You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

360 lines
20 KiB

  1. # Lite client
  2. A lite client is a process that connects to Tendermint full nodes and then tries to verify application data using the Merkle proofs.
  3. ## Context of this document
  4. In order to make sure that full nodes have the incentive to follow the protocol, we have to address the following three Issues
  5. 1) The lite client needs a method to verify headers it obtains from full nodes according to trust assumptions -- this document.
  6. 2) The lite client must be able to connect to one correct full node to detect and report on failures in the trust assumptions (i.e., conflicting headers) -- a future document.
  7. 3) In the event the trust assumption fails (i.e., a lite client is fooled by a conflicting header), the Tendermint fork accountability protocol must account for the evidence -- see #3840
  8. ## Problem statement
  9. We assume that the lite client knows a (base) header *inithead* it trusts (by social consensus or because the lite client has decided to trust the header before). The goal is to check whether another header *newhead* can be trusted based on the data in *inithead*.
  10. The correctness of the protocol is based on the assumption that *inithead* was generated by an instance of Tendermint consensus. The term "trusting" above indicates that the correctness on the protocol depends on this assumption. It is in the responsibility of the user that runs the lite client to make sure that the risk of trusting a corrupted/forged *inithead* is negligible.
  11. ## Definitions
  12. ### Data structures
  13. In the following, only the details of the data structures needed for this specification are given.
  14. * header fields
  15. - *height*
  16. - *bfttime*: the chain time when the header (block) was generated
  17. - *V*: validator set containing validators for this block.
  18. - *NextV*: validator set for next block.
  19. - *commit*: evidence that block with height *height* - 1 was committed by a set of validators (canonical commit). We will use ```signers(commit)``` to refer to the set of validators that committed the block.
  20. * signed header fields: contains a header and a *commit* for the current header; a "seen commit". In the Tendermint consensus the "canonical commit" is stored in header *height* + 1.
  21. * For each header *h* it has locally stored, the lite client stores whether
  22. it trusts *h*. We write *trust(h) = true*, if this is the case.
  23. * Validator fields. We will write a validator as a tuple *(v,p)* such that
  24. + *v* is the identifier (we assume identifiers are unique in each validator set)
  25. + *p* is its voting power
  26. ### Functions
  27. For the purpose of this lite client specification, we assume that the Tendermint Full Node exposes the following function over Tendermint RPC:
  28. ```go
  29. func Commit(height int64) (SignedHeader, error)
  30. // returns signed header: header (with the fields from
  31. // above) with Commit that include signatures of
  32. // validators that signed the header
  33. type SignedHeader struct {
  34. Header Header
  35. Commit Commit
  36. }
  37. ```
  38. ### Definitions
  39. * *tp*: trusting period
  40. * for realtime *t*, the predicate *correct(v,t)* is true if the validator *v*
  41. follows the protocol until time *t* (we will see about recovery later).
  42. ### Tendermint Failure Model
  43. If a block *h* is generated at time *bfttime* (and this time is stored in the block), then a set of validators that hold more than 2/3 of the voting power in h.Header.NextV is correct until time h.Header.bfttime + tp.
  44. Formally,
  45. \[
  46. \sum_{(v,p) \in h.Header.NextV \wedge correct(v,h.Header.bfttime + tp)} p >
  47. 2/3 \sum_{(v,p) \in h.Header.NextV} p
  48. \]
  49. *Assumption*: "correct" is defined w.r.t. realtime (some Newtonian global notion of time, i.e., wall time), while *bfttime* corresponds to the reading of the local clock of a validator (how this time is computed may change when the Tendermint consensus is modified). In this note, we assume that all clocks are synchronized to realtime. We can make this more precise eventually (incorporating clock drift, accuracy, precision, etc.). Right now, we consider this assumption sufficient, as clock synchronization (under NTP) is in the order of milliseconds and *tp* is in the order of weeks.
  50. *Remark*: This failure model might change to a hybrid version that takes heights into account in the future.
