of which are independent:
The interaction could be, that in order to
join
a token network, an account assistant asks the user for the amount of ERC20 funds that shall be used and a recommendation of an ETH amount for gas for on-chain transactions. The funding of the special purpose account would then happen via regular interactive unlock requests. The special purpose account can stay unlocked.By separating memory of the main process and the signing process we could achieve further hardening: leaking memory of the (more complex) main process would not expose the privatekey that is used for signing.
The text was updated successfully, but these errors were encountered: