-
Notifications
You must be signed in to change notification settings - Fork 5
Re registering attack protection #27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from 5 commits
725718d
3c78f37
a88471e
bdc13e0
1b362a3
5374984
f532c23
95ad0ae
82be1a6
d2ca931
8aad9ac
1883af0
a42dccb
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,12 +1,13 @@ | ||
| ## All SIPS | ||
|
|
||
| | SIP # | Title | Status | | ||
| |---------------------------------------|-----------------------------|--------| | ||
| | [1](./sips/dkg.md) | DKG | open-for-discussion | | ||
| | [2](./sips/msg_struct_encoding.md) | Message struct and encoding | open-for-discussion | | ||
| | [3](./sips/qbft_sync.md) | QBFT Sync | open-for-discussion | | ||
| | [4](./sips/change_operator.md) | Change operators set | open-for-discussion | | ||
| | [5](./sips/ecies_share_encryption.md) | ECIES Share Encryption | open-for-discussion | | ||
| | [6](./sips/constant_qbft_timeout.md) | Constant QBFT timeout | open-for-discussion | | ||
| | [7](./sips/fork_support.md) | Fork Support | open-for-discussion | | ||
| | [8](./sips/pre_consensus_livness.md) | Pre-Consensus livness fix | open-for-discussion | | ||
| | SIP # | Title | Status | | ||
| |-------------------------------------------------|---------------------------------------|---------------------| | ||
| | [1](./sips/dkg.md) | DKG | open-for-discussion | | ||
| | [2](./sips/msg_struct_encoding.md) | Message struct and encoding | open-for-discussion | | ||
| | [3](./sips/qbft_sync.md) | QBFT Sync | open-for-discussion | | ||
| | [4](./sips/change_operator.md) | Change operators set | open-for-discussion | | ||
| | [5](./sips/ecies_share_encryption.md) | ECIES Share Encryption | open-for-discussion | | ||
| | [6](./sips/constant_qbft_timeout.md) | Constant QBFT timeout | open-for-discussion | | ||
| | [7](./sips/fork_support.md) | Fork Support | open-for-discussion | | ||
| | [8](./sips/pre_consensus_livness.md) | Pre-Consensus livness fix | open-for-discussion | | ||
| | [9](./sips/re_registering_attack_protection.md) | Register Cluster copied shares attack | open-for-discussion | |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,12 +1,13 @@ | ||
| ## Core | ||
|
|
||
| | SIP # | Title | Status | | ||
| |------------------------------------|-----------------------------|--------| | ||
| | [1](./sips/dkg.md) | DKG | open-for-discussion | | ||
| | [2](./sips/msg_struct_encoding.md) | Message struct and encoding | open-for-discussion | | ||
| | [3](./sips/qbft_sync.md) | QBFT Sync | open-for-discussion | | ||
| | [4](./sips/change_operator.md) | Change operators set | open-for-discussion | | ||
| | [5](./sips/ecies_share_encryption.md) | ECIES Share Encryption | open-for-discussion | | ||
| | [6](./sips/constant_qbft_timeout.md) | Constant QBFT timeout | open-for-discussion | | ||
| | [7](./sips/fork_support.md) | Fork Support | open-for-discussion | | ||
| | [8](./sips/pre_consensus_livness.md) | Pre-Consensus livness fix | open-for-discussion | | ||
| | SIP # | Title | Status | | ||
| |-------------------------------------------------|---------------------------------------|---------------------| | ||
| | [1](./sips/dkg.md) | DKG | open-for-discussion | | ||
| | [2](./sips/msg_struct_encoding.md) | Message struct and encoding | open-for-discussion | | ||
| | [3](./sips/qbft_sync.md) | QBFT Sync | open-for-discussion | | ||
| | [4](./sips/change_operator.md) | Change operators set | open-for-discussion | | ||
| | [5](./sips/ecies_share_encryption.md) | ECIES Share Encryption | open-for-discussion | | ||
| | [6](./sips/constant_qbft_timeout.md) | Constant QBFT timeout | open-for-discussion | | ||
| | [7](./sips/fork_support.md) | Fork Support | open-for-discussion | | ||
| | [8](./sips/pre_consensus_livness.md) | Pre-Consensus livness fix | open-for-discussion | | ||
| | [9](./sips/re_registering_attack_protection.md) | Register Cluster copied shares attack | open-for-discussion | |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,95 @@ | ||
| | Author | Title | Category | Status | | ||
| |-----------------------------| ------------------------------- | -------- | ------------------- | | ||
| | Lior Rutenberg (@lior-blox) | SSV Register Cluster copied shares attack | Core | open-for-discussion | | ||
|
|
||
| ## Summary | ||
|
|
||
| A "copied shares" attack can occur when a malicious actor registers valid shares to a legitimate validator by either "frontrunning" a valid registration of a cluster transaction, or re-registering a previously removed validator. | ||
|
|
||
| In both scenarios, a validator would be operating on the SSV network under the control of a harmful user instead of the rightful validator owner. | ||
|
|
||
| #### Front-Running | ||
| In this scenario, a malicious actor could "front-run" a genuine user trying to register a validator. The registration would appear as legitimate. To keep the attack ongoing, the attacker would cover the validator's fees. | ||