  51. The specification in this document considers an implementation of the lite client under this assumption. Issues like *counter-factual signing* and *fork accountability* and *evidence submission* are mechanisms that justify this assumption by incentivizing validators to follow the protocol.
  52. If they don't, and we have more that 1/3 faults, safety may be violated. Our approach then is to *detect* these cases (after the fact), and take suitable repair actions (automatic and social). This is discussed in an upcoming document on "Fork accountability". (These safety violations include the lite client wrongly trusting a header, a fork in the blockchain, etc.)
  53. ## Lite Client Trusting Spec
  54. The lite client communicates with a full node and learns new headers. The goal is to locally decide whether to trust a header. Our implementation needs to ensure the following two properties:
  55. - Lite Client Completeness: If header *h* was correctly generated by an instance of Tendermint consensus (and its age is less than the trusting period), then the lite client should eventually set *trust(h)* to true.
  56. - Lite Client Accuracy: If header *h* was *not generated* by an instance of Tendermint consensus, then the lite client should never set *trust(h)* to true.
  57. *Remark*: If in the course of the computation, the lite client obtains certainty that some headers were forged by adversaries (that is were not generated by an instance of Tendermint consensus), it may submit (a subset of) the headers it has seen as evidence of misbehavior.
  58. *Remark*: In Completeness we use "eventually", while in practice *trust(h)* should be set to true before *h.Header.bfttime + tp*. If not, the block cannot be trusted because it is too old.
  59. *Remark*: If a header *h* is marked with *trust(h)*, but it is too old (its bfttime is more than *tp* ago), then the lite client should set *trust(h)* to false again.
  60. *Assumption*: Initially, the lite client has a header *inithead* that it trusts correctly, that is, *inithead* was correctly generated by the Tendermint consensus.
  61. To reason about the correctness, we may prove the following invariant.
  62. *Verification Condition: Lite Client Invariant.*
  63. For each lite client *l* and each header *h*:
  64. if *l* has set *trust(h) = true*,
  65. then validators that are correct until time *h.Header.bfttime + tp* have more than two thirds of the voting power in *h.Header.NextV*.
  66. Formally,
  67. \[
  68. \sum_{(v,p) \in h.Header.NextV \wedge correct(v,h.Header.bfttime + tp)} p >
  69. 2/3 \sum_{(v,p) \in h.Header.NextV} p
  70. \]
  71. *Remark.* To prove the invariant, we will have to prove that the lite client only trusts headers that were correctly generated by Tendermint consensus, then the formula above follows from the Tendermint failure model.
  72. ## High Level Solution
  73. Upon initialization, the lite client is given a header *inithead* it trusts (by
  74. social consensus). It is assumed that *inithead* satisfies the lite client invariant. (If *inithead* has been correctly generated by Tendermint consensus, the invariant follows from the Tendermint Failure Model.)
  75. When a lite clients sees a signed new header *snh*, it has to decide whether to trust the new
  76. header. Trust can be obtained by (possibly) the combination of three methods.
  77. 1. **Uninterrupted sequence of proof.** If a block is appended to the chain, where the last block
  78. is trusted (and properly committed by the old validator set in the next block),
  79. and the new block contains a new validator set, the new block is trusted if the lite client knows all headers in the prefix.
  80. Intuitively, a trusted validator set is assumed to only chose a new validator set that will obey the Tendermint Failure Model.
  81. 2. **Trusting period.** Based on a trusted block *h*, and the lite client
  82. invariant, which ensures the fault assumption during the trusting period, we can check whether at least one validator, that has been continuously correct from *h.Header.bfttime* until now, has signed *snh*.
  83. If this is the case, similarly to above, the chosen validator set in *snh* does not violate the Tendermint Failure Model.
  84. 3. **Bisection.** If a check according to the trusting period fails, the lite client can try to obtain a header *hp* whose height lies between *h* and *snh* in order to check whether *h* can be used to get trust for *hp*, and *hp* can be used to get trust for *snh*. If this is the case we can trust *snh*; if not, we may continue recursively.
