ics | title | stage | category | kind | implements | author | created | modified |
---|---|---|---|---|---|---|---|---|
6 |
Solo Machine Client |
draft |
IBC/TAO |
instantiation |
2 |
Christopher Goes <[email protected]> |
2019-12-09 |
2019-12-09 |
This specification document describes a client (verification algorithm) for a solo machine with a single updateable public key which implements the ICS 2 interface.
Solo machines — which might be devices such as phones, browsers, or laptops — might like to interface with other machines & replicated ledgers which speak IBC, and they can do so through the uniform client interface.
Solo machine clients are roughly analogous to "implicit accounts" and can be used in lieu of "regular transactions" on a ledger, allowing all transactions to work through the unified interface of IBC.
Functions & terms are as defined in ICS 2.
This specification must satisfy the client interface defined in ICS 2.
Conceptually, we assume "big table of signatures in the universe" - that signatures produced are public - and incorporate replay protection accordingly.
This specification contains implementations for all of the functions defined by ICS 2.
The ClientState
of a solo machine is simply whether or not the client is frozen.
interface ClientState {
frozen: boolean
consensusState: ConsensusState
}
The ConsensusState
of a solo machine consists of the current public key, current diversifier, sequence number, and timestamp.
The diversifier is an arbitrary string, chosen when the client is created, designed to allow the same public key to be re-used across different solo machine clients (potentially on different chains) without being considered misbehaviour.
interface ConsensusState {
sequence: uint64
publicKey: PublicKey
diversifier: string
timestamp: uint64
}
The Height
of a solo machine is just a uint64
, with the usual comparison operations.
Header
s must only be provided by a solo machine when the machine wishes to update the public key or diversifier.
interface Header {
sequence: uint64 // deprecated
timestamp: uint64
signature: Signature
newPublicKey: PublicKey
newDiversifier: string
}
Header
implements the ClientMessage
interface.
The solomachine public key must sign over the following struct:
interface SignBytes {
sequence: uint64
timestamp: uint64
diversifier: string
path: []byte
data: []byte
}
Misbehaviour
for solo machines consists of a sequence and two signatures over different messages at that sequence.
interface SignatureAndData {
sig: Signature
path: []byte
data: []byte
timestamp: Timestamp
}
interface Misbehaviour {
sequence: uint64
signatureOne: SignatureAndData
signatureTwo: SignatureAndData
}
Misbehaviour
implements the ClientMessage
interface.
Signatures are provided in the Proof
field of client state verification functions. They include data & a timestamp, which must also be signed over.
interface Signature {
data: []byte
timestamp: uint64
}
The solo machine client initialise
function starts an unfrozen client with the initial consensus state.
function initialise(consensusState: ConsensusState): ClientState {
return {
frozen: false,
consensusState
}
}
The solo machine client latestClientHeight
function returns the latest sequence.
function latestClientHeight(clientState: ClientState): uint64 {
return clientState.consensusState.sequence
}
All of the functions defined below are methods on the ClientState
interface. Thus, the solo machine client state is always in scope for these functions.
The solo machine client verifyClientMessage
function checks that the currently registered public key signed over the client message at the expected sequence with the current diversifier included in the client message. If the client message is an update, then it must be the current sequence. If the client message is misbehaviour then it must be the sequence of the misbehaviour.
