Security Review of Ethereum Beacon Clients

09/23/2021
by   Jean-Philippe Aumasson, et al.
0

The beacon chain is the backbone of the Ethereum's evolution towards a proof-of-stake-based scalable network. Beacon clients are the applications implementing the services required to operate the beacon chain, namely validators, beacon nodes, and slashers. Security defects in beacon clients could lead to loss of funds, consensus rules violation, network congestion, and other inconveniences. We reported more than 35 issues to the beacon client developers, including various security improvements, specification inconsistencies, missing security checks, exposure to known vulnerabilities. None of our findings appears to be high-severity. We covered the four main beacon clients, namely Lighthouse (Rust), Nimbus (Nim), Prysm (Go), and Teku (Java). We looked for bugs in the logic and implementation of the new security-critical components (BLS signatures, slashing, networking protocols, and API) over a 3-month project that followed a preliminary analysis of BLS signatures code. We focused on Lighthouse and Prysm, the most popular clients, and thus the highest-value targets. Furthermore, we identify protocol-level issues, including replay attacks and incomplete forward secrecy. In addition, we reviewed the network fingerprints of beacon clients, discussing the information obtainable from passive and active searches, and we analyzed the supply chain risk related to third-party dependencies, providing indicators and recommendations to reduce the risk of backdoors and unpatchable vulnerabilities. Our results suggest that despite intense scrutiny by security auditors and independent researchers, the complexity and constant evolution of a platform like Ethereum requires regular expert review and thorough SSDLC practices.

READ FULL TEXT

page 1

page 30

page 36

research
12/29/2020

Resource Analysis of Ethereum 2.0 Clients

Scalability is a common issue among the most used permissionless blockch...
research
06/19/2023

Ethereum Proof-of-Stake Consensus Layer: Participation and Decentralization

In September 2022, Ethereum transitioned from Proof-of-Work (PoW) to Pro...
research
05/09/2022

Static Analysis for AWS Best Practices in Python Code

Amazon Web Services (AWS) is a comprehensive and broadly adopted cloud p...
research
01/29/2023

Unified Singular Protocol Flow for OAuth (USPFO) Ecosystem

OAuth 2.0 is a popular authorization framework that allows third-party c...
research
02/11/2022

Very Pwnable Network: Cisco AnyConnect Security Analysis

Corporate Virtual Private Networks (VPNs) enable users to work from home...
research
08/09/2023

Optimal Flexible Consensus and its Application to Ethereum

Classic BFT consensus protocols guarantee safety and liveness for all cl...
research
10/30/2021

Chaos Engineering of Ethereum Blockchain Clients

The Ethereum blockchain is the operational backbone of major decentraliz...

Please sign up or login with your details

Forgot password? Click here to reset