Electric-Coin-Company / tfl-book

A Trailing Finality Layer book for a proposed Zcash protocol change.
MIT License
5 stars 2 forks source link

Define attack capability / impact matrix (without analysis) #53

Open nathan-at-least opened 1 year ago

nathan-at-least commented 1 year ago

Suggested Improvement

Issue #39 is titled for a specific attack capability, then in comments we start fleshing out an attack capability table.

This ticket is about defining that table but leaving most of the cells as "tbd", just to provide the structure.

The table could have capability rows and impact columns:

Attack capabilities are the cartesian product of a few categories:

Attack impact categories include:

Close this ticket by putting that table into the book with tbd columns.

nathan-at-least commented 1 year ago

Consider these distinct PoS Attack Capabilities:

These different capabilities have different implications:

nathan-at-least commented 1 year ago

More on preventing votes:

An adversary may control a signing key exclusively, e.g. it just runs a malicious notary with its own identity.

vs

An adversary controls a signing key of a victim node, so both nodes are racing to emit messages.

Consider the distinct impacts of these cases, ex: in the first case, if the adversary is the epoch leader, there's no race, whereas in the latter case, there is a race.

In practice, it's likely an attacker will always want exclusive control of a notary, so that in some cases they won't have races (such as when their node is an epoch leader). This does require some minimum cost: enough to control at least one "legitimate" notary roster entry.