Key Management Architecture
This document describes the comprehensive key management architecture for Gonka Network, a decentralized AI infrastructure that requires robust security through role-based key separation.
Overview
Gonka Network implements a role-based key management system that separates automated functions from high-stakes manual approvals. This architecture ensures that no single key controls all network operations, providing enhanced security and operational flexibility.
Quick Setup
For immediate deployment, see the Quickstart Guide. This document focuses on understanding the complete key management architecture and security model.
Key Architecture at Launch (v0)
At network launch, participants use a three-key system:
Key Type | Purpose | Storage | Algorithm | Usage |
---|---|---|---|---|
Account Key | Master control & permissions | Secure local machine | SECP256K1 | Manual high-stakes operations |
ML Operational Key | Automated AI transactions | Encrypted on server | SECP256K1 | Automated ML workflows |
Consensus Key | Block validation & consensus | TMKMS warm storage | ED25519 | Network consensus participation |
Security Model
Account Key (Cold Wallet) - CRITICAL
- Control: Master key that grants permissions to all other keys
- Security: Must be stored offline on a secure, air-gapped machine
- Usage: Only for granting permissions and validator registration
- Recovery: Protected by mnemonic phrase - if lost, all access is permanently lost
ML Operational Key (Warm Wallet)
- Control: Authorized by Account Key for ML-specific transactions
- Security: Encrypted file on server, accessed programmatically
- Usage: Automated transactions (inference requests, proof submissions, rewards)
- Recovery: Can be rotated/revoked by Account Key at any time
Consensus Key (TMKMS - Warm Storage)
- Control: Managed by secure TMKMS service
- Security: Warm storage with double-signing prevention
- Usage: Block validation and network consensus participation
- Recovery: Can be rotated by Account Key or authorized delegates
Planned Evolution
Best Practices
Security Guidelines
-
Account Key Protection
- Storage: Secure local machine with encrypted storage and minimal internet exposure
- Secure local machine: A dedicated computer with restricted access, not used for daily browsing/email, ideally air-gapped or with limited network connectivity
- Keyring Backend: Use
file
oros
keyring backend for secure local storage - Passphrases: Use strong, unique passphrases for keyring protection
- Backup: Maintain offline backup of mnemonic phrase in secure location
- Usage: Never use for routine operations - only for granting permissions and validator actions
- Storage: Secure local machine with encrypted storage and minimal internet exposure
-
Hardware Wallet Support
- Current Status: Not supported at network launch
- Critical: Always save and securely store your mnemonic phrase as your ultimate recovery method
-
ML Operational Key Management
- Keyring Backend: Must use
file
keyring backend for server-based storage with programmatic access - Security: Store encrypted on server with strong passphrase protection
- Rotation: Regularly rotate ML Operational Keys using Account Key authorization
- Access: Enable programmatic access by containers while maintaining encryption at rest
- Keyring Backend: Must use
-
Operational Security
- Implement proper backup and recovery procedures for all keys
- Test key recovery procedures in safe environment before production deployment
- Monitor and audit key usage patterns
Recovery Procedures
- Account Key Loss: CRITICAL - No recovery possible without mnemonic
- ML Operational Key Loss: Create new key and re-authorize with Account Key
- Consensus Key Loss: Rotate consensus key using Account Key authorization
Multi-signature Groups (v1 Advanced)
Company Participant:
├── Account Key → Secure Storage + Multi-sig
├── ML Operational Key → Automated AI workloads
├── Governance Group → Multi-sig for protocol votes
│ ├── CEO/Founder
│ ├── CTO/Tech Lead
│ └── Head of Operations
└── Treasury Group (Optional) → Separate multi-sig for high-value transfers
├── CEO/Founder
├── CFO/Finance Lead
└── Board Member
Production Deployment
Before deploying to production, ensure you understand the complete key management workflow and have tested key recovery procedures in a safe environment.
Need help? Join our Discord server for assistance with key management, security concerns, or technical issues.