-
-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SpendingCondition: use ripemd160(length, sha3(bytecode)) instead of just using ripemd160 #242
Comments
Yes, related. But we still need to do the same for the addressing scheme. |
One proposal after all the madness today, and that I discovered that the solidity abi encoder doesn't hash the length of a dynamic @johannbarbie What do you think? :) |
in general not a bad idea. |
ideally we would use |
@johannbarbie I guess we should do it the right way before the migration, otherwise it would be a breaking change later, right? |
just a joke. that's ok |
bytecodeMerkleRoot = merkleized array of opcodes? |
nope, but @peara working on it here: leapdao/solEVM-enforcer#117 |
ah, I see it should be exactly the same as in solEVM |
@johannbarbie @pinkiebell can someone point me out why we need length in here just to produce hash? |
@troggy This helps us securing the validation of proofs. If we know the length, we know the tree depth and therefore an attacker won't be able to send us bogus-length proofs for a 'theoretical' birthday attack |
forgive me my ignorance, can you explain how this hash will be used later on? What do you mean by "If we know the length" in the context of this issue? |
@troggy |
From the Ops Tactical: decided to go with |
Bounty
leap-node should use
ripemd160(length, sha3(bytecode))
for spencon¹ addressesScope
checkSpendingCondition
Deliverables
Gain for the project
Publicly visible delivery
Roles
bounty worker: name / 50%
bounty reviewer: name / 50% (security related)
¹ — Spending Condition
The text was updated successfully, but these errors were encountered: