specs/standards/core/rln-contract.md
Sergei Tikhomirov 72fd5336bc
Add raw spec for mainnet deployment of RLN contract (#30)
Add the first version of WAKU2-RLN-CONTRACT specification that describes the version of the RLN contract suitable for the inintial mainnet deployment.

New features include:
- membership management;
- deposits and withdrawals;
- recommendations about rate limits and pricing scheme.

To be iterated upon based on insights from implementation.
2024-08-20 14:03:31 +02:00

15 KiB

title name category tags editor contributors
WAKU2-RLN-CONTRACT Waku2 RLN Contract Specification Standards Track
waku/core-protocol
Sergei Tikhomirov <sergei@status.im>

Abstract

This document describes membership management within the RLN smart contract, specifically addressing:

  • membership-related contract functionality;
  • suggested parameter values for the initial mainnet deployment;
  • contract governance and upgradability.

Currently, this document focuses solely on membership-related functionality. It might later evolve into a comprehensive contract specification.

As of August 2024, RLN is deployed only on Sepolia testnet (source code). This document aims to outline the path to its mainnet deployment.

Syntax

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in RFC 2119.

Background

Rate-Limiting Nullifier (RLN) is a Zero-Knowledge (ZK) based gadget used for privacy-preserving rate limiting in Waku. The RLN smart contract (referred to as "the contract" hereinafter) is the central component of the RLN architecture. The contract stores the RLN tree, which contains all current memberships. Users interact with the contract to manage their memberships and obtain the necessary data for proof generation and verification.

Message transmission is handled by Waku RLN Relay nodes. The sender of a message MUST prove its validity according to RLN requirements. RLN Relay nodes MUST NOT relay invalid messages. For the full specification of RLN Relay, see See 17/WAKU2-RLN-RELAY.

Contract overview

The contract MUST provide the following functionalities:

  • register a membership;
  • extend a membership;
  • withdraw a deposit.

A membership holder is the entity that controls the secret associated with the respective RLN commitment. A membership keeper is the entity that controls the Ethereum address used to register that membership. The holder and the keeper MAY be different entities for the same membership. When authorizing membership-related requests, the contract SHOULD distinguish between the keeper and non-keepers, and MAY also use additional criteria.

Contract parameters and their RECOMMENDED values for the initial mainnet deployment are as follows:

Parameter Symbol Value Units
Epoch length epoch 10 minutes
Maximum total rate limit of all memberships in the tree R_{max} 160000 messages per epoch
Minimum rate limit of one membership r_{min} 20 messages per epoch
Maximum rate limit of one membership r_{max} 600 messages per epoch
Membership price for 1 message per epoch p_u 0.05 USD
Membership expiration term T 180 days
Membership grace period G 30 days
Accepted tokens DAI

The pricing function SHOULD be linear in the rate limit per epoch.

Membership lifecycle

Any existing membership MUST always be in exactly one of the following states:

  • Active;
  • GracePeriod;
  • Expired;
  • ErasedAwaitsWithdrawal;
  • Erased.
graph TD;
    NonExistent --> |"register"| Active;
    Active -.-> |"time T passed"| GracePeriod;
    GracePeriod --> |"extend"| Active;
    GracePeriod -.-> |"time G passed"| Expired;
    GracePeriod --> |"withdraw"| Erased;
    Expired --> |"withdraw"| Erased;
    Expired --> |"another membership reuses slot"| ErasedAwaitsWithdrawal;
    ErasedAwaitsWithdrawal --> |"withdraw"| Erased;

State updates triggered by a transaction (e.g., from GracePeriod to Active as a result of extend) MUST be applied immediately. State updates defined by time progression (e.g., from GracePeriod to Expired after time G) MAY be applied lazily.

When handling a membership-specific transaction, the contract MUST:

  • check whether the state of the involved membership is up-to-date;
  • if necessary, update the membership state;
  • process the transaction in accordance with the updated membership state.

