Note: This attacknet program has been deprecated in favor of the more general eth2 bounty program. All previous bounty types in this repo qualify in the new program. Please use eth2bounty@ethereum.org for responsible disclosure.
All previous trophies will be ported to the long standing eth2 bounty program.
This repository tracks public "attacknets" maintained by the EF.
A multi-client beta-1 attacknet composed of three clients is up with multiple tiers of bounties (up to $15k!). Read more for details about configuration, rules, and rewards.
Each attacknet is contained within it's own sub-directory within ./attacknets
.
Within the attacknet directory, a README.md
is provided with human
readable, high-level configuration as well as the rules and any rewards
associated with the attacknet.
The attacknet directory also provides configuration files that might be useful in running clients and connecting to the network.
prysm_config.yaml
-- is a YAML configuration file that can be ingested by the Prysm client via the--chain-config-file
commandline flagteku_config.yaml
-- is a YAML configuration file that can be ingested by the Teku client via the--network
commandline flaglighthouse
-- is the testnet configuration directory that can be ingested by the Lighthouse client via the--testnet-dir
commandline flag
In addition to attacknet specific rules provided for in each attacknet. The
following are the general rules for the program. [Note: This program is in beta-0
and all rules are subject to change without prior notice].
- The Ethereum Foundation is solely responsible for judging the attack and deciding on rewards
- The Ethereum Foundation may reward "honorable mention" rewards of any denomination for interesting effects induced on testnets that do not necessarily meet the stated goal
- Awards can be redeemed in ETH or DAI
- Eth2 client teams are eligible to participate only on attacknets that do not contain their specific client
All claims on attacknet rewards must be reported as an issue in this repo.
Please follow this reporting structure to aid in prompt review:
-
If succeeded in a testnet goal and want to make a claim on the reward, prefix the name of the Issue/PR with "[
{ATTACK_NET_NAME}
Reward]" Use this template for convenience. -
If want to share something interesting achieved outside of the goal, prefix the name of the Issue/PR with "[
{ATTACK_NET_NAME}
Issue]" Use this template for convenience. -
Use the following structure for the body of the Issue/PR
-
Description: High-level description of the attack [1 sentence]
-
Attack scenario: More detailed description of the attack scenario and how it was carried out [1 to 3 sentences]
-
Impact: Describe the effect had on the attacknet [1 to 2 sentences]
-
Details: Very specific details about the attack including the specific slots/epochs where it can be observed
-
The Ethereum Foundation is not responsible for any private information that might be leaked as a result of this program.
In the event that the reporting of an attack does leak private information (e.g. logs from a testnet containing IP addresses), we ask that you withhold any such information in the public report. Instead, please note that there are additional accompanying resources to be shared, and the attacknet evaluators will be in touch.
We give explicit permission to attack these attacknets over the internet.
This attacknet program is an experimental and discretionary rewards program for our active Ethereum community to encourage and reward those who are helping to improve the platform. It is not a competition. You should know that we can cancel the program at any time, and rewards are at the sole discretion of Ethereum Foundation. In addition, we are not able to issue rewards to individuals who are on sanctions lists or who are in countries on sanctions lists (e.g. North Korea, Iran, etc). You are responsible for all taxes. All rewards are subject to applicable law. Finally, your testing must not violate any law or compromise any data that is not yours.
For each attacknet, a README.md and configuration files are provided to allow
for easy running of clients. Note that a prysm_config.yaml
, teku_config.yaml
, and lighthouse
directory
are provided for each testnet regardless of the constituent clients making up
the testnet. These are configuration files that you can use to run lighthouse,
prysm, and/or teku on each testnet.
To run lighthouse, in addition to normal configuration commandline flags, use the following:
--testnet-dir {LIGHTHOUSE_TESTNET_DIR}
whereLIGHTHOUSE_TESTNET_DIR
is thelighthouse
directory found within the specific attacknet
To run prysm, in addition to normal configuration commandline flags, use the following:
--chain-config-file {PRYSM_CONFIG_FILE}
wherePRYSM_CONFIG_FILE
is theprysm_config.yaml
file found within the specific attacknet--deposit-contract {DEPOSIT_CONTRACT_ADDR}
whereDEPOSIT_CONTRACT_ADDR
is the0x
prefixed deposit contract address found in the specific attacknet README.md--contract-deployment-block {DEPOSIT_CONTRACT_DEPLOY_NUMBER}
whereDEPOSIT_CONTRACT_DEPLOY_NUMBER
is the block number at which the deposit contract was deployed, found in the attacknet README.md--custom-genesis-delay {GENESIS_DELAY}
whereGENESIS_DELAY
is the genesis delay param found in the attacknet README.md
To run teku, in addition to normal configuration commandline flags, use the following:
--network {TEKU_CONFIG_FILE}
whereTEKU_CONFIG_FILE
is theteku_config.yaml
file found within the specific attacknet--eth1-deposit-contract-address {DEPOSIT_CONTRACT_ADDR}
whereDEPOSIT_CONTRACT_ADDR
is the0x
prefixed deposit contract address found in the specific attacknet README.md
@protolambda maintains rumor
,
an eth2 interactive shell for dynamically interacting with eth2 networks and data.
Check out the rumor README for basic documentation. We expect this tool to be invaluable in getting started, understanding networks, and constructing attacks.
Here we immortalize, for all time, the successful attacks conducted by 1337 h4x0rz.
You, too, can achieve perpetual fame and glory. Read some code, run some nodes, and break some nets.
User | Attacknet | Attack | Reward |
---|---|---|---|
@jrhea | prysm-attack-0 |
DoS Attack on Prysm via Golang stdlib exploit stops finality | $5k (USD) |
@holiman | prysm-attack-0 |
Remote crash nodes over p2p | |
@AlexSSD7 | prysm-attack-0 |
L4 Distributed Denial of Service attack stops finality | $5k (USD) |
@jrhea | teku-attack-0 |
DoS Attack on Teku Stops Finality | $5k (USD) |
@jrhea | lighthouse-attack-0 |
Network agent crashes lighthouse discovery | $1k (USD) |
@tintinweb | teku-attack-0 |
DoS Attack on Teku via gossipsub | $5k (USD) |
@atoulme | teku-attack-0 |
DoS Attack: UDP random 46 bytes packets | $5k (USD) |
@atoulme | teku-attack-0 |
Crash discovery service with malformed WHOAREYOU packet | $5k (USD) |
beta-0
attacknets are deprecated. All nodes are have been disabled
and attacks/rewards are no longer eligible.