13 KiB
eip | title | description | author | discussions-to | status | type | category | created | requires |
---|---|---|---|---|---|---|---|---|---|
5453 | Endorsement - Permit for Any Functions | A general protocol for approving function calls in the same transaction rely on EIP-5750. | Zainan Victor Zhou (@xinbenlv) | https://ethereum-magicians.org/t/erc-5453-endorsement-standard/10355 | Draft | Standards Track | ERC | 2022-08-12 | 165, 712, 1271, 5750 |
Abstract
This EIP establish a general protocol for permitting approving function calls in the same transaction rely on EIP-5750.
Unlike a few prior art (EIP-2612 for EIP-20, EIP-4494 for EIP-721 that
usually only permit for a single behavior (transfer
for EIP-20 and safeTransferFrom
for EIP-721) and a single approver in two transactions (first a permit(...)
TX, then a transfer
-like TX), this EIP provides a way to permit arbitrary behaviors and aggregating multiple approvals from arbitrary number of approvers in the same transaction, allowing for Multi-Sig or Threshold Signing behavior.
Motivation
- Support permit(approval) alongside a function call.
- Support a second approval from another user.
- Support pay-for-by another user
- Support multi-sig
- Support persons acting in concert by endorsements
- Support accumulated voting
- Support off-line signatures
Specification
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 and RFC 8174.
Interfaces
The interfaces and structure referenced here are as followed
pragma solidity ^0.8.9;
struct ValidityBound {
bytes32 functionParamStructHash;
uint256 validSince;
uint256 validBy;
uint256 nonce;
}
struct SingleEndorsementData {
address endorserAddress; // 32
bytes sig; // dynamic = 65
}
struct GeneralExtensionDataStruct {
bytes32 erc5453MagicWord;
uint256 erc5453Type;
uint256 nonce;
uint256 validSince;
uint256 validBy;
bytes endorsementPayload;
}
interface IERC5453EndorsementCore {
function eip5453Nonce(address endorser) external view returns (uint256);
function isEligibleEndorser(address endorser) external view returns (bool);
}
interface IERC5453EndorsementDigest {
function computeValidityDigest(
bytes32 _functionParamStructHash,
uint256 _validSince,
uint256 _validBy,
uint256 _nonce
) external view returns (bytes32);
function computeFunctionParamHash(
string memory _functionName,
bytes memory _functionParamPacked
) external view returns (bytes32);
}
interface IERC5453EndorsementDataTypeA {
function computeExtensionDataTypeA(
uint256 nonce,
uint256 validSince,
uint256 validBy,
address endorserAddress,
bytes calldata sig
) external view returns (bytes memory);
}
interface IERC5453EndorsementDataTypeB {
function computeExtensionDataTypeB(
uint256 nonce,
uint256 validSince,
uint256 validBy,
address[] calldata endorserAddress,
bytes[] calldata sigs
) external view returns (bytes memory);
}
See IERC5453.sol
.
Behavior specification
As specified in EIP-5750 General Extensibility for Method Behaviors, any compliant method that has an bytes extraData
as its
last method designated for extending behaviors can conform to EIP-5453 as the way to indicate a permit from certain user.
- Any compliant method of this EIP MUST be a EIP-5750 compliant method.
- Caller MUST pass in the last parameter
bytes extraData
conforming a solidity memory encoded layout bytes ofGeneralExtensonDataStruct
specified in Section Interfaces. The following descriptions are based on when decodingbytes extraData
into aGeneralExtensonDataStruct
- In the
GeneralExtensonDataStruct
-decodedextraData
, caller MUST set the value ofGeneralExtensonDataStruct.erc5453MagicWord
to be thekeccak256("ERC5453-ENDORSEMENT")
. - Caller MUST set the value of
GeneralExtensonDataStruct.erc5453Type
to be one of the supported values.
uint256 constant ERC5453_TYPE_A = 1;
uint256 constant ERC5453_TYPE_B = 2;
-
When the value of
GeneralExtensonDataStruct.erc5453Type
is set to beERC5453_TYPE_A
,GeneralExtensonDataStruct.endorsementPayload
MUST be abi encoded bytes of aSingleEndorsementData
. -
When the value of
GeneralExtensonDataStruct.erc5453Type
is set to beERC5453_TYPE_B
,GeneralExtensonDataStruct.endorsementPayload
MUST be abi encoded bytes ofSingleEndorsementData[]
(a dynamic array). -
Each
SingleEndorsementData
MUST have aaddress endorserAddress;
and a 65-bytesbytes sig
signature. -
Each
bytes sig
MUST be an ECDSA (secp256k1) signature using private key of signer whose corresponding address isendorserAddress
signingvalidityDigest
which is the a hashTypeDataV4 of EIP-712 of hashStruct ofValidityBound
data structure as followed:
bytes32 validityDigest =
eip712HashTypedDataV4(
keccak256(
abi.encode(
keccak256(
"ValidityBound(bytes32 functionParamStructHash,uint256 validSince,uint256 validBy,uint256 nonce)"
),
functionParamStructHash,
_validSince,
_validBy,
_nonce
)
)
);
- The
functionParamStructHash
MUST be computed as followed
bytes32 functionParamStructHash = keccak256(
abi.encodePacked(
keccak256(bytes(_functionStructure)),
_functionParamPacked
)
);
return functionParamStructHash;
whereas
_functionStructure
MUST be computed asfunction methodName(type1 param1, type2 param2, ...)
._functionParamPacked
MUST be computed asenc(param1) || enco(param2) ...
-
Upon validating that
endorserAddress == ecrecover(validityDigest, signature)
orEIP1271(endorserAddress).isValidSignature(validityDigest, signature) == ERC1271.MAGICVALUE
, the single endorsement MUST be deemed valid. -
Compliant method MAY choose to impose a threshold for a number of endorsements needs to be valid in the same
ERC5453_TYPE_B
kind ofendorsementPayload
. -
The
validSince
andvalidBy
are both inclusive. Implementer MAY choose to use blocknumber or timestamp. Implementor SHOULD find away to indicate whethervalidSince
andvalidBy
is blocknumber or timestamp.
Rationale
-
We chose to have both
ERC5453_TYPE_A
(single-endorsement) andERC5453_TYPE_B
(multiple-endorsements, same nonce for entire contract) so we could balance a wider range of use cases. E.g. the same use cases of EIP-2612 and EIP-4494 can be supported byERC5453_TYPE_A
. And threshold approvals can be done viaERC5453_TYPE_B
. More complicated approval types can also be extended by defining newERC5453_TYPE_?
-
We chose to include both
validSince
andvalidBy
to allow maximum flexibility in expiration. This can be also be supported by EVM natively at if adopted EIP-5081 but EIP-5081 will not be adopted anytime soon, we choose to add these two numbers in our protocol to allow smart contract level support.
Backwards Compatibility
The design assumes a bytes calldata extraData
to maximize the flexibility of future extensions. This assumption is compatible with EIP-721, EIP-1155 and many other ERC-track EIPs. Those that aren't, such as EIP-20, can also be updated to support it, such as using a wrapper contract or proxy upgrade.
Reference Implementation
In addition to the specified algorithm for validating endorser signatures, we also present the following reference implementations.
pragma solidity ^0.8.9;
import "@openzeppelin/contracts/utils/cryptography/SignatureChecker.sol";
import "@openzeppelin/contracts/utils/cryptography/EIP712.sol";
import "./IERC5453.sol";
abstract contract AERC5453Endorsible is EIP712,
IERC5453EndorsementCore, IERC5453EndorsementDigest, IERC5453EndorsementDataTypeA, IERC5453EndorsementDataTypeB {
// ...
function _validate(
bytes32 msgDigest,
SingleEndorsementData memory endersement
) internal virtual {
require(
endersement.sig.length == 65,
"AERC5453Endorsible: wrong signature length"
);
require(
SignatureChecker.isValidSignatureNow(
endersement.endorserAddress,
msgDigest,
endersement.sig
),
"AERC5453Endorsible: invalid signature"
);
}
// ...
modifier onlyEndorsed(
bytes32 _functionParamStructHash,
bytes calldata _extensionData
) {
require(_isEndorsed(_functionParamStructHash, _extensionData));
_;
}
function computeExtensionDataTypeB(
uint256 nonce,
uint256 validSince,
uint256 validBy,
address[] calldata endorserAddress,
bytes[] calldata sigs
) external pure override returns (bytes memory) {
require(endorserAddress.length == sigs.length);
SingleEndorsementData[]
memory endorsements = new SingleEndorsementData[](
endorserAddress.length
);
for (uint256 i = 0; i < endorserAddress.length; ++i) {
endorsements[i] = SingleEndorsementData(
endorserAddress[i],
sigs[i]
);
}
return
abi.encode(
GeneralExtensionDataStruct(
MAGIC_WORLD,
ERC5453_TYPE_B,
nonce,
validSince,
validBy,
abi.encode(endorsements)
)
);
}
}
See AERC5453.sol
Reference Implementation of EndorsableERC721
Here is a reference implementation of EndorsableERC721
that achieves similar behavior of EIP-4494.
pragma solidity ^0.8.9;
contract EndorsableERC721 is ERC721, AERC5453Endorsible {
//...
function mint(
address _to,
uint256 _tokenId,
bytes calldata _extraData
)
external
onlyEndorsed(
_computeFunctionParamHash(
"function mint(address _to,uint256 _tokenId)",
abi.encode(_to, _tokenId)
),
_extraData
)
{
_mint(_to, _tokenId);
}
}
Reference Implementation of ThresholdMultiSigForwarder
Here is a reference implementation of ThresholdMultiSigForwarder that achieves similar behavior of multi-sig threshold approval remote contract call like a Gnosis-Safe wallet.
pragma solidity ^0.8.9;
contract ThresholdMultiSigForwarder is AERC5453Endorsible {
//...
function forward(
address _dest,
uint256 _value,
uint256 _gasLimit,
bytes calldata _calldata,
bytes calldata _extraData
)
external
onlyEndorsed(
_computeFunctionParamHash(
"function forward(address _dest,uint256 _value,uint256 _gasLimit,bytes calldata _calldata)",
abi.encode(_dest, _value, _gasLimit, keccak256(_calldata))
),
_extraData
)
{
string memory errorMessage = "Fail to call remote contract";
(bool success, bytes memory returndata) = _dest.call{value: _value}(
_calldata
);
Address.verifyCallResult(success, returndata, errorMessage);
}
}
See ThresholdMultiSigForwarder.sol
Security Considerations
Replay Attacks
A replay attack is a type of attack on cryptography authentication. In a narrow sense, it usually refers to a type of attack that circumvents the cryptographically signature verification by reusing an existing signature for a message being signed again. Any implementations relying on this EIP must realize that all smart endorsements described here are cryptographic signatures that are public and can be obtained by anyone. They must foresee the possibility of a replay of the transactions not only at the exact deployment of the same smart contract, but also other deployments of similar smart contracts, or of a version of the same contract on another chainId
, or any other similar attack surfaces. The nonce
, validSince
, and validBy
fields are meant to restrict the surface of attack but might not fully eliminate the risk of all such attacks, e.g. see the Phishing section.
Phishing
It's worth pointing out a special form of replay attack by phishing. An adversary can design another smart contract in a way that the user be tricked into signing a smart endorsement for a seemingly legitimate purpose, but the data-to-designed matches the target application
Copyright
Copyright and related rights waived via CC0.