-
Notifications
You must be signed in to change notification settings - Fork 998
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reject Blobs Which Reference Already Finalized Parent Blocks #3529
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
makes sense. thanks!
Should this be a REJECT or an IGNORE? I'm not sure. It should probably be just an IGNORE because the block proposer sometimes just doesn't have the latest finalized checkpoint in their view yet without the intention to be malicious. |
@ppopth This follows from here #1985 I think the reason it was |
That makes sense then. Thanks. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This change should be incorporated into #3531
Maybe we could merge this to officially signal that this is go to go and rebase #3531 afterwards since it is still under refinement? |
Currently we will allow blobs to reference parent blocks which are already finalized. This could allow malicious peers to perform DOS attacks by referencing a very old parent block. Due to the requirements for nodes to verify proposer shuffling for these blobs, you could have a malicous peer force a honest node to perform an excessive amount of epoch transitions to verify the shuffling for the proposer. In order to mitigate this we can simply add the same gossip validation condition that we have for beacon blocks for blobs:
This was encountered when running an Antithesis experiment.