Recreating Private Keys
Create new private key shares for your existing distributed validator cluster using the charon alpha edit recreate-private-keys command.
This is an alpha feature and is not yet recommended for production use.
You can recreate the private key shares for your cluster using the charon alpha edit recreate-private-keys command. This operation creates new private key shares to replace the existing validator private keys whilst retaining the same operator identities and validator public keys.
When to Use This Feature
You might need to recreate private key shares in several scenarios:
Security concerns: If you suspect that private key shares may have been compromised
Key rotation: As part of regular security practices to rotate cryptographic material
Recovery: After a security incident where you want to refresh all key material
Compliance: Meeting organisational policies that require periodic key rotation
Prerequisites
Review the
edit recreate-private-keyscommand CLI reference.Keep the DV node running during the process and ensure you have a copy of the current cluster lock file and validator private key shares.
All operators in the cluster must participate in this ceremony.
Each operator must have their current validator private key shares available.
Recreating Private Keys Process
All operators must run this command simultaneously. The ceremony will coordinate between all operators to generate new private key shares.
This command will:
Use the existing cluster configuration and operator identities
Generate new private key shares for all validators
Create a new cluster lock file with updated key shares
Save the new configuration in the
outputdirectory
Making the DV Stack Use the New Keys
The example below is designed for the CDVN repository, but the process is similar for other setups.
Critical Security Step: All operators must coordinate to switch to the new keys at approximately the same time to avoid validation failures. Plan a maintenance window and communicate clearly with all operators.
To start using the new keys, stop the current Charon and validator client instances:
Back up and remove the existing
.charondirectory, then move theoutputdirectory to.charon:
Restart the Charon and validator client instances:
Lodestar's boot script (lodestar/run.sh) will automatically import all keys, removing any existing keys and cache. Charon will load the new cluster-lock.json with the recreated private key shares.
All operators must fully shut down their existing cluster nodes before starting with the new configuration. The old cluster must be completely stopped before the new cluster with the recreated private keys can begin operating. Steps 1–3 must be performed by all node operators within a coordinated maintenance window to minimise downtime.
Verifying the New Configuration
After all operators have restarted with the new keys, verify that:
All Charon nodes are connected and healthy
The cluster is successfully producing attestations
No error messages appear in the logs related to signature verification
Security Best Practices
Secure deletion: After successfully transitioning to the new keys and verifying operation, securely delete the old key shares
Coordination: Ensure all operators are prepared and available during the planned maintenance window
Communication: Maintain clear communication channels between all operators throughout the process
Backup: Keep the backup until you've verified that the cluster is operating normally with the new keys for at least several epochs
Current Limitations
The new cluster configuration will not be reflected on the Launchpad.
The new cluster configuration will have a new cluster hash, so the observability stack will display new cluster data under a different identifier.
All operators must participate in the ceremony; there is no option for partial participation.
All operators must have their current validator private key shares available for the ceremony to succeed.
The transition period requires coordination to minimise validator downtime.
Last updated
Was this helpful?

