revault / practical-revault

Version 0 specifications for a Revault deployment
Creative Commons Attribution 4.0 International
33 stars 9 forks source link

Ceremony - how to set up a secure Revault infrastructure #56

Open kloaec opened 3 years ago

kloaec commented 3 years ago

WORK-IN-PROGRESS - DO NOT USE (yet)

THERE IS NOT SUCH THING AS PERFECT SECURITY. thIs iS NoT SEcuRitY ADviCe

Table of content:

  1. Rationale
  2. Revault 2.1. Vocabulary 2.2. The Revault deployment 2.3. Secrets
  3. Key generation and verification 3.1. Shopping list 3.2. Pre-ceremony work 3.3. The Ceremony 3.4. Sharing the secrets and pub keys 3.5. Testing
  4. Post-ceremony

Rationale

Revault is about going further than simple key management security. The protocol adds logic and rights management for delegating, spending and securing funds. That said, key management is still important in Revault. Revault states that everybody-but-one-participant can be corrupt, the system still works. Still, we want to help clients/users to set up the protocol correctly, with best security practice. We try to keep a trail for forensic should a critical failure happen, helping the client understand what went wrong. The Ceremony, as the rest of the Revault architecture, is designed to defend against very motivated and capable attackers.

Revault

Vocabulary

The Revault deployment

Secrets

Key generation and verification

shopping list

Pre-ceremony work for all participants (may be assisted by Revault team)

The Ceremony :champagne:

darosior commented 3 years ago

Should the room be naked and checked its cavities as well ?

kloaec commented 3 years ago

Still a lot to do, and decide. Questions to discuss on Monday: