You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/leios-design/README.md
+37-37Lines changed: 37 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -273,9 +273,44 @@ The threats examined here represent scenarios that could compromise the implemen
273
273
274
274
The following threats have been selected for detailed analysis based on their potential to inform critical implementation decisions. These represent attack vectors that emerged prominently during research, have significant implications for system performance under adversarial conditions, or require empirical validation through prototyping and testing.
275
275
276
+
### Data withholding
277
+
278
+
In a data withholding attack (**ATK-LeiosDataWithholding**, see also [threat vectors #20, #21 and #22](../threat-model.md#data-withholding)), the adversary deliberately prevents the diffusion of endorser block transaction closures to disrupt certification and degrade network throughput.
279
+
This attack exploits the fundamental dependency between transaction availability and EB certification, targeting the gap between optimistic and worst-case diffusion scenarios that underlies Leios' [security argument](https://github.com/cardano-scaling/CIPs/blob/leios/CIP-0164/README.md#protocol-security).
280
+
281
+
The attack operates by manipulating timing and availability of transaction data required for EB validation.
282
+
When an EB is announced via an RB header, voting committee members must acquire and validate the complete transaction closure before casting votes.
283
+
The adversary can exploit this in several ways: withholding the EB body itself, selectively withholding individual transactions, or strategically timing data release to exceed the $L_\text{vote}$ deadline.
284
+
285
+
**Direct threshold impact.** The most direct form involves an adversarial block producer creating valid EBs but refusing to serve transaction closures when requested by voting nodes.
286
+
Since committee members cannot validate unavailable transactions, they cannot vote for certification, effectively nullifying the EB's throughput contribution.
287
+
More sophisticated variants involve network-level manipulation where the adversary controls network relays to selectively prevent transaction propagation to specific voting committee members.
288
+
289
+
Consider an adversary controlling 15% of stake attempting to prevent honest EBs from achieving the 75% certification threshold.
290
+
The adversary must withhold transaction data from enough voting committee members to reduce available honest stake below 75%.
291
+
Since the adversary controls 15% stake directly, they need to prevent an additional 10% of honest stake from voting.
292
+
This demonstrates how modest adversarial stake combined with strategic network positioning could significantly impact honest EB certification.
293
+
294
+
**Attack on safety.** While throughput degradation represents the obvious impact, the most dangerous variant targets blockchain safety itself.
295
+
The adversary can strategically delay transaction data release to create scenarios where EBs achieve certification but cannot be processed by honest nodes within the required timeframe.
296
+
Just before the voting deadline, they release data to a subset of voting committee members—enough to achieve certification, but not to all network participants.
297
+
The resulting certificate gets included in a subsequent RB, but honest block producers cannot acquire the certified EB's transaction closure within $L_\text{diff}$.
298
+
299
+
By reducing the number of honest nodes that received the EB data in time for certification, the adversary also impairs subsequent diffusion.
300
+
With fewer nodes initially possessing the complete transaction closure, propagation becomes slower and less reliable, potentially extending diffusion times beyond protocol anticipation.
301
+
This would represent a violation of Praos' timing assumptions.
302
+
While missing the $\Delta$ deadline occasionally does not break safety, short forks are normal in Ouroboros, persistent violations can lead to longer forks and degraded chain quality.
303
+
In summary, the attack fundamentally challenges the security argument's assumption that the difference between optimistic and worst-case diffusion remains bounded by $L_\text{diff}$.
304
+
305
+
Mitigation relies primarily on the protocol design ensuring that diffusion timing remains bounded even under adversarial conditions.
306
+
The certification mechanism provides defense against stake-based withholding by requiring broad consensus before including EBs in the ledger.
307
+
Network-level attacks require sophisticated countermeasures including redundant peer connections, timeouts that punish non-responsive nodes, and strategic committee selection considering network topology.
308
+
309
+
The implementation must validate empirically that real-world network conditions support the timing assumptions underlying the security argument through adversarial diffusion testing.
