Replies: 5 comments 2 replies
-
|
The parser in keripy will process incoming KEL events using the kevery (see here), and make sure they are correctly witnessed etc. KERIA runs this parser. You need to do it like this because KELs can have forks and they can be malicious - and there are recovery mechanisms for KEL forks. So just cryptographically verifying that a KEL follows correct KERI semantics and is signed correctly isn't enough. And ideally, you would incorporate a pool of watchers to independently do such verifications and check with them, which in turn protects from additional attacks. After OOBIing with an identifier, you use the I have however always thought of a Signify edge client communicating with watchers in case your KERIA agent got compromised, but nothing has been done there yet. |
Beta Was this translation helpful? Give feedback.
-
|
Hey @iFergal , Thankyou for your reply. So that means when we use keyStates and keyEvents like functions which returns the events or states are already verified on KERIA side using KEVERY? Also I few questions,
|
Beta Was this translation helpful? Give feedback.
-
|
@Kaifmohd Yes, but it will just return the last known key states. If there are updates to the KEL of the remote identifier, you should use
Alternatively, you can also just stream the CESR events to the 3902 endpoint and the parser will verify them. Or use |
Beta Was this translation helpful? Give feedback.
-
|
hi @iFergal, Thank you for clearing my doubts. So I found a temporary fix. By changing the command path to command: vLEI-server -s ./schema -c ./credentials -o ./oobis The internal code is trying to find the schema in the /schema/acdc folder. For eg: when running saidify-schema command. There is not any acdc path inside schema folder here in the above image that the code is looking for. The above is setup from the default script of docker-compose.yml
The above is the schema that I want to use. When I sadify the above schema I get a @id for that Schema SAID. But when I am using it like other vLEI schema examples like QVI schema. It give me error while resolving oobi. For the other thing that I want to mention. (Note this is different issue that I was facing earlier)
|
Beta Was this translation helpful? Give feedback.
-
|
Hey @iFergal, Do you know about this endpoint /credentials/verify as you mentioned its not there in Signify-ts in Veridian Wallet Documentation its mentioned its in some forked branch. Do you know that repo? I tried creating my own in credentialing.ts just for testing purposes. But it was not working. At first it return sucess as its a long running operation it is submitted to some queue so we need to do somekind of polling check which I was doing using operations().get(). But I guess its not returning and stuck in the operations loop. async verify(acdc: object, iss: object, anc?: object): Promise { Could you please help here? |
Beta Was this translation helpful? Give feedback.




Uh oh!
There was an error while loading. Please reload this page.
-
Hi all,
While working with signify-ts and KERIA, I had a question regarding the integrity of event logs.
Is there any recommended way to cryptographically verify the authenticity and integrity of KEL (Key Event Logs) or witness receipts/logs? Specifically:
Can we detect if any tampering has occurred in the event sequence or witness data?
Are there any built-in methods or endpoints in signify-ts or KERIA that help validate these logs?
Can signatures from controllers and witnesses be verified independently using local cryptographic primitives?
I understand that the KEL structure and SAIDs offer some protection, but I’m looking for a robust verification method to ensure that:
The event chain is cryptographically intact (e.g., digest chaining, proper d field)
Attached signatures (atc, receipts) can be independently verified
Would love to hear how others handle this, or if there are utility methods in the libraries that I might have missed.
Thanks in advance!
Beta Was this translation helpful? Give feedback.
All reactions