  85. ## How to use it
  86. We consider the following use case:
  87. the lite client wants to verify a header for some given height *k*. Thus:
  88. - it requests the signed header for height *k* from a full node
  89. - it tries to verify this header with the methods described here.
  90. This can be used in several settings:
  91. - someone tells the lite client that application data that is relevant for it can be read in the block of height *k*.
  92. - the lite clients wants the latest state. It asks a full nude for the current height, and uses the response for *k*.
  93. ## Details
  94. *Assumptions*
  95. 1. *tp < unbonding period*.
  96. 2. *snh.Header.bfttime < now*
  97. 3. *snh.Header.bfttime < h.Header.bfttime+tp*
  98. 4. *trust(h)=true*
  99. **Observation 1.** If *h.Header.bfttime + tp > now*, we trust the old
  100. validator set *h.Header.NextV*.
  101. When we say we trust *h.Header.NextV* we do *not* trust that each individual validator in *h.Header.NextV* is correct, but we only trust the fact that at most 1/3 of them are faulty (more precisely, the faulty ones have at most 1/3 of the total voting power).
  102. ### Functions
  103. The function *Bisection* checks whether to trust header *h2* based on the trusted header *h1*. It does so by calling
  104. the function *CheckSupport* in the process of
  105. bisection/recursion. *CheckSupport* implements the trusted period method and, for two adjacent headers (in term of heights), it checks uninterrupted sequence of proof.
  106. *Assumption*: In the following, we assume that *h2.Header.height > h1.Header.height*. We will quickly discuss the other case in the next section.
  107. We consider the following set-up:
  108. - the lite client communicates with one full node
  109. - the lite client locally stores all the signed headers it obtained (trusted or not). In the pseudo code below we write *Store(header)* for this.
  110. - If *Bisection* returns *false*, then the lite client has seen a forged header.
  111. * However, it does not know which header(s) is/are the problematic one(s).
  112. * In this case, the lite client can submit (some of) the headers it has seen as evidence. As the lite client communicates with one full node only when executing Bisection, there are two cases
  113. - the full node is faulty
  114. - the full node is correct and there was a fork in Tendermint consensus. Header *h1* is from a different branch than the one taken by the full node. This case is not focus of this document, but will be treated in the document on fork accountability.
  115. - the lite client must retry to retrieve correct headers from another full node
  116. * it picks a new full node
  117. * it restarts *Bisection*
  118. * there might be optimizations; a lite client may not need to call *Commit(k)*, for a height *k* for which it already has a signed header it trusts.
  119. * how to make sure that a lite client can communicate with a correct full node will be the focus of a separate document (recall Issue 3 from "Context of this document").
  120. **Auxiliary Functions.** We will use the function ```votingpower_in(V1,V2)``` to compute the voting power the validators in set V1 have according to their voting power in set V2;
  121. we will write ```totalVotingPower(V)``` for ```votingpower_in(V,V)```, which returns the total voting power in V.
  122. We further use the function ```signers(Commit)``` that returns the set of validators that signed the Commit.
  123. **CheckSupport.** The following function checks whether we can trust the header h2 based on header h1 following the trusting period method. Time constraint is
  124. captured by the `hasExpired` function that depends on trusted period (`tp`) and a parameter `Delta` that denotes minimum duration of header so it is
  125. not considered expired.
  126. ```go
  127. // return true if header has expired, i.e., it is outside its trusted period; otherwise it returns false
  128. func hasExpired(h) bool {
  129. if h.Header.bfttime + tp - Delta < now { // Observation 1
  130. return true
  131. }
  132. // return true if header is correctly signed by 2/3+ voting power in the corresponding validator set; otherwise false. Additional checks should be done in the implementation
  133. // to ensure header is well formed.
