Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Re registering attack protection #27

Open
wants to merge 13 commits into
base: main
Choose a base branch
from

Conversation

liorrutenberg
Copy link

No description provided.

@liorrutenberg
Copy link
Author

Nonce should be removed from the register function, cause the node can validate it

@@ -0,0 +1,95 @@
| Author | Title | Category | Status |
|-----------------------------| ------------------------------- | -------- | ------------------- |
| Lior Rutenberg (@lior-blox) | SSV Register Cluster copied shares attack | Core | open-for-discussion |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

category should be contracts + core

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

done

In both scenarios, a validator would be operating on the SSV network under the control of a harmful user instead of the rightful validator owner.

#### Front-Running
In this scenario, a malicious actor could "front-run" a genuine user trying to register a validator. The registration would appear as legitimate. To keep the attack ongoing, the attacker would cover the validator's fees.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"an honest" instead of genuine

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

done


The BLS signature's authenticity will be confirmed by the SSV nodes, which will use the validator's public key and ensure that the nonce value is greater than the previous one. Instead of being on a validator level, the nonce will be on an account level to prevent scenarios where a validator is deregistered and re-registered by the same user.

The decision regarding whether the nonce should be stored on the contract or solely on the SSV nodes still needs to be made.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the SIP is not leaving open questions, let's decided where the nonce is stored and update the SIP

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I removed this.
we clarified it already in the node spec part

sips/re_registering_attack_protection.md Show resolved Hide resolved

To make any changes (such as removing or changing the cluster), the genuine user would need to exit the validator.

#### Re-registering attack
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

add also removing from a different cluster section explaining it

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added in contract section

Copy link
Contributor

@GalRogozinski GalRogozinski May 17, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If you want to use crypto lingo, then you can call it a "replay attack" or registration replay.
Just a nit

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lior-blox please fix

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed it

2. Altering the validator map keys within the contract to include the address along with the public key.
3. Implementing signature verification within the SSV nodes during the validator registration process.

> Please be aware: A new contract deployment will be necessary to modify the validator map.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

irrelevant to the SIP

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what is irrelevant, the note?

> Please be aware: A new contract deployment will be necessary to modify the validator map.
> Furthermore, the uniqueness of a public key will be associated with each individual address, rather than being unique across the entire contract.

### SSV Keys
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what do you mean by SSV keys? cli changes do not belong to an SIP

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

removed

sips/re_registering_attack_protection.md Show resolved Hide resolved
@alonmuroch
Copy link
Contributor

@lior-blox update?

| [4](./sips/change_operator.md) | Change operators set | open-for-discussion |
| [5](./sips/ecies_share_encryption.md) | ECIES Share Encryption | open-for-discussion |
| [6](./sips/re_registering_attack_protection.md) | Register Cluster copied shares attack | open-for-discussion |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it's 9 not 6, @lior-blox please make changes

```
To:
```solidity
struct Validator {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lior-blox should I push a commit with the current implementation code?

/// @notice Maps each validator's public key to its hashed representation of: operator Ids used by the validator and active / inactive flag (uses LSB)
mapping(bytes32 => bytes32) validatorPKs;

// example of setting the mapping
bytes32 hashedPk = keccak256(abi.encodePacked(publicKey, msg.sender));
validatorPKs[hashedPk] = bytes32(uint256(keccak256(abi.encodePacked(operatorIds))) | uint256(0x01)); // set LSB to 1

Copy link

@mtabasco mtabasco left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lior-blox I left a comment about including the current implementation solidity code in the example section. thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants