You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

65 lines
2.9 KiB

  1. # Light Client Protocol
  2. NOTE: This specification is under heavy development and is not yet complete nor
  3. accurate.
  4. ## Contents
  5. - [Motivation](#motivation)
  6. - [Structure](#structure)
  7. - [Core Verification](./verification.md)
  8. - [Fork Detection](./detection.md)
  9. - [Fork Accountability](./accountability.md)
  10. ## Motivation
  11. The Tendermint Light Client is motivated by the need for a light weight protocol
  12. to sync with a Tendermint blockchain, with the least processing necessary to
  13. securely verify a recent state. The protocol consists of managing trusted validator
  14. sets and trusted block headers, and is based primarily on checking hashes
  15. and verifying Tendermint commit signatures.
  16. Motivating use cases include:
  17. - Light Node: a daemon that syncs a blockchain to the latest committed header by making RPC requests to full nodes.
  18. - State Sync: a reactor that syncs a blockchain to a recent committed state by making P2P requests to full nodes.
  19. - IBC Client: an ABCI application library that syncs a blockchain to a recent committed header by receiving proof-carrying
  20. transactions from "IBC relayers", who make RPC requests to full nodes on behalf of the IBC clients.
  21. ## Structure
  22. ### Components
  23. The Tendermint Light Client consists of three primary components:
  24. - [Core Verification](./verification.md): verifying hashes, signatures, and validator set changes
  25. - [Fork Detection](./detection.md): talking to multiple peers to detect Byzantine behaviour
  26. - [Fork Accountability](./accountability.md): analyzing Byzantine behaviour to hold validators accountable.
  27. While every light client must perform core verification and fork detection
  28. to achieve their prescribed security level, fork accountability is expected to
  29. be done by full nodes and validators, and is thus more accurately a component of
  30. the full node consensus protocol, though it is included here since it is
  31. primarily concerned with providing security to light clients.
  32. A schematic of the core verification and fork detection components in
  33. a Light Node are depicted below. The schematic is quite similar for other use cases.
  34. Note that fork accountability is not depicted, as it is the responsibility of the
  35. full nodes.
  36. ![Light Client Diagram](./assets/light-node-image.png).
  37. ### Synchrony
  38. Light clients are fundamentally synchronous protocols,
  39. where security is restricted by the interval during which a validator can be punished
  40. for Byzantine behaviour. We assume here that such intervals have fixed and known minimal duration
  41. referred to commonly as a blockchain's Unbonding Period.
  42. A secure light client must guarantee that all three components -
  43. core verification, fork detection, and fork accountability -
  44. each with their own synchrony assumptions and fault model, can execute
  45. sequentially and to completion within the given Unbonding Period.
  46. TODO: define all the synchrony parameters used in the protocol and their
  47. relation to the Unbonding Period.