This repository has been archived by the owner on Oct 20, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 8
Malicious slowdown using valid headers #15
Labels
bug
Something isn't working
Comments
MaksymZavershynskyi
pushed a commit
that referenced
this issue
Oct 6, 2020
* Bump version, change the state machine used for processing new blocks. Now a newly added block that is not yet trusted is stored in untrustedHead. After the challenge period is over, it can be moved to head. Fixes #13, #15. * CHANGELOG Co-authored-by: Maksym Zavershynskyi <[email protected]>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Suppose there is
NearOnEthClient
running on Ethereum blockchain that accepts headers every 4 hours fromNear2EthRelay
. Suppose the last header inNearOnEthClient
hash height X, as soon as it passes the challenge period someone malicious submits a valid header of height X+1. This header is valid and cannot be challenged, but it progresses client only 1 block ahead. In 4 hours the attack can be repeated.The solution proposed by @abacabadabacaba is the following:
The text was updated successfully, but these errors were encountered: