Skip to content

Update threat model for Linear Leios #486

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 10 commits into
base: main
Choose a base branch
from
Open

Update threat model for Linear Leios #486

wants to merge 10 commits into from

Conversation

ch1bo
Copy link
Member

@ch1bo ch1bo commented Aug 6, 2025

Updated scope to fit the latest design we have in the CIP draft. Updated several threats in there. I'm not 100% happy with the level of detail and its honestly a bit hard to maintain (also the diffs are horrible with re-ordering things). Especially as there are very good write-ups of attacks already.

Some key changes / observations:

  • Linear leios does not allow us to use mitigate withholding and front-running by over-parameterization (M5)
  • Linear leios avoids conflicting transactions by design. This is covered by M11, but I'm not sure whether things avoided by design should be actual mitigations?

@will-break-it Feel free to use it or leave it out for the CIP rationale/appendix.

@ch1bo ch1bo force-pushed the update-threat-model branch from 93ea9e8 to f4853a3 Compare August 6, 2025 14:20
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR updates the threat model to align with the simplified "Linear Leios" design that eliminates Input Blocks (IBs) and couples Endorser Block (EB) and Ranking Block (RB) production by the same block producer. The update reflects significant architectural changes in the consensus mechanism and reassesses threat scenarios accordingly.

Key changes include:

  • Updated system overview to reflect Linear Leios architecture with coupled RB/EB production
  • Revised threat analysis with updated likelihood assessments and attack vectors
  • Added new mitigation strategy (M11) for conflicting transactions and noted limitations of over-parameterization (M5)

@ch1bo ch1bo force-pushed the update-threat-model branch from f4853a3 to 6b0439e Compare August 6, 2025 14:21
**Control type**: By design

**Implementation**:
- Protocol design inherently prevents conflicting transactions from reaching the chain
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not 100% true any more, because of the need for execution bitmaps.

#### T?: Honey Pot Contract

**Description**: An attacker deliberately makes ADA available on-chain so anyone races to claim it with the goal of producing many conflicting transactions. This is very similar to T1, but uses cryptocurrency instead of network resources.
#### T8: Transaction Withholding
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A more powerful related attack is to delay releasing transactions for several seconds. This will create a spike in fetches of those transactions so that some nodes do not have enough time to retrieve+validate them and then vote.

Copy link
Collaborator

@bwbush bwbush left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I noted a coupe of corrections. Aside from those, this is aligned with the latest version of Linear Leios.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants