Gossipsub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks

Gossipsub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks

GossipSub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks Dimitris Vyzovitis Yusef Napora Dirk McCormick Protocol Labs Protocol Labs Protocol Labs [email protected] [email protected] [email protected] David Dias Yiannis Psaras Protocol Labs Protocol Labs [email protected] [email protected] ABSTRACT ACM Reference Format: Permissionless blockchain environments necessitate the use Dimitris Vyzovitis, Yusef Napora, Dirk McCormick, David Dias, of a fast and attack-resilient message propagation protocol and Yiannis Psaras. 2020. GossipSub: Attack-Resilient Message Prop- agation in the Filecoin and ETH2.0 Networks. In Proceedings of Pro- for Block and Transaction messages to keep nodes synchro- tocol Labs TechRep (PL-TechRep-2020-002). Protocol Labs, 17 pages. nised and avoid forks. We present GossipSub, a gossip-based https://doi.org/10.1145/nnnnnnn.nnnnnnn pubsub protocol, which, in contrast to past pubsub protocols, incorporates resilience against a wide spectrum of attacks. Firstly, GossipSub’s mesh construction implements an eager 1 INTRODUCTION push model keeps the fan-out of the pubsub delivery low and Blockchain environments require a message layer protocol balances excessive bandwidth consumption and fast mes- to propagate transaction and block messages. Transaction sage propagation throughout the mesh. Secondly, through messages are those that transfer value, normally in the form gossip dissemination, GossipSub realises a lazy-pull model to of tokens or crypto-assets between different nodes in the reach nodes far-away or outside the mesh. Thirdly, through network. Block messages are produced by a subset of nodes, constant observation, nodes maintain a score profile for the the “miner” nodes, to group sets of transactions together, peers they are connected to, allowing them to choose the update the state of the blockchain and keep all nodes in sync. most well-behaved nodes to include in the mesh. Finally, Being up-to-date, or synchronised, with regard to both trans- and most importantly, a number of tailor-made mitigation action and block messages is a very important requirement strategies designed specifically for these three components in blockchain networks and it is the task of the message make GossipSub resilient against the most challenging Sybil- propagation protocol to achieve. In the opposite case, nodes based attacks. We test GossipSub in a testbed environment have differing views of the state of the network, are working involving more than 5000 VM nodes deployed on AWS and on different data-sets and cause the blockchain to fork. show that it stays immune to all considered attacks. Gos- Furthermore, open blockchain networks, such as Bitcoin sipSub is currently being integrated as the main messaging [10], Ethereum [17] and Filecoin [2] are “permissionless” with layer protocol in the Filecoin and the Ethereum 2.0 (ETH2.0) no central control by any entity or organisation to oversee blockchains. and manage access control (i.e., the identity of nodes joining the network). The network is an open, unstructured peer- arXiv:2007.02754v1 [cs.NI] 6 Jul 2020 to-peer (P2P) network and can be joined by any node that claims to run the protocol. Malicious nodes can, therefore, join and try to distort the view of nodes with regards to Permission to make digital or hard copies of all or part of this work for latest transactions and blocks with the aim of disrupting personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear the network or stealing monetary value. Malicious activity this notice and the full citation on the first page. Copyrights for components is most commonly realised through Sybil nodes [11] that of this work owned by others than ACM must be honored. Abstracting with can carry out a range of attacks, the most prominent of credit is permitted. To copy otherwise, or republish, to post on servers or to which is the eclipse attack [16, 31] i.e., silencing of nodes redistribute to lists, requires prior specific permission and/or a fee. Request in order to cause packet loss and in turn, blockchain forks. permissions from [email protected]. Given that those networks carry large amounts of monetary PL-TechRep-2020-002, July 2020, © 2020 Association for Computing Machinery. value, potentially in the order of hundreds of millions of ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00 dollars, they are very attractive to attackers. Therefore, the https://doi.org/10.1145/nnnnnnn.nnnnnnn messaging layer protocol of a blockchain network has to be PL-TechRep-2020-002, July 2020, Dimitris Vyzovitis, Yusef Napora, Dirk McCormick, David Dias, and Yiannis Psaras resilient against malicious nodes that attack the network by peers according to their behaviour in the network. Every dropping or delaying messages. peer keeps a score for every other peer it is connected The most straightforward strategy to alleviate both mes- to and does not share this score with others. Instead, it sage propagation speed and resilience/security concerns in makes routing and relaying decisions based on its own permission-less, unstructured P2P networks is flooding - used view of other nodes. in the Bitcoin network [10, 24]. Flooding ensures that mes- (3) The Mitigation Strategies: Building directly on the sages propagate as fast as possible throughout the network properties introduced by the mesh construction and the and is robust against eclipse attacks, as it introduces high scoring function, we complement GossipSub with a set levels of traffic redundancy. Flooding, however, is very ex- of mitigation strategies to protect its operation against pensive in terms of bandwidth. Authors in [24] report that malicious activity. Indicatively, these strategies include: up to 44% of the overall traffic of the Bitcoin network is re- controlled mesh maintenance through score-driven par- dundant. This figure translates to a bandwidth requirement ticipation, scoped flooding for newly published messages of up to 350GBs/month for a public Bitcoin node and for the and score-based node isolation when malicious activity current network size. is detected. “Gossip”-based pubsub protocols have been introduced In GossipSub-based systems all nodes start equal and build in the past as a way to limit the number of messages prop- their profile based on their behaviour. Well-behaved nodes agated between peers in pub/sub systems [21], [5], [20]. In are generally part of the mesh, while nodes with questionable gossip-based approaches, peers forward metadata related to or malicious intentions are progressively excluded from the messages they have “seen” without forwarding the messages mesh to the gossip network and then from the network as a themselves, a method generally called lazy pull. However, whole. given that past systems were either centralised from the GossipSub is the first of its kind protocol that addresses point of view of (ownership and) access control, or were both the speed and the resilience challenges of permission- not carrying any commercial/financial weight, they were not less message propagation environments that carry high mon- designed to be resilient against attacks. etary value. It has been adopted and is currently been inte- In this paper, we are proposing GossipSub, a gossip-based grated as the main transaction and block propagation proto- pubsub protocol that is designed to deal with both fast and col in the Filecoin network [2], an incentivized, decentralised resilient message propagation in permissionless networks. storage network, and the Ethereum (ETH2.0) network [1], a GossipSub consists of two main components, the Mesh Con- decentralised smart contract computation network. Despite struction and the Score Function, as well as a set of mitigation carrying utility on top, these systems are primarily financial mechanisms designed exclusively on top of the two afore- systems at the transaction and block propagation level and mentioned protocol components. As we show here, the com- are expected to carry transaction messages potentially worth bination of these parts render the protocol resilient against a millions in monetary value. That said, the performance and wide-range of attacks, responsive to dynamic network con- security properties of GossipSub need to be investigated in ditions and fast in terms of message propagation. detail. That said, it is imperative to detail the performance and security properties of GossipSub, which is the primary (1) The Mesh Construction: GossipSub introduces a con- focus of this paper. nected global mesh structure, where each node is con- The contributions of the paper are as follows. nected to a limited number of other peers forming its local (view of the) mesh. Mesh-connected nodes directly share • We introduce GossipSub to fill the gap of attack-resistant messages with one another, realising an eager push com- message propagation protocols for permissionless blockchains. munication model. Nodes can join and leave the mesh While previous literature has investigated extensively the based on network-level conditions or application-level efficiency of (gossip-based) pubsub protocols, the need for semantics. Those nodes that are not part of the mesh resilience against attacks did not surface due to limited communicate with mesh-connected nodes through gos- financial incentives from the attacker’s point of view. sip (i.e., lazy push). • We build a VM-based testbed environment that supports (2) The Score Function: Every node participating in the experiment reproducibility and test the ∼16k LOC produc- network is constantly being observed by all of the nodes tion code on 5000 containers in AWS. Each container has it is connected to (whether in the same local mesh or 1.2 vCPUs and 2 GB RAM. We test Sybil:honest node not). We have carefully selected a number of actions that connection ratios of up to 40:1, although mostly present either flag malicious activity (e.g., dropped messages), results with up to 20:1.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us