You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Comment:
Add some tests (can add some to the testloop test) that messing with the proof will result in a failing verification.
We could, e.g. check that tweaking every byte of a valid serialized proof will cause a failure one way or another.
It doesn't cover all possible attacks but at least makes sure that we aren't forgetting any fields.
The text was updated successfully, but these errors were encountered:
Issue: #11932
Implements EpochSyncProof validation, according to:
- [design
doc](https://docs.google.com/document/d/14Itc9Hs7ewTRmcGANid9UCaYcJzaLzzM7FsvYYIFKDY/edit#heading=h.p2oiicluwd6o)
-
[`epoch_sync.rs`](https://github.com/near/nearcore/blob/d6d6e4782f7d57a7b7acc2894e1668355012ff74/core/primitives/src/epoch_sync.rs)
Summary:
- Move block merkle proof retrieval logic from `Chain` to a separate
trait (`MerkleProofAccess`). Make `Store` implements this trait so that
we can `get_block_proof` while serving `EpochSyncRequest` from a
separate thread and having no access to `Chain`.
- Refactor `verify_approval` and `compute_bp_hash` so that we can use it
for proof validation.
- Derive `first_block_info_in_epoch` from block header.
- Implement the validation logic.
- Add 2 more fields to the proof
- `EpochSyncProofPastEpochData::protocol_version`
- `merkle_proof_for_first_block` generated at height of final block of
current epoch.
- Apparently, we need to add even more to enable generating
`merkle_proof_for_first_block` at the bootstrapped node. That will be
done as a follow-up issue:
#12255.
- Create a bunch of follow-up issues (added to the [tracking
issue](near/near-one-project-tracking#73)):
- #12255
- #12256
- #12258
- #12259
- #12260
Messing with the proof arbitrarily (flipping every bit perhaps)
Making a test case where every epoch the block producers change (to check that we don't have any off-by-one errors in verifying handoff and signatures)
Description
Follow-up task to #12020.
Comment:
Add some tests (can add some to the testloop test) that messing with the proof will result in a failing verification.
We could, e.g. check that tweaking every byte of a valid serialized proof will cause a failure one way or another.
It doesn't cover all possible attacks but at least makes sure that we aren't forgetting any fields.
The text was updated successfully, but these errors were encountered: