From 88a762cab5ac08e12fa0574ead369622407f8249 Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 13:18:19 +0200 Subject: [PATCH 01/17] removed other branch page --- learn/architecture.md | 33 --------------------------------- 1 file changed, 33 deletions(-) delete mode 100644 learn/architecture.md diff --git a/learn/architecture.md b/learn/architecture.md deleted file mode 100644 index c0d135785..000000000 --- a/learn/architecture.md +++ /dev/null @@ -1,33 +0,0 @@ ---- -title: Architecture -description: Overview of Wormhole's architecture, detailing key on-chain and off-chain components like the Core Contract, Guardian Network, and relayers. ---- - -# Architecture Overview - -## Architecture - -Wormhole has several noteworthy components. Before we discuss each component in depth, let's discuss the names of the major pieces and how they fit together. - -![Wormhole architecture detailed diagram: source to target chain communication.](/images/learn/architecture/overview.webp) - -## On-Chain Components - -- **Emitter** - a contract that calls the publish message method on the Core Contract. The core contract will write an event to the Transaction Logs with details about the emitter and sequence number to identify the message. This may be your [xDapp](#){target=\_blank} or an existing ecosystem protocol -- **[Wormhole core contract](#){target=\_blank}** - primary contract, this is the contract which the Guardians observe and which fundamentally allows for cross-chain communication -- **Transaction Log** - blockchain-specific logs that allow the Guardians to observe messages emitted by the core contract - -## Off-Chain Components - -- **Guardian Network** - validators that exist in their own P2P network. Guardians observe and validate the messages emitted by the Core Contract on each supported chain to produce VAAs (signed messages) -- **[Guardian](#){target=\_blank}** - one of 19 validators in the Guardian Network that contributes to the VAA multi-sig -- **[Spy](#){target=\_blank}** - a daemon that subscribes to messages published within the Guardian Network. A Spy can observe and forward network traffic, which helps scale up VAA distribution -- **[API](#){target=\_blank}** - a REST server to retrieve details for a VAA or the guardian network -- **[VAAs](/learn/infrastructure/vaas/){target=\_blank}** - verifiable Action Approvals (VAAs) are the signed attestation of an observed message from the wormhole core contract. -- **[Relayer](#){target=\_blank}** - any off-chain process that relays a VAA to the target chain - - **Standard Relayers** - a decentralized relayer network that delivers messages that are requested on-chain via the Wormhole Relay Contract. Also referred to as Generic Relayers - - **Specialized Relayers** - relayers that only handle VAAs for a specific protocol or cross-chain application. They can execute custom logic off-chain, reducing gas costs and increasing cross-chain compatibility. Currently, cross-chain application developers are responsible for developing and hosting specialized relayers - From 43f856e51a9a3a83d256f250bf506ec320f4d018 Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 15:04:28 +0200 Subject: [PATCH 02/17] added folders for code snippets --- .../code/learn/infrastructure/VAAs/header.js | 4 ++ .../learn/infrastructure/VAAs/signature.js | 2 + learn/infrastructure/vaas.md | 41 +++++++++++++++++++ 3 files changed, 47 insertions(+) create mode 100644 .snippets/code/learn/infrastructure/VAAs/header.js create mode 100644 .snippets/code/learn/infrastructure/VAAs/signature.js diff --git a/.snippets/code/learn/infrastructure/VAAs/header.js b/.snippets/code/learn/infrastructure/VAAs/header.js new file mode 100644 index 000000000..575487f44 --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/header.js @@ -0,0 +1,4 @@ +byte version // VAA Version +u32 guardian_set_index // Indicates which guardian set is signing +u8 len_signatures // Number of signatures stored +[]signature signatures // Collection of guardian signatures \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/signature.js b/.snippets/code/learn/infrastructure/VAAs/signature.js new file mode 100644 index 000000000..8a47d8bba --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/signature.js @@ -0,0 +1,2 @@ +u8 index // The index of this guardian in the guardian set +[65]byte signature // The ECDSA signature \ No newline at end of file diff --git a/learn/infrastructure/vaas.md b/learn/infrastructure/vaas.md index e69de29bb..85d3457e9 100644 --- a/learn/infrastructure/vaas.md +++ b/learn/infrastructure/vaas.md @@ -0,0 +1,41 @@ +--- +title: VAAs +description: +--- + + + +# Verified Action Approvals + +VAAs are the core messaging primitive in Wormhole. You can think of them as packets of cross chain data that are emitted any time a cross chain application contract interacts with the Core Contract. + +The basic VAA has two components: a Header and a Body. + +Messages emitted by contracts need to be validated by the guardians before they can be sent to the target chain. Once a majority of guardians observe the message and finality has been achieved, the Guardians sign a keccak256 hash of the message body. + +The message is wrapped up in a structure called a VAA which combines the message with the guardian signatures to form a proof. + +VAAs are uniquely indexed by the (emitter_chain, emitter_address, sequence) tuple. A VAA can be obtained by querying the Guardian [RPC](#){target=\_blank} or the [API](#){target=\_blank} with this information. + +These VAA's are ultimately what a smart contract on a receiving chain must process in order to receive a wormhole message. + +## VAA Format + +VAA's contain two sections of data. + +### Header + +The header holds metadata about the current VAA, the guardian set that is currently active, and the list of signatures gathered so far. + +```js +--8<-- 'code/learn/infrastructure/VAAs/header.js' +``` + +where each signature is: + +```js +--8<-- 'code/learn/infrastructure/VAAs/signature.js' +``` + From e9d649c2d149c8c65dd395542d02c626051965dd Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 16:54:21 +0200 Subject: [PATCH 03/17] code snippets and update VAAs page --- .../infrastructure/VAAs/action-example.js | 4 + .../code/learn/infrastructure/VAAs/action.js | 4 + .../learn/infrastructure/VAAs/attestation.js | 6 + .../code/learn/infrastructure/VAAs/body.js | 7 + .../learn/infrastructure/VAAs/sign-hash.js | 4 + .../learn/infrastructure/VAAs/token-msg.js | 8 ++ .../infrastructure/VAAs/token-transfer.js | 7 + learn/infrastructure/vaas.md | 135 ++++++++++++++++-- 8 files changed, 167 insertions(+), 8 deletions(-) create mode 100644 .snippets/code/learn/infrastructure/VAAs/action-example.js create mode 100644 .snippets/code/learn/infrastructure/VAAs/action.js create mode 100644 .snippets/code/learn/infrastructure/VAAs/attestation.js create mode 100644 .snippets/code/learn/infrastructure/VAAs/body.js create mode 100644 .snippets/code/learn/infrastructure/VAAs/sign-hash.js create mode 100644 .snippets/code/learn/infrastructure/VAAs/token-msg.js create mode 100644 .snippets/code/learn/infrastructure/VAAs/token-transfer.js diff --git a/.snippets/code/learn/infrastructure/VAAs/action-example.js b/.snippets/code/learn/infrastructure/VAAs/action-example.js new file mode 100644 index 000000000..fe8eb64dd --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/action-example.js @@ -0,0 +1,4 @@ +module: 0x00000000000000000000000000000000000000000000000000000000436f7265 +action: 1 +chain: 1 +new_contract: 0x3485672937589571623749593761923748845625222819374462348283888283 \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/action.js b/.snippets/code/learn/infrastructure/VAAs/action.js new file mode 100644 index 000000000..01b5b0207 --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/action.js @@ -0,0 +1,4 @@ +u8[32] module // Contains a right-aligned module identifier +u8 action // Predefined governance action to execute +u16 chain // Chain the action is targeting, 0 = all chains +... args // Arguments to the action \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/attestation.js b/.snippets/code/learn/infrastructure/VAAs/attestation.js new file mode 100644 index 000000000..944e9e05f --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/attestation.js @@ -0,0 +1,6 @@ +u8 payload_id = 2 // Attestation +[32]byte token_address // Address of the originating token contract +u16 token_chain // Chain ID of the originating token +u8 decimals // Number of decimals this token should have +[32]byte symbol // Short name of asset +[32]byte name // Full name of asset \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/body.js b/.snippets/code/learn/infrastructure/VAAs/body.js new file mode 100644 index 000000000..4cfc6edee --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/body.js @@ -0,0 +1,7 @@ +u32 timestamp // The timestamp of the block this message was published in +u32 nonce // +u16 emitter_chain // The id of the chain that emitted the message +[32]byte emitter_address // The contract address (wormhole formatted) that called the core contract +u64 sequence // The auto incrementing integer that represents the number of messages published by this emitter +u8 consistency_level // The consistency level (finality) required by this emitter +[]byte payload // arbitrary bytes containing the data to be acted on \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/sign-hash.js b/.snippets/code/learn/infrastructure/VAAs/sign-hash.js new file mode 100644 index 000000000..9ac3c2514 --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/sign-hash.js @@ -0,0 +1,4 @@ +// hash the bytes of the body twice +digest = keccak256(keccak256(body)) +// sign the result +signature = ecdsa_sign(digest, key) \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/token-msg.js b/.snippets/code/learn/infrastructure/VAAs/token-msg.js new file mode 100644 index 000000000..23a2f2fc4 --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/token-msg.js @@ -0,0 +1,8 @@ +u8 payload_id = 3 // Token Transfer with Message +u256 amount // Amount of tokens being transferred. +u8[32] token_address // Address on the source chain. +u16 token_chain // Numeric ID for the source chain. +u8[32] to // Address on the destination chain. +u16 to_chain // Numeric ID for the destination chain. +u256 fee // Portion of amount paid to a relayer. +[]byte payload // Message, arbitrary bytes, app specific \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/token-transfer.js b/.snippets/code/learn/infrastructure/VAAs/token-transfer.js new file mode 100644 index 000000000..ca7b94f0b --- /dev/null +++ b/.snippets/code/learn/infrastructure/VAAs/token-transfer.js @@ -0,0 +1,7 @@ +u8 payload_id = 1 // Token Transfer +u256 amount // Amount of tokens being transferred. +u8[32] token_address // Address on the source chain. +u16 token_chain // Numeric ID for the source chain. +u8[32] to // Address on the destination chain. +u16 to_chain // Numeric ID for the destination chain. +u256 fee // Portion of amount paid to a relayer. \ No newline at end of file diff --git a/learn/infrastructure/vaas.md b/learn/infrastructure/vaas.md index 85d3457e9..15de3a0fa 100644 --- a/learn/infrastructure/vaas.md +++ b/learn/infrastructure/vaas.md @@ -1,29 +1,30 @@ --- title: VAAs -description: +description: Learn about Verified Action Approvals (VAAs) in Wormhole, their structure, validation, and role in cross-chain communication. --- # Verified Action Approvals -VAAs are the core messaging primitive in Wormhole. You can think of them as packets of cross chain data that are emitted any time a cross chain application contract interacts with the Core Contract. +VAAs are Wormhole's core messaging primitive. They are packets of cross-chain data that are emitted any time a cross-chain application contract interacts with the Core Contract. The basic VAA has two components: a Header and a Body. -Messages emitted by contracts need to be validated by the guardians before they can be sent to the target chain. Once a majority of guardians observe the message and finality has been achieved, the Guardians sign a keccak256 hash of the message body. +The guardians must validate messages emitted by contracts before they can be sent to the target chain. Once a majority of guardians observe the message and finality has been achieved, the Guardians sign a keccak256 hash of the message body. -The message is wrapped up in a structure called a VAA which combines the message with the guardian signatures to form a proof. +The message is wrapped up in a structure called a VAA, which combines the message with the guardian signatures to form a proof. -VAAs are uniquely indexed by the (emitter_chain, emitter_address, sequence) tuple. A VAA can be obtained by querying the Guardian [RPC](#){target=\_blank} or the [API](#){target=\_blank} with this information. +VAAs are uniquely indexed by the (`emitter_chain`, `emitter_address`, `sequence`) tuple. A VAA can be obtained by querying the Guardian [RPC](#){target=\_blank} or the [API](#){target=\_blank} with this information. -These VAA's are ultimately what a smart contract on a receiving chain must process in order to receive a wormhole message. +These VAAs are ultimately what a smart contract on a receiving chain must process to receive a Wormhole message. ## VAA Format -VAA's contain two sections of data. +VAAs contain two sections of data. ### Header @@ -33,9 +34,127 @@ The header holds metadata about the current VAA, the guardian set that is curren --8<-- 'code/learn/infrastructure/VAAs/header.js' ``` -where each signature is: +Where each `signature` is: ```js --8<-- 'code/learn/infrastructure/VAAs/signature.js' ``` +### Body + +The body is _deterministically_ derived from an on-chain message. Any two guardians must derive the exact same body. This requirement exists so that there is always a one-to-one relationship between VAAs and messages to avoid double processing of messages. + +```js +--8<-- 'code/learn/infrastructure/VAAs/body.js' +``` + +The body is the relevant information for consumers and is handed back from a call like `parseAndVerifyVAA`. Because the `emitterAddress` is included as part of the body, the developer is able to tell if this VAA originated from a trusted contract. + +!!! note + Because VAAs have no destination, they are effectively multicast. They will be verified as authentic by any Core Contract on any chain in the network. If a VAA has a specific destination, it is entirely the responsibility of relayers to complete that delivery appropriately. + +## Signatures + +The body of the VAA is hashed twice with `keccak256` to produce the digest message that is signed. + +```js +--8<-- 'code/learn/infrastructure/VAAs/sign-hash.js' +``` + +!!! note + Different implementations of the ECDSA signature validation may apply a keccak256 hash to the message passed, so care must be taken to pass the correct arguments. + + For example the [Solana secp256k1 program](https://docs.solanalabs.com/runtime/programs#secp256k1-program){target=\_blank} will hash the message passed. In this case, the argument for the message should be a single hash of the body, not the twice hashed body. + +## Payload Types + +Different applications that are built on Wormhole may specify a format for the payloads attached to a VAA. This payload provides information the target chain and contract so it can take some action (e.g. minting tokens to a receiver address). + +### Token Transfer + +Tokens are transferred from one chain to another using a lockup/mint and burn/unlock mechanism. While many bridges work on this basic premise, this implementation achieves this by relying on the generic message passing protocol provided by Wormhole to support routing the lock and burn events from one chain to another. This makes Wormhole's token bridge completely chain agnostic. As long as a wormhole contract exists on the chain we wish to transfer to, an implementation can be quickly incorporated into the network. Due to the generic message passing nature of Wormhole, programs emitting messages do not need to know anything about the implementation details of any other chain. + +In order to transfer tokens from A to B, we must lock the tokens on A and mint them on B. It is important that the tokens on A have been proven to be locked before the minting can occur on B. To facilitate this process, chain A first locks the tokens and emits a message indicating that the locking has been completed. This message has the following structure, and is referred to as a transfer message: + +```js +--8<-- 'code/learn/infrastructure/VAAs/token-transfer.js' +``` + +This structure contains everything needed for the receiving chain to learn about a lockup event. Once Chain B receives this payload it can mint the corresponding asset. + +Note that Chain B is agnostic as to how the tokens on the sending side were locked. They could have been burned by a mint or locked in a custody account. The protocol simply relays the event once a sufficient amount of guardians have attested its existence. + +### Attestation + +The Transfer event above is missing an important detail. While the program on Chain B can trust the message to inform it of token lockup events, it has no way to know what the token being locked up actually is. The address alone is a meaningless value to most users. To solve this, the Token Bridge supports token attestation. + +For a Token Attestation, Chain A emits a message containing metadata about a token which Chain B may use to persist the name, symbol, and decimal precision of a token address. + +The message format for this action is as follows: + +```js +--8<-- 'code/learn/infrastructure/VAAs/attestation.js' +``` + +Attestations use a fixed-length byte-array to encode UTF8 token name and symbol data. + +!!! note + Because the byte array is fixed length, the data contained may truncate multibyte unicode characters. + +When sending an attestation VAA, we recommend sending the longest UTF8 prefix that does NOT truncate a character, and then right-padding it with 0 bytes. + +When parsing an attestation VAA, we recommend trimming all trailing 0 bytes, and converting the remainder to UTF8 via any lossy algorithm. + +!!! note + Be mindful that different on-chain systems may have different VAA parsers, that may result in different names/symbols on different chains if the string is long, or contains invalid UTF8. + +An important detail of the token bridge is that an attestation is required before a token can be transferred. This is because without knowing a tokens decimal precision, it is not possible for Chain B to correctly mint the correct amount of tokens when processing a transfer. + +### Token + Message + +!!! note + This VAA type is also referred to as a payload3 message or a Contract Controlled Transfer. + +The Token + Message data structure is identical to the Token only data structure with the addition of a `payload` field that contains arbitrary bytes. This arbitrary byte field is where an app may include additional data in the transfer to inform some application specific behavior. + +```js +--8<-- 'code/learn/infrastructure/VAAs/token-msg.js' +``` + +### Governance + +Governance VAAs don't have a `payload_id` field like the above formats, they're used to trigger some action in the deployed contracts (e.g. upgrade). + +### Action Structure + +Governance messages contain pre-defined actions, which can target the various Wormhole modules currently deployed on chain. The structure contains the following fields: + +```js +--8<-- 'code/learn/infrastructure/VAAs/action.js' +``` + +Here is an example message containing a governance action triggering a code upgrade to the solana core contract. The module field here is a right-aligned encoding of the ASCII "Core", represented as a 32 byte hex string. + +```js +--8<-- 'code/learn/infrastructure/VAAs/action-example.js' +``` + +### Actions + +The meaning of each numeric action is pre-defined and documented in the Wormhole design documents. For each application, the relevant definitions can be found via these links: + +- Core governance actions are documented [link](#){target=\_blank} +- Token Bridge governance actions are documented [link](#){target=\_blank} +- NFT Bridge governance actions are documented [link](#){target=\_blank} + +## Lifetime of a Message + +!!! note + Anyone can submit the VAA to the target chain. The guardians typically do not perform this step to avoid transaction fees. Instead, applications built on top of Wormhole can acquire the VAA via the guardian RPC and do the submission in a separate flow. + +With the concepts now defined, we can illustrate what a full flow for a message passing between two chains looks like. The following stages demonstrate each stage of processing the Wormhole network performs in order to route a message. + +1. **A message is emitted by a contract running on chain A** - messages can be emitted by any contract, and the guardians are programmed to observe all chains for these events. Here, the guardians are represented as a single entity to simplify the graphics but the observation of the message must be performed individually by each of the 19 guardians +2. **Signatures are aggregated** - guardians independently observe and sign the message. Once enough guardians have signed the message, the collection of signatures are combined with the message and metadata to produce a VAA +3. **VAA submitted to target chain** - the VAA acts as proof that the guardians have collectively attested the existence of the message payload, in order to complete the final step, the VAA itself is submitted (or relayed) to the target chain to be processed by a receiving contract + From 4f4862c1a3e65dd725cda6f8dede6c74a0b54748 Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 17:49:39 +0200 Subject: [PATCH 04/17] grammarly check --- learn/infrastructure/vaas.md | 52 ++++++++++++++++++------------------ 1 file changed, 26 insertions(+), 26 deletions(-) diff --git a/learn/infrastructure/vaas.md b/learn/infrastructure/vaas.md index 15de3a0fa..897f53ac7 100644 --- a/learn/infrastructure/vaas.md +++ b/learn/infrastructure/vaas.md @@ -4,7 +4,7 @@ description: Learn about Verified Action Approvals (VAAs) in Wormhole, their st --- @@ -55,7 +55,7 @@ The body is the relevant information for consumers and is handed back from a cal ## Signatures -The body of the VAA is hashed twice with `keccak256` to produce the digest message that is signed. +The body of the VAA is hashed twice with `keccak256` to produce the signed digest message. ```js --8<-- 'code/learn/infrastructure/VAAs/sign-hash.js' @@ -64,31 +64,31 @@ The body of the VAA is hashed twice with `keccak256` to produce the digest messa !!! note Different implementations of the ECDSA signature validation may apply a keccak256 hash to the message passed, so care must be taken to pass the correct arguments. - For example the [Solana secp256k1 program](https://docs.solanalabs.com/runtime/programs#secp256k1-program){target=\_blank} will hash the message passed. In this case, the argument for the message should be a single hash of the body, not the twice hashed body. + For example, the [Solana secp256k1 program](https://docs.solanalabs.com/runtime/programs#secp256k1-program){target=\_blank} will hash the message passed. In this case, the argument for the message should be a single hash of the body, not the twice-hashed body. ## Payload Types -Different applications that are built on Wormhole may specify a format for the payloads attached to a VAA. This payload provides information the target chain and contract so it can take some action (e.g. minting tokens to a receiver address). +Different applications that are built on Wormhole may specify a format for the payloads attached to a VAA. This payload provides information on the target chain and contract so it can take some action (e.g., minting tokens to a receiver address). ### Token Transfer -Tokens are transferred from one chain to another using a lockup/mint and burn/unlock mechanism. While many bridges work on this basic premise, this implementation achieves this by relying on the generic message passing protocol provided by Wormhole to support routing the lock and burn events from one chain to another. This makes Wormhole's token bridge completely chain agnostic. As long as a wormhole contract exists on the chain we wish to transfer to, an implementation can be quickly incorporated into the network. Due to the generic message passing nature of Wormhole, programs emitting messages do not need to know anything about the implementation details of any other chain. +Tokens are transferred from one chain to another using a lockup/mint and burn/unlock mechanism. While many bridges work on this basic premise, this implementation achieves this by relying on the generic message-passing protocol provided by Wormhole to support routing the lock and burn events from one chain to another. This makes Wormhole's token bridge ultimately chain-agnostic. An implementation can be quickly incorporated into the network as long as a wormhole contract exists on the chain we wish to transfer to. Due to the generic message-passing nature of Wormhole, programs emitting messages do not need to know anything about the implementation details of any other chain. -In order to transfer tokens from A to B, we must lock the tokens on A and mint them on B. It is important that the tokens on A have been proven to be locked before the minting can occur on B. To facilitate this process, chain A first locks the tokens and emits a message indicating that the locking has been completed. This message has the following structure, and is referred to as a transfer message: +To transfer tokens from A to B, we must lock the tokens on A and mint them on B. The tokens on A must be proven to be locked before the minting can occur on B. To facilitate this process, chain A first locks the tokens and emits a message indicating that the locking has been completed. This message has the following structure and is referred to as a transfer message: ```js --8<-- 'code/learn/infrastructure/VAAs/token-transfer.js' ``` -This structure contains everything needed for the receiving chain to learn about a lockup event. Once Chain B receives this payload it can mint the corresponding asset. +This structure contains everything the receiving chain needs to learn about a lockup event. Once Chain B receives this payload, it can mint the corresponding asset. -Note that Chain B is agnostic as to how the tokens on the sending side were locked. They could have been burned by a mint or locked in a custody account. The protocol simply relays the event once a sufficient amount of guardians have attested its existence. +Note that Chain B is agnostic regarding how the tokens on the sending side were locked. They could have been burned by a mint or locked in a custody account. The protocol relays the event once enough guardians have attested to its existence. ### Attestation -The Transfer event above is missing an important detail. While the program on Chain B can trust the message to inform it of token lockup events, it has no way to know what the token being locked up actually is. The address alone is a meaningless value to most users. To solve this, the Token Bridge supports token attestation. +The Transfer event above needs an important detail added. While the program on Chain B can trust the message to inform it of token lockup events, it has no way of knowing what the token being locked up actually is. The address alone is a meaningless value to most users. To solve this, the Token Bridge supports token attestation. -For a Token Attestation, Chain A emits a message containing metadata about a token which Chain B may use to persist the name, symbol, and decimal precision of a token address. +For a token attestation, Chain A emits a message containing metadata about a token which Chain B may use to preserve the name, symbol, and decimal precision of a token address. The message format for this action is as follows: @@ -96,26 +96,26 @@ The message format for this action is as follows: --8<-- 'code/learn/infrastructure/VAAs/attestation.js' ``` -Attestations use a fixed-length byte-array to encode UTF8 token name and symbol data. +Attestations use a fixed-length byte array to encode UTF8 token name and symbol data. !!! note Because the byte array is fixed length, the data contained may truncate multibyte unicode characters. -When sending an attestation VAA, we recommend sending the longest UTF8 prefix that does NOT truncate a character, and then right-padding it with 0 bytes. +When sending an attestation VAA, we recommend sending the longest UTF8 prefix that does NOT truncate a character and right-padding it with 0 bytes. -When parsing an attestation VAA, we recommend trimming all trailing 0 bytes, and converting the remainder to UTF8 via any lossy algorithm. +When parsing an attestation VAA, we recommend trimming all trailing 0 bytes and converting the remainder to UTF8 via any lossy algorithm. !!! note - Be mindful that different on-chain systems may have different VAA parsers, that may result in different names/symbols on different chains if the string is long, or contains invalid UTF8. + Be mindful that different on-chain systems may have different VAA parsers, which may result in different names/symbols on different chains if the string is long or contains invalid UTF8. -An important detail of the token bridge is that an attestation is required before a token can be transferred. This is because without knowing a tokens decimal precision, it is not possible for Chain B to correctly mint the correct amount of tokens when processing a transfer. +An essential detail of the token bridge is that an attestation is required before a token can be transferred. This is because without knowing a token's decimal precision, it is not possible for Chain B to correctly mint the correct amount of tokens when processing a transfer. ### Token + Message !!! note This VAA type is also referred to as a payload3 message or a Contract Controlled Transfer. -The Token + Message data structure is identical to the Token only data structure with the addition of a `payload` field that contains arbitrary bytes. This arbitrary byte field is where an app may include additional data in the transfer to inform some application specific behavior. +The Token + Message data structure is identical to the token-only data structure with the addition of a `payload` field that contains arbitrary bytes. This arbitrary byte field is where an app may include additional data in the transfer to inform some application-specific behavior. ```js --8<-- 'code/learn/infrastructure/VAAs/token-msg.js' @@ -123,17 +123,17 @@ The Token + Message data structure is identical to the Token only data structure ### Governance -Governance VAAs don't have a `payload_id` field like the above formats, they're used to trigger some action in the deployed contracts (e.g. upgrade). +Governance VAAs don't have a `payload_id` field like the above formats; they're used to trigger some action in the deployed contracts (e.g., upgrade). ### Action Structure -Governance messages contain pre-defined actions, which can target the various Wormhole modules currently deployed on chain. The structure