Closed alxiong closed 11 months ago
Pessimistic case: in case of CDN failures, replica would send over their signatures to the prover Since we don’t want anyone to DOS replica, how do we prevent that?
Is this problem not similar to the problem DoS against replicas by trigerring VID shares reconstruction? IIUC we reached the conclusion that this is a fundamental issue in distributed systems in general.
Pessimistic case: in case of CDN failures, replica would send over their signatures to the prover Since we don’t want anyone to DOS replica, how do we prevent that?
Is this problem not similar to the problem DoS against replicas by trigerring VID shares reconstruction? IIUC we reached the conclusion that this is a fundamental issue in distributed systems in general.
Exactly. So I guess will proceed with directly fetching signatures from replicas, with standard DoS protection. There are way more entry points for DoS attacks beside ours.
this is a parent issues explaining the design & overall progress, subtasks should be created for each individual points.
Replica:
bls-over-bn254
)LightClientState
then the replica sign the new state and store the Schnorr signature locally and send one copy to the CDNLightClient.sol
on L1, whenevent NewFinalizedState
is emitted, replicas delete all signatures on that state and even older ones. We could also add a worst-case storage cap on how long these signatures would be kept before being pruned.CDN:
block_height
field of the signed message, and cached themhotshot-state-prover
on a specific block height, serve all Schnorr signatures cachedcc @jbearer @philippecamacho @fkrell @chancharles92
smaller issues: