Abstract
Blockchain protocols’ primary security goal is consensus: one version of the global ledger that everyone in the network agrees on. Their proofs of security depend on assumptions on how well their peer-to-peer (P2P) overlay networks operate. Yet, surprisingly, little is understood about what factors influence the P2P network properties. In this work, we extensively study the Ethereum P2P network’s connectivity and its block propagation mechanism. We gather data on the Ethereum network by running the official Ethereum client, geth, modified to run as a “super peer” with many neighbors. We run this client in North America for over seven months, as well as shorter runs with multiple vantages around the world. Our results expose an incredible amount of churn, and a surprisingly small number of peers who are actually useful (that is, who propagate new blocks). We also find that a node’s location has a significant impact on when it hears about blocks, and that the precise behavior of this has changed over time (e.g., nodes in the US have become less likely to hear about new blocks first). Finally, we find prune blocks propagate faster than uncles.
We thank the anonymous reviewers and Arthur Gervais for their helpful comments. This research was supported in part by NSF grants CNS-1816802 and CNS-1900879, a Ripple unrestricted gift, and Facebook Fellowship. We also thank the Ethereum Foundation for a gift of AWS credit used toward the collection of our data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The Ethereum protocol uses their own memory-hard hash function, Ethhash [1].
- 2.
In geth this subset is composed of a square root of their peers who have not heard about the block.
- 3.
Find a median and mean delay of 6.5 and 12.6 s (from 2013).
- 4.
We are unable to avoid forwarding information on all blocks/transactions, as doing so would cause other peers to decide to stop peering with our client.
- 5.
Gencer et al. [15] compared Bitcoin prunes to all blocks mined, but for Ethereum just used uncle counts. They found that at the time Bitcoin had a larger standard deviation in mining fairness than Ethereum.
- 6.
When prunes are first announced to us via a NewBlockHashesMsg, it generally correspond to times we hear about odd blocks that do not follow the mainchain (i.e. the block number is much smaller or larger than the current height).
- 7.
The bomb was delayed with the Muir Glacier hardfork in early January 2020.
- 8.
Mostly Coinbase nodes who appear to be routinely generating a fresh ENODEID.
References
Ethash. https://github.com/ethereum/wiki/wiki/Mining#ethash-dag
Ethereum wire protocol (eth). https://github.com/ethereum/devp2p/blob/master/caps/eth.md
Measuring ethereum nodes. https://medium.com/coinmonks/measuring-ethereum-nodes-530bfff08e9c
Node discovery protocol. https://github.com/ethereum/devp2p/blob/master/discv4.md
The rlpx transport protocol. https://github.com/ethereum/devp2p/blob/master/rlpx.md
Ethereum market capitalization (2020). https://coinmarketcap.com/currencies/ethereum/
Ethereum node explorer. ethernodes.org (2020)
Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New kids on the block: an analysis of modern blockchains. arXiv preprint arXiv:1606.06530 (2016)
Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on ethereum: identification, analysis, and impact. Future Gener. Comput. Syst. 102, 259–277 (2020)
Daian, P., et al.: Flash boys 2.0: frontrunning, transaction reordering, and consensus instability in decentralized exchanges. arXiv preprint arXiv:1904.05234 (2019)
Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE P2P 2013 Proceedings, pp. 1–10. IEEE (2013)
Donet Donet, J.A., Pérez-Solà, C., Herrera-Joancomartí, J.: The bitcoin P2P network. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 87–102. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_7
El Ioini, N., Pahl, C., Helmer, S.: A decision framework for blockchain platforms for IoT and edge computing. In: SCITEPRESS (2018)
Gao, Y., Shi, J., Wang, X., Tan, Q., Zhao, C., Yin, Z.: Topology measurement and analysis on ethereum P2P network. In: 2019 IEEE Symposium on Computers and Communications (ISCC), pp. 1–7. IEEE (2019)
Gencer, A.E., Basu, S., Eyal, I., van Renesse, R., Sirer, E.G.: Decentralization in bitcoin and ethereum networks. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 439–457. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-662-58387-6_24
Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. ACM (2016)
Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S.: Tampering with the delivery of blocks and transactions in bitcoin. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 692–705 (2015)
go-ethereum client. https://github.com/ethereum/go-ethereum
Greene, R., Johnstone, M.N.: An investigation into a denial of service attack on an ethereum network. In: Proceedings of the 16th Australian Information Security Management Conference, p. 90 (2018)
E. E. Group. Networking: Dev P2P, RPLx, Discovery, and Eth wire protocol: via zoom: https://www.youtube.com/watch?v=hnw59hmk6rk
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: 24th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 15), pp. 129–144 (2015)
Henningsen, S., Teunis, D., Florian, M., Scheuermann, B.: Eclipsing ethereum peers with false friends. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 300–309. IEEE (2019)
Holotescu, C., et al.: Understanding blockchain opportunities and challenges. In: Conference Proceedings of<<eLearning and Software for Education (eLSE)>>, vol. 4, pp. 275–283 (2018). “Carol I” National Defence University Publishing House
Imamura, M., Omote, K.: Difficulty of decentralized structure due to rational user behavior on blockchain. In: Liu, J.K., Huang, X. (eds.) NSS 2019. LNCS, vol. 11928, pp. 504–519. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36938-5_31
Imtiaz, M.A., Starobinski, D., Trachtenberg, A., Younis, N.: Churn in the bitcoin network: characterization and impact. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 431–439. IEEE (2019)
Kiffer, L., Levin, D., Mislove, A.: Stick a fork in it: analyzing the ethereum network partition. In: Proceedings of the 16th ACM Workshop on Hot Topics in Networks, pp. 94–100 (2017)
Kiffer, L., Levin, D., Mislove, A.: Analyzing ethereum’s contract topology. In: Proceedings of the Internet Measurement Conference, vol. 2018, pp. 494–499 (2018)
Kiffer, L., Salman, A., Levin, D., Mislove, A., Nita-Rotaru, C.: Under the hood of the ethereum gossip protocol. https://fc21.ifca.ai/papers/203.pdf
Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring ethereum network peers. In: Proceedings of the Internet Measurement Conference, vol. 2018, pp. 91–104 (2018)
Marcus, Y., Heilman, E., Goldberg, S.: Low-resource eclipse attacks on ethereum’s peer-to-peer network. IACR Cryptol. ePrint Arch. 2018, 236 (2018)
Mariem, S.B., Casas, P., Romiti, M., Donnet, B., Stütz, R., Haslhofer, B.: All that glitters is not bitcoin-unveiling the centralized nature of the BTC (IP) network. In: NOMS 2020–2020 IEEE/IFIP Network Operations and Management Symposium, pp. 1–9. IEEE (2020)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical report (2008)
Victor, F., Lüders, B.K.: Measuring ethereum-based ERC20 token networks. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 113–129. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32101-7_8
Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1–32 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 International Financial Cryptography Association
About this paper
Cite this paper
Kiffer, L., Salman, A., Levin, D., Mislove, A., Nita-Rotaru, C. (2021). Under the Hood of the Ethereum Gossip Protocol. In: Borisov, N., Diaz, C. (eds) Financial Cryptography and Data Security. FC 2021. Lecture Notes in Computer Science(), vol 12675. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-64331-0_23
Download citation
DOI: https://doi.org/10.1007/978-3-662-64331-0_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-64330-3
Online ISBN: 978-3-662-64331-0
eBook Packages: Computer ScienceComputer Science (R0)