Skip to content

Conversation

@ariard
Copy link

@ariard ariard commented Oct 20, 2020

See CVE-2020-26895 for context.

Note, the requirement is on every remote signature reception instead of a global note. We make this a reception requirement, which doesn't prevent implementation to harden by normalizing to low-S at transactions broadcasting.

The recipient:
- if `signature` is incorrect:
- if `signature` is incorrect OR non-compliant with LOW-S-standard rule<sup>[LOWS](https://github.com/bitcoin/bitcoin/pull/6769)</sup>:

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: extra new line

@rustyrussell
Copy link
Collaborator

Ack. Sometimes you just gotta repeat yourself.

Copy link
Collaborator

@Roasbeef Roasbeef left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 🐲

@ariard

This comment was marked as abuse.

Copy link
Collaborator

@t-bast t-bast left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ACK c93d772

@t-bast
Copy link
Collaborator

t-bast commented Nov 3, 2020

Merging according to spec meeting decision.

@t-bast t-bast merged commit 01f29bf into lightning:master Nov 3, 2020
SomberNight added a commit to SomberNight/electrum that referenced this pull request May 27, 2024
The low-S rule for ecdsa signatures is mandated by Bitcoin Core policy/standardness (though not by consensus). If we get signatures from untrusted sources, we should mandate they obey the policy rules. (e.g. from LN peers)

Note that we normalize the signatures in the sig format conversion methods (DER <-> (r,s) <-> sig64).

The BOLTs treat high-S signatures as invalid, and this changes our behaviour to that.
(previously we would silently normalize the S value)

see bitcoin/bitcoin#6769
see lightning/bolts#807
ahmedbodi pushed a commit to ahmedbodi/electrum-hemis that referenced this pull request Aug 28, 2024
The low-S rule for ecdsa signatures is mandated by Bitcoin Core policy/standardness (though not by consensus). If we get signatures from untrusted sources, we should mandate they obey the policy rules. (e.g. from LN peers)

Note that we normalize the signatures in the sig format conversion methods (DER <-> (r,s) <-> sig64).

The BOLTs treat high-S signatures as invalid, and this changes our behaviour to that.
(previously we would silently normalize the S value)

see bitcoin/bitcoin#6769
see lightning/bolts#807
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants