keyKeys

Guide for obtaining an ECDSA key as a Seeker.

We are currently requiring Seekers to identify themselves in the network when sending requests. These requests are signed using an ECDSA key, which you must get whitelisted by submitting a form application (linked below).


ECDSA Keypair

You can generate a new ECDSA key pair or import an existing one.

A passphrase will be prompted from the user to securely store the key. Keys are saved using a user-provided name, which will be used to refer to them in other CLI commands.

Generate a new key with a given name:

NAME=ecdsa.seeker

fermah-seek key gen --name $NAME --key-type ecdsa
circle-info

Output will include the public key. This will be used as the identifier to to get you whitelisted. Private key will be saved to ~/.fermah/keys/name.jsonaccording to the Web3 Secret Storage Definitionarrow-up-right.

Reference

Argument
Description
Required

--name

unique name for key

yes

--key-type

ecdsa or bls

yes

--password-stdin

read password from stdin

no

--no-pw-confirm

do not ask for password confirmation

no

--no-password

force no password for keystore

no

chevron-rightExample Keystorehashtag
{
  "plain": {
    "crypto": {
      "ciphertext": "59c6995e998f97a5a0044966f0945389dc9e86dae88c7a8412f4603b6b78690d"
    },
    "address": "0x70997970c51812dc3a010c7d01b50e0d17dc79c8",
    "id": "cc706dea-d20c-44b1-8f64-b5e8ce43cc7f",
    "version": 1
  }
}

Either "plain" or "encrypted" version will be saved depending on password usage. We follow Web3 Secret Storage Definitionarrow-up-right.

Whitelist Keys

Once the keys are generated, you can submit the ECDSA public key and other details in the Seeker Application Form (Holesky)arrow-up-right for whitelisting. We will notify you once your key has been registered.

Last updated

Was this helpful?