mirror of https://github.com/vacp2p/rfc.git
275 lines
18 KiB
Markdown
275 lines
18 KiB
Markdown
---
|
||
slug: 17
|
||
title: 17/WAKU2-RLN-RELAY
|
||
name: Waku v2 RLN Relay
|
||
status: draft
|
||
tags: waku-core
|
||
editor: Sanaz Taheri <sanaz@status.im>
|
||
contributors:
|
||
- Oskar Thorén <oskar@status.im>
|
||
- Aaryamann Challani <aaryamann@status.im>
|
||
- Giuseppe <giuseppe@status.im>
|
||
---
|
||
|
||
The `17/WAKU2-RLN-RELAY` protocol is an extension of `11/WAKU2-RELAY` which additionally provides spam protection using [Rate Limiting Nullifiers (RLN)](/spec/32).
|
||
|
||
The security objective is to contain spam activity in a GossipSub network by enforcing a global messaging rate to all the peers.
|
||
Peers that violate the messaging rate are considered spammers and their message is considered spam.
|
||
Spammers are also financially punished and removed from the system.
|
||
|
||
|
||
<!-- **Protocol identifier***: `/vac/waku/waku-rln-relay/2.0.0-alpha1` -->
|
||
|
||
# Motivation
|
||
|
||
In open and anonymous p2p messaging networks, one big problem is spam resistance.
|
||
Existing solutions, such as Whisper’s proof of work are computationally expensive hence not suitable for resource-limited nodes.
|
||
Other reputation-based approaches might not be desirable, due to issues around arbitrary exclusion and privacy.
|
||
|
||
We augment the [`11/WAKU2-RELAY`](/spec/11) protocol with a novel construct of [RLN](/spec/32) to enable an efficient economic spam prevention mechanism that can be run in resource-constrained environments.
|
||
|
||
|
||
# Flow
|
||
|
||
|
||
The messaging rate is defined by the `period` which indicates how many messages can be sent in a given period.
|
||
We define an `epoch` as $\lceil$ `unix_time` / `period` $\rceil$. For example, if `unix_time` is `1644810116` and we set `period` to `30`, then `epoch` is $\lceil$`(unix_time/period)`$\rceil$ `= 54827003`.
|
||
Note that `epoch` refers to epoch in RLN and not Unix epoch. This means a message can only be sent every period, where period is up to the application.
|
||
See see section [Recommended System Parameters](#recommended-system-parameters) for some recommended ways to set a sensible `period` value depending on the application.
|
||
Peers subscribed to a spam-protected `pubsubTopic` are only allowed to send one message per `epoch`.
|
||
The higher-level layers adopting `17/WAKU2-RLN-RELAY` MAY choose to enforce the messaging rate for `WakuMessages` with a specific `contentTopic` published on a `pubsubTopic`.
|
||
|
||
|
||
|
||
## Setup and Registration
|
||
Peers subscribed to a specific `pubsubTopic` form a [RLN group](/spec/32).
|
||
<!-- link to the RLN group definition in the RLN RFC -->
|
||
Peers MUST be registered to the RLN group to be able to publish messages.
|
||
Registration is moderated through a smart contract deployed on the Ethereum blockchain.
|
||
Each peer has an [RLN key pair](/spec/32) denoted by `sk` and `pk`.
|
||
The secret key `sk` is secret data and MUST be persisted securely by the peer.
|
||
The state of the membership contract contains the list of registered members' public identity keys i.e., `pk`s.
|
||
For the registration, a peer creates a transaction that invokes the registration function of the contract via which registers its `pk` in the group.
|
||
The transaction also transfers some amount of ether to the contract to be staked.
|
||
This amount is denoted by `staked_fund` and is a system parameter.
|
||
The peer who has the secret key `sk` associated with a registered `pk` would be able to withdraw a portion `reward_portion` of the staked fund by providing valid proof. <!-- a secure way to prove the possession of a pk is yet under discussion, maybe via commit and reveal -->
|
||
`reward_portion` is also a system parameter.
