105 lines
4.9 KiB
Markdown
105 lines
4.9 KiB
Markdown
|
# Key Management
|
||
|
|
||
|
Lighthouse uses a _hierarchical_ key management system for producing validator
|
||
|
keys. It is hierarchical because each validator key can be _derived_ from a
|
||
|
master key, making the validators keys _children_ of the master key. This
|
||
|
scheme means that a single 12-word mnemonic can be used to backup all of your
|
||
|
validator keys without providing any observable link between them (i.e., it is
|
||
|
privacy-retaining). Hierarchical key derivation schemes are common-place in
|
||
|
cryptocurrencies, they are already used by most hardware and software wallets
|
||
|
to secure BTC, ETH and many other coins.
|
||
|
|
||
|
## Key Concepts
|
||
|
|
||
|
We defined some terms in the context of validator key management:
|
||
|
|
||
|
- **Mnemonic**: a string of 12-words that is designed to be easy to write down
|
||
|
and remember. E.g., _"enemy fog enlist laundry nurse hungry discover turkey holiday resemble glad discover"_.
|
||
|
- Defined in BIP-39
|
||
|
- **Wallet**: a wallet is a JSON file which stores an
|
||
|
encrypted version of a mnemonic.
|
||
|
- Defined in EIP-2386
|
||
|
- **Keystore**: typically created by wallet, it contains a single encrypted BLS
|
||
|
keypair.
|
||
|
- Defined in EIP-2335.
|
||
|
- **Voting Keypair**: a BLS public and private keypair which is used for
|
||
|
signing blocks, attestations and other messages on regular intervals,
|
||
|
whilst staking in Phase 0.
|
||
|
- **Withdrawal Keypair**: a BLS public and private keypair which will be
|
||
|
required _after_ Phase 0 to manage ETH once a validator has exited.
|
||
|
|
||
|
## Overview
|
||
|
|
||
|
The key management system in Lighthouse involves moving down the above list of
|
||
|
items, starting at one easy-to-backup mnemonic and ending with multiple
|
||
|
keypairs. Creating a single validator looks like this:
|
||
|
|
||
|
1. Create a **wallet** and record the **mnemonic**:
|
||
|
- `lighthouse account wallet create --name wally --passphrase-file wally.pass`
|
||
|
1. Create the voting and withdrawal **keystores** for one validator:
|
||
|
- `lighthouse account validator create --wallet-name wally --wallet-passphrase wally.pass`
|
||
|
|
||
|
|
||
|
In step (1), we created a wallet in `~/.lighthouse/wallets` with the name
|
||
|
`mywallet`. We encrypted this using a pre-defined password in the
|
||
|
`mywallet.pass` file. Then, in step (2), we created a new validator in the
|
||
|
`~/.lighthouse/validators` directory using `mywallet` (unlocking it with
|
||
|
`mywallet.pass`) and storing the passwords to the validators voting key in
|
||
|
`~/.lighthouse/secrets`.
|
||
|
|
||
|
Thanks to the hierarchical key derivation scheme, we can delete all of the
|
||
|
aforementioned directories and then regenerate them as long as we remembered
|
||
|
the 12-word mnemonic (we don't recommend doing this, though).
|
||
|
|
||
|
Creating another validator is easy, it's just a matter of repeating step (2).
|
||
|
The wallet keeps track of how many validators it has generated and ensures that
|
||
|
a new validator is generated each time.
|
||
|
|
||
|
## Detail
|
||
|
|
||
|
### Directory Structure
|
||
|
|
||
|
There are three important directories in Lighthouse validator key management:
|
||
|
|
||
|
- `wallets/`: contains encrypted wallets which are used for hierarchical
|
||
|
key derivation.
|
||
|
- Defaults to `~/.lighthouse/wallets`
|
||
|
- `validators/`: contains a directory for each validator containing
|
||
|
encrypted keystores and other validator-specific data.
|
||
|
- Defaults to `~/.lighthouse/validators`
|
||
|
- `secrets/`: since the validator signing keys are "hot", the validator process
|
||
|
needs access to the passwords to decrypt the keystores in the validators
|
||
|
dir. These passwords are stored here.
|
||
|
- Defaults to `~/.lighthouse/secrets`
|
||
|
|
||
|
When the validator client boots, it searches the `validators/` for directories
|
||
|
containing voting keystores. When it discovers a keystore, it searches the
|
||
|
`secrets/` dir for a file with the same name as the 0x-prefixed hex
|
||
|
representation of the keystore public key. If it finds this file, it attempts
|
||
|
to decrypt the keystore using the contents of this file as the password. If it
|
||
|
fails, it logs an error and moves onto the next keystore.
|
||
|
|
||
|
The `validators/` and `secrets/` directories are kept separate to allow for
|
||
|
ease-of-backup; you can safely backup `validators/` without worrying about
|
||
|
leaking private key data.
|
||
|
|
||
|
### Withdrawal Keypairs
|
||
|
|
||
|
In Eth2 Phase 0, withdrawal keypairs do not serve any immediate purpose.
|
||
|
However, they become very important _after_ Phase 0: they will provide the
|
||
|
ultimate control of the ETH of withdrawn validators.
|
||
|
|
||
|
This presents an interesting key management scenario: withdrawal keys are very
|
||
|
important, but not right now. Considering this, Lighthouse has adopted a
|
||
|
strategy where **we do not save withdrawal keypairs to disk by default** (it is
|
||
|
opt-in). Instead, we assert that since the withdrawal keys can be regenerated
|
||
|
from a mnemonic, having them lying around on the file-system only presents risk
|
||
|
and complexity.
|
||
|
|
||
|
At the time or writing, we do not expose the commands to regenerate keys from
|
||
|
mnemonics. However, key regeneration is tested on the public Lighthouse
|
||
|
repository and will be exposed prior to mainnet launch.
|
||
|
|
||
|
So, in summary, withdrawal keypairs can be trivially regenerated from the
|
||
|
mnemonic via EIP-2333 so they are not saved to disk like the voting keypairs.
|