You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/leios-design/README.md
+27-44Lines changed: 27 additions & 44 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -282,7 +282,7 @@ The cost to the victim is merely the work to acquire the closures and to check t
282
282
In particular, at most one of the EBs in the burst could extend the tip of a victim node's current selection, and so that's the only EB the victim would attempt to fully parse and validate.
283
283
284
284
Even without honest nodes needing to validate the vast majority of the burst, the sheer amount of concentrated bandwidth utilization can be problematic.
285
-
Suppose the adversary controls 1/3rd stake and they're issuing nominal RBs.
285
+
**Attack magnitude.**Suppose the adversary controls 1/3rd stake and they're issuing nominal RBs.
286
286
Recall that CIP-164 requires each honest node to attempt to acquire any EB that was promptly announced within the last 12 hours.
287
287
Even if it's too late for the honest node itself to vote on a tardy EB, the lack of global objective information implies the node must not assume the EB cannot be certified by other node's in the network.
288
288
Thus, the honest node might later need to switch to a fork that requires having this EB, and that switch ideally wouldn't be delayed by waiting on that EB's arrival; the node should still acquire the EB as soon as it can.
@@ -293,7 +293,7 @@ In this scenario---which is not the worst-case---the average would be approximat
293
293
There could be several thousand if the adversary is also grinding, for example, and/or had closer to 50% stake, etc.
294
294
If each of the attacker's EBs has the maximum size of 500 kilobytes of tx references and 12.5 megabytes of actual txs---which don't even need to be valid---then that's an average of 720 * (12.5 + 0.5 megabytes) = 9.36 gigabytes the honest nodes will be eagerly diffusing throughout the network.
295
295
296
-
For however long it takes for the network to (carefully) diffuse 10 gigabytes, honest traffic might diffuse more poorly.
296
+
**Resource contention.**For however long it takes for the network to (carefully) diffuse 10 gigabytes, honest traffic might diffuse more poorly.
297
297
CIP-164 requires that Praos traffic will be preferred over Leios traffic and that fresher Leios traffic will be preferred over stale Leios traffic.
298
298
That would prevent the burst from degrading contemporary honest traffic if the prioritization could be perfect.
299
299
However, there are some infrastructural resources that cannot be prioritized perfectly nor instantly reapportioned, including: CPU, memory, disk, disk bandwidth, and buffer utilization on the nodes themselves but also along the Internet routers carrying packets between Cardano peers.
@@ -305,7 +305,7 @@ If none of the 720 EBs overlap, then there would be more than 7,200,000 unique t
305
305
The identifying hashes of those txs alone is more than 230 megabytes.
306
306
To maximize the bookkeeping overhead, for example, the adversary might choose to diffuse all of the EB bodies before diffusing any of their closures.
307
307
308
-
It remains an engineering challenge to achieve as much prioritization as possible, especially during a protocol burst, without unnecessarily delaying the diffusion of any EB.
308
+
**Implementation challenge.**It remains an engineering challenge to achieve as much prioritization as possible, especially during a protocol burst, without unnecessarily delaying the diffusion of any EB.
309
309
That is, determining how to prevent this kind of protocol burst from increasing the latency of contemporary Praos and Leios traffic among honest nodes.
310
310
311
311
The adversary is only able to issue EBs at an average rate in proportion to their resources (stake and grinding).
@@ -314,55 +314,38 @@ However, the Praos security argument's parameters represent the worst-case, so t
314
314
315
315
### Data withholding
316
316
317
-
In a data withholding attack (**ATK-LeiosDataWithholding**), the adversary deliberately prevents the diffusion of endorser block transaction closures to disrupt the certification process and degrade network throughput.
318
-
This attack targets the fundamental dependency between transaction availability and EB certification, exploiting the gap between optimistic and worst-case diffusion scenarios that forms the basis of Leios' [security argument](https://github.com/cardano-scaling/CIPs/blob/leios/CIP-0164/README.md#protocol-security).
317
+
In a data withholding attack (**ATK-LeiosDataWithholding**), the adversary deliberately prevents the diffusion of endorser block transaction closures to disrupt certification and degrade network throughput.
