Content pfp
Content
@
0 reply
0 recast
0 reaction

Pawel Pokrywka pfp
Pawel Pokrywka
@pawelpokrywka
Idea: Protecting Your Validator from Attacks During Block Proposal to Prevent MEV Theft Recently, I read a paper on validator deanonymization (linked in the last comment). TL;DR: An attacker could find the IP address used by your validator. Then, when you're about to propose a block with significant MEV (Miner Extractable Value), the attacker can launch a cheap DoS (Denial of Service) attack on your internet connection. You would miss the opportunity to propose a block. The attacker would then DoS the next validator and repeat this until their validator is selected. This would allow them to propose a block, essentially stealing your winning lottery ticket and grabbing all the MEV.
3 replies
0 recast
4 reactions

Pawel Pokrywka pfp
Pawel Pokrywka
@pawelpokrywka
Solo stakers are most vulnerable to these DoS attacks. My idea is to use a public VPN to combat this. If you use a VPN, an attacker targeting your IP performs a DoS attack that stops at the VPN provider's infrastructure (which should be fairly resistant). Your internet connection should remain safe. So far, so good. You're protected - unless you open your ports for incoming connections (which is encouraged because it helps the Ethereum network). If you have your ports forwarded (some VPNs, especially torrent-friendly ones, allow this), the attacker could easily saturate your bandwidth by directing a DoS attack at those ports. The VPN won't protect you in this case. Unless you implement this trick: The moment you know you're going to propose a block, close the VPN ports and re-open them right after the proposal.
1 reply
0 recast
1 reaction

Rémy Roy pfp
Rémy Roy
@remyroy.eth
Even though this attack has been theorized, we haven't seen it happen in the real world. You also have to include a potential loss of reputation for the attacker in this equation because this would be visible on the network. Even though the severity of this is potentially big, the difficulty is high and it comes with a few other risks.
1 reply
0 recast
2 reactions

polymutex pfp
polymutex
@polymutex.eth
Cool idea, but difficult because there is no standardization around APIs for port forwarding by VPN providers. I think the endgame is to run validators over Tor and use a different Tor circuit for attestations vs block proposals. But with the trend of stakers' latency reqs, seems like swimming against the current.
1 reply
0 recast
1 reaction