Skip to content

Commit b9f7b29

Browse files
committed
Re-order and link up key threats
They are now in the same sequence as in the threat-model
1 parent ea798ef commit b9f7b29

File tree

2 files changed

+45
-39
lines changed

2 files changed

+45
-39
lines changed

docs/leios-design/README.md

Lines changed: 37 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -273,9 +273,44 @@ The threats examined here represent scenarios that could compromise the implemen
273273

274274
The following threats have been selected for detailed analysis based on their potential to inform critical implementation decisions. These represent attack vectors that emerged prominently during research, have significant implications for system performance under adversarial conditions, or require empirical validation through prototyping and testing.
275275

276+
### Data withholding
277+
278+
In a data withholding attack (**ATK-LeiosDataWithholding**, see also [threat vectors #20, #21 and #22](../threat-model.md#data-withholding)), the adversary deliberately prevents the diffusion of endorser block transaction closures to disrupt certification and degrade network throughput.
279+
This attack exploits the fundamental dependency between transaction availability and EB certification, targeting the gap between optimistic and worst-case diffusion scenarios that underlies Leios' [security argument](https://github.com/cardano-scaling/CIPs/blob/leios/CIP-0164/README.md#protocol-security).
280+
281+
The attack operates by manipulating timing and availability of transaction data required for EB validation.
282+
When an EB is announced via an RB header, voting committee members must acquire and validate the complete transaction closure before casting votes.
283+
The adversary can exploit this in several ways: withholding the EB body itself, selectively withholding individual transactions, or strategically timing data release to exceed the $L_\text{vote}$ deadline.
284+
285+
**Direct threshold impact.** The most direct form involves an adversarial block producer creating valid EBs but refusing to serve transaction closures when requested by voting nodes.
286+
Since committee members cannot validate unavailable transactions, they cannot vote for certification, effectively nullifying the EB's throughput contribution.
287+
More sophisticated variants involve network-level manipulation where the adversary controls network relays to selectively prevent transaction propagation to specific voting committee members.
288+
289+
Consider an adversary controlling 15% of stake attempting to prevent honest EBs from achieving the 75% certification threshold.
290+
The adversary must withhold transaction data from enough voting committee members to reduce available honest stake below 75%.
291+
Since the adversary controls 15% stake directly, they need to prevent an additional 10% of honest stake from voting.
292+
This demonstrates how modest adversarial stake combined with strategic network positioning could significantly impact honest EB certification.
293+
294+
**Attack on safety.** While throughput degradation represents the obvious impact, the most dangerous variant targets blockchain safety itself.
295+
The adversary can strategically delay transaction data release to create scenarios where EBs achieve certification but cannot be processed by honest nodes within the required timeframe.
296+
Just before the voting deadline, they release data to a subset of voting committee members—enough to achieve certification, but not to all network participants.
297+
The resulting certificate gets included in a subsequent RB, but honest block producers cannot acquire the certified EB's transaction closure within $L_\text{diff}$.
298+
299+
By reducing the number of honest nodes that received the EB data in time for certification, the adversary also impairs subsequent diffusion.
300+
With fewer nodes initially possessing the complete transaction closure, propagation becomes slower and less reliable, potentially extending diffusion times beyond protocol anticipation.
301+
This would represent a violation of Praos' timing assumptions.
302+
While missing the $\Delta$ deadline occasionally does not break safety, short forks are normal in Ouroboros, persistent violations can lead to longer forks and degraded chain quality.
303+
In summary, the attack fundamentally challenges the security argument's assumption that the difference between optimistic and worst-case diffusion remains bounded by $L_\text{diff}$.
304+
305+
Mitigation relies primarily on the protocol design ensuring that diffusion timing remains bounded even under adversarial conditions.
306+
The certification mechanism provides defense against stake-based withholding by requiring broad consensus before including EBs in the ledger.
307+
Network-level attacks require sophisticated countermeasures including redundant peer connections, timeouts that punish non-responsive nodes, and strategic committee selection considering network topology.
308+
309+
The implementation must validate empirically that real-world network conditions support the timing assumptions underlying the security argument through adversarial diffusion testing.
310+
276311
### Protocol bursts
277312

