What Would it Take to Carry out a Successful Eclipse Attack on Ethereum?

Yahsin Huang
HackerNoon.com
Published in
5 min readJun 20, 2019

--

Photo by Constantin Popp on Unsplash

What is an Eclipse Attack?

An eclipse attack is a type of attack occurs at a peer-to-peer network level: an attacker gains full control of a specific node’s access to information by eclipsing the node from the whole peer-to-peer network.

In popular peer-to-peer networks such as Bitcoin and Ethereum, an attacker can perform an eclipse attack by ensuring the victim node no longer receives correct information from the rest of the network but only receives information manipulated by the attacker.

In other words, an attack occurs when the majority of peers on a network are malicious and are gaining control of the connections of a specific node. Attackers in control of such connections can ensure that this specific node is surrounded by malicious nodes.

Further, rather than attacking the entire network as in a Sybil attack, in an eclipse attack, the attacker focuses on isolating and targeting a specific node. This attack often results in the victim node receiving a manipulated, fake view of the blockchain.

Malicious nodes block the victim node’s view of the real blockchain with their imposter blockchain. Hence the name of one of blockchain’s major security threats — the Eclipse Attack.

According to Heilman et al’s report in 2015, one key implication of eclipse attacks is that eclipse attacks could be a useful building block for other attacks. For instance, one of the bad things an attacker can do once the attack positions are secured is that the attacker can launch mining attacks such as a 51% attack with much less than 51% mining power.

This could potentially result in altering a network’s transaction history as seen by the victim and thus, may lead to economic losses for the victim(s).

What would it take to carry out a successful Eclipse Attack on Ethereum?

It’s worth noting that it doesn’t take much from a malicious actor to successfully carry out an eclipse attack. Heilman et al’s 2018 paper showed that it takes only a few machines to perform an eclipse attack on the Ethereum network.

The researchers pointed out that to pull off an eclipse attack on Ethereum, an adversary needs “only control two machines, each with only a single IP address” to monopolize the connections going to and from a victim’s node, and eventually, isolating the victim node from the rest of its peers in the network.

Nonetheless, in most cases eclipse attacks are still difficult to launch because the attacker would have to pick a target node or group of nodes, have an established botnet of host nodes, disconnect the targets from every node they’re connected to, and work out by trial and error the neighboring nodes of the targets in order to make them connect to the attacker’s. Then, the attacker would have to wait for the next time the victim node logs off and rejoins the network.

During the resetting, the attacker would force the connections to redirect to a new set of nodes, and thereby gaining full control of all of the victim’s connections. That is not an easy task, but it’s doable. So far we haven’t seen any examples of eclipse attacks; however, recent research results have shown that it is something that shouldn’t be ignored.

Eclipse attacks on IoT devices

What about eclipse attacks in an Internet of Things (IoT) environment? The risks posed by IoT devices rise significantly higher. In a common scenario of mining nodes in a data center, an attacker would need several machines in order to successfully execute an eclipse attack. In the data center scenario, an eclipse attack is hard to do because it usually involves attacking multiple independent uplinks.

On the other hand, in an IoT environment scenario, it becomes a lot easier for the attacker to perform an eclipse attack. An IoT device is an easy target for attackers largely because an eclipse attack on IoT devices involves attacking only one single point of failure, for instance, attacking a cellular 3G uplink.

If the attacker wants to launch an eclipse attack on an IoT device, what the attacker can do is to first launch a man-in-the-middle attack by targeting an IoT device’s gateway. Once the gateway is compromised, the attacker has full control of the victim IoT device’s data such as block synchronization requests, and can therefore force connection to the malicious nodes.

The IoT device becomes isolated from the rest of the peer-to-peer network and thus, becoming impossible to view the real blockchain network. Henceforth, an eclipse attack on an IoT device is completed.

So how to mitigate Eclipse Attacks?

In an eclipse attack scenario in a Proof-of-Work (PoW) based network, the attacker exploits to force a node to accept a longer chain with lower total difficulty than the main chain. Since the attacker advertised a higher total difficulty than honest nodes’, when the victim node rejoins the network, it would receive a chain that is longer than the valid chain but has lower total difficulty.

Therefore, what happens is the victim node can no longer synchronize with the valid chain. So, what are the ways to alleviate this problem?

Fortunately, important proposals are quickly emerging. Just last month, Dominic Letz, a Taipei-based German blockchain researcher, proposed BlockQuick — the first super light client protocol that addresses the issue of eclipse attacks.

As Letz wrote in the paper “BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices,” BlockQuick is capable of preventing eclipse attacks because it doesn’t depend solely on choosing the longest chain with the highest difficulty on the Proof-of-Work (PoW) network when validating a block.

The longest chain and highest difficulty features are critical in the blockchain protocol and to popular light clients such as Ethereum Geth as well, but without proper protection can be abused by attackers. In order to provide a secure light client protocol, the security policy must adopt the consensus reputation table when validating a block.

As he explains in the paper: “In each new block the device validates the cryptographic signature of the miner and compares these with the known miner identities in its consensus reputation table. Only if a block receives a consensus score of >50% is it accepted by the client. Receiving a chain with a lower total score results in an abort.”

The client will look at how the devices iterate the blocks and will run a slow update mechanism. The idea is that instead of complying with the longest chain rule, BlockQuick will be running a reputation check in order to ensure that the client is accepting only the blocks with >50% reputation scores.

Conclusion

In this article, we described what an eclipse attack is, discussed some of the implications of eclipse attacks, and explored how super light client protocols can address the issue. As blockchain technologies continue to evolve, being knowledgeable in current and possible future developments are critical for leaders in the community. So stay connected! Follow me on Twitter: https://twitter.com/YahsinHuang

--

--