Crates.io | tofnd |
lib.rs | tofnd |
version | 1.0.1 |
source | src |
created_at | 2023-02-25 04:48:41.814587 |
updated_at | 2024-07-13 07:49:09.416378 |
description | A cryptographic signing service, used by the Axelar network |
homepage | |
repository | |
max_upload_size | |
id | 794169 |
size | 362,098 |
Tofnd is a gRPC server written in Rust that wraps the tofn cryptography library.
git clone git@github.com:axelarnetwork/tofnd.git --recursive
Install protoc
# Ubuntu
sudo apt install protobuf-compiler
# MacOS
brew install protobuf
Pre-built releases can be found here
To build yourself, run:
cargo build --release --locked
Run tests:
cargo test --release
Generate golden files for relevant tests:
GOLDIE_UPDATE=1 cargo test --release
# install tofnd at ./target/release/tofnd
cargo install --locked --path . && cd ./target/release
# init tofnd
./tofnd -m create
# IMPORTANT: store the content of ./.tofnd/export file at a safe, offline place, and then delete the file
rm ./.tofnd/export
# start tofnd daemon
./tofnd
Terminate the server with ctrl+C
.
By default, tofnd
prompts for a password from stdin immediately upon launch. This password is used to encrypt on-disk storage. It is the responsibility of the user to keep this password safe.
Users may automate password entry as they see fit. Some examples follow. These examples are not necessarily secure as written---it's the responsibility of the user to secure password entry.
# feed password from MacOS keyring
security find-generic-password -a $(whoami) -s "tofnd" -w | ./tofnd
# feed password from 1password-cli
op get item tofnd --fields password | ./tofnd
# feed password from Pass
pass show tofnd | ./tofnd
# feed password from environment variable `PASSWORD`
echo $PASSWORD | ./tofnd
# feed password from a file `password.txt`
cat ./password.txt | ./tofnd
Sophisticated users may explicitly opt out of password entry via the --no-password
terminal argument (see below). In this case, on-disk storage is not secure---it is the responsibility of the user to take additional steps to secure on-disk storage.
We use clap to manage command line arguments.
Users can specify:
--directory
or -d
to specify a full or a relative path. If no argument is provided, then the environment variable TOFND_HOME
is used. If no environment variable is set either, the default ./tofnd
directory is used.mnemonic
operations for their tofnd
instance (default is Existing
).
For more information, see on mnemonic options, see Mnemonic.tofnd
expects a password from the standard input. Users that don't want to use passwords can use the --no-password
flag. Attention: Use --no-password
only for testing .A cryptographic signing service
USAGE:
tofnd [FLAGS] [OPTIONS]
FLAGS:
--no-password Skip providing a password. Disabled by default. **Important note** If --no-password is set, the
a default (and public) password is used to encrypt.
-h, --help Prints help information
-V, --version Prints version information
OPTIONS:
-a, --address <ip> [default: 0.0.0.0]
-d, --directory <directory> [env: TOFND_HOME=] [default: .tofnd]
-m, --mnemonic <mnemonic> [default: existing] [possible values: existing, create, import, export]
-p, --port <port> [default: 50051]
To setup a tofnd
container, use the create
mnemonic command:
docker-compose run -e MNEMONIC_CMD=create tofnd
This will initialize tofnd
, and then exit.
To run a tofnd
daemon inside a container, run:
docker-compose up
We use data containers to persist data across restarts. To clean up storage, remove all tofnd
containers, and run
docker volume rm tofnd_tofnd
For testing purposes, docker-compose.test.yml
is available, which is equivelent to ./tofnd --no-password
. To spin up a test tofnd
container, run
docker-compose -f docker-compose.test.yml up
auto
commandIn containerized environments the auto
mnemonic command can be used. This command is implemented in entrypoint.sh
and does the following:
tofnd
server.tofnd
server.TOFND_HOME/export
---rename this file to TOFND_HOME/import
so as to unblock future executions of tofnd. Then launch tofnd
server.The rationale behind auto
is that users can frictionlessly launch and restart their tofnd nodes without the need to execute multiple commands.
auto
is currently the default command only in docker-compose.test.yml
, but users can edit the docker-compose.yml
to use it at their own discretion.
Attention: auto
leaves the mnemonic on plain text on disk. You should remove the TOFND_HOME/import
file and store the mnemonic at a safe, offline place.
Tofnd
uses the tiny-bip39 crate to enable users manage mnemonic passphrases. Currently, each party can use only one passphrase.
The command line API supports the following commands:
Existing
Starts the gRPC daemon using an existing mnemonic; Fails if no mnemonic exist.
Create
Creates a new mnemonic, inserts it in the kv-store, exports it to a file and exits; Fails if a mnemonic already exists.
Import
Prompts user to give a new mnemonic from standard input, inserts it in the kv-store and exits; Fails if a mnemonic exists or if the provided string is not a valid bip39 mnemonic.
Export
Writes the existing mnemonic to <tofnd_root>/.tofnd/export and exits; Succeeds when there is an existing mnemonic. Fails if no mnemonic is stored, or the export file already exists.
We use the zeroize crate to clear sensitive info for memory as a good practice. The data we clean are related to the mnemonic:
Note that, tiny-bip39 also uses zeroize
internally.
To persist information between different gRPCs (i.e. keygen and sign), we use a key-value storage based on sled.
Tofnd
uses an encrypted mnemonic KV Store which stores the entropy of a mnemonic passphrase. This entropy is used to derive user's keys. The KV Store is encrypted with a password provided by the user. The password is used to derive a key that encrypts the KV Store.
For an implementation of the GG20 threshold-ECDSA protocol,
see this version of tofnd. The GG20 protocol implementation should not be considered ready for production since it doesn't protect against recently discovered attacks on the protocol implementation. This was removed from tofnd
as it is not being used in the Axelar protocol.
All crates licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.