Paper 2024/1242

Beyond the Whitepaper: Where BFT Consensus Protocols Meet Reality

David Wong, zkSecurity
Denis Kolegov
Ivan Mikushin, SigmaZero
Abstract

This paper presents a collection of lessons learned from analyzing the real-world security of various Byzantine Fault Tolerant (BFT) consensus protocol implementations. Drawing upon our experience as a team of security experts who have both developed and audited BFT systems, including BA★, HotStuff variants, Paxos variants, and DAG-based algorithms like Narwhal and Bullshark, we identify and analyze a variety of security vulnerabilities discovered in the translation of theoretical protocols into real-world code. Our analysis covers a range of issues, including subtle logic errors, concurrency bugs, cryptographic vulnerabilities, and mismatches between the theoretical model and the implementation. We provide detailed case studies illustrating these vulnerabilities, discuss their potential impact, and propose mitigation strategies. This work aims to provide valuable insights for both designers and implementers of BFT consensus protocols, ultimately contributing to the development of more secure and reliable distributed systems.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
BFT consensussecurity analysisimplementation vulnerabilitiesreal-world security
Contact author(s)
david @ zksecurity xyz
History
2024-08-07: revised
2024-08-06: received
See all versions
Short URL
https://ia.cr/2024/1242
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1242,
      author = {David Wong and Denis Kolegov and Ivan Mikushin},
      title = {Beyond the Whitepaper: Where {BFT} Consensus Protocols Meet Reality},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1242},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1242}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.