-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extend or add Junction with signature #27
Comments
Sounds interesting, I feel this lacking in XCM. So may be parity working on this? What type of signature is used? various chains use different signature schemes? should it be enum variant somewhere? Did you saw ORML remote chains XCM helper? Does it solves you problem? |
I don't think so. I think the current solution is to just derive secure accounts that have no privat keys on the remote chains.
Can you point me to it? |
yeah, derived accounts (utility so limited to 65k of these) or https://github.com/open-web3-stack/orml-xcm-builder/blob/master/kusama/src/tinkernet_multisigs.rs |
Closing as we are having remote account derivation now. |
Currently, XCM does not support a way to prove ownership of an
AccountId32
via aJunction
. This leads to the need, that parachains need to trust the sender of an XCM that it has made proper checks of ownership when converting something likeinto either an
Origin
(e.g. in theInstructions::Transact
) or anAccountId
(e.g. in theAssetTransactor::*
calls).Adding both or one of the below could help here:
The text was updated successfully, but these errors were encountered: