-
Notifications
You must be signed in to change notification settings - Fork 20
Limit subnet certificate delegations to depth 1 #239
Conversation
This speaks to a slightly broader issue with the specification, but if there are going to be different rules for a valid subnet delegation, as opposed to what is allowed in a valid delegation chain used for a client In the actual agent implementation, this change makes |
I don't quite understand the objection here; the validity rules for:
are already quite different. The encoding is different (plain CBOR vs hash trees), the rules for signatures are different (signing the representation-independent hash of a CBOR map vs signing the root has of the hash tree), and the side conditions are also different (how the delegations are signed, and how they are restricted). Now what has changed with the new |
I think all I really want is a section in the specification that offers a clear disambiguation about the different "delegation" types and what they should contain. It doesn't conflict with this proposal, but came to mind while I was reading it, based on my recent project that called for a close reading of the spec |
This reflects the following change in the interface spec: dfinity/interface-spec#239
This reflects the following change in the interface spec: dfinity/interface-spec#239
This reflects the following change in the interface spec: dfinity/interface-spec#239
As discussed in various meetings, the nested certificate delegations allowed by the spec aren't used, but have complicated the reasoning about some features (see discussions around delegations in #163 for example), and stating some properties (like the new subnet
read_state
requests). But we don't use nested delegations in practice and we don't have any plans to use them in the future. So this PR removes them.