# Core Verification
# Problem statement
We assume that the light client knows a (base) header inithead
it trusts (by social consensus or because
the light client has decided to trust the header before). The goal is to check whether another header
newhead
can be trusted based on the data in inithead
.
The correctness of the protocol is based on the assumption that inithead
was generated by an instance of
Tendermint consensus.
# Failure Model
For the purpose of the following definitions we assume that there exists a function
validators
that returns the corresponding validator set for the given hash.
The light client protocol is defined with respect to the following failure model:
Given a known bound TRUSTED_PERIOD
, and a block b
with header h
generated at time Time
(i.e. h.Time = Time
), a set of validators that hold more than 2/3 of the voting power
in validators(b.Header.NextValidatorsHash)
is correct until time b.Header.Time + TRUSTED_PERIOD
.
Assumption: "correct" is defined w.r.t. realtime (some Newtonian global notion of time, i.e., wall time),
while Header.Time
corresponds to the BFT time. In this note, we assume that clocks of correct processes
are synchronized (for example using NTP), and therefore there is bounded clock drift (CLOCK_DRIFT
) between local clocks and
BFT time. More precisely, for every correct light client process and every header.Time
(i.e. BFT Time, for a header correctly
generated by the Tendermint consensus), the following inequality holds: Header.Time < now + CLOCK_DRIFT
,
where now
corresponds to the system clock at the light client process.
Furthermore, we assume that TRUSTED_PERIOD
is (several) order of magnitude bigger than CLOCK_DRIFT
(TRUSTED_PERIOD >> CLOCK_DRIFT
),
as CLOCK_DRIFT
(using NTP) is in the order of milliseconds and TRUSTED_PERIOD
is in the order of weeks.
We expect a light client process defined in this document to be used in the context in which there is some
larger period during which misbehaving validators can be detected and punished (we normally refer to it as UNBONDING_PERIOD
due to the "bonding" mechanism in modern proof of stake systems). Furthermore, we assume that
TRUSTED_PERIOD < UNBONDING_PERIOD
and that they are normally of the same order of magnitude, for example
TRUSTED_PERIOD = UNBONDING_PERIOD / 2
.
The specification in this document considers an implementation of the light client under the Failure Model defined above.
Mechanisms like fork accountability
and evidence submission
are defined in the context of UNBONDING_PERIOD
and
they incentivize validators to follow the protocol specification defined in this document. If they don't,
and we have 1/3 (or more) faulty validators, safety may be violated. Our approach then is
to detect these cases (after the fact), and take suitable repair actions (automatic and social).
This is discussed in document on Fork accountability.
The term "trusted" above indicates that the correctness of the protocol depends on
this assumption. It is in the responsibility of the user that runs the light client to make sure that the risk
of trusting a corrupted/forged inithead
is negligible.
Remark: This failure model might change to a hybrid version that takes heights into account in the future.
# High Level Solution
Upon initialization, the light client is given a header inithead
it trusts (by
social consensus). When a light clients sees a new signed header snh
, it has to decide whether to trust the new
header. Trust can be obtained by (possibly) the combination of three methods.
Uninterrupted sequence of headers. Given a trusted header
h
and an untrusted headerh1
, the light client trusts a headerh1
if it trusts all headers in betweenh
andh1
.Trusted period. Given a trusted header
h
, an untrusted headerh1 > h
andTRUSTED_PERIOD
during which the failure model holds, we can check whether at least one validator, that has been continuously correct fromh.Time
until now, has signedh1
. If this is the case, we can trusth1
.Bisection. If a check according to 2. (trusted period) fails, the light client can try to obtain a header
hp
whose height lies betweenh
andh1
in order to check whetherh
can be used to get trust forhp
, andhp
can be used to get trust forsnh
. If this is the case we can trusth1
; if not, we continue recursively until either we found set of headers that can build (transitively) trust relation betweenh
andh1
, or we failed as two consecutive headers don't verify against each other.
# Definitions
# Data structures
In the following, only the details of the data structures needed for this specification are given.
# Functions
For the purpose of this light client specification, we assume that the Tendermint Full Node exposes the following functions over Tendermint RPC:
Furthermore, we assume the following auxiliary functions:
In the functions below we will be using trustThreshold
as a parameter. For simplicity
we assume that trustThreshold
is a float between 1/3
and 2/3
and we will not be checking it
in the pseudo-code.
VerifySingle. The function VerifySingle
attempts to validate given untrusted header and the corresponding validator sets
based on a given trusted state. It ensures that the trusted state is still within its trusted period,
and that the untrusted header is within assumed clockDrift
bound of the passed time now
.
Note that this function is not making external (RPC) calls to the full node; the whole logic is
based on the local (given) state. This function is supposed to be used by the IBC handlers.
Note that in case VerifySingle
returns without an error (untrusted header
is successfully verified) then we have a guarantee that the transition of the trust
from trustedState
to newTrustedState
happened during the trusted period of
trustedState.SignedHeader.Header
.
TODO: Explain what happens in case VerifySingle
returns with an error.
verifySingle. The function verifySingle
verifies a single untrusted header
against a given trusted state. It includes all validations and signature verification.
It is not publicly exposed since it does not check for header expiry (time constraints)
and hence it's possible to use it incorrectly.
VerifyHeaderAtHeight. The function VerifyHeaderAtHeight
captures high level
logic, i.e., application call to the light client module to download and verify header
for some height.
Note that in case VerifyHeaderAtHeight
returns without an error (untrusted header
is successfully verified) then we have a guarantee that the transition of the trust
from trustedState
to newTrustedState
happened during the trusted period of
trustedState.SignedHeader.Header
.
In case VerifyHeaderAtHeight
returns with an error, then either (i) the full node we are talking to is faulty
or (ii) the trusted header has expired (it is outside its trusted period). In case (i) the full node is faulty so
light client should disconnect and reinitialise with new peer. In the case (ii) as the trusted header has expired,
we need to reinitialise light client with a new trusted header (that is within its trusted period),
but we don't necessarily need to disconnect from the full node we are talking to (as we haven't observed full node misbehavior in this case).
VerifyBisection. The function VerifyBisection
implements
recursive logic for checking if it is possible building trust
relationship between trustedState
and untrusted header at the given height over
finite set of (downloaded and verified) headers.
# The case untrustedHeader.Height < trustedHeader.Height
In the use case where someone tells the light client that application data that is relevant for it
can be read in the block of height k
and the light client trusts a more recent header, we can use the
hashes to verify headers "down the chain." That is, we iterate down the heights and check the hashes in each step.
Remark. For the case were the light client trusts two headers i
and j
with i < k < j
, we should
discuss/experiment whether the forward or the backward method is more effective.
Assumption: In the following, we assume that untrusted_h.Header.height > trusted_h.Header.height. We will quickly discuss the other case in the next section.
We consider the following set-up:
- the light client communicates with one full node
- the light client locally stores all the headers that has passed basic verification and that are within light client trust period. In the pseudo code below we write Store.Add(header) for this. If a header failed to verify, then the full node we are talking to is faulty and we should disconnect from it and reinitialise with new peer.
- If
CanTrust
returns error, then the light client has seen a forged header or the trusted header has expired (it is outside its trusted period).- In case of forged header, the full node is faulty so light client should disconnect and reinitialise with new peer. If the trusted header has expired, we need to reinitialise light client with new trusted header (that is within its trusted period), but we don't necessarily need to disconnect from the full node we are talking to (as we haven't observed full node misbehavior in this case).
# Correctness of the Light Client Protocols
# Definitions
TRUSTED_PERIOD
: trusted period- for realtime
t
, the predicatecorrect(v,t)
is true if the validatorv
follows the protocol until timet
(we will see about recovery later). - Validator fields. We will write a validator as a tuple
(v,p)
such thatv
is the identifier (i.e., validator address; we assume identifiers are unique in each validator set)p
is its voting power
- For each header
h
, we writetrust(h) = true
if the light client trustsh
.
# Failure Model
If a block b
with a header h
is generated at time Time
(i.e. h.Time = Time
), then a set of validators that
hold more than 2/3
of the voting power in validators(h.NextValidatorsHash)
is correct until time
h.Time + TRUSTED_PERIOD
.
Formally, [ \sum_{(v,p) \in validators(h.NextValidatorsHash) \wedge correct(v,h.Time + TRUSTED_PERIOD)} p > 2/3 \sum_{(v,p) \in validators(h.NextValidatorsHash)} p ]
The light client communicates with a full node and learns new headers. The goal is to locally decide whether to trust a header. Our implementation needs to ensure the following two properties:
Light Client Completeness: If a header
h
was correctly generated by an instance of Tendermint consensus (and its age is less than the trusted period), then the light client should eventually settrust(h)
totrue
.Light Client Accuracy: If a header
h
was not generated by an instance of Tendermint consensus, then the light client should never settrust(h)
to true.
Remark: If in the course of the computation, the light client obtains certainty that some headers were forged by adversaries (that is were not generated by an instance of Tendermint consensus), it may submit (a subset of) the headers it has seen as evidence of misbehavior.
Remark: In Completeness we use "eventually", while in practice trust(h)
should be set to true before h.Time + TRUSTED_PERIOD
. If not, the header
cannot be trusted because it is too old.
Remark: If a header h
is marked with trust(h)
, but it is too old at some point in time we denote with now
(h.Time + TRUSTED_PERIOD < now
),
then the light client should set trust(h)
to false
again at time now
.
Assumption: Initially, the light client has a header inithead
that it trusts, that is, inithead
was correctly generated by the Tendermint consensus.
To reason about the correctness, we may prove the following invariant.
Verification Condition: light Client Invariant.
For each light client l
and each header h
:
if l
has set trust(h) = true
,
then validators that are correct until time h.Time + TRUSTED_PERIOD
have more than two thirds of the voting power in validators(h.NextValidatorsHash)
.
Formally, [ \sum_{(v,p) \in validators(h.NextValidatorsHash) \wedge correct(v,h.Time + TRUSTED_PERIOD)} p > 2/3 \sum_{(v,p) \in validators(h.NextValidatorsHash)} p ]
Remark. To prove the invariant, we will have to prove that the light client only trusts headers that were correctly generated by Tendermint consensus. Then the formula above follows from the failure model.
# Details
Observation 1. If h.Time + TRUSTED_PERIOD > now
, we trust the validator set validators(h.NextValidatorsHash)
.
When we say we trust validators(h.NextValidatorsHash)
we do not
trust that each individual validator in validators(h.NextValidatorsHash)
is correct, but we only trust the fact that less than 1/3
of them are faulty (more precisely, the faulty ones have less than 1/3
of the total voting power).
VerifySingle
correctness arguments
Light Client Accuracy:
- Assume by contradiction that
untrustedHeader
was not generated correctly and the light client sets trust to true becauseverifySingle
returns without error. trustedState
is trusted and sufficiently new- by the Failure Model, less than
1/3
of the voting power held by faulty validators => at least one correct validatorv
has signeduntrustedHeader
. - as
v
is correct up to now, it followed the Tendermint consensus protocol at least up to signinguntrustedHeader
=>untrustedHeader
was correctly generated. We arrive at the required contradiction.
Light Client Completeness:
- The check is successful if sufficiently many validators of
trustedState
are still validators in the heightuntrustedHeader.Height
and signeduntrustedHeader
. - If
untrustedHeader.Height = trustedHeader.Height + 1
, and both headers were generated correctly, the test passes.
Verification Condition: We may need a Tendermint invariant stating that if untrustedSignedHeader.Header.Height = trustedHeader.Height + 1
then
signers(untrustedSignedHeader.Commit) \subseteq validators(trustedHeader.NextValidatorsHash)
.
Remark: The variable trustThreshold
can be used if the user believes that relying on one correct validator is not sufficient.
However, in case of (frequent) changes in the validator set, the higher the trustThreshold
is chosen, the more unlikely it becomes that
verifySingle
returns with an error for non-adjacent headers.
VerifyBisection
correctness arguments (sketch)*
Light Client Accuracy:
- Assume by contradiction that the header at
untrustedHeight
obtained from the full node was not generated correctly and the light client sets trust to true becauseVerifyBisection
returns without an error. VerifyBisection
returns without error only if all calls toverifySingle
in the recursion return without error (returnnil
).- Thus we have a sequence of headers that all satisfied the
verifySingle
- again a contradiction
light Client Completeness:
This is only ensured if upon Commit(pivot)
the light client is always provided with a correctly generated header.
Stalling
With VerifyBisection
, a faulty full node could stall a light client by creating a long sequence of headers that are queried one-by-one by the light client and look OK,
before the light client eventually detects a problem. There are several ways to address this:
- Each call to
Commit
could be issued to a different full node - Instead of querying header by header, the light client tells a full node which header it trusts, and the height of the header it needs. The full node responds with
the header along with a proof consisting of intermediate headers that the light client can use to verify. Roughly,
VerifyBisection
would then be executed at the full node. - We may set a timeout how long
VerifyBisection
may take.