You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/threat-model.md
+22-30Lines changed: 22 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,15 +10,15 @@ A threat model for the Leios consensus change for Cardano. This was created by r
10
10
11
11
See also [the threat model section in Leios Technical Report #1](./technical-report-1.md#threat-model) and more [comments on attack surface in Leios Technical Report #2](./technical-report-2.md#notes-on-the-leios-attack-surface).
12
12
13
-
## 1. System Overview
13
+
## System Overview
14
14
15
15
> [!NOTE]
16
16
> The described system here is the heavily simplified EB-only variant of Leios. Whenever we update this, reflect on existing assets, threats and mitigations, as well as add new ones accordingly.
17
17
18
-
### 1.1 Description
18
+
### Description
19
19
Leios is an overlay protocol on top of Ouroboros Praos that enhances transaction throughput by introducing Endorser Blocks (EBs) alongside regular Praos blocks (Ranking Blocks - RBs). The system maintains backward compatibility at the client interface while introducing new responsibilities for stake pools.
20
20
21
-
### 1.2 Key Components
21
+
### Key Components
22
22
23
23
#### Core Components
24
24
-**Ranking Block (RB)**: Standard Praos block enhanced with a Leios certificate
@@ -37,19 +37,19 @@ Leios is an overlay protocol on top of Ouroboros Praos that enhances transaction
37
37
-**Relay Nodes**: Participate in transaction and block diffusion
38
38
-**Clients**: Submit transactions and observe the chain / ledger state evolving, ideally maintain backward compatibility and may largely unaware of Leios mechanics
39
39
40
-
###1.3 System Flow
40
+
###3 System Flow
41
41
1. Stake pools create EBs based on VRF eligibility (parameterizable stage length)
42
42
2. EBs are announced and propagated through the network
43
43
3. A committee of nodes (> 500 by stake) vote on EB validity and transaction availability
44
44
4. If a quorum of voting stake (> 60%) approves, a certificate is created
45
45
5. Certificates are included in the next available RB (every ~20 seconds)
46
46
6. Missing transactions are fetched on-demand when EBs are processed
47
47
48
-
## 2. Assets to Protect
48
+
## Assets to Protect
49
49
50
50
For each asset we define what could be impacted in respect to its Confidentiality, Integrity, Availability; i.e. the [CIA Triad](https://www.splunk.com/en_us/blog/learn/cia-triad-confidentiality-integrity-availability.html)
51
51
52
-
### 2.1 Blockchain Safety
52
+
### Blockchain Safety
53
53
**Description**: The fundamental guarantee that all honest nodes agree on the blockchain history and no conflicting valid chains exist.
54
54
55
55
**CIA Impact:**
@@ -59,7 +59,7 @@ For each asset we define what could be impacted in respect to its Confidentialit
59
59
60
60
**Leios-Specific Considerations**: Vote certificates and EB validation must not create conflicting blockchain states or enable double-spending.
61
61
62
-
### 2.2 Blockchain Liveness
62
+
### Blockchain Liveness
63
63
**Description**: The guarantee that the blockchain continues to make progress by producing new blocks and processing transactions within reasonable time bounds.
64
64
65
65
**CIA Impact:**
@@ -69,7 +69,7 @@ For each asset we define what could be impacted in respect to its Confidentialit
69
69
70
70
**Leios-Specific Considerations**: EB creation, voting, and certificate inclusion must not prevent regular block production or create bottlenecks.
71
71
72
-
### 2.3 Transaction Validity, Availability, and Determinism
72
+
### Transaction Validity, Availability, and Determinism
73
73
**Description**: All transactions included in the blockchain must be cryptographically valid, available to all network participants for verification, and deterministic (transactions only consume fees if successfully included, a key Cardano property).
74
74
75
75
**CIA Impact:**
@@ -79,7 +79,7 @@ For each asset we define what could be impacted in respect to its Confidentialit
79
79
80
80
**Leios-Specific Considerations**: EBs reference transactions that must be available when the EB is processed; voting nodes must verify transaction availability before voting; deterministic behavior must be preserved across the EB endorsement and certification process.
81
81
82
-
### 2.4 Operational Sustainability
82
+
### Operational Sustainability
83
83
**Description**: Computational and network resources consumed by Stake Pool Operators to participate in the protocol, including CPU, memory, storage, and bandwidth. Resource increases are acceptable as long as they are covered by corresponding incentives to maintain operational sustainability.
84
84
85
85
**CIA Impact:**
@@ -89,15 +89,15 @@ For each asset we define what could be impacted in respect to its Confidentialit
89
89
90
90
**Leios-Specific Considerations**: New responsibilities (EB creation, voting, additional network protocols) must not significantly increase SPO operational costs relative to incentives or create barriers to participation.
91
91
92
-
### 2.5 Decentralization Properties
92
+
### Decentralization Properties
93
93
**Description**: The distribution of block production, voting power, and network participation across many independent operators.
94
94
95
95
**CIA Impact:**
96
96
-**Confidentiality**: LOW - Centralization patterns are observable but don't directly affect data secrecy
97
97
-**Integrity**: HIGH - Centralization increases risk of coordinated attacks on consensus
98
98
-**Availability**: HIGH - Centralized infrastructure creates single points of failure
99
99
100
-
### 2.6 High Throughput
100
+
### High Throughput
101
101
**Description**: The enhanced transaction processing capacity that Leios provides beyond basic Praos liveness, enabling the network to handle significantly more transactions per unit time.
102
102
103
103
**CIA Impact:**
@@ -107,11 +107,11 @@ For each asset we define what could be impacted in respect to its Confidentialit
107
107
108
108
**Leios-Specific Considerations**: EB certification failures, voting delays, or resource exhaustion attacks directly impact the throughput gains Leios is designed to provide.
109
109
110
-
## 3. Threats
110
+
## Threats
111
111
112
112
Notable threats to the system that could impact assets.
113
113
114
-
### 3.1 Network-Level Threats
114
+
### Network-Level Threats
115
115
116
116
#### T1: Mempool Partitioning Attack
117
117
**Description**: Attacker deliberately partitions the mempools of block producing nodes by submitting conflicting transactions (spending the same inputs) to different network segments, creating inconsistent views of valid transactions across the network.
@@ -141,7 +141,7 @@ Notable threats to the system that could impact assets.
141
141
142
142
**Assets Affected**: High Throughput, Operational Sustainability, Blockchain Safety
143
143
144
-
#### T2: Eclipse Attack on Voting Nodes
144
+
#### Eclipse Attack on Voting Nodes
145
145
**Description**: Attacker isolates top voting nodes to manipulate vote collection by controlling their network connections and information flow.
146
146
147
147
**Prerequisites**:
@@ -167,7 +167,7 @@ Notable threats to the system that could impact assets.
167
167
168
168
**Assets Affected**: Blockchain Safety, High Throughput
169
169
170
-
#### T3: Vote Flooding Attack
170
+
#### Vote Flooding Attack
171
171
**Description**: Malicious nodes flood the network with invalid or duplicate votes to overwhelm voting infrastructure and waste network resources.
172
172
173
173
**Prerequisites**:
@@ -192,7 +192,7 @@ Notable threats to the system that could impact assets.
192
192
193
193
**Assets Affected**: Operational Sustainability, High Throughput
194
194
195
-
### 3.2 Consensus-Level Threats
195
+
### Consensus-Level Threats
196
196
197
197
#### T4: EB Withholding Attack
198
198
**Description**: Eligible stake pools deliberately withhold EBs they are entitled to create, reducing network throughput and potentially enabling censorship.
@@ -287,7 +287,7 @@ Notable threats to the system that could impact assets.
287
287
288
288
**Assets Affected**: Decentralization Properties
289
289
290
-
### 3.3 Transaction-Level Threats
290
+
### Transaction-Level Threats
291
291
292
292
#### T8: Transaction Availability Attack
293
293
**Description**: Attacker creates EBs referencing unavailable transactions to waste network resources and disrupt certification.
@@ -312,7 +312,7 @@ Notable threats to the system that could impact assets.
312
312
313
313
**Assets Affected**: High Throughput, Operational Sustainability
314
314
315
-
#### T9: Transaction Front-Running
315
+
#### Transaction Front-Running
316
316
**Description**: EB producers observe profitable transactions and reorder or insert their own transactions to extract value before the original transaction executes.
317
317
318
318
**Prerequisites**:
@@ -336,7 +336,7 @@ Notable threats to the system that could impact assets.
0 commit comments