
Why Magic Wormhole?
Magic Wormhole is the first library I’ve encounted that fasciliates p2p file transfer using a human-utterable keying phrase. Other common patterns depend on committing 60+ bytes to human memory (or use a third-party shortening service for brevity). Brian Warner describes his library as the intersection between “easy” and “safe.”
Example useage: two-factor bitcoin wallet
I maintain one bitcoin address on my laptop, and another on a Raspberry Pi Zero. I keep my funds in a multi-signature wallet signed by both, which means both devices must issue a signature to finalize a transaction.
First, I initiate and sign the bitcoin transaction from my laptop. Then, I use Magic Wormhole to easily forward the transaction identity over to my Pi. Receiving the 34+ byte string is as easy as uttering “Nine. Bison. Jawbone.” After I receive the hex string on my Pi, I can sign finalize the transaction.
laptop$ bitcoin-cli signrawtransaction some_hexstring <params>
laptop$ wormhole send --text some_hexstring
Sending text message (34 bytes)
On the other computer, please run: wormhole receive
Wormhole code is 9-bison-jawbone
pi$ wormhole receive
Enter receive wormhole code: 9-bison-jawbone
some_hexstring
pi$ bitcoin-cli signrawtransaction some_hextstring <params>
Example useage: three-way bitcoin escrow
Bob commissions Alice to provision a private Hello Kitty Island Adventure game server. They both agree to use a mutual acquitance, Carol, as an escrow arbiter for this transaction.
Bob and Alice provide their public bitcoin addresses to Carol. Carol generates a 2-of-3 multisignature address using the signatures received from Bob and Alice, plus her own. Carol broadcasts the 2-of-3 address to Alice and Bob.
All three parties are now cognizant of the escrow address. When the transaction is signed by any 2 parties, it will be broadcasted to the blockchain.
Magic Wormhole supports out-of-band keying. Bob, Alice, and Carol can select an unused channel ID and use it to broadcast/receive with the --code
argument.
Alice and Bob broadcasting their wallet addresses to Carol
bob$ wormhole send --text bob_hexstring --code 1-tonic-willow
Sending text message (34 bytes)
alice$ wormhole send --text alice_hexstring --code 2-cublic-filament
Sending text message (34 bytes)
carol$ wormhole receive
Enter receive wormhole code: 1-tonic-willow
<bob_hexstring>
carol$ wormhole receive
Enter receive wormhole code: 2-cubic-filament
<alice_hexstring>
Carol broadcasting the 2-of-3 address to Alice and Bob
carol$ wormhole send --text 2_of_3_hexstring --code 1-willow-tonic
Sending text message (34 bytes)
carol$ wormhole send --text 2_of_3_hexstring --code 2-filament-cubic
Sending text message (34 bytes)
alice$ wormhole receive
Enter receive wormhole code: 2-willow-tonic
<2_of_3_hexstring>
bob$ wormhole receive
Enter receive wormhole code: 2-filament-cubic
<2_of_3_hexstring>
Neat. How does it work?
PAKE & SPAKE2 use a weak shared password to derive a much stronger shared secret key. If both sides input the same password, both sides can anticipate receiving the same key. If either side inputs a password failing the challenge, the received keys will be random.
Brian Warner mentioned SPAKE2 strongly resembles a basic DH exchange, which gave me a stronger grasp of what’s happening going on stage right. Here’s my crack at solving a drastically over-simplified version of this problem:

# pseudocode: easier than latex
# pw - password phrase in bytecode
# p is a pre-agreed prime
# g is a generator of some kind
# H() - a hash function
# X1, Y1 - scaler multiplication of the random entropy onto the generator
# X2, Y2 - result of X/Y1 added to the scaler multiplication of the password bytecode onto some arbitrary points
# M, N - some arbitrary points
# P, Q - the propositions
def scalarMult(A,n):
result = [[n*i for i in row] for row in A]
return result
x = os.urandom(p)
y = os.urandom(p)
X1 = scalerMult(g, x)
Y1 = scalerMult(g, y)
X2 = X1 + scalerMult(M, pw)
Y2 = Y1 + scalerMult(N, pw)
# this is probably not the right way to negate a constant, send help!
P = scalerMult(X2 + scalerMult(M, -(pw)), x)
Q = scalerMult(Y2 + scalerMult(N, -(pw)), y)
assert H(pw + X2 + Y2 + P) == H(pw + X2 + Y2 + Q), "One of these things is not like the other"
key_1 = H(pw + X2 + Y2 + P)
key_2 = H(pw + X2 + Y2 + Q)
What does a selfsame session key do?
All subsequent communications between the two clients are encrypted using this key. After the keying step, the clients attempt to forge a connection.
Each client will listen to a set of TCP ports and also broadcast on a range of ports. The first successful response to a client’s key challenge will initiate the next connection step.
But what if either client is behind a NAT?
Magic Wormhole direct connections through a TURN server, which allows a client behind a NAT to request that the server act as relay. The server relays packets on the behalf of the client to and from peers.
TURN is the most expensive relay protocol, becauase it behaves as a data stream between peers. Brian Warner has generously provided the address of both his own TURN for file transfers, and the websocket service used during the keying phase.
Where to from here?
I setup a fragile TURN (tcp:wormhole.leighjohnson.com:7001) and websocket rendevous (ws://wormhole.leighjohnson.me:7000) without much effort. I haven’t been able to use either by passing options through the CLI, but they’re working fine when I replace the hard-coded values in magic-wormhole/src/wormhole/cli/public_relay.py.
The takeaway: PAKE is a nifty way to ramp humans/devices into a more complex exchange.
References
- Move Things From One Computer to Another, Safely by Brian Warner slides video
- PAKE use cases @ Curves list