|
||
|
|
||
| To make any changes (such as removing or changing the cluster), the genuine user would need to exit the validator. | ||
|
|
||
| #### Re-registering attack | ||
|
||
| In this case, an attacker could identify a validator that has been removed (from the SSV network) and quickly re-register it, thereby preventing the owner from transferring the validator elsewhere. Similar to the front-running scenario, the attacker would cover the validator's fees to keep the attack active. | ||
|
|
||
| In response, the genuine user would need to exit the validator immediately. | ||
|
|
||
| ## Rational & Design Goals | ||
| This SIP proposes a method to safeguard users by preventing unauthorized access to their validators by harmful entities. The proposal ensures that only the legitimate owner of a validator can enroll it in the SSV network. The process involves using the validator's private key to sign the address that is registering, along with a nonce. | ||
|
|
||
| The nonce is a necessary addition to prevent a unique edge case where, if a validator address that has been removed is compromised, a malicious party could potentially re-register it using the original address. | ||
|
|
||
| The BLS signature's authenticity will be confirmed by the SSV nodes, which will use the validator's public key and ensure that the nonce value is greater than the previous one. Instead of being on a validator level, the nonce will be on an account level to prevent scenarios where a validator is deregistered and re-registered by the same user. | ||
alonmuroch marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| The decision regarding whether the nonce should be stored on the contract or solely on the SSV nodes still needs to be made. | ||
|
||
|
|
||
| ## Specification | ||
| The specification is organized into three distinct sections: | ||
|
|
||
| 1. Modifying the validator enrollment procedure to incorporate the validator's signature on the address. | ||
| 2. Altering the validator map keys within the contract to include the address along with the public key. | ||
| 3. Implementing signature verification within the SSV nodes during the validator registration process. | ||
|
|
||
| > Please be aware: A new contract deployment will be necessary to modify the validator map. | ||
|
||
| > Furthermore, the uniqueness of a public key will be associated with each individual address, rather than being unique across the entire contract. | ||
|
|
||
| ### SSV Keys | ||
|
||
| Inputs for SSV keys should encompass both the validator's address and the most recent account nonce. | ||
|
|
||
| These inputs will utilize the validator's private key to sign the address as well as the incremented nonce. | ||
|
|
||
| The resultant output should not only contain the current output but also the signature and the incremented nonce. | ||
|
|
||
| ### SSV Contract | ||
|
|
||
| Changing the validator mapping to include the address in addition to the public key. | ||
|
|
||
| From: | ||
| ```solidity | ||
| struct Validator { | ||
| address owner; | ||
| bool active; | ||
| } | ||
| mapping(bytes32 => Validator) public validatorPKs; | ||
| ``` | ||
| To: | ||
| ```solidity | ||
| struct Validator { | ||
|
||
| bytes32 hashedOperators; | ||
| bool active; | ||
| } | ||
| mapping(bytes32 => Validator) public validatorPKs; | ||
|
|
||
| //example of setting the mapping | ||
| validatorPKs[keccak256(abi.encodePacked(publicKey, msg.sender))] = Validator({hashedOperators: keccak256(operatorIds), active: true}); | ||
|
|
||
| function registerValidator( | ||
| bytes calldata publicKey, | ||
| uint64[] memory operatorIds, | ||
| bytes calldata shares, | ||
| bytes calldata signature, //signature on the address and nonce | ||
| uint256 amount, | ||
| Cluster memory cluster | ||
| ) | ||
|
|
||
| ``` | ||
| > Note: The input parameters for the registerValidator function are not yet finalized and should be evaluated in light of optimizing gas fees. | ||
| > | ||
| > Several potential arrangements are under consideration: | ||
| > 1. Consolidating shares, signature, and nonce into a single bytes array. | ||
| > 2. Merging signature and nonce into a single bytes array. | ||
| > 3. Keeping all elements separate. | ||
|
|
||
| ### SSV Node | ||
alonmuroch marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| Every nonce associated with registration will be stored by the SSV node. | ||
|
|
||
| The nonce will be kept in a mapping that links addresses to their respective nonces. | ||
|
|
||
| The SSV node will confirm the signature of the address and nonce by using the validator's public key. | ||
|
|
||
| The nonce should be sequentially larger than the previously stored nonce. | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
category should be contracts + core
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done