contains the following fields: +Governance messages contain pre-defined actions, which can target the various Wormhole modules currently deployed on-chain. The structure contains the following fields: ```js --8<-- 'code/learn/infrastructure/VAAs/action.js' ``` -Here is an example message containing a governance action triggering a code upgrade to the solana core contract. The module field here is a right-aligned encoding of the ASCII "Core", represented as a 32 byte hex string. +Here is an example message containing a governance action triggering a code upgrade to the Solana core contract. The module field here is a right-aligned encoding of the ASCII "Core", represented as a 32-byte hex string. ```js --8<-- 'code/learn/infrastructure/VAAs/action-example.js' @@ -143,18 +143,18 @@ Here is an example message containing a governance action triggering a code upgr The meaning of each numeric action is pre-defined and documented in the Wormhole design documents. For each application, the relevant definitions can be found via these links: -- Core governance actions are documented [link](#){target=\_blank} -- Token Bridge governance actions are documented [link](#){target=\_blank} -- NFT Bridge governance actions are documented [link](#){target=\_blank} +- Core governance actions are documented in the their [whitepaper](https://github.com/wormhole-foundation/wormhole/blob/main/whitepapers/0002_governance_messaging.md){target=\_blank} +- Token Bridge governance actions are documented in the their [whitepaper](https://github.com/wormhole-foundation/wormhole/blob/main/whitepapers/0003_token_bridge.md){target=\_blank} +- NFT Bridge governance actions are documented in their [whitepaper](https://github.com/wormhole-foundation/wormhole/blob/main/whitepapers/0006_nft_bridge.md){target=\_blank} ## Lifetime of a Message !!! note - Anyone can submit the VAA to the target chain. The guardians typically do not perform this step to avoid transaction fees. Instead, applications built on top of Wormhole can acquire the VAA via the guardian RPC and do the submission in a separate flow. + Anyone can submit the VAA to the target chain. The guardians typically do not perform this step to avoid transaction fees. Instead, applications built on top of Wormhole can acquire the VAA via the guardian RPC and make the submission in a separate flow. With the concepts now defined, we can illustrate what a full flow for a message passing between two chains looks like. The following stages demonstrate each stage of processing the Wormhole network performs in order to route a message. -1. **A message is emitted by a contract running on chain A** - messages can be emitted by any contract, and the guardians are programmed to observe all chains for these events. Here, the guardians are represented as a single entity to simplify the graphics but the observation of the message must be performed individually by each of the 19 guardians -2. **Signatures are aggregated** - guardians independently observe and sign the message. Once enough guardians have signed the message, the collection of signatures are combined with the message and metadata to produce a VAA -3. **VAA submitted to target chain** - the VAA acts as proof that the guardians have collectively attested the existence of the message payload, in order to complete the final step, the VAA itself is submitted (or relayed) to the target chain to be processed by a receiving contract +1. **A message is emitted by a contract running on chain A** - any contract can emit messages, and the guardians are programmed to observe all chains for these events. Here, the guardians are represented as a single entity to simplify the graphics, but the observation of the message must be performed individually by each of the 19 guardians +2. **Signatures are aggregated** - guardians observe and sign the message independently. Once enough guardians have signed the message, the collection of signatures are combined with the message and metadata to produce a VAA +3. **VAA submitted to target chain** - the VAA acts as proof that the guardians have collectively attested the existence of the message payload; in order to complete the final step, the VAA itself is submitted (or relayed) to the target chain to be processed by a receiving contract From ed34afe9f48bb37b2367145b0c7604d7b85a4f4b Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 17:55:40 +0200 Subject: [PATCH 05/17] guardian page setup --- learn/infrastructure/.pages | 1 + learn/infrastructure/guardians.md | 13 +++ learn/infrastructure/vaas.md | 160 ------------------------------ 3 files changed, 14 insertions(+), 160 deletions(-) create mode 100644 learn/infrastructure/guardians.md delete mode 100644 learn/infrastructure/vaas.md diff --git a/learn/infrastructure/.pages b/learn/infrastructure/.pages index 7c4429262..98a5cf82c 100644 --- a/learn/infrastructure/.pages +++ b/learn/infrastructure/.pages @@ -2,3 +2,4 @@ title: Infrastructure Components nav: - index.md - 'VAAs': 'vaas.md' + - 'Guardians': 'guardians.md' diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md new file mode 100644 index 000000000..5e5f4fee5 --- /dev/null +++ b/learn/infrastructure/guardians.md @@ -0,0 +1,13 @@ +--- +title: Guardians +description: +--- + + \ No newline at end of file diff --git a/learn/infrastructure/vaas.md b/learn/infrastructure/vaas.md deleted file mode 100644 index 897f53ac7..000000000 --- a/learn/infrastructure/vaas.md +++ /dev/null @@ -1,160 +0,0 @@ ---- -title: VAAs -description: Learn about Verified Action Approvals (VAAs) in Wormhole, their structure, validation, and role in cross-chain communication. ---- - - - -# Verified Action Approvals - -VAAs are Wormhole's core messaging primitive. They are packets of cross-chain data that are emitted any time a cross-chain application contract interacts with the Core Contract. - -The basic VAA has two components: a Header and a Body. - -The guardians must validate messages emitted by contracts before they can be sent to the target chain. Once a majority of guardians observe the message and finality has been achieved, the Guardians sign a keccak256 hash of the message body. - -The message is wrapped up in a structure called a VAA, which combines the message with the guardian signatures to form a proof. - -VAAs are uniquely indexed by the (`emitter_chain`, `emitter_address`, `sequence`) tuple. A VAA can be obtained by querying the Guardian [RPC](#){target=\_blank} or the [API](#){target=\_blank} with this information. - -These VAAs are ultimately what a smart contract on a receiving chain must process to receive a Wormhole message. - -## VAA Format - -VAAs contain two sections of data. - -### Header - -The header holds metadata about the current VAA, the guardian set that is currently active, and the list of signatures gathered so far. - -```js ---8<-- 'code/learn/infrastructure/VAAs/header.js' -``` - -Where each `signature` is: - -```js ---8<-- 'code/learn/infrastructure/VAAs/signature.js' -``` - -### Body - -The body is _deterministically_ derived from an on-chain message. Any two guardians must derive the exact same body. This requirement exists so that there is always a one-to-one relationship between VAAs and messages to avoid double processing of messages. - -```js ---8<-- 'code/learn/infrastructure/VAAs/body.js' -``` - -The body is the relevant information for consumers and is handed back from a call like `parseAndVerifyVAA`. Because the `emitterAddress` is included as part of the body, the developer is able to tell if this VAA originated from a trusted contract. - -!!! note - Because VAAs have no destination, they are effectively multicast. They will be verified as authentic by any Core Contract on any chain in the network. If a VAA has a specific destination, it is entirely the responsibility of relayers to complete that delivery appropriately. - -## Signatures - -The body of the VAA is hashed twice with `keccak256` to produce the signed digest message. - -```js ---8<-- 'code/learn/infrastructure/VAAs/sign-hash.js' -``` - -!!! note - Different implementations of the ECDSA signature validation may apply a keccak256 hash to the message passed, so care must be taken to pass the correct arguments. - - For example, the [Solana secp256k1 program](https://docs.solanalabs.com/runtime/programs#secp256k1-program){target=\_blank} will hash the message passed. In this case, the argument for the message should be a single hash of the body, not the twice-hashed body. - -## Payload Types - -Different applications that are built on Wormhole may specify a format for the payloads attached to a VAA. This payload provides information on the target chain and contract so it can take some action (e.g., minting tokens to a receiver address). - -### Token Transfer - -Tokens are transferred from one chain to another using a lockup/mint and burn/unlock mechanism. While many bridges work on this basic premise, this implementation achieves this by relying on the generic message-passing protocol provided by Wormhole to support routing the lock and burn events from one chain to another. This makes Wormhole's token bridge ultimately chain-agnostic. An implementation can be quickly incorporated into the network as long as a wormhole contract exists on the chain we wish to transfer to. Due to the generic message-passing nature of Wormhole, programs emitting messages do not need to know anything about the implementation details of any other chain. - -To transfer tokens from A to B, we must lock the tokens on A and mint them on B. The tokens on A must be proven to be locked before the minting can occur on B. To facilitate this process, chain A first locks the tokens and emits a message indicating that the locking has been completed. This message has the following structure and is referred to as a transfer message: - -```js ---8<-- 'code/learn/infrastructure/VAAs/token-transfer.js' -``` - -This structure contains everything the receiving chain needs to learn about a lockup event. Once Chain B receives this payload, it can mint the corresponding asset. - -Note that Chain B is agnostic regarding how the tokens on the sending side were locked. They could have been burned by a mint or locked in a custody account. The protocol relays the event once enough guardians have attested to its existence. - -### Attestation - -The Transfer event above needs an important detail added. While the program on Chain B can trust the message to inform it of token lockup events, it has no way of knowing what the token being locked up actually is. The address alone is a meaningless value to most users. To solve this, the Token Bridge supports token attestation. - -For a token attestation, Chain A emits a message containing metadata about a token which Chain B may use to preserve the name, symbol, and decimal precision of a token address. - -The message format for this action is as follows: - -```js ---8<-- 'code/learn/infrastructure/VAAs/attestation.js' -``` - -Attestations use a fixed-length byte array to encode UTF8 token name and symbol data. - -!!! note - Because the byte array is fixed length, the data contained may truncate multibyte unicode characters. - -When sending an attestation VAA, we recommend sending the longest UTF8 prefix that does NOT truncate a character and right-padding it with 0 bytes. - -When parsing an attestation VAA, we recommend trimming all trailing 0 bytes and converting the remainder to UTF8 via any lossy algorithm. - -!!! note - Be mindful that different on-chain systems may have different VAA parsers, which may result in different names/symbols on different chains if the string is long or contains invalid UTF8. - -An essential detail of the token bridge is that an attestation is required before a token can be transferred. This is because without knowing a token's decimal precision, it is not possible for Chain B to correctly mint the correct amount of tokens when processing a transfer. - -### Token + Message - -!!! note - This VAA type is also referred to as a payload3 message or a Contract Controlled Transfer. - -The Token + Message data structure is identical to the token-only data structure with the addition of a `payload` field that contains arbitrary bytes. This arbitrary byte field is where an app may include additional data in the transfer to inform some application-specific behavior. - -```js ---8<-- 'code/learn/infrastructure/VAAs/token-msg.js' -``` - -### Governance - -Governance VAAs don't have a `payload_id` field like the above formats; they're used to trigger some action in the deployed contracts (e.g., upgrade). - -### Action Structure - -Governance messages contain pre-defined actions, which can target the various Wormhole modules currently deployed on-chain. The structure contains the following fields: - -```js ---8<-- 'code/learn/infrastructure/VAAs/action.js' -``` - -Here is an example message containing a governance action triggering a code upgrade to the Solana core contract. The module field here is a right-aligned encoding of the ASCII "Core", represented as a 32-byte hex string. - -```js ---8<-- 'code/learn/infrastructure/VAAs/action-example.js' -``` - -### Actions - -The meaning of each numeric action is pre-defined and documented in the Wormhole design documents. For each application, the relevant definitions can be found via these links: - -- Core governance actions are documented in the their [whitepaper](https://github.com/wormhole-foundation/wormhole/blob/main/whitepapers/0002_governance_messaging.md){target=\_blank} -- Token Bridge governance actions are documented in the their [whitepaper](https://github.com/wormhole-foundation/wormhole/blob/main/whitepapers/0003_token_bridge.md){target=\_blank} -- NFT Bridge governance actions are documented in their [whitepaper](https://github.com/wormhole-foundation/wormhole/blob/main/whitepapers/0006_nft_bridge.md){target=\_blank} - -## Lifetime of a Message - -!!! note - Anyone can submit the VAA to the target chain. The guardians typically do not perform this step to avoid transaction fees. Instead, applications built on top of Wormhole can acquire the VAA via the guardian RPC and make the submission in a separate flow. - -With the concepts now defined, we can illustrate what a full flow for a message passing between two chains looks like. The following stages demonstrate each stage of processing the Wormhole network performs in order to route a message. - -1. **A message is emitted by a contract running on chain A** - any contract can emit messages, and the guardians are programmed to observe all chains for these events. Here, the guardians are represented as a single entity to simplify the graphics, but the observation of the message must be performed individually by each of the 19 guardians -2. **Signatures are aggregated** - guardians observe and sign the message independently. Once enough guardians have signed the message, the collection of signatures are combined with the message and metadata to produce a VAA -3. **VAA submitted to target chain** - the VAA acts as proof that the guardians have collectively attested the existence of the message payload; in order to complete the final step, the VAA itself is submitted (or relayed) to the target chain to be processed by a receiving contract - From e0f29641f6d281e2ceed03e3724372e5c6a23eb1 Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 18:11:58 +0200 Subject: [PATCH 06/17] guardians page content --- learn/infrastructure/.pages | 2 +- learn/infrastructure/guardians.md | 70 ++++++++++++++++++++++++++++++- 2 files changed, 69 insertions(+), 3 deletions(-) diff --git a/learn/infrastructure/.pages b/learn/infrastructure/.pages index 98a5cf82c..b00826b56 100644 --- a/learn/infrastructure/.pages +++ b/learn/infrastructure/.pages @@ -2,4 +2,4 @@ title: Infrastructure Components nav: - index.md - 'VAAs': 'vaas.md' - - 'Guardians': 'guardians.md' + - 'Guardians': 'guardians.md' diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index 5e5f4fee5..d02778a2b 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -1,6 +1,6 @@ --- title: Guardians -description: +description: Discover Wormhole's Guardian Network, a decentralized, modular system enabling secure and scalable cross-chain communication across multiple blockchain ecosystems. --- \ No newline at end of file +--> + +## Guardian + +Wormhole relies upon a set of distributed nodes which monitor state on several blockchains. In Wormhole these nodes are referred to as Guardians. The current guardian set can be seen in the [Dashboard](https://wormhole-foundation.github.io/wormhole-dashboard/#/?endpoint=Mainnet){target=\_blank}. + +It is the guardians role to observe messages and sign the corresponding payloads. Each guardian performs this step in isolation, later combining the resulting signatures with other guardians as a final step. The resulting collection of independent observations form a multisig which represents a proof that a state has been observed and agreed upon by a majority of the wormhole network. These multisigs are referred to as VAAs in Wormhole. + +## Guardian Network + +The Guardian Network is designed to serve as Wormhole's oracle component, and the entire Wormhole ecosystem is founded on its technical underpinnings. It is the most critical element of the Wormhole ecosystem, and represents the single most important component to learn about if you want a deep understanding of Wormhole. + +To understand not just _how_ the Guardian Network works, but _why_ it works the way it does, let's first take a step back and go over the key design considerations. To become the best-in-class interoperability platform, there were five critical features Wormhole needed to have: + +- **Decentralization** - control of the network needs to be distributed amongst many parties +- **Modularity** - disparate parts of the ecosystem such as the oracle, relayer, applications, etc, should be kept as separate and modular as possible so they can be designed, modified and upgraded independently +- **Chain Agnosticism** - Wormhole should be able to support not only EVM, but also chains like Solana, Algorand, Cosmos, and even platforms that haven't been created yet. It also should not have any one chain as a single point of failure +- **Scalability** - Wormhole should be able to secure a large amount of value immediately and be able to handle the large transaction volume +- **Upgradeability** - as the decentralized computing ecosystem evolves, Wormhole will need to be able to change the implementation of its existing modules without breaking integrators + +Next, let's go into how Wormhole achieves these one at a time. + +### Decentralization + +Decentralization is the biggest concern. Previous interoperability solutions have largely been entirely centralized, and even newer solutions utilizing things like adversarial relayers still tend to have single points of failure or collusion thresholds as low as one or two. + +When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system-but this turns out to be a suboptimal solution. PoS is designed for blockchain consensus in smart-contract enabled environments, so it's less suitable when the network is verifying the output of many blockchains and not supporting its own smart contracts. While it looks appealing from a decentralization perspective, the network security remains unclear, and it can make some other outlined goals more difficult to achieve. Let's explore other options. + +The next option would be to rush straight for the finish line and use zero-knowledge proofs to secure the network. This would be a good solution from a decentralization perspective, as it's literally trustless. However, zero-knowledge proofs are still a nascent technology and it's not really feasible to verify them on-chain, especially on chains with limited computational environments. That means a form of multisig will be needed to secure the network. + +If we step back and look at the current De-Fi landscape, most of the top blockchains are secured by the same handful of validator companies. Currently, there are a limited number of companies in the world with the skills and capital to run top-notch validator companies. + +If a protocol could unite a large number of those validator companies into a purpose-built consensus mechanism that's optimized for chain interoperability, that design would likely be more performant and secure than a network bootstrapped by a tokenomics model. Assuming the validators would be on board, how many could Wormhole realistically utilize? + +If Wormhole were to use threshold signatures, the answer would basically be 'as many as are willing to participate.' However, threshold signatures have spotty support across the blockchain world, meaning it would be difficult and expensive to verify the signatures, ultimately limiting scalability and chain agnosticism. Thus, a t-schnorr