|
||
|
||
Note that `sk` is initially only known to its owning peer however, it may get exposed to other peers in case the owner attempts spamming the system i.e., sending more than one message per `epoch`.
|
||
An overview of registration is illustrated in Figure 1.
|
||
|
||
![Figure 1: Registration.](../../../../rfcs/17/rln-relay.png)
|
||
|
||
|
||
## Publishing
|
||
|
||
To publish at a given `epoch`, the publishing peer proceeds based on the regular [`11/WAKU2-RELAY`](/spec/11) protocol.
|
||
However, to protect against spamming, each `WakuMessage` (which is wrapped inside the `data` field of a PubSub message) MUST carry a [`RateLimitProof`](##RateLimitProof) with the following fields.
|
||
Section [Payload](#payloads) covers the details about the type and encoding of these fields.
|
||
|
||
The `merkle_root` contains the root of the Merkle tree.
|
||
|
||
The `epoch` represents the current epoch.
|
||
|
||
The `nullifier` is an internal nullifier acting as a fingerprint that allows specifying whether two messages are published by the same peer during the same `epoch`.
|
||
The `nullifier` is a deterministic value derived from `sk` and `epoch` therefore any two messages issued by the same peer (i.e., using the same `sk`) for the same `epoch` are guaranteed to have identical `nullifier`s.
|
||
|
||
The `share_x` and `share_y` can be seen as partial disclosure of peer's `sk` for the intended `epoch`.
|
||
They are derived deterministically from peer's `sk` and current `epoch` using [Shamir secret sharing scheme](/spec/32).
|
||
If a peer discloses more than one such pair (`share_x`, `share_y`) for the same `epoch`, it would allow full disclosure of its `sk` and hence get access to its staked fund in the membership contract.
|
||
|
||
|
||
The `proof` field is a zero-knowledge proof signifying that:
|
||
1. The message owner is the current member of the group i.e., her/his identity commitment key `pk` is part of the membership group Merkle tree with the root `merkle_root`.
|
||
2. `share_x` and `share_y` are correctly computed.
|
||
3. The `nullifier` is constructed correctly.
|
||
For more details about the proof generation check [RLN](/spec/32)
|
||
The proof generation relies on the knowledge of two pieces of private information i.e., `sk` and `authPath`.
|
||
The `authPath` is a subset of Merkle tree nodes by which a peer can prove the inclusion of its `pk` in the group. <!-- TODO refer to RLN RFC for authPath def -->
|
||
The proof generation also requires a set of public inputs which are: the Merkle tree root `merkle_root`, the current `epoch`, and the message for which the proof is going to be generated.
|
||
In `17/WAKU2-RLN-RELAY`, the message is the concatenation of `WakuMessage`'s `payload` filed and its `contentTopic` i.e., `payload||contentTopic`.
|
||
|
||
## Group Synchronization
|
||
|
||
Proof generation relies on the knowledge of Merkle tree root `merkle_root` and `authPath` which both require access to the membership Merkle tree.
|
||
Getting access to the Merkle tree can be done in various ways.
|
||
One way is that all the peers construct the tree locally.
|
||
This can be done by listening to the registration and deletion events emitted by the membership contract.
|
||
Another approach for synchronizing the state of slashed `pk`s is to disseminate such information through a p2p GossipSub network to which all peers are subscribed.
|
||
This is in addition to sending the deletion transaction to the membership contract.
|
||
The benefit of an off-chain slashing is that it allows real-time removal of spammers as opposed to on-chain slashing in which peers get informed with a delay,
|
||
where the delay is due to mining the slashing transaction.
|
||
For the group synchronization, one important security consideration is that peers MUST make sure they always use the most recent Merkle tree root in their proof generation.
|
||
The reason is that using an old root can allow inference about the index of the user's `pk` in the membership tree hence compromising user privacy and breaking message unlinkability.
|
||
|
||
## Routing
|
||
|
||
Upon the receipt of a PubSub message via [`11/WAKU2-RELAY`](/spec/11) protocol, the routing peer parses the `data` field as a `WakuMessage` and gets access to the `RateLimitProof` field.
|
||
The peer then validates the `RateLimitProof` as explained next.
|
||
|
||
**Epoch Validation**
|
||
If the `epoch` attached to the message is more than `max_epoch_gap` apart from the routing peer's current `epoch` then the message is discarded and considered invalid.
|
||
This is to prevent a newly registered peer from spamming the system by messaging for all the past epochs.
|
||
`max_epoch_gap` is a system parameter for which we provide some recommendations in section [Recommended System Parameters](#recommended-system-parameters).
|
||
|
||
**Merkle Root Validation**
|
||
The routing peers MUST check whether the provided Merkle root in the `RateLimitProof` is valid.
|
||
It can do so by maintaining a local set of valid Merkle roots, which consist of `acceptable_root_window_size` past roots.
|
||
This allows peers which are not well connected to the network to be able to send messages, accounting for network delay.
|
||
This network delay is related to the nature of asynchronous network conditions, which means that peers see membership changes asynchronously, and therefore may have differing local Merkle trees.
|
||
See [Recommended System Parameters](#recommended-system-parameters) on choosing an appropriate `acceptable_root_window_size`.
|
||
|
||
**Proof Verification**
|
||
The routing peers MUST check whether the zero-knowledge proof `proof` is valid.
|
||
It does so by running the zk verification algorithm as explained in [RLN](/spec/32).
|
||
If `proof` is invalid then the message is discarded.
|
||
|
||
**Spam detection**
|
||
To enable local spam detection and slashing, routing peers MUST record the `nullifier`, `share_x`, and `share_y` of incoming messages which are not discarded i.e., not found spam or with invalid proof or epoch.
|
||
To spot spam messages, the peer checks whether a message with an identical `nullifier` has already been relayed.
|
||
1. If such a message exists and its `share_x` and `share_y` components are different from the incoming message, then slashing takes place.
|
||
That is, the peer uses the `share_x` and `share_y` of the new message and the `share'_x` and `share'_y` of the old record to reconstruct the `sk` of the message owner.
|
||
The `sk` then can be used to delete the spammer from the group and withdraw a portion `reward_portion` of its staked fund.
|
||
2. If the `share_x` and `share_y` fields of the previously relayed message are identical to the incoming message, then the message is a duplicate and shall be discarded.
|
||
3. If none is found, then the message gets relayed.
|
||
|
||
An overview of the routing procedure and slashing is provided in Figure 2.
|
||
|
||
|
||
<!-- TODO: may consider [validator functions](https://github.com/libp2p/specs/tree/master/pubsub#topic-validation) or [extended validators](https://github.com/libp2p/specs/blob/master/pubsub/gossipsub/gossipsub-v1.1.md#extended-validators) for the spam detection -->
|
||
|
||
![Figure 2: Publishing, Routing and Slashing workflow.](../../../../rfcs/17/rln-message-verification.png)
|
||
|
||
-------
|
||
|
||
# Payloads
|
||
|
||
Payloads are protobuf messages implemented using [protocol buffers v3](https://developers.google.com/protocol-buffers/).
|
||
Nodes MAY extend the [14/WAKU2-MESSAGE](/spec/14) with a `rate_limit_proof` field to indicate that their message is not spam.
|
||
|
||
```diff
|
||
|
||
syntax = "proto3";
|
||
|
||
message RateLimitProof {
|
||
bytes proof = 1;
|
||
bytes merkle_root = 2;
|
||
bytes epoch = 3;
|
||
bytes share_x = 4;
|
||
bytes share_y = 5;
|
||
bytes nullifier = 6;
|
||
}
|
||
|
||
message WakuMessage {
|
||
bytes payload = 1;
|
||
string contentTopic = 2;
|
||
uint32 version = 3;
|
||
double timestamp = 4;
|
||
+ RateLimitProof rate_limit_proof = 21;
|
||
}
|
||
|
||
```
|
||
## WakuMessage
|
||
|
||
`rate_limit_proof` holds the information required to prove that the message owner has not exceeded the message rate limit.
|
||
|
||
## RateLimitProof
|
||
Below is the description of the fields of `RateLimitProof` and their types.
|
||
|
||
| Parameter | Type | Description |
|
||
| ----: | ----------- | ----------- |
|
||
| `proof` | array of 256 bytes | the zkSNARK proof as explained in the [Publishing process](##Publishing) |
|
||
| `merkle_root` | array of 32 bytes in little-endian order | the root of membership group Merkle tree at the time of publishing the message |
|
||
| `share_x` and `share_y`| array of 32 bytes each | Shamir secret shares of the user's secret identity key `sk` . `share_x` is the Poseidon hash of the `WakuMessage`'s `payload` concatenated with its `contentTopic` . `share_y` is calculated using [Shamir secret sharing scheme](/spec/32) | <!-- todo specify the poseidon hash setting -->
|
||
| `nullifier` | array of 32 bytes | internal nullifier derived from `epoch` and peer's `sk` as explained in [RLN construct](/spec/32)|
|
||
|
||
## RLN Credentials format
|
||
A RLN credential collects all the relevant fields that allow generation of valid RLN proofs with respect to an onchain membership contract.
|
||
|
||
To make it compatible across different clients and platforms, RLN credentials will be encoded in JSON.
|
||
This further allows to validate credentials using [JSON schema](https://json-schema.org/).
|
||
|
||
```
|
||
{
|
||
"application": string,
|
||
"appIdentifier": string,
|
||
"credentials": [{
|
||
"key": string,
|
||
"commitment": string,
|
||
"membershipGroups" : [{
|
||
"chainId": number,
|
||
"contract": string,
|
||
"treeIndex": string
|
||
}]
|
||
}],
|
||
"version": number
|
||
}
|
||
```
|
||
Fields are specified as follow:
|
||
|
||
- `application` : the application name within which credential(s) refer to.
|
||
- `appIdentifier` : a unique identifier for the application. In RLN-RELAY, this SHOULD corresond to the application-specific [RLN identifier](https://rfc.vac.dev/spec/32/#terminology).
|
||
- `credentials`: the array containing the actual RLN credentials used to generate proofs. Each node consists of:
|
||
- `key`: the identity secret key as `uint256`. It is encoded as a 64-characters left 0-padded hex string with a leading `0x` prefix (66 chars in total).
|
||
- `commitment`: the Poseidon hash of the secret key as `uint256`. It is encoded as a 64-characters left 0-padded hex string with a leading `0x` prefix (66 chars in total).
|
||
- `membershipGroups`: the array containing information for membership groups registrations for the pair (`key`, `commitment`). Each node consists of:
|
||
- `chainId`: the integer corresponding to the [unique chain-id](https://github.com/ethereum-lists/chains) identifying the chain where the membership contract is deployed.
|
||
- `contract`: the smart contract address of the membership contract. It is encoded as a 40-characters left 0-padded hex string with a leading "0x" prefix (42 chars in total).
|
||
- `treeIndex`: the Merkle tree index assigned when registering `commitment` to `contract`. It is encoded as a 64-characters left 0-padded hex string with a leading `0x` prefix (10 chars in total).
|
||
- `version`: a unique and progressive integer that can be used to uniquely identify the RLN credential encoding format.
|
||
|
||
JSON RLN credentials SHOULD be persisted in encrypted form.
|
||
We recommend to use the [Web3 Secret Storage](https://github.com/ethereum/wiki/wiki/Web3-Secret-Storage-Definition) to password-protect credentials and to allow cross-client support for RLN credentials decryption and decoding.
|
||
|
||
# Recommended System Parameters
|
||
The system parameters are summarized in the following table, and the recommended values for a subset of them are presented next.
|
||
|
||
| Parameter | Description |
|
||
| ----: |----------- |
|
||
| `period` | the length of `epoch` in seconds |
|
||
| `staked_fund` | the amount of wei to be staked by peers at the registration |
|
||
| `reward_portion` | the percentage of `staked_fund` to be rewarded to the slashers |
|
||
| `max_epoch_gap` | the maximum allowed gap between the `epoch` of a routing peer and the incoming message |
|
||
| `acceptable_root_window_size` | The maximum number of past Merkle roots to store |
|
||
|
||
## Epoch Length
|
||
A sensible value for the `period` depends on the application for which the spam protection is going to be used.
|
||
For example, while the `period` of `1` second i.e., messaging rate of `1` per second, might be acceptable for a chat application, might be too low for communication among Ethereum network validators.
|
||
One should look at the desired throughput of the application to decide on a proper `period` value.
|
||
In the proof of concept implementation of `17/WAKU2-RLN-RELAY` protocol which is available in [nim-waku](https://github.com/status-im/nim-waku), the `period` is set to `1` second.
|
||
Nevertheless, this value is also subject to change depending on user experience.
|
||
|
||
## Maximum Epoch Gap
|
||
We discussed in the [Routing](#routing) section that the gap between the epoch observed by the routing peer and the one attached to the incoming message should not exceed a threshold denoted by `max_epoch_gap` .
|
||
The value of `max_epoch_gap` can be measured based on the following factors.
|
||
- Network transmission delay `Network_Delay`: the maximum time that it takes for a message to be fully disseminated in the GossipSub network.
|
||
- Clock asynchrony `Clock_Asynchrony`: The maximum difference between the Unix epoch clocks perceived by network peers which can be due to clock drifts.
|
||
|
||
With a reasonable approximation of the preceding values, one can set `max_epoch_gap` as
|
||
`max_epoch_gap` $= \lceil \frac{\text{Network Delay} + \text{Clock Asynchrony}}{\text{Epoch Length}}\rceil$ where `period` is the length of the `epoch` in seconds.
|
||
`Network_Delay` and `Clock_Asynchrony` MUST have the same resolution as `period` .
|
||
By this formulation, `max_epoch_gap` indeed measures the maximum number of `epoch`s that can elapse since a message gets routed from its origin to all the other peers in the network.
|
||
|
||
`acceptable_root_window_size` depends upon the underlying chain's average blocktime, `block_time`
|
||
|
||
The lower bound for the `acceptable_root_window_size` SHOULD be set as $acceptable_root_window_size=(Network_Delay)/block_time$
|
||
|
||
`Network_Delay` MUST have the same resolution as `block_time`.
|
||
|
||
By this formulation, `acceptable_root_window_size` will provide a lower bound of how many roots can be acceptable by a routing peer.
|
||
|
||
The `acceptable_root_window_size` should indicate how many blocks may have been mined during the time it takes for a peer to receive a message.
|
||
This formula represents a lower bound of the number of acceptable roots.
|
||
|
||
|
||
# Copyright
|
||
|
||
Copyright and related rights waived via [CC0](https://creativecommons.org/publicdomain/zero/1.0/).
|
||
|
||
# References
|
||
|
||
1. [RLN documentation](https://hackmd.io/tMTLMYmTR5eynw2lwK9n1w?view)
|
||
2. [Public inputs to the RLN circuit](https://hackmd.io/tMTLMYmTR5eynw2lwK9n1w?view#Public-Inputs)
|
||
3. [Shamir secret sharing scheme used in RLN](https://hackmd.io/tMTLMYmTR5eynw2lwK9n1w?view#Linear-Equation-amp-SSS)
|
||
4. [RLN internal nullifier](https://hackmd.io/tMTLMYmTR5eynw2lwK9n1w?view#Nullifiers)
|