278-
In a protocol burst attack (**ATK-LeiosProtocolBurst**) the adversary withholds a large number of EBs and/or their closures over a significant duration and then releases them all at once.
313+
In a protocol burst attack (**ATK-LeiosProtocolBurst**, see also [threat vector #23](../threat-model.md#protocol-bursts)) the adversary withholds a large number of EBs and/or their closures over a significant duration and then releases them all at once.
279314
This will lead to a sustained maximal load on the honest network for a smaller but still significant duration, a.k.a. a burst.
280315
The potential magnitude of that burst will depend on various factors, including at least the adversary's portion of stake, but the worst-case is more than a gigabyte of download.
281316
The cost to the victim is merely the work to acquire the closures and to check the hashes of the received EB bodies and transaction bodies.
@@ -312,41 +347,6 @@ The adversary is only able to issue EBs at an average rate in proportion to thei
312347
There will be some variance, but in general they can do smaller bursts more often or larger bursts less often.
313348
However, the Praos security argument's parameters represent the worst-case, so the largest burst fundamentally challenges the current Praos security argument even if it can only happen rarely to whatever extent the prioritization schemes of CIP-164 are imperfectly implemented.
314349

315-
### Data withholding
316-
317-
In a data withholding attack (**ATK-LeiosDataWithholding**), the adversary deliberately prevents the diffusion of endorser block transaction closures to disrupt certification and degrade network throughput.
318-
This attack exploits the fundamental dependency between transaction availability and EB certification, targeting the gap between optimistic and worst-case diffusion scenarios that underlies Leios' [security argument](https://github.com/cardano-scaling/CIPs/blob/leios/CIP-0164/README.md#protocol-security).
319-
320-
The attack operates by manipulating timing and availability of transaction data required for EB validation.
321-
When an EB is announced via an RB header, voting committee members must acquire and validate the complete transaction closure before casting votes.
322-
The adversary can exploit this in several ways: withholding the EB body itself, selectively withholding individual transactions, or strategically timing data release to exceed the $L_\text{vote}$ deadline.
323-
324-
**Direct threshold impact.** The most direct form involves an adversarial block producer creating valid EBs but refusing to serve transaction closures when requested by voting nodes.
325-
Since committee members cannot validate unavailable transactions, they cannot vote for certification, effectively nullifying the EB's throughput contribution.
326-
More sophisticated variants involve network-level manipulation where the adversary controls network relays to selectively prevent transaction propagation to specific voting committee members.
327-
328-
Consider an adversary controlling 15% of stake attempting to prevent honest EBs from achieving the 75% certification threshold.
329-
The adversary must withhold transaction data from enough voting committee members to reduce available honest stake below 75%.
330-
Since the adversary controls 15% stake directly, they need to prevent an additional 10% of honest stake from voting.
331-
This demonstrates how modest adversarial stake combined with strategic network positioning could significantly impact honest EB certification.
332-
333-
**Attack on safety.** While throughput degradation represents the obvious impact, the most dangerous variant targets blockchain safety itself.
334-
The adversary can strategically delay transaction data release to create scenarios where EBs achieve certification but cannot be processed by honest nodes within the required timeframe.
335-
Just before the voting deadline, they release data to a subset of voting committee members—enough to achieve certification, but not to all network participants.
336-
The resulting certificate gets included in a subsequent RB, but honest block producers cannot acquire the certified EB's transaction closure within $L_\text{diff}$.
337-
338-
By reducing the number of honest nodes that received the EB data in time for certification, the adversary also impairs subsequent diffusion.
339-
With fewer nodes initially possessing the complete transaction closure, propagation becomes slower and less reliable, potentially extending diffusion times beyond protocol anticipation.
340-
This would represent a violation of Praos' timing assumptions.
341-
While missing the $\Delta$ deadline occasionally does not break safety, short forks are normal in Ouroboros, persistent violations can lead to longer forks and degraded chain quality.
342-
In summary, the attack fundamentally challenges the security argument's assumption that the difference between optimistic and worst-case diffusion remains bounded by $L_\text{diff}$.
343-
344-
Mitigation relies primarily on the protocol design ensuring that diffusion timing remains bounded even under adversarial conditions.
345-
The certification mechanism provides defense against stake-based withholding by requiring broad consensus before including EBs in the ledger.
346-
Network-level attacks require sophisticated countermeasures including redundant peer connections, timeouts that punish non-responsive nodes, and strategic committee selection considering network topology.
347-
348-
The implementation must validate empirically that real-world network conditions support the timing assumptions underlying the security argument through adversarial diffusion testing.
349-
350350
## Assumptions to validate early
351351

