Skip to content

Conversation

@akileshtangella
Copy link
Contributor

@akileshtangella akileshtangella commented Jan 3, 2022

Signing hash(nonce, publicKey)

Copy link
Contributor

@drewstone drewstone left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we make sure to bound more nonce updates for all proposals necessary including this one?

function transferOwnershipWithSignature(address newOwner, bytes memory sig) public {
function transferOwnershipWithSignature(address newOwner, uint32 nonce, bytes memory sig) public {
require(refreshNonce < nonce, "Invalid nonce");
require(nonce <= refreshNonce + 1, "Nonce must increment by 1");
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We need to add checks that nonce doesn't increase tremendously (causing overflow attack).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oops I had it backwards. This looks good.

@akileshtangella
Copy link
Contributor Author

Can we make sure to hound more nonce updates for all proposals necessary including this one?

What does hound more nonce updates mean? I didn't understand.

@drewstone
Copy link
Contributor

Bound*

@akileshtangella
Copy link
Contributor Author

Bound*

Ah ok cool.

@drewstone drewstone merged commit 17bf312 into main Jan 4, 2022
@drewstone drewstone deleted the akilesh/refresh-nonce branch November 3, 2022 21:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants