Multi-Signature Workflow
The purpose of this tutorial is to provide an example of how to integrate key management on Casper accounts. This guide assumes previous completion of the Two-Party Multi-Signature Deploys tutorial, among other prerequisites. You will also need the Casper CLI client to use the make-deploy
, sign-deploy
, and send-deploy
Casper CLI client commands.
The session code provided in this tutorial should not be used in a production environment.
Incorrect account configurations could render accounts defunct and unusable, thus losing access to all the corresponding CSPR tokens.
Test any changes to an account in a test environment like Testnet before performing changes in a live environment like Mainnet.
Prerequisites
The following prerequisites are required for this workflow:
- Set up all the development environment prerequisites, including a funded account and the Casper CLI client
- Complete the Two-Party Multi-Signature Deploys workflow and set up the source account for multi-signature deploys
- Understand the Casper account-based model before proceeding
Session Code Required for Key Management
To manage an account's associated keys and thresholds, you must run session code that executes within the account's context. Note that the session code provided in this workflow is not a general-purpose program and needs to be modified for each use case.
Do not run these examples on Mainnet. Update each command for your environment.
Tutorial Workflow
Step 1: Clone the example Wasm for this workflow
The multi-sig GitHub repository contains session code that can be used for learning how to configure Casper accounts using associated keys and multi-signature deploys. Clone the repository and navigate to the corresponding folder.
git clone https://github.com/casper-ecosystem/tutorials-example-wasm/ && cd multi-sig
Step 2: Build the sample Wasm provided
Prepare your environment, build and test the session code provided with the following commands:
rustup update
make clean
make prepare
make test
Step 3: Increase the primary key's weight to set thresholds
This workflow starts by increasing the weight of the primary key from 1 to 3. To make account updates, a key's weight must equal or exceed the key_management
threshold. In a later step, you will add the associated accounts that will participate in signing deploys.
Retrieve the account hash of the primary key you are working with using a block explorer or the Casper CLI client.
casper-client account-address --public-key <INSERT_PUBLIC_KEY_HEX>
Update the weight of the primary key to 3 by calling the update_associated_keys.wasm
.
casper-client put-deploy --node-address https://rpc.testnet.casperlabs.io/ \
--chain-name "casper-test" \
--payment-amount 500000000 \
--secret-key $PATH/secret_key.pem \
--session-path target/wasm32-unknown-unknown/release/update_associated_keys.wasm \
--session-arg "associated_key:key='account-hash-<ACCOUNT_HASH_HEX_HERE>'" \
--session-arg "new_weight:u8='3'"
The primary key in this account should now have weight 3.
Account details
"Account": {
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"action_thresholds": {
"deployment": 1,
"key_management": 1
},
"associated_keys": [
{
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"weight": 3
}
],
"main_purse": "uref-8294864177c2c1ec887a11dae095e487b5256ce6bd2a1f2740d0e4f28bd3251c-007",
"named_keys": []
}
The table below summarizes the updates.
Threshold / Key | Previous weight | Current weight |
---|---|---|
deployment | 1 | 1 |
key_management | 1 | 1 |
Primary key (1ed5... ) | 1 | 3 |
Step 4: Update the account's action thresholds
Set up a multi-signature scheme for the account by updating the deployment
and key_management
thresholds. The update_thresholds.wasm
will take two arguments and set the deployment
threshold to 2 and the key_management
threshold to 3.
casper-client put-deploy \
--node-address https://rpc.testnet.casperlabs.io \
--chain-name casper-test \
--payment-amount 500000000 \
--secret-key $PATH/secret_key.pem \
--session-path target/wasm32-unknown-unknown/release/update_thresholds.wasm \
--session-arg "deployment_threshold:u8='2'" \
--session-arg "key_management_threshold:u8='3'"
The account's action thresholds would look like this:
"action_thresholds": {
"deployment": 2,
"key_management": 3
},
This account configuration requires a cumulative weight of 3 to manage keys and a cumulative weight of 2 to send deploys. For example, if two associated keys have weight 1, they must both sign and send the deploy as part of this account context. The cumulative weight of these two keys would not meet the threshold for key management.
Account details
"Account": {
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"action_thresholds": {
"deployment": 2,
"key_management": 3
},
"associated_keys": [
{
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"weight": 3
}
],
"main_purse": "uref-8294864177c2c1ec887a11dae095e487b5256ce6bd2a1f2740d0e4f28bd3251c-007",
"named_keys": []
}
The table below summarizes the updates.
Threshold / Key | Previous weight | Current weight |
---|---|---|
deployment | 1 | 2 |
key_management | 1 | 3 |
Primary key (1ed5... ) | 1 | 3 |
Step 5: Add associated keys to the primary account
To add an associated key to the primary account, use the add_account.wasm
provided. This example adds two keys to the primary account (account-hash-d89c*
): user_1
with account-hash-e2d0*
, and user_2
with account-hash-04a9*
.
casper-client put-deploy --node-address https://rpc.testnet.casperlabs.io/ \
--chain-name "casper-test" \
--payment-amount 500000000 \
--secret-key $PATH/secret_key.pem \
--session-path target/wasm32-unknown-unknown/release/add_account.wasm \
--session-arg "new_key:key='account-hash-e2d00525cac31ae2756fb155f289d276c6945b6914923fe275de0cb127bffee7" \
--session-arg "weight:u8='1'"
casper-client put-deploy --node-address https://rpc.testnet.casperlabs.io/ \
--chain-name "casper-test" \
--payment-amount 500000000 \
--secret-key $PATH/secret_key.pem \
--session-path target/wasm32-unknown-unknown/release/add_account.wasm \
--session-arg "new_key:key='account-hash-04a9691a9f8f05a0f08bd686f188b27c7dbcd644b415759fd3ca043d916ea02f" \
--session-arg "weight:u8='1'"
Now, the account has one primary key with weight 3, and two associated accounts, each with weight 1.
Account details
"Account": {
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"action_thresholds": {
"deployment": 2,
"key_management": 3
},
"associated_keys": [
{
"account_hash": "account-hash-04a9691a9f8f05a0f08bd686f188b27c7dbcd644b415759fd3ca043d916ea02f",
"weight": 1
},
{
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"weight": 3
},
{
"account_hash": "account-hash-e2d00525cac31ae2756fb155f289d276c6945b6914923fe275de0cb127bffee7",
"weight": 1
}
],
"main_purse": "uref-8294864177c2c1ec887a11dae095e487b5256ce6bd2a1f2740d0e4f28bd3251c-007",
"named_keys": []
}
- All associated keys should be kept incredibly secure to ensure the security and integrity of the account.
- After all associated keys and action thresholds have been set to the desired multi-signature scheme, the weight of the original primary key can be increased or lowered, depending on your use case. Be careful with this! If you lower the primary key's weight below the key management threshold, the account will require multiple signatures for key management. The account will be unusable if you do not have enough associated keys set up.
The table below summarizes the updates.
Threshold / Key | Previous weight | Current weight |
---|---|---|
deployment | 1 | 2 |
key_management | 1 | 3 |
Primary key (1ed5... ) | 1 | 3 |
Associated key (04a9... ) | N/A | 1 |
Associated key (e2d0... ) | N/A | 1 |
Step 6: Send a deploy from the primary account
This step sends a deploy containing Wasm (contract.wasm
), which adds a named key to the account. The source code for the Wasm comes from the hello-world repository. The deploy should succeed as the primary account has a weight of 3, which is greater than the deployment threshold.
casper-client put-deploy --chain-name casper-test \
--payment-amount 3000000000 \
--session-path tests/wasm/contract.wasm \
--secret-key $PATH/secret_key.pem \
--session-arg "my-key-name:string='primary_account_key'" \
--session-arg "message:string='Hello, World'"
The hello_world.wasm
will run and add a named key to the account.
"named_keys": [
{
"key": "uref-9b9ecaa9e5e235fc6955d4d528cb1b5b38f2d800f6cbbc55351131a3701b5a81-007",
"name": "my-key-name"
}
]
Step 7: Send a multi-signature deploy from an associated key
Given the multi-signature scheme set up in this example, two associated keys need to sign to send a deploy from one of the associated keys. This example uses the following commands to sign a deploy with multiple keys and send it to the network:
make-deploy
- creates and signs a deploy, saving the output to a filesign-deploy
- adds additional signatures for a multi-signature deploysend-deploy
- sends the deploy to the network
Similar to step 6, this example uses Wasm (contract.wasm
), which adds a named key to the account. The deploy originates from the primary account, specified with the --session-account
argument. The deploy needs two signatures to meet the deployment
weight equal to 2. Once both associated keys sign the deploy, either can send it to the network.
When using the --session-account
argument, specify the hex-encoded public key of the primary account context under which the session code will be executed.