352352
Following the principle of early validation outlined in the [implementation plan](#approach), several critical assumptions underlying Leios' security argument must be validated before we can commit to full scale implementation and deployment. These assumptions represent potential failure points where theoretical models may not match real-world performance.
@@ -357,7 +357,7 @@ Following the principle of early validation outlined in the [implementation plan
357357

358358
- **A real ledger can process orders of magnitude higher transaction loads as expected.** Leios assumes that nodes can validate and apply large transaction sets within tight timing constraints. This requires empirical validation of transaction validation throughput, especially when combined with disk-based ledger storage and concurrent processing demands.
359359

360-
The [prototyping and adversarial testing](#prototyping-and-adversarial-testing) phase of the implementation plan is specifically designed to validate these assumptions through controlled experiments. Only with such validation we can confidently design and implement the components that realize a Leiso consensus.
360+
The [prototyping and adversarial testing](#prototyping-and-adversarial-testing) phase of the implementation plan is specifically designed to validate these assumptions through controlled experiments. Only with such validation we can confidently design and implement the components that realize a Leios consensus.
361361

362362
# Technical design
363363

docs/threat-model.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,10 @@ SPOs concerned about front-running competition may choose to bypass the EB mecha
208208
| 18 | Insert or replace transactions in EB | MEV, market manipulation | Stake for block production | Limited detection capability |
209209
| 19 | Ignore certificates, include txs in RB only | Reduces EB throughput, avoids front-running | Stake for block production | Reduced rewards, Self-limiting when load exceeds RB capacity |
210210

211-
### Data Withholding
211+
### Data withholding
212+
213+
> [!NOTE]
214+
> This is also a [key threat informing the Leios technical design](./leios-design#data-withholding)
212215
213216
Adversaries deliberately prevent or delay the diffusion of EB transaction data to disrupt the certification process and degrade network throughput. This attack targets the fundamental dependency between transaction availability and EB certification, exploiting the gap between optimistic and worst-case diffusion scenarios that forms the basis of Leios' security argument. Unlike protocol bursts that overwhelm with volume, data withholding attacks manipulate timing and availability of critical data.
214217

@@ -234,7 +237,10 @@ A particularly dangerous and sophisticated variant targets blockchain safety its
234237
| 21 | Selectively withhold data from voting committee | Prevent honest EB certification, reduces throughput | Network position control | Redundant peer connections, diffusion monitoring |
235238
| 22 | Selectively withhold data from honest nodes | Allow certification, but delay block propagation | Network position control + modest stake | L_diff parameter sizing, worst-case diffusion validation |
236239

237-
### Protocol Bursts
240+
### Protocol bursts
241+
242+
> [!NOTE]
243+
> This is also a [key threat informing the Leios technical design](./leios-design#protocol-bursts)
238244
239245
Adversaries can withhold large numbers of EBs and their transaction closures over extended periods, then release them simultaneously to create concentrated bursts of network traffic. This attack exploits Leios' requirement that nodes must attempt to acquire any EB correctly announced even if it arrives too late for the node to vote on it, since the EB might still be certified by other nodes and required for future chain selection.
240246

0 commit comments

Comments
 (0)