310
+
276
311
### Protocol bursts
277
312
278
-
In a protocol burst attack (**ATK-LeiosProtocolBurst**) the adversary withholds a large number of EBs and/or their closures over a significant duration and then releases them all at once.
313
+
In a protocol burst attack (**ATK-LeiosProtocolBurst**, see also [threat vector #23](../threat-model.md#protocol-bursts)) the adversary withholds a large number of EBs and/or their closures over a significant duration and then releases them all at once.
279
314
This will lead to a sustained maximal load on the honest network for a smaller but still significant duration, a.k.a. a burst.
280
315
The potential magnitude of that burst will depend on various factors, including at least the adversary's portion of stake, but the worst-case is more than a gigabyte of download.
281
316
The cost to the victim is merely the work to acquire the closures and to check the hashes of the received EB bodies and transaction bodies.
@@ -312,41 +347,6 @@ The adversary is only able to issue EBs at an average rate in proportion to thei
312
347
There will be some variance, but in general they can do smaller bursts more often or larger bursts less often.
313
348
However, the Praos security argument's parameters represent the worst-case, so the largest burst fundamentally challenges the current Praos security argument even if it can only happen rarely to whatever extent the prioritization schemes of CIP-164 are imperfectly implemented.
314
349
315
-
### Data withholding
316
-
317
-
In a data withholding attack (**ATK-LeiosDataWithholding**), the adversary deliberately prevents the diffusion of endorser block transaction closures to disrupt certification and degrade network throughput.
318
-
This attack exploits the fundamental dependency between transaction availability and EB certification, targeting the gap between optimistic and worst-case diffusion scenarios that underlies Leios' [security argument](https://github.com/cardano-scaling/CIPs/blob/leios/CIP-0164/README.md#protocol-security).
319
-
320
-
The attack operates by manipulating timing and availability of transaction data required for EB validation.
321
-
When an EB is announced via an RB header, voting committee members must acquire and validate the complete transaction closure before casting votes.
322
-
The adversary can exploit this in several ways: withholding the EB body itself, selectively withholding individual transactions, or strategically timing data release to exceed the $L_\text{vote}$ deadline.
323
-
324
-
**Direct threshold impact.** The most direct form involves an adversarial block producer creating valid EBs but refusing to serve transaction closures when requested by voting nodes.
325
-
Since committee members cannot validate unavailable transactions, they cannot vote for certification, effectively nullifying the EB's throughput contribution.
326
-
More sophisticated variants involve network-level manipulation where the adversary controls network relays to selectively prevent transaction propagation to specific voting committee members.
327
-
328
-
Consider an adversary controlling 15% of stake attempting to prevent honest EBs from achieving the 75% certification threshold.
329
-
The adversary must withhold transaction data from enough voting committee members to reduce available honest stake below 75%.
330
-
Since the adversary controls 15% stake directly, they need to prevent an additional 10% of honest stake from voting.
331
-
This demonstrates how modest adversarial stake combined with strategic network positioning could significantly impact honest EB certification.
332
-
333
-
**Attack on safety.** While throughput degradation represents the obvious impact, the most dangerous variant targets blockchain safety itself.
334
-
The adversary can strategically delay transaction data release to create scenarios where EBs achieve certification but cannot be processed by honest nodes within the required timeframe.
335
-
Just before the voting deadline, they release data to a subset of voting committee members—enough to achieve certification, but not to all network participants.
336
-
The resulting certificate gets included in a subsequent RB, but honest block producers cannot acquire the certified EB's transaction closure within $L_\text{diff}$.
337
-
338
-
By reducing the number of honest nodes that received the EB data in time for certification, the adversary also impairs subsequent diffusion.
339
-
With fewer nodes initially possessing the complete transaction closure, propagation becomes slower and less reliable, potentially extending diffusion times beyond protocol anticipation.
340
-
This would represent a violation of Praos' timing assumptions.
341
-
While missing the $\Delta$ deadline occasionally does not break safety, short forks are normal in Ouroboros, persistent violations can lead to longer forks and degraded chain quality.
342
-
In summary, the attack fundamentally challenges the security argument's assumption that the difference between optimistic and worst-case diffusion remains bounded by $L_\text{diff}$.
343
-
344
-
Mitigation relies primarily on the protocol design ensuring that diffusion timing remains bounded even under adversarial conditions.
345
-
The certification mechanism provides defense against stake-based withholding by requiring broad consensus before including EBs in the ledger.
346
-
Network-level attacks require sophisticated countermeasures including redundant peer connections, timeouts that punish non-responsive nodes, and strategic committee selection considering network topology.
347
-
348
-
The implementation must validate empirically that real-world network conditions support the timing assumptions underlying the security argument through adversarial diffusion testing.
349
-
350
350
## Assumptions to validate early
351
351
352
352
Following the principle of early validation outlined in the [implementation plan](#approach), several critical assumptions underlying Leios' security argument must be validated before we can commit to full scale implementation and deployment. These assumptions represent potential failure points where theoretical models may not match real-world performance.
@@ -357,7 +357,7 @@ Following the principle of early validation outlined in the [implementation plan
357
357
358
358
-**A real ledger can process orders of magnitude higher transaction loads as expected.** Leios assumes that nodes can validate and apply large transaction sets within tight timing constraints. This requires empirical validation of transaction validation throughput, especially when combined with disk-based ledger storage and concurrent processing demands.
359
359
360
-
The [prototyping and adversarial testing](#prototyping-and-adversarial-testing) phase of the implementation plan is specifically designed to validate these assumptions through controlled experiments. Only with such validation we can confidently design and implement the components that realize a Leiso consensus.
360
+
The [prototyping and adversarial testing](#prototyping-and-adversarial-testing) phase of the implementation plan is specifically designed to validate these assumptions through controlled experiments. Only with such validation we can confidently design and implement the components that realize a Leios consensus.
Copy file name to clipboardExpand all lines: docs/threat-model.md
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -208,7 +208,10 @@ SPOs concerned about front-running competition may choose to bypass the EB mecha
208
208
| 18 | Insert or replace transactions in EB | MEV, market manipulation | Stake for block production | Limited detection capability |
209
209
| 19 | Ignore certificates, include txs in RB only | Reduces EB throughput, avoids front-running | Stake for block production | Reduced rewards, Self-limiting when load exceeds RB capacity |
210
210
211
-
### Data Withholding
211
+
### Data withholding
212
+
213
+
> [!NOTE]
214
+
> This is also a [key threat informing the Leios technical design](./leios-design#data-withholding)
212
215
213
216
Adversaries deliberately prevent or delay the diffusion of EB transaction data to disrupt the certification process and degrade network throughput. This attack targets the fundamental dependency between transaction availability and EB certification, exploiting the gap between optimistic and worst-case diffusion scenarios that forms the basis of Leios' security argument. Unlike protocol bursts that overwhelm with volume, data withholding attacks manipulate timing and availability of critical data.
214
217
@@ -234,7 +237,10 @@ A particularly dangerous and sophisticated variant targets blockchain safety its
234
237
| 21 | Selectively withhold data from voting committee | Prevent honest EB certification, reduces throughput | Network position control | Redundant peer connections, diffusion monitoring |
235
238
| 22 | Selectively withhold data from honest nodes | Allow certification, but delay block propagation | Network position control + modest stake | L_diff parameter sizing, worst-case diffusion validation |
236
239
237
-
### Protocol Bursts
240
+
### Protocol bursts
241
+
242
+
> [!NOTE]
243
+
> This is also a [key threat informing the Leios technical design](./leios-design#protocol-bursts)
238
244
239
245
Adversaries can withhold large numbers of EBs and their transaction closures over extended periods, then release them simultaneously to create concentrated bursts of network traffic. This attack exploits Leios' requirement that nodes must attempt to acquire any EB correctly announced even if it arrives too late for the node to vote on it, since the EB might still be certified by other nodes and required for future chain selection.
0 commit comments