multisig presents itself as the best option: cheap and well supported, despite the fact that its verification costs increases linearly with the number of signatures included. + +All these things considered, 19 seems to be the maximum number and a good tradeoff. If 2/3 of the signatures are needed for consensus, then 13 signatures need to be verified on-chain, which remains reasonable from a gas-cost perspective. + +Rather than securing the network with tokenomics, it is better to initially secure the network by involving robust companies which are heavily invested in the success of De-Fi as a whole. The 19 Guardians are not anonymous or small--they are many of the largest and most widely-known validator companies in cryptocurrency. + +That's how we end up with the network of 19 Guardians, each with an equal stake and joined in a purpose-built Proof of Authority consensus mechanism. As threshold signatures become better supported, the Guardian set can expand, and once ZKPs are ubiquitous, the Guardian Network will become fully trustless. + +With our perspective on Decentralization laid out, the remaining elements fall into place. + +### Modularity + +The Guardian Network is robust and trustworthy by itself, so there's no need for components like the relayer to contribute to the security model. That makes Wormhole able to have simple components that are very good at the one thing they do. That way, Guardians only need to verify on-chain activity and produce VAAs while Relayers only need to interact with blockchains and deliver messages. + +The signing scheme of the VAAs can be changed without affecting downstream users, and multiple relay mechanisms can exist independently. xAssets can be implemented purely at the application layer and cross chain applications can use whatever components suits them. + +### Chain Agnosticism + +Today, Wormhole supports a wider range of ecosystems than any other interoperability protocol because it uses simple tech (t-schnorr signatures), an adaptable, heterogeneous relayer model, and a robust validator network. + +Wormhole can expand to new ecosystems as quickly as a Core Contract can be developed for the smart contract runtime. Relayers don't need to be factored into the security model--they just need to be able to upload messages to the blockchain. The Guardians are able to observe every transaction on every chain, without taking shortcuts. + +### Scalability + +Wormhole scales well, as demonstrated by its ability to handle huge TVL and transaction volume--even during tumultuous events. + +The requirements for running a Guardian are relatively heavy, as they need to run a full node for every single blockchain in the ecosystem. This is another reason why a limited number of robust validator companies are beneficial for this design. + +However, once all the full nodes are running, the actual computation and network overheads of the Guardian Network become lightweight. The performance of the blockchains themselves tends to be the bottleneck in Wormhole, rather than anything happening inside the Guardian Network. + +### Upgradeability + +Over time, the Guardian Set can be expanded beyond 19 with the use of threshold signatures. A variety of relaying models will emerge, each with their own strengths and weaknesses. ZKPs can be used on chains where they are well supported. The cross chain application ecosystem will grow, and cross chain applications will become increasingly intermingled with each other. There are very few APIs in Wormhole, and most items are implementation details from the perspective of an integrator. This creates a clear pathway towards a fully trustlessness interoperability layer which spans the entirety of decentralized computing. From 74dc0fd508f027146cec4e4f3780761b77c6c9d4 Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 18:36:34 +0200 Subject: [PATCH 07/17] pages fix --- learn/.pages | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/learn/.pages b/learn/.pages index 9becff282..f2292044a 100644 --- a/learn/.pages +++ b/learn/.pages @@ -2,6 +2,6 @@ title: Learn nav: - index.md - 'Introduction to Wormhole': 'introduction.md' - - 'Security': security.md - - 'Architecture Overview': architecture.md + - 'Security': 'security.md' + - 'Architecture Overview': 'architecture.md' - infrastructure From 27ce8bc9071d9643d29dbc5359edcc13590b889f Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 19:49:35 +0200 Subject: [PATCH 08/17] grammarly fixes --- learn/infrastructure/guardians.md | 51 +++++++++++++------------------ 1 file changed, 21 insertions(+), 30 deletions(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index d02778a2b..e9fd7a7e6 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -3,68 +3,59 @@ title: Guardians description: Discover Wormhole's Guardian Network, a decentralized, modular system enabling secure and scalable cross-chain communication across multiple blockchain ecosystems. --- - - ## Guardian -Wormhole relies upon a set of distributed nodes which monitor state on several blockchains. In Wormhole these nodes are referred to as Guardians. The current guardian set can be seen in the [Dashboard](https://wormhole-foundation.github.io/wormhole-dashboard/#/?endpoint=Mainnet){target=\_blank}. +Wormhole relies upon a set of distributed nodes that monitor the state on several blockchains. In Wormhole, these nodes are referred to as Guardians. The current guardian set can be seen in the [Dashboard](https://wormhole-foundation.github.io/wormhole-dashboard/#/?endpoint=Mainnet){target=\_blank}. -It is the guardians role to observe messages and sign the corresponding payloads. Each guardian performs this step in isolation, later combining the resulting signatures with other guardians as a final step. The resulting collection of independent observations form a multisig which represents a proof that a state has been observed and agreed upon by a majority of the wormhole network. These multisigs are referred to as VAAs in Wormhole. +It is the guardians' role to observe messages and sign the corresponding payloads. Each guardian performs this step in isolation, later combining the resulting signatures with other guardians as a final step. The resulting collection of independent observations forms a multi-sig, which represents a proof that a state has been observed and agreed upon by a majority of the Wormhole network. These multisigs are referred to as VAAs in Wormhole. ## Guardian Network -The Guardian Network is designed to serve as Wormhole's oracle component, and the entire Wormhole ecosystem is founded on its technical underpinnings. It is the most critical element of the Wormhole ecosystem, and represents the single most important component to learn about if you want a deep understanding of Wormhole. +The Guardian Network is designed to serve as Wormhole's oracle component, and the entire Wormhole ecosystem is founded on its technical underpinnings. It is the most critical element of the Wormhole ecosystem and represents the single most crucial component to learn about if you want a deep understanding of Wormhole. -To understand not just _how_ the Guardian Network works, but _why_ it works the way it does, let's first take a step back and go over the key design considerations. To become the best-in-class interoperability platform, there were five critical features Wormhole needed to have: +To understand not just _how_ the Guardian Network works but _why_ it works the way it does, let's first take a step back and review the key design considerations. To become the best-in-class interoperability platform, Wormhole needed to have five critical features: - **Decentralization** - control of the network needs to be distributed amongst many parties -- **Modularity** - disparate parts of the ecosystem such as the oracle, relayer, applications, etc, should be kept as separate and modular as possible so they can be designed, modified and upgraded independently -- **Chain Agnosticism** - Wormhole should be able to support not only EVM, but also chains like Solana, Algorand, Cosmos, and even platforms that haven't been created yet. It also should not have any one chain as a single point of failure +- **Modularity** - disparate parts of the ecosystem, such as the oracle, relayer, applications, etc., should be kept as separate and modular as possible so they can be designed, modified, and upgraded independently +- **Chain Agnosticism** - Wormhole should be able to support not only EVM but also chains like Solana, Algorand, Cosmos, and even platforms that still need to be created. It also should not have any one chain as a single point of failure - **Scalability** - Wormhole should be able to secure a large amount of value immediately and be able to handle the large transaction volume - **Upgradeability** - as the decentralized computing ecosystem evolves, Wormhole will need to be able to change the implementation of its existing modules without breaking integrators -Next, let's go into how Wormhole achieves these one at a time. +Next, let's examine how Wormhole achieves these one at a time. ### Decentralization Decentralization is the biggest concern. Previous interoperability solutions have largely been entirely centralized, and even newer solutions utilizing things like adversarial relayers still tend to have single points of failure or collusion thresholds as low as one or two. -When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system-but this turns out to be a suboptimal solution. PoS is designed for blockchain consensus in smart-contract enabled environments, so it's less suitable when the network is verifying the output of many blockchains and not supporting its own smart contracts. While it looks appealing from a decentralization perspective, the network security remains unclear, and it can make some other outlined goals more difficult to achieve. Let's explore other options. +When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system; this turns out to be a suboptimal solution. PoS is designed for blockchain consensus in smart-contract enabled environments, so it's less suitable when the network verifies the output of many blockchains and does not support its own smart contracts. While it looks appealing from a decentralization perspective, the network security remains to be seen, and it can make some other outlined goals more difficult to achieve. Let's explore other options. -The next option would be to