On Ethereum, to prove that a user owns an account need to make the user to sign a message. On IC, can I do this (confirming that an account belongs to a currently logged in user) without asking the user? If yes, how? If no, how to sign a message?
Note that in my case the backend is a regular server (e.g. AWS), not a canister.
That is, I want to check Internet Identity of a user without the user sending any requests to a canister.
No, unfortunately, it’s not possible to verify a user’s Internet Identity ownership without involving the user in the process on the Internet Computer (IC)
The user will basically sign some data (challenge) to return a signature which in turn can be verified by the dapp. Currently working on implementing this and other standards in a lib.
Keep in mind user identities can be ed25519, p256, secp256k1 or canister key algorithm. Verifying the signature is different depending on the key algorithm, the first few bytes (OID) of the DER encoded public key indicates the key algorithm that needs to be used to verify signatures made by the public key.
I don’t want the user to explicitly sign anything. Instead in onSuccess of use authentication I construct a message with user’s principal and random nonce, to validate it in the Python backend.
Bard refused to tell me about code for that, claiming that it is an insecure practice. It isn’t, because when user signs in, he/she gives my app the right to act on his/her behalf.
As you see from my other response, I am still investigating how to check the signature in Python.
Since you’re referring to onSuccess I assume you’re referring to an Internet Identity?
An Internet Identity is different from a normal public/private key identity. Since it uses delegation, which basically means the following process happens when a user authenticates:
Dapp generates public/private key pair
Dapp asks auth client to authenticate with II, the public key from the previous step is sent in this request to II
User logs in with II
II will create a delegation and return it to the dapp
When the dapp calls a canister it will sign the request with private key from step 1 and also send the delegation in this request
The IC receives the signed request, verifies that it indeed has been signed by private key from step 1
Since also a delegation is received it will check which public key has been delegated towards and checks if the signature of the delegation has indeed been signed by the II canister
AuthClient by default generates the key in step 1 and sends it in step 2 for you.
A delegation is a signed message by private key B that states that public key A can make calls for public key B. This means that private key B never has to leave the II canister.
As far as I’m aware there’s no Python implementation, you’ll likely have to implement it from scratch. Depending on the key algorithm that has been delegated towards (ecdsa p256 by default in AuthClient), you’ll need different signature verification libraries. You’ll also need to verify the IC canister signature in the delegation (bls signature)
Also to clearify, the principal is a unique hash of the public key of an identity. It’s enough to differentiate between identities but you’ll need the public key instead to actually verify signatures.
A simpler identity verification approach without the need for any signature verification in python would be e.g. creating a canister that keeps a list of principals that have called the canister. You could then query the canister with a principal as argument to check if it’s within the list and return true/false. This basically moves the signatures check onto the IC.
Hey, the package was split into multiple separate packages. This signature verification part is now a standalone package that can be found at NPM and GitHub