One associated key creates and signs the deploy with the make-deploy
command, indicating the account context under which the session code will be executed.
casper-client make-deploy --chain-name casper-test \
--payment-amount 300000000 \
--session-path tests/wasm/contract.wasm \
--secret-key $PATH/user_1_secret_key.pem \
--session-arg "my-key-name:string='user_1_key'" \
--session-arg "message:string='Hello, World'" \
--session-account 01360af61b50cdcb7b92cffe2c99315d413d34ef77fadee0c105cc4f1d4120f986 \
--output hello_world_one_signature
The second associated key signs the deploy with sign-deploy
to meet the deployment threshold for the account.
casper-client sign-deploy -i hello_world_one_signature -k $PATH/user_2_secret_key.pem -o hello_world_two_signatures
The deploy can be sent to the network using the send-deploy
command:
casper-client send-deploy --node-address https://rpc.testnet.casperlabs.io -i hello_world_two_signatures
The hello_world.wasm
will run and add a named key to the account.
Removing a Compromised Key
This example shows how to remove a compromised key from an account. The example adds an associated key only to remove it using the remove_account.wasm
session code.
Remove keys with caution! Do not run this example on Mainnet.
Before removing a key, ensure the remaining associated keys can combine their weight to meet the threshold for key management. Otherwise, the account could become unusable. Changing key weights or adding new associated keys would only be possible by meeting the key management threshold. Proceed with caution.
Given the current setup, the primary account will add an associated key, and then remove it. In other use cases, associated keys may need to combine their signatures to send a multi-sig deploy that removes a key.
casper-client put-deploy --node-address https://rpc.testnet.casperlabs.io/ \
--chain-name "casper-test" \
--payment-amount 500000000 \
--secret-key $PATH/secret_key.pem \
--session-path target/wasm32-unknown-unknown/release/add_account.wasm \
--session-arg "new_key:key='account-hash-1fed34baa6807a7868bb18f91b161d99ebf21763810fe4c92e39775d10bbf1f8" \
--session-arg "weight:u8='1'"
Account details
"Account": {
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"action_thresholds": {
"deployment": 2,
"key_management": 3
},
"associated_keys": [
{
"account_hash": "account-hash-04a9691a9f8f05a0f08bd686f188b27c7dbcd644b415759fd3ca043d916ea02f",
"weight": 1
},
{
"account_hash": "account-hash-1fed34baa6807a7868bb18f91b161d99ebf21763810fe4c92e39775d10bbf1f8",
"weight": 1
},
{
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"weight": 3
},
{
"account_hash": "account-hash-e2d00525cac31ae2756fb155f289d276c6945b6914923fe275de0cb127bffee7",
"weight": 1
}
],
"main_purse": "uref-8294864177c2c1ec887a11dae095e487b5256ce6bd2a1f2740d0e4f28bd3251c-007",
"named_keys": []
}
The table below summarizes the updates after calling the add_account.wasm
.
Threshold / Key | Previous weight | Current weight |
---|---|---|
deployment | 1 | 2 |
key_management | 1 | 3 |
Primary key (1ed5... ) | 1 | 3 |
Associated key (04a9... ) | 1 | 1 |
Associated key (e2d0... ) | 1 | 1 |
Associated key (1fed... ) | N/A | 1 |
The remove_account.wasm
will remove the newly added account to demonstrate the possibility of removing associated keys that may have been compromised.
casper-client put-deploy --node-address https://rpc.testnet.casperlabs.io/ \
--chain-name "casper-test" \
--payment-amount 500000000 \
--secret-key $PATH/secret_key.pem \
--session-path target/wasm32-unknown-unknown/release/remove_account.wasm \
--session-arg "remove_key:key='account-hash-1fed34baa6807a7868bb18f91b161d99ebf21763810fe4c92e39775d10bbf1f8"
The resulting account should not contain the associated key that was just removed.
Account details
"Account": {
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"action_thresholds": {
"deployment": 2,
"key_management": 3
},
"associated_keys": [
{
"account_hash": "account-hash-04a9691a9f8f05a0f08bd686f188b27c7dbcd644b415759fd3ca043d916ea02f",
"weight": 1
},
{
"account_hash": "account-hash-1ed5a1c39bea93c105f2d22c965a84b205b36734a377d05dbb103b6bfaa595a7",
"weight": 3
},
{
"account_hash": "account-hash-e2d00525cac31ae2756fb155f289d276c6945b6914923fe275de0cb127bffee7",
"weight": 1
}
],
"main_purse": "uref-8294864177c2c1ec887a11dae095e487b5256ce6bd2a1f2740d0e4f28bd3251c-007",
"named_keys": []
}
The table below summarizes the updates after calling the remove_account.wasm
.
Threshold / Key | Previous weight | Current weight |
---|---|---|
deployment | 1 | 2 |
key_management | 1 | 3 |
Primary key (1ed5... ) | 1 | 3 |
Associated key (04a9... ) | 1 | 1 |
Associated key (e2d0... ) | 1 | 1 |
Associated key (1fed... ) | 1 | N/A (Removed) |
Next Steps
The next section contains additional examples where Casper's multi-signature feature would be helpful.