function verifyClientMessage(clientMsg: ClientMessage) {
switch typeof(ClientMessage) {
case Header:
verifyHeader(clientMessage)
// misbehaviour only suppported for current public key and diversifier on solomachine
case Misbehaviour:
verifyMisbehaviour(clientMessage)
}
}
function verifyHeader(header: header) {
assert(header.timestamp >= clientstate.consensusState.timestamp)
headerData = {
newPubKey: header.newPubKey,
newDiversifier: header.newDiversifier,
}
signBytes = SignBytes(
sequence: clientState.consensusState.sequence,
timestamp: header.timestamp,
diversifier: clientState.consensusState.diversifier,
path: []byte{"solomachine:header"},
value: marshal(headerData)
)
assert(checkSignature(cs.consensusState.publicKey, signBytes, header.signature))
}
function verifyMisbehaviour(misbehaviour: Misbehaviour) {
s1 = misbehaviour.signatureOne
s2 = misbehaviour.signatureTwo
pubkey = clientState.consensusState.publicKey
diversifier = clientState.consensusState.diversifier
timestamp = clientState.consensusState.timestamp
// assert that the signatures validate and that they are different
sigBytes1 = SignBytes(
sequence: misbehaviour.sequence,
timestamp: s1.timestamp,
diversifier: diversifier,
path: s1.path,
data: s1.data
)
sigBytes2 = SignBytes(
sequence: misbehaviour.sequence,
timestamp: s2.timestamp,
diversifier: diversifier,
path: s2.path,
data: s2.data
)
// either the path or data must be different in order for the misbehaviour to be valid
assert(s1.path != s2.path || s1.data != s2.data)
assert(checkSignature(pubkey, sigBytes1, misbehaviour.signatureOne.signature))
assert(checkSignature(pubkey, sigBytes2, misbehaviour.signatureTwo.signature))
}
Since misbehaviour is checked in verifyClientMessage
, if the client message is of type Misbehaviour
then we return true:
function checkForMisbehaviour(clientMessage: ClientMessage) => bool {
switch typeof(ClientMessage) {
case Misbehaviour:
return true
}
return false
}
UpdateState
updates the solo machine ConsensusState
values using the provided client message header:
function updateState(clientMessage: ClientMessage) {
clientState.consensusState.publicKey = header.newPubKey
clientState.consensusState.diversifier = header.newDiversifier
clientState.consensusState.timestamp = header.timestamp
clientState.consensusState.sequence++
set("clients/{identifier}/clientState", clientState)
}
UpdateStateOnMisbehaviour
updates the function after receving valid misbehaviour:
function updateStateOnMisbehaviour(clientMessage: ClientMessage) {
// freeze the client
clientState.frozen = true
set("clients/{identifier}/clientState", clientState)
}
All solo machine client state verification functions simply check a signature, which must be provided by the solo machine.
function verifyMembership(
// provided height is unnecessary for solomachine
// since clientState maintains the expected sequence
height: uint64,
// delayPeriod is unsupported on solomachines
// thus these fields are ignored
delayTimePeriod: uint64,
delayBlockPeriod: uint64,
proof: CommitmentProof,
path: CommitmentPath,
value: []byte): boolean {
// the expected sequence used in the signature
abortTransactionUnless(!clientState.frozen)
abortTransactionUnless(proof.timestamp >= clientState.consensusState.timestamp)
signBytes = SignBytes(
sequence: clientState.consensusState.sequence,
timestamp: proof.timestamp,
diversifier: clientState.consensusState.diversifier,
path: path.String(),
data: value,
)
proven = checkSignature(clientState.consensusState.publicKey, signBytes, proof.sig)
if !proven {
return false
}
// increment sequence on each verification to provide
// replay protection
clientState.consensusState.sequence++
clientState.consensusState.timestamp = proof.timestamp
// unlike other clients, we must set the client state here because we
// mutate the clientState (increment sequence and set timestamp)
// thus the verification methods are stateful for the solomachine
// in order to prevent replay attacks
set("clients/{identifier}/clientState", clientState)
return true
}
function verifyNonMembership(
// provided height is unnecessary for solomachine
// since clientState maintains the expected sequence
height: uint64,
// delayPeriod is unsupported on solomachines
// thus these fields are ignored
delayTimePeriod: uint64,
delayBlockPeriod: uint64,
proof: CommitmentProof,
path: CommitmentPath): boolean {
abortTransactionUnless(!clientState.frozen)
abortTransactionUnless(proof.timestamp >= clientState.consensusState.timestamp)
signBytes = SignBytes(
sequence: clientState.consensusState.sequence,
timestamp: proof.timestamp,
diversifier: clientState.consensusState.diversifier,
path: path.String(),
data: nil,
)
proven = checkSignature(clientState.consensusState.publicKey, signBytes, proof.sig)
if !proven {
return false
}
// increment sequence on each verification to provide
// replay protection
clientState.consensusState.sequence++
clientState.consensusState.timestamp = proof.timestamp
// unlike other clients, we must set the client state here because we
// mutate the clientState (increment sequence and set timestamp)
// thus the verification methods are stateful for the solomachine
// in order to prevent replay attacks
set("clients/{identifier}/clientState", clientState)
return true
}
Instantiates the interface defined in ICS 2.
Not applicable.
Not applicable. Alterations to the client verification algorithm will require a new client standard.
None yet.
None at present.
December 9th, 2019 - Initial version December 17th, 2019 - Final first draft August 15th, 2022 - Changes to align with 02-client-refactor in #813
All content herein is licensed under Apache 2.0.