Memberships MUST be included in the RLN tree according to the following table:

State Included in the RLN tree
Active Yes
GracePeriod Yes
Expired Yes
ErasedAwaitsWithdrawal No
Erased No

Memberships MUST NOT be transferable. A user MAY use one Ethereum address to manage multiple memberships. A user MAY use one Waku node1 to manage multiple memberships.

Contract functionalities

Availability of membership-specific functionalities2 MUST be as follows:

Active GracePeriod Expired ErasedAwaitsWithdrawal Erased
Send a message Yes Yes Yes No No
Extend the membership No Yes No No No
Withdraw the deposit No Yes Yes Yes No

Register a membership

Membership registration is subject to the following conditions:

  • If there are Expired memberships in the RLN tree, the new membership MUST overwrite an Expired membership.
  • The new membership SHOULD overwrite the membership that has been Expired for the longest time.
  • If a new membership A overwrites an Expired membership B:
    • membership B MUST become ErasedAwaitsWithdrawal;
    • the current total rate limit MUST be decremented by the rate limit of membership B;
    • the contract MUST take all necessary steps to ensure that the keeper of membership B can withdraw their deposit later.
  • Registration MUST fail if the total rate limit of Active, GracePeriod, and Expired memberships, including the one being created, would exceed R_{max}.
  • Registration MUST fail if the requested rate limit for a new membership is lower than r_{min} or higher than r_{max}.
  • The keeper MUST lock up a deposit to register a membership.
  • The keeper MUST specify the rate limit3 of a membership at registration time.
  • The size of the deposit MUST depend on the specified rate limit.
  • In case of a successful registration:
    • the new membership MUST become Active;
    • the current total rate limit MUST be incremented by the rate limit of the new membership.
  • A membership MUST have an expiration time T and a grace period G.

Extend a membership

Extending a membership is subject to the following conditions:

  • The extension MUST fail if the membership is in any state other than GracePeriod.
  • The membership keeper MUST be able to extend their membership.
  • Any user other than the membership keeper MUST NOT be able to extend a membership.
  • After a successful extension, the membership MUST become Active.

Withdraw the deposit

Deposit withdrawal is subject to the following conditions:

  • The membership keeper MUST be able to withdraw their deposit.
  • Any user other than the membership keeper MUST NOT be able to withdraw its deposit.
  • A deposit MUST be withdrawn in full.
  • A withdrawal MUST fail if the membership is not in GracePeriod, Expired, or ErasedAwaitsWithdrawal.
  • A membership MUST become Erased after withdrawal.

Governance and upgradability

At initial mainnet deployment, the contract MUST have an Owner. The Owner MUST be able to change the values of all contract parameters. The Owner MUST be able to pause any of the following contract functionalities:

  • register a membership;
  • extend a membership;
  • withdraw a deposit.

At some point, the Owner SHOULD renounce their privileges, and the contract MUST become immutable. If further upgrades are necessary, a new contract SHOULD be deployed, and the membership set SHOULD be migrated.

Implementation Suggestions

User-facing applications SHOULD suggest one or more rate limits (tiers) to simplify user selection among the following RECOMMENDED options:

  • 20 messages per epoch as low-tier;
  • 200 messages per epoch as mid-tier;
  • 600 messages per epoch as high-tier.

User-facing applications SHOULD save membership expiration dates in a local keystore during registration, and notify the user when their membership is about to expire.

Q&A

Why can't I withdraw a deposit from an Active membership?

The rationale for this limitation is to prevent a usage pattern where users make deposits and withdrawals in quick succession.
Such a pattern could lead to network instability and should be carefully considered if deemed desirable.

Why can't I extend an Active membership?

Memberships can only be extended during GracePeriod. Extending an Active membership is not allowed. The rationale is to make possible parameter changes that the contract Owner might make (e.g., for security reasons) applicable to most memberships.

What if I don't extend my membership within its GracePeriod?

If a user does not extend their membership during the GracePeriod, they risk having their Expired membership overwritten.
Generally, users are expected to either extend their membership or withdraw their deposit to avoid this risk.

Can I send messages when my membership is Expired?

An Expired membership allows sending messages for a certain period. The RLN proof that message senders provide to RLN Relay nodes does not prove the state of the membership, only its inclusion in the tree.

Expired memberships are not proactively erased from the tree.
An Expired membership is erased only when a new membership overwrites it or when its deposit is withdrawn.
Once erased (i.e., Erased or ErasedAwaitsWithdrawal), the membership can no longer be used to send messages.

Will my deposit be slashed if I exceed the rate limit?

This specification does not include slashing. The deposit's current purpose is purely to protect the network from denial-of-service attacks through bandwidth capping.

Do I need an extra deposit to extend my membership?

Membership extension requires no additional deposit. The opportunity cost of locked-up capital and gas fees for extension transactions make extensions non-free, which is sufficient for the initial mainnet deployment.

Why this particular epoch length?

Epoch length is a global parameter defined in the contract. Rate limits are defined in terms of the maximum allowed messages per epoch.

There is a trade-off between short and long epochs. Longer epochs accommodate short-term usage peaks better, but they increase memory requirements for RLN Relay nodes. An epoch length of 10 minutes was chosen as a reasonable middle ground.

Each message contains a nullifier that proves its validity in terms of RLN. Each RLN Relay node must store a nullifier log for the current epoch in memory. A nullifier plus metadata is 128 bytes per message. With a 10-minute epoch, a high-tier user with a 1 message per second rate limit generates up to 600 * 128 / 1024 = 75 KiB of nullifier log data per epoch. This equates to, approximately:

  • 73 MiB for 1000 users;
  • 732 MiB for 10 thousand users.

Why is there a cap on the total rate limit?

Total network bandwidth is a limited resource. To avoid overstretching the network's capabilities for the initial mainnet deployment, we define a cap R_{max} on the total rate limit.

Why is there a minimum rate limit?

The minimum rate limit r_{min} prevents an attack where a large number of tiny memberships cause RLN tree bloat.

Why is there a maximum rate limit?

The maximum rate limit r_{max} prevents any single actor from consuming an excessive portion of the total available rate limit.

However, it is still possible for an attacker to register multiple Ethereum addresses, and occupy a significant portion of the total rate limit through several memberships.

Are there bulk discounts for high-rate memberships?

For the initial mainnet deployment, no bulk discounts are offered. Membership price is linearly proportional to its rate limit. We choose this pricing scheme for simplicity. Future work may explore alternative pricing schemes that balance efficiency with centralization risk.

Why only accept DAI?

When choosing a token to accept, we considered the following criteria:

  • a stablecoin, as USD-denominated pricing is familiar for users and requires no oracle;
  • popular with high liquidity;
  • decentralized;
  • reasonably good censorship-resistance.

Based on these criteria, we chose DAI for the initial mainnet deployment. Other tokens may be added in the future.

Security / Privacy Considerations

Issuing membership-specific transactions, such as membership extensions and deposit withdrawals, publicly associates a membership with an Ethereum address. However, this association does not compromise the privacy of the relayed messages, as the protocol does not require the sender to disclose their specific membership to RLN Relay nodes.

To generate an RLN proof, a message sender must obtain a Merkle proof confirming that their membership belongs to the RLN tree. This proof can be requested directly from the contract. Requesting the proof through a third-party RPC provider could compromise the sender's privacy, as the provider might link the requester's Ethereum address, their RLN membership, and the corresponding API key.

Copyright and related rights waived via CC0.

References


  1. No Waku implementation supports managing multiple memberships from one node (as of August 2024). ↩︎

  2. Sending a message is included here for completeness, although it is part of the RLN Relay protocol and not the contract. ↩︎

  3. A user-facing application SHOULD suggest default rate limits to the keeper (see Implementation Suggestions). ↩︎