  134. func verify(h) bool {
  135. vp_all := totalVotingPower(h.Header.V) // total sum of voting power of validators in h
  136. return votingpower_in(signers(h.Commit),h.Header.V) > 2/3 * vp_all
  137. }
  138. // Captures skipping condition. h1 and h2 has already passed basic validation (function `verify`).
  139. // returns (true, nil) in case h2 can be trusted based on h1, (false, nil) in case it cannot be trusted but no errors are observed during check and (false, error) in case
  140. // an error is detected (for example adjacent headers are not consistent).
  141. func CheckSupport(h1,h2,trustlevel) (bool, error) {
  142. assume h1.Header.Height < h2.header.Height
  143. if hasExpired(h1) return (false, ErrHeaderExpired(h1))
  144. // total sum of voting power of validators in h1.NextV
  145. vp_all := totalVotingPower(h1.Header.NextV)
  146. // check for adjacent headers
  147. if (h2.Header.height == h1.Header.height + 1) {
  148. if h1.Header.NextV == h2.Header.V return (true, nil)
  149. else return (false, ErrInvalidAdjacentHeaders)
  150. } else {
  151. // check for non-adjacent headers
  152. return (votingpower_in(signers(h2.Commit),h1.Header.NextV) > max(1/3,trustlevel) * vp_all, nil)
  153. }
  154. }
  155. ```
  156. *Remark*: Basic header verification must be done for *h2*. Similar checks are done in:
  157. https://github.com/tendermint/tendermint/blob/master/types/validator_set.go#L591-L633
  158. *Remark*: There are some sanity checks which are not in the code:
  159. *h2.Header.height > h1.Header.height* and *h2.Header.bfttime > h1.Header.bfttime* and *h2.Header.bfttime < now*.
  160. *Remark*: ```return (votingpower_in(signers(h2.Commit),h1.Header.NextV) > max(1/3,trustlevel) * vp_all)``` may return false even if *h2* was properly generated by Tendermint consensus in the case of big changes in the validator sets. However, the check ```return (votingpower_in(signers(h2.Commit),h1.Header.NextV) >
  161. 2/3 * vp_all)``` must return true if *h1* and *h2* were generated by Tendermint consensus.
  162. *Remark*: The 1/3 check differs from a previously proposed method that was based on intersecting validator sets and checking that the new validator set contains "enough" correct validators. We found that the old check is not suited for realistic changes in the validator sets. The new method is not only based on cardinalities, but also exploits that we can trust what is signed by a correct validator (i.e., signed by more than 1/3 of the voting power).
  163. *Correctness arguments*
  164. Towards Lite Client Accuracy:
  165. - Assume by contradiction that *h2* was not generated correctly and the lite client sets trust to true because *CheckSupport* returns true.
  166. - h1 is trusted and sufficiently new
  167. - by Tendermint Fault Model, less than 1/3 of voting power held by faulty validators => at least one correct validator *v* has signed *h2*.
  168. - as *v* is correct up to now, it followed the Tendermint consensus protocol at least up to signing *h2* => *h2* was correctly generated, we arrive at the required contradiction.
  169. Towards Lite Client Completeness:
  170. - The check is successful if sufficiently many validators of *h1* are still validators in *h2* and signed *h2*.
  171. - If *h2.Header.height = h1.Header.height + 1*, and both headers were generated correctly, the test passes
  172. *Verification Condition:* We may need a Tendermint invariant stating that if *h2.Header.height = h1.Header.height + 1* then *signers(h2.Commit) \subseteq h1.Header.NextV*.
  173. *Remark*: The variable *trustlevel* can be used if the user believes that relying on one correct validator is not sufficient. However, in case of (frequent) changes in the validator set, the higher the *trustlevel* is chosen, the more unlikely it becomes that CheckSupport returns true for non-adjacent headers.
  174. **Bisection.** The following function uses CheckSupport in a recursion to find intermediate headers that allow to establish a sequence of trust.
  175. ```go
  176. // return (true, nil) in case we can trust header h2 based on header h1; otherwise return (false, error) where error captures the nature of the error.
  177. func Bisection(h1,h2,trustlevel) (bool, error) {
  178. assume h1.Header.Height < h2.header.Height
  179. ok, err = CheckSupport(h1,h2,trustlevel)
  180. if (ok or err != nil) return (ok, err)
  181. // we cannot verify h2 based on h1, so we try to move trusted header closer to h2 so we can verify h2
  182. th := h1 // th is trusted header
  183. while th.Header.Height <= h2.Header.height - 1 do {
  184. // try to move trusted header forward with stored headers
  185. ih := th
  186. for all stored headers h s.t ih.Header.Height < h.Header.height < h2.Header.height do { // try to move trusted header forward
  187. // we assume here that iteration is done in the order of header heights
  188. ok, err = CheckSupport(th,h,trustlevel)
  189. if err != nil { return (ok, err) }
  190. if ok {
  191. th = h
  192. }
  193. }
  194. // at this point we have potentially updated th based on stored headers so we try to verify h2 based on new trusted header
  195. ok, err = CheckSupport(th,h2,trustlevel)
  196. if (ok or err != nil) return (ok, err)
  197. // we cannot verify h2 based on th, so we try to move trusted header closer to h2 by downloading header(s) between th and h2
  198. endHeight = h2.Header.height
  199. foundPivot = false
  200. while(!foundPivot) {
  201. pivot := (th.Header.height + endHeight) / 2
  202. hp := Commit(pivot)
  203. if !verify(hp) return (false, ErrInvalidHeader(hp))
  204. Store(hp)
  205. // try to move trusted header forward to hp
  206. ok, err = CheckSupport(th,hp,trustlevel)
  207. if err != nil { return (ok, err) }
  208. if ok {
  209. th = hp
  210. foundPivot = true
  211. }
  212. endHeight = pivot
  213. }
  214. }
  215. }
  216. ```
  217. *Correctness arguments (sketch)*
  218. Lite Client Accuracy:
  219. - Assume by contradiction that *h2* was not generated correctly and the lite client sets trust to true because Bisection returns true.
  220. - Bisection returns true only if all calls to CheckSupport in the recursion return true.
  221. - Thus we have a sequence of headers that all satisfied the CheckSupport
  222. - again a contradiction
  223. Lite Client Completeness:
  224. This is only ensured if upon *Commit(pivot)* the lite client is always provided with a correctly generated header.
  225. *Stalling*
  226. With Bisection, a faulty full node could stall a lite client by creating a long sequence of headers that are queried one-by-one by the lite client and look OK, before the lite client eventually detects a problem. There are several ways to address this:
  227. * Each call to ```Commit``` could be issued to a different full node
  228. * Instead of querying header by header, the lite client tells a full node which header it trusts, and the height of the header it needs. The full node responds with the header along with a proof consisting of intermediate headers that the light client can use to verify. Roughly, Bisection would then be executed at the full node.
  229. * We may set a timeout how long bisection may take.
  230. ### The case *h2.Header.height < h1.Header.height*
  231. In the use case where someone tells the lite client that application data that is relevant for it can be read in the block of height *k* and the lite client trusts a more recent header, we can use the hashes to verify headers "down the chain." That is, we iterate down the heights and check the hashes in each step.
  232. *Remark.* For the case were the lite client trusts two headers *i* and *j* with *i < k < j*, we should discuss/experiment whether the forward or the backward method is more effective.
  233. ```go
  234. func Backwards(h1,h2) bool {
  235. assert (h2.Header.height < h1.Header.height)
  236. old := h1
  237. for i := h1.Header.height - 1; i > h2.Header.height; i-- {
  238. new := Commit(i)
  239. Store(new)
  240. if (hash(new) != old.Header.hash) {
  241. return false
  242. }
  243. old := new
  244. }
  245. return (hash(h2) == old.Header.hash)
  246. }
  247. ```