This repository was archived by the owner on Aug 19, 2024. It is now read-only.
[Governance] Disrupting the chain through the actions of a solitary malicious CN node #1942
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Proposed changes
Each CN have a power to vote global network parameter. Let me describe how a single CN can destroy the entire chain. Note that this attack is not exploiting the protocol, rather it targets the implementation error.
Problem
Assume that a governance mode is
none
(ballot
is also feasible to attack. Explained later). Single CN can change any global parameter in this mode. Themintingamount
item had not been well considered for an allowed set of input values. So, any negative values are acceptable. In the next epoch, all the validators do not claim that the scheduled voting is not illegal. And, it successfully shipped to the block at the first epoch. At 2nd epoch, theEffectiveParams
start to malfunction because the checkers betweengovParamType
andGovernanceItems
are slightly different.The type checker for big integer of
GovernanceItems
:The type checker for big integer of
govParamType
:Implication
By the malfunctioning of the
EffectiveParams
, the chain does not proceed with necessary works such as header verification and creating a new snapshot. Restarting does not solve this problem. Either only rewinding the chain for all CNs, PNs, and ENs or a new hardfork will fix it.In the
Ballot
mode, a few of CN can launch this attack too by having total voting occupation over 50%, not requiring over 2/3 nodes' to agree.Types of changes
Please put an x in the boxes related to your change.
Checklist
Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.
$ make test
)Related issues
Further comments
If this is a relatively large or complex change, kick off the discussion by explaining why you chose the solution you did and what alternatives you considered, etc...