You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 26, 2022. It is now read-only.
libp2p/specs#234 adds a new requirement to the spec, which we should implement here.
To prevent replay attacks & tampering of handshake messages, we sign the Noise HandshakeHash with the libp2p key and send the signature before any ciphertexts are exchanged over the secure channel. Each party will verify the signature against their own HandshakeHash, which proves that both parties have the same view of the handshake exchange and that nothing has been altered.
The text was updated successfully, but these errors were encountered:
libp2p/specs#234 adds a new requirement to the spec, which we should implement here.
To prevent replay attacks & tampering of handshake messages, we sign the Noise
HandshakeHash
with the libp2p key and send the signature before any ciphertexts are exchanged over the secure channel. Each party will verify the signature against their ownHandshakeHash
, which proves that both parties have the same view of the handshake exchange and that nothing has been altered.The text was updated successfully, but these errors were encountered: