Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert Merkle proof verifier contract #861

Merged
merged 17 commits into from
Jun 15, 2023
Merged
Show file tree
Hide file tree
Changes from 7 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 4 additions & 7 deletions core/packages/contracts/src/BeefyClient.sol
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ pragma solidity ^0.8.19;

import {ECDSA} from "openzeppelin/utils/cryptography/ECDSA.sol";
import {Ownable} from "openzeppelin/access/Ownable.sol";
import {MerkleProof} from "openzeppelin/utils/cryptography/MerkleProof.sol";
import {MerkleProof} from "./utils/MerkleProof.sol";
import {Bitfield} from "./utils/Bitfield.sol";
import {MMRProof} from "./utils/MMRProof.sol";
import {ScaleCodec} from "./ScaleCodec.sol";
Expand Down Expand Up @@ -441,10 +441,7 @@ contract BeefyClient is Ownable {
}

// Check that validator is actually in a validator set
//
// NOTE: This currently insecure due to a regression documented in SNO-427.
// Basically `proof.index` (the merkle leaf index) is not being validated.
if (!isValidatorInSet(vset, proof.account, proof.proof)) {
if (!isValidatorInSet(vset, proof.account, proof.index, proof.proof)) {
revert InvalidValidatorProof();
}

Expand Down Expand Up @@ -498,13 +495,13 @@ contract BeefyClient is Ownable {
* @param proof Merkle proof required for validation of the address
* @return true if the validator is in the set
*/
function isValidatorInSet(ValidatorSet memory vset, address addr, bytes32[] calldata proof)
function isValidatorInSet(ValidatorSet memory vset, address addr, uint256 index, bytes32[] calldata proof)
internal
pure
returns (bool)
{
bytes32 hashedLeaf = keccak256(abi.encodePacked(addr));
return MerkleProof.verify(proof, vset.root, hashedLeaf);
return MerkleProof.verifyMerkleLeafAtPosition(vset.root, hashedLeaf, index, vset.length, proof);
}

/**
Expand Down
9 changes: 7 additions & 2 deletions core/packages/contracts/src/ParachainClient.sol
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
// SPDX-License-Identifier: Apache-2.0
pragma solidity ^0.8.19;

import "openzeppelin/utils/cryptography/MerkleProof.sol";
import "./utils/MerkleProof.sol";
import "./BeefyClient.sol";
import "./IParachainClient.sol";
import "./ScaleCodec.sol";
Expand Down Expand Up @@ -74,7 +74,12 @@ contract ParachainClient is IParachainClient {
bytes32 parachainHeadHash = createParachainHeaderMerkleLeaf(proof.header);

// Compute the merkle root hash of all parachain heads
bytes32 parachainHeadsRoot = MerkleProof.processProof(proof.headProof.proof, parachainHeadHash);
bytes32 parachainHeadsRoot = MerkleProof.computeRootFromProofAtPosition(
parachainHeadHash,
proof.headProof.pos,
proof.headProof.width,
proof.headProof.proof
);

bytes32 leafHash = createMMRLeaf(proof.leafPartial, parachainHeadsRoot);
return beefyClient.verifyMMRLeafProof(leafHash, proof.leafProof, proof.leafProofOrder);
Expand Down
73 changes: 73 additions & 0 deletions core/packages/contracts/src/utils/MerkleProof.sol
Original file line number Diff line number Diff line change
@@ -0,0 +1,73 @@
// SPDX-License-Identifier: Apache-2.0
pragma solidity ^0.8.19;

library MerkleProof {
/**
* @notice Verify that a specific leaf element is part of the Merkle Tree at a specific position in the tree
*
* @param root the root of the merkle tree
* @param leaf the leaf which needs to be proven
* @param pos the position of the leaf, index starting with 0
* @param width the width or number of leaves in the tree
* @param proof the array of proofs to help verify the leaf's membership, ordered from leaf to root
* @return a boolean value representing the success or failure of the operation
*/
function verifyMerkleLeafAtPosition(
bytes32 root,
bytes32 leaf,
uint256 pos,
uint256 width,
bytes32[] calldata proof
) public pure returns (bool) {
bytes32 computedHash = computeRootFromProofAtPosition(leaf, pos, width, proof);

return computedHash == root;
}

function computeRootFromProofAtPosition(
bytes32 leaf,
uint256 pos,
uint256 width,
bytes32[] calldata proof
) public pure returns (bytes32) {
bytes32 computedHash = leaf;

require(pos < width, "Merkle position is too high");

unchecked {
uint256 i = 0;
for (uint256 height = 0; width > 1; height++) {
bool computedHashLeft = pos & 1 == 0;

// check if at rightmost branch and whether the computedHash is left
if (pos + 1 == width && computedHashLeft) {
// there is no sibling and also no element in proofs, so we just go up one layer in the tree
pos = pos >> 1;
width = ((width - 1) >> 1) + 1;
continue;
}

if (computedHashLeft) {
computedHash = efficientHash(computedHash, proof[i]);
} else {
computedHash = efficientHash(proof[i], computedHash);
}

pos = pos >> 1;
width = ((width - 1) >> 1) + 1;
i++;
}

return computedHash;
}
}

function efficientHash(bytes32 a, bytes32 b) private pure returns (bytes32 value) {
/// @solidity memory-safe-assembly
assembly {
mstore(0x00, a)
mstore(0x20, b)
value := keccak256(0x00, 0x40)
}
}
}
2 changes: 1 addition & 1 deletion core/packages/test/scripts/set-env.sh
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# exports enable use in core/packages/test/config/launch-config.toml
root_dir="$(realpath ../../..)"
bridge_hub_runtime="${PARACHAIN_RUNTIME:-bridge-hub-rococo-local}"
relaychain_version="${POLKADOT_VER:-v0.9.38}"
relaychain_version="${POLKADOT_VER:-v0.9.43}"
relaychain_dir="$root_dir/parachain/.cargo/$relaychain_version"
relaychain_bin="${POLKADOT_BIN:-$relaychain_dir/bin/polkadot}"
cumulus_version="${CUMULUS_VER:-snowbridge}"
Expand Down