318
+
This attack exploits the fundamental dependency between transaction availability and EB certification, targeting the gap between optimistic and worst-case diffusion scenarios that underlies Leios' [security argument](https://github.com/cardano-scaling/CIPs/blob/leios/CIP-0164/README.md#protocol-security).
319
319
320
-
The attack operates by manipulating the timing and availability of transaction data required for EB validation.
321
-
When an EB is announced via an RB header, voting committee members must acquire and validate the complete transaction closure before they can cast their votes.
322
-
The adversary can exploit this requirement in several ways: withholding the EB body itself, selectively withholding individual transactions referenced by the EB, or strategically timing the release of data to exceed the voting period deadline.
320
+
The attack operates by manipulating timing and availability of transaction data required for EB validation.
321
+
When an EB is announced via an RB header, voting committee members must acquire and validate the complete transaction closure before casting votes.
322
+
The adversary can exploit this in several ways: withholding the EB body itself, selectively withholding individual transactions, or strategically timing data release to exceed the $L_\text{vote}$ deadline.
323
323
324
-
The most direct form involves an adversarial block producer creating valid EBs but refusing to serve the transaction closures when requested by voting nodes.
324
+
**Direct threshold impact.**The most direct form involves an adversarial block producer creating valid EBs but refusing to serve transaction closures when requested by voting nodes.
325
325
Since committee members cannot validate unavailable transactions, they cannot vote for certification, effectively nullifying the EB's throughput contribution.
326
-
This attack requires no additional stake beyond block production eligibility and can be executed by any malicious SPO.
326
+
More sophisticated variants involve network-level manipulation where the adversary controls network relays to selectively prevent transaction propagation to specific voting committee members.
327
327
328
-
A more sophisticated variant involves network-level manipulation where the adversary controls routing infrastructure or operates multiple nodes to selectively prevent transaction propagation to specific voting committee members.
329
-
By ensuring that a sufficient fraction of voting stake cannot access the required transaction data within the $L_\text{vote}$ period, the adversary can prevent EBs from achieving the certification threshold even when the transactions are technically available elsewhere in the network.
328
+
Consider an adversary controlling 15% of stake attempting to prevent honest EBs from achieving the 75% certification threshold.
329
+
The adversary must withhold transaction data from enough voting committee members to reduce available honest stake below 75%.
330
+
Since the adversary controls 15% stake directly, they need to prevent an additional 10% of honest stake from voting.
331
+
This demonstrates how modest adversarial stake combined with strategic network positioning could significantly impact honest EB certification.
330
332
331
-
The quantitative impact depends on the adversary's capabilities and the network's diffusion characteristics.
332
-
In the simplest case where a single adversarial block producer withholds their own EB data, the throughput loss is limited to that producer's contribution—approximately their proportional stake multiplied by the EB capacity.
333
-
However, when combined with network partitioning techniques, the attack can affect honest EBs by preventing their certification.
333
+
**Attack on safety.** While throughput degradation represents the obvious impact, the most dangerous variant targets blockchain safety itself.
334
+
The adversary can strategically delay transaction data release to create scenarios where EBs achieve certification but cannot be processed by honest nodes within the required timeframe.
335
+
Just before the voting deadline, they release data to a subset of voting committee members—enough to achieve certification, but not to all network participants.
336
+
The resulting certificate gets included in a subsequent RB, but honest block producers cannot acquire the certified EB's transaction closure within $L_\text{diff}$.
334
337
335
-
Consider an adversary controlling 20% of stake and strategically targeting EBs from honest producers by selectively withholding transaction data to 30% of the voting committee.
336
-
If the certification threshold is set at 67%, and the remaining 70% of voters represent 47% stake on average (due to the random committee selection), many honest EBs would fail certification.
337
-
This could reduce effective throughput by 50% or more, far exceeding the adversary's direct stake proportion.
338
+
By reducing the number of honest nodes that received the EB data in time for certification, the adversary also impairs subsequent diffusion.
339
+
With fewer nodes initially possessing the complete transaction closure, propagation becomes slower and less reliable, potentially extending diffusion times beyond protocol anticipation.
340
+
This would represent a violation of Praos' timing assumptions.
341
+
While missing the $\Delta$ deadline occasionally does not break safety, short forks are normal in Ouroboros, persistent violations can lead to longer forks and degraded chain quality.
342
+
In summary, the attack fundamentally challenges the security argument's assumption that the difference between optimistic and worst-case diffusion remains bounded by $L_\text{diff}$.
338
343
339
-
While throughput degradation represents the obvious impact, the most dangerous variant of data withholding targets blockchain safety itself.
340
-
The attack exploits the timing relationship between EB certification and the Praos diffusion deadline $\Delta$.
341
-
An adversary can strategically delay transaction data release to create a scenario where EBs achieve certification but cannot be processed by honest nodes within the required timeframe.
344
+
Mitigation relies primarily on the protocol design ensuring that diffusion timing remains bounded even under adversarial conditions.
345
+
The certification mechanism provides defense against stake-based withholding by requiring broad consensus before including EBs in the ledger.
346
+
Network-level attacks require sophisticated countermeasures including redundant peer connections, timeouts that punish non-responsive nodes, and strategic committee selection considering network topology.
342
347
343
-
Consider this attack sequence: The adversary allows an EB to be announced and initially withholds transaction data to prevent early voting.
344
-
Just before the voting deadline, they release the data to a subset of voting committee members—enough to achieve certification, but not to all network participants.
345
-
The resulting certificate gets included in a subsequent RB, but honest block producers who need to build upon this RB cannot acquire the certified EB's transaction closure within $L_\text{diff}$.
346
-
347
-
By reducing the number of honest nodes that received the EB data in time for certification, the adversary also impairs the subsequent diffusion process itself.
348
-
With fewer nodes initially possessing the complete transaction closure, the peer-to-peer propagation becomes slower and less reliable, potentially extending diffusion times beyond what the protocol's timing parameters anticipate.
349
-
350
-
This creates a violation of Praos' timing assumptions.
351
-
While missing the $\Delta$ deadline occasionally does not break safety—short forks are normal in Ouroboros and handled by the fork choice rule—persistent violations can lead to longer forks than the protocol is designed to handle.
352
-
If honest nodes regularly cannot construct the ledger state required to validate and build upon ranking blocks within reasonable time bounds, it degrades the chain quality and increases the risk of deeper reorganizations.
353
-
Some honest nodes may consistently lag behind in processing certified EBs, creating a persistent split in the network's view of the valid chain tip.
354
-
355
-
The attack fundamentally challenges the security argument's assumption that the difference between optimistic and worst-case diffusion remains bounded by $L_\text{diff}$.
356
-
When data withholding prevents unanimous certification of honest EBs, it merely reduces throughput.
357
-
But when it allows partial certification followed by delayed availability, it can compromise the blockchain safety property that underpins Cardano's value proposition.
358
-
359
-
Mitigation relies primarily on the protocol's design ensuring that the difference between optimistic and worst-case diffusion remains bounded by $L_\text{diff}$ even under adversarial conditions.
360
-
The certification mechanism itself provides defense against stake-based withholding by requiring broad consensus before including EBs in the ledger.
361
-
Network-level attacks require more sophisticated countermeasures including redundant peer connections, timeouts that punish non-responsive nodes, and strategic committee selection that considers network topology.
362
-
363
-
The implementation must validate empirically that real-world network conditions support the timing assumptions underlying the security argument.
364
-
Prototyping efforts should specifically test diffusion performance under adversarial scenarios where motivated attackers attempt to maximize the gap between optimistic and worst-case EB availability.
365
-
Only through such validation can we ensure that the $L_\text{diff}$ parameter provides adequate protection against data withholding attacks while maintaining the throughput benefits that justify Leios' complexity.
348
+
The implementation must validate empirically that real-world network conditions support the timing assumptions underlying the security argument through adversarial diffusion testing.
0 commit comments