Crate Docs Build Status Apache 2.0 Licensed

Overview

AlephBFT is an asynchronous and Byzantine fault tolerant consensus protocol aimed at ordering arbitrary messages (transactions). It has been designed to operate continuously under conditions where there is no bound on message-delivery delay and under the assumption that there is a significant probability of malicious behavior, making it an excellent fit for blockchain-related applications. For more information, check the white paper.

This repository contains a Rust implementation of AlephBFT that offers a convenient API enabling seamless application to various problems. The prime application of the repository is the consensus engine (sometimes called the "finality gadget") of the Aleph Zero blockchain.

The code is split into several Rust packages, each having its own directory - see the Cargo.toml file, which defines the layout of the whole workspace. The main package, aleph-bft, is located in the consensus directory. Additionally, every other package has a short README describing its role in the AlephBFT toolset.

Documentation

Every package is documented on docs.rs. Comprehensive documentation is available as a mdBook.

The book can be built locally (assuming you have installed rustup): cargo install mdbook cd docs mdbook serve --open

Implementation status

Highlights: - The protocol is asynchronous, so it's driven by consensus events as opposed to some clock ticks. - The performance is still optimal in a partially synchronous environment. - BFT - secure if less than one third of the committee is malicious. - Secure against fork bombs. - Lowered network overhead of sending DAG parent information. - Thorough testing, including malicious scenarios, and high code coverage.

More details are available in the book.

Using the crate

Examples

Currently we provide two basic examples of running AlephBFT. The first one: ordering implements a committee member that is not cryptographically secure and serves only as a working example of what traits need to be implemented and how to implement them. For example, you may run the following command cd ./examples/ordering ./run.sh 5 where 5 in the above is the number of committee members, and can be replaced by any reasonable number. Running this script will result in generating log files node0.log, node1.log, ... corresponding to subsequent nodes. The script will try to start nodes at predefined IP addresses, 127.0.0.1:43XXX, where XXX denotes the node id, and a node will panic if the address is not available.

The second example: blockchain is meant for benchmarking AlephBFT in the blockchain setting. It implements a simple round-robin blockchain assuming honest participation. The easiest way to run it is to use the provided script as follows (assuming we start in the root directory)

cd ./examples/blockchain ./run.sh 5 where, again, 5 denotes the number of nodes that will be started. Here we only assume that the address 127.0.0.1:43000 is available, as the network implementation contains a simple node discovery mechanism. The achieved transactions per second will be among the final log messages in these files.

For further details, see cargo run -- --help

Dependencies

The repository is mainly self-contained. It is implemented using Rust's async features and depends only on the futures crate from the standard library. Moreover, it has some usual dependencies like log and rand and one bigger for encoding, namely parity-scale-codec. In future work, we plan to get rid of this dependency.

Toolchain

This release was built and tested against the nightly-2021-10-24 Rust toolchain. If you want to use another version, edit the rust-toolchain file, or use an override with higher priority.

Tests

There are many unit tests and several integration tests that may be run by standard command cargo test --lib or cargo test --lib --skip medium if you want to run just small tests. Alternatively, you may run the run_local_pipeline.sh script.

Fuzzing

We provide fuzzing tests that try to crash the whole application by creating arbitrary data for the network layer and feeding it into the member implementation. To run those tests you need to install afl and cargo-fuzz. cargo-fuzz requires you to use a nightly Rust toolchain. afl differs from cargo-fuzz in that it requires so called corpus data to operate, i.e. some non-empty data set that do not crash the application. Both tools are using LLVM's instrumentation capabilities in order to guide the fuzzing process basing on code-coverage statistics.

sh cargo install cargo-fuzz cargo install afl

cargo-fuzz/libfuzzer

sh cargo fuzz run --features="libfuzz" fuzz_target

afl

You will need to generate some seed data first in order to run it.

```sh

create some random input containing network data from a locally executed test

mkdir aflin cargo build --bin genfuzz ./target/debug/genfuzz >./aflin/seed ```

You might need to reconfigure your operating system in order to proceed - in such a case follow the instructions printed by the afl tool in your terminal.

sh cargo afl build --features="afl-fuzz" --bin fuzz_target_afl cargo afl fuzz -i afl_in -o afl_out target/debug/fuzz_target_afl

The gen_fuzz binary is also able to verify data for the afl tool.

sh cargo build --bin gen_fuzz ./target/debug/gen_fuzz | ./target/debug/gen_fuzz --check-fuzz

Code Coverage

You may generate the code coverage summary using the gen_cov_data.sh script and then a detailed raport for every file with cov_report.sh. Make sure to first install all the required tools with install_cov_tools.sh.

Resources

Future work

License

AlephBFT is licensed under the terms of the Apache License 2.0.

Funding

The implementation in this repository is funded by Aleph Zero Foundation.