rush straight for the finish line and use zero-knowledge proofs to secure the network. This would be a good solution from a decentralization perspective, as it's literally trustless. However, zero-knowledge proofs are still a nascent technology and it's not really feasible to verify them on-chain, especially on chains with limited computational environments. That means a form of multisig will be needed to secure the network. +The next option would be to rush straight for the finish line and use zero-knowledge proofs to secure the network. From a decentralization perspective, this would be a good solution, as it's trustless. However, zero-knowledge proofs are still a nascent technology, and it's not feasible to verify them on-chain, especially on chains with limited computational environments. That means a form of multi-sig will be needed to secure the network. -If we step back and look at the current De-Fi landscape, most of the top blockchains are secured by the same handful of validator companies. Currently, there are a limited number of companies in the world with the skills and capital to run top-notch validator companies. +If we look at the current De-Fi landscape, most of the top blockchains are secured by the same handful of validator companies. Currently, there are only a limited number of companies in the world with the skills and capital to run top-notch validator companies. -If a protocol could unite a large number of those validator companies into a purpose-built consensus mechanism that's optimized for chain interoperability, that design would likely be more performant and secure than a network bootstrapped by a tokenomics model. Assuming the validators would be on board, how many could Wormhole realistically utilize? +If a protocol could unite a large number of those validator companies into a purpose-built consensus mechanism optimized for chain interoperability, that design would likely be more performant and secure than a network bootstrapped by a tokenomics model. Assuming the validators would be on board, how many could Wormhole realistically utilize? -If Wormhole were to use threshold signatures, the answer would basically be 'as many as are willing to participate.' However, threshold signatures have spotty support across the blockchain world, meaning it would be difficult and expensive to verify the signatures, ultimately limiting scalability and chain agnosticism. Thus, a t-schnorr multisig presents itself as the best option: cheap and well supported, despite the fact that its verification costs increases linearly with the number of signatures included. +If Wormhole were to use threshold signatures, the answer would be 'as many as are willing to participate.' However, threshold signatures need more support across the blockchain world, meaning verifying the signatures would be difficult and expensive, ultimately limiting scalability and chain agnosticism. Thus, a t-schnorr multisig presents itself as the best option: cheap and well-supported, despite the fact that its verification costs increase linearly with the number of signatures included. -All these things considered, 19 seems to be the maximum number and a good tradeoff. If 2/3 of the signatures are needed for consensus, then 13 signatures need to be verified on-chain, which remains reasonable from a gas-cost perspective. +All these things considered, 19 seems to be the maximum number and a good tradeoff. If two-thirds of the signatures are needed for consensus, then 13 signatures must be verified on-chain, which remains reasonable from a gas-cost perspective. -Rather than securing the network with tokenomics, it is better to initially secure the network by involving robust companies which are heavily invested in the success of De-Fi as a whole. The 19 Guardians are not anonymous or small--they are many of the largest and most widely-known validator companies in cryptocurrency. +Rather than securing the network with tokenomics, it is better to initially secure the network by involving robust companies that are heavily invested in the success of De-Fi as a whole. The 19 Guardians are not anonymous or small--they are many of the largest and most widely known validator companies in cryptocurrency. -That's how we end up with the network of 19 Guardians, each with an equal stake and joined in a purpose-built Proof of Authority consensus mechanism. As threshold signatures become better supported, the Guardian set can expand, and once ZKPs are ubiquitous, the Guardian Network will become fully trustless. +That's how we ended up with the network of 19 Guardians, each with an equal stake and joined in a purpose-built Proof of Authority consensus mechanism. As threshold signatures become better supported, the Guardian set can expand, and once ZKPs are ubiquitous, the Guardian Network will become fully trustless. With our perspective on Decentralization laid out, the remaining elements fall into place. ### Modularity -The Guardian Network is robust and trustworthy by itself, so there's no need for components like the relayer to contribute to the security model. That makes Wormhole able to have simple components that are very good at the one thing they do. That way, Guardians only need to verify on-chain activity and produce VAAs while Relayers only need to interact with blockchains and deliver messages. +The Guardian Network is robust and trustworthy by itself, so there's no need for components like the relayer to contribute to the security model. That makes Wormhole able to have simple components that are very good at their one thing. Guardians only need to verify on-chain activity and produce VAAs, while Relayers only need to interact with blockchains and deliver messages. -The signing scheme of the VAAs can be changed without affecting downstream users, and multiple relay mechanisms can exist independently. xAssets can be implemented purely at the application layer and cross chain applications can use whatever components suits them. +The VAAs' signing scheme can be changed without affecting downstream users, and multiple relay mechanisms can exist independently. xAssets can be implemented purely at the application layer and cross-chain applications can use whatever components suit them. ### Chain Agnosticism -Today, Wormhole supports a wider range of ecosystems than any other interoperability protocol because it uses simple tech (t-schnorr signatures), an adaptable, heterogeneous relayer model, and a robust validator network. +Today, Wormhole supports a broader range of ecosystems than any other interoperability protocol because it uses simple tech (t-schnorr signatures), an adaptable, heterogeneous relayer model, and a robust validator network. -Wormhole can expand to new ecosystems as quickly as a Core Contract can be developed for the smart contract runtime. Relayers don't need to be factored into the security model--they just need to be able to upload messages to the blockchain. The Guardians are able to observe every transaction on every chain, without taking shortcuts. +Wormhole can expand to new ecosystems as quickly as a Core Contract can be developed for the smart contract runtime. Relayers don't need to be factored into the security model--they just need to be able to upload messages to the blockchain. The Guardians are able to observe every transaction on every chain without taking shortcuts. ### Scalability @@ -72,8 +63,8 @@ Wormhole scales well, as demonstrated by its ability to handle huge TVL and tran The requirements for running a Guardian are relatively heavy, as they need to run a full node for every single blockchain in the ecosystem. This is another reason why a limited number of robust validator companies are beneficial for this design. -However, once all the full nodes are running, the actual computation and network overheads of the Guardian Network become lightweight. The performance of the blockchains themselves tends to be the bottleneck in Wormhole, rather than anything happening inside the Guardian Network. +However, once all the full nodes are running, the Guardian Network's actual computation and network overheads become lightweight. The performance of the blockchains themselves tends to be the bottleneck in Wormhole, rather than anything happening inside the Guardian Network. ### Upgradeability -Over time, the Guardian Set can be expanded beyond 19 with the use of threshold signatures. A variety of relaying models will emerge, each with their own strengths and weaknesses. ZKPs can be used on chains where they are well supported. The cross chain application ecosystem will grow, and cross chain applications will become increasingly intermingled with each other. There are very few APIs in Wormhole, and most items are implementation details from the perspective of an integrator. This creates a clear pathway towards a fully trustlessness interoperability layer which spans the entirety of decentralized computing. +Over time, the Guardian Set can be expanded beyond 19 using threshold signatures. Various relaying models will emerge, each with their own strengths and weaknesses. ZKPs can be used on chains where they are well-supported. The cross-chain application ecosystem will grow, and cross-chain applications will become increasingly intermingled. There are very few APIs in Wormhole, and most items are implementation details from an integrator's perspective. This creates a clear pathway towards a fully trustlessness interoperability layer that spans decentralized computing. From c39815936863b4bb7012d8af46292df95f7ba9c1 Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Mon, 29 Jul 2024 19:53:55 +0200 Subject: [PATCH 09/17] deleted code snippets from vaas on this branch --- .../code/learn/infrastructure/VAAs/action-example.js | 4 ---- .snippets/code/learn/infrastructure/VAAs/action.js | 4 ---- .snippets/code/learn/infrastructure/VAAs/attestation.js | 6 ------ .snippets/code/learn/infrastructure/VAAs/body.js | 7 ------- .snippets/code/learn/infrastructure/VAAs/header.js | 4 ---- .snippets/code/learn/infrastructure/VAAs/sign-hash.js | 4 ---- .snippets/code/learn/infrastructure/VAAs/signature.js | 2 -- .snippets/code/learn/infrastructure/VAAs/token-msg.js | 8 -------- .../code/learn/infrastructure/VAAs/token-transfer.js | 7 ------- 9 files changed, 46 deletions(-) delete mode 100644 .snippets/code/learn/infrastructure/VAAs/action-example.js delete mode 100644 .snippets/code/learn/infrastructure/VAAs/action.js delete mode 100644 .snippets/code/learn/infrastructure/VAAs/attestation.js delete mode 100644 .snippets/code/learn/infrastructure/VAAs/body.js delete mode 100644 .snippets/code/learn/infrastructure/VAAs/header.js delete mode 100644 .snippets/code/learn/infrastructure/VAAs/sign-hash.js delete mode 100644 .snippets/code/learn/infrastructure/VAAs/signature.js delete mode 100644 .snippets/code/learn/infrastructure/VAAs/token-msg.js delete mode 100644 .snippets/code/learn/infrastructure/VAAs/token-transfer.js diff --git a/.snippets/code/learn/infrastructure/VAAs/action-example.js b/.snippets/code/learn/infrastructure/VAAs/action-example.js deleted file mode 100644 index fe8eb64dd..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/action-example.js +++ /dev/null @@ -1,4 +0,0 @@ -module: 0x00000000000000000000000000000000000000000000000000000000436f7265 -action: 1 -chain: 1 -new_contract: 0x3485672937589571623749593761923748845625222819374462348283888283 \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/action.js b/.snippets/code/learn/infrastructure/VAAs/action.js deleted file mode 100644 index 01b5b0207..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/action.js +++ /dev/null @@ -1,4 +0,0 @@ -u8[32] module // Contains a right-aligned module identifier -u8 action // Predefined governance action to execute -u16 chain // Chain the action is targeting, 0 = all chains -... args // Arguments to the action \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/attestation.js b/.snippets/code/learn/infrastructure/VAAs/attestation.js deleted file mode 100644 index 944e9e05f..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/attestation.js +++ /dev/null @@ -1,6 +0,0 @@ -u8 payload_id = 2 // Attestation -[32]byte token_address // Address of the originating token contract -u16 token_chain // Chain ID of the originating token -u8 decimals // Number of decimals this token should have -[32]byte symbol // Short name of asset -[32]byte name // Full name of asset \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/body.js b/.snippets/code/learn/infrastructure/VAAs/body.js deleted file mode 100644 index 4cfc6edee..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/body.js +++ /dev/null @@ -1,7 +0,0 @@ -u32 timestamp // The timestamp of the block this message was published in -u32 nonce // -u16 emitter_chain // The id of the chain that emitted the message -[32]byte emitter_address // The contract address (wormhole formatted) that called the core contract -u64 sequence // The auto incrementing integer that represents the number of messages published by this emitter -u8 consistency_level // The consistency level (finality) required by this emitter -[]byte payload // arbitrary bytes containing the data to be acted on \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/header.js b/.snippets/code/learn/infrastructure/VAAs/header.js deleted file mode 100644 index 575487f44..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/header.js +++ /dev/null @@ -1,4 +0,0 @@ -byte version // VAA Version -u32 guardian_set_index // Indicates which guardian set is signing -u8 len_signatures // Number of signatures stored -[]signature signatures // Collection of guardian signatures \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/sign-hash.js b/.snippets/code/learn/infrastructure/VAAs/sign-hash.js deleted file mode 100644 index 9ac3c2514..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/sign-hash.js +++ /dev/null @@ -1,4 +0,0 @@ -// hash the bytes of the body twice -digest = keccak256(keccak256(body)) -// sign the result -signature = ecdsa_sign(digest, key) \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/signature.js b/.snippets/code/learn/infrastructure/VAAs/signature.js deleted file mode 100644 index 8a47d8bba..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/signature.js +++ /dev/null @@ -1,2 +0,0 @@ -u8 index // The index of this guardian in the guardian set -[65]byte signature // The ECDSA signature \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/token-msg.js b/.snippets/code/learn/infrastructure/VAAs/token-msg.js deleted file mode 100644 index 23a2f2fc4..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/token-msg.js +++ /dev/null @@ -1,8 +0,0 @@ -u8 payload_id = 3 // Token Transfer with Message -u256 amount // Amount of tokens being transferred. -u8[32] token_address // Address on the source chain. -u16 token_chain // Numeric ID for the source chain. -u8[32] to // Address on the destination chain. -u16 to_chain // Numeric ID for the destination chain. -u256 fee // Portion of amount paid to a relayer. -[]byte payload // Message, arbitrary bytes, app specific \ No newline at end of file diff --git a/.snippets/code/learn/infrastructure/VAAs/token-transfer.js b/.snippets/code/learn/infrastructure/VAAs/token-transfer.js deleted file mode 100644 index ca7b94f0b..000000000 --- a/.snippets/code/learn/infrastructure/VAAs/token-transfer.js +++ /dev/null @@ -1,7 +0,0 @@ -u8 payload_id = 1 // Token Transfer -u256 amount // Amount of tokens being transferred. -u8[32] token_address // Address on the source chain. -u16 token_chain // Numeric ID for the source chain. -u8[32] to // Address on the destination chain. -u16 to_chain // Numeric ID for the destination chain. -u256 fee // Portion of amount paid to a relayer. \ No newline at end of file From 1f83211c7123f0200b6b233f39925ee321b6a12c Mon Sep 17 00:00:00 2001 From: Ilaria <43253244+ilariae@users.noreply.github.com> Date: Wed, 31 Jul 2024 11:36:19 +0200 Subject: [PATCH 10/17] Update learn/infrastructure/guardians.md Co-authored-by: Erin Shaben --- learn/infrastructure/guardians.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index e9fd7a7e6..d41bb5648 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -5,7 +5,7 @@ description: Discover Wormhole's Guardian Network, a decentralized, modular syst ## Guardian -Wormhole relies upon a set of distributed nodes that monitor the state on several blockchains. In Wormhole, these nodes are referred to as Guardians. The current guardian set can be seen in the [Dashboard](https://wormhole-foundation.github.io/wormhole-dashboard/#/?endpoint=Mainnet){target=\_blank}. +Wormhole relies on a set of distributed nodes that monitor the state on several blockchains. In Wormhole, these nodes are referred to as Guardians. The current Guardian set can be seen in the [Dashboard](https://wormhole-foundation.github.io/wormhole-dashboard/#/?endpoint=Mainnet){target=\_blank}. It is the guardians' role to observe messages and sign the corresponding payloads. Each guardian performs this step in isolation, later combining the resulting signatures with other guardians as a final step. The resulting collection of independent observations forms a multi-sig, which represents a proof that a state has been observed and agreed upon by a majority of the Wormhole network. These multisigs are referred to as VAAs in Wormhole. From 5d906f1c086229771de6a49925f11a8a5da50911 Mon Sep 17 00:00:00 2001 From: Ilaria <43253244+ilariae@users.noreply.github.com> Date: Wed, 31 Jul 2024 11:36:30 +0200 Subject: [PATCH 11/17] Update learn/infrastructure/guardians.md Co-authored-by: Erin Shaben --- learn/infrastructure/guardians.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index d41bb5648..f394475cc 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -7,7 +7,7 @@ description: Discover Wormhole's Guardian Network, a decentralized, modular syst Wormhole relies on a set of distributed nodes that monitor the state on several blockchains. In Wormhole, these nodes are referred to as Guardians. The current Guardian set can be seen in the [Dashboard](https://wormhole-foundation.github.io/wormhole-dashboard/#/?endpoint=Mainnet){target=\_blank}. -It is the guardians' role to observe messages and sign the corresponding payloads. Each guardian performs this step in isolation, later combining the resulting signatures with other guardians as a final step. The resulting collection of independent observations forms a multi-sig, which represents a proof that a state has been observed and agreed upon by a majority of the Wormhole network. These multisigs are referred to as VAAs in Wormhole. +It is the Guardians' role to observe messages and sign the corresponding payloads. Each Guardian performs this step in isolation, combining the resulting signatures with other Guardians as a final step. The resulting collection of independent observations forms a multisig, representing proof that the majority of the Wormhole network has observed and agreed upon a state. These multisigs are referred to as VAAs in Wormhole. ## Guardian Network From ab51d770181954deddba1af229aac8b678fd3e91 Mon Sep 17 00:00:00 2001 From: Ilaria <43253244+ilariae@users.noreply.github.com> Date: Wed, 31 Jul 2024 11:37:00 +0200 Subject: [PATCH 12/17] Update learn/infrastructure/guardians.md Co-authored-by: Erin Shaben --- learn/infrastructure/guardians.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index f394475cc..9cd099341 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -47,7 +47,7 @@ With our perspective on Decentralization laid out, the remaining elements fall i ### Modularity -The Guardian Network is robust and trustworthy by itself, so there's no need for components like the relayer to contribute to the security model. That makes Wormhole able to have simple components that are very good at their one thing. Guardians only need to verify on-chain activity and produce VAAs, while Relayers only need to interact with blockchains and deliver messages. +The Guardian Network is robust and trustworthy by itself, so there's no need for components like the relayer to contribute to the security model. That makes Wormhole able to have simple components that are very good at their one thing. Guardians only need to verify on-chain activity and produce VAAs, while relayers only need to interact with blockchains and deliver messages. The VAAs' signing scheme can be changed without affecting downstream users, and multiple relay mechanisms can exist independently. xAssets can be implemented purely at the application layer and cross-chain applications can use whatever components suit them. From f30e4dd6e6be68a20fa018616dacb477bfd83e2c Mon Sep 17 00:00:00 2001 From: Ilaria <43253244+ilariae@users.noreply.github.com> Date: Wed, 31 Jul 2024 11:37:18 +0200 Subject: [PATCH 13/17] Update learn/infrastructure/guardians.md Co-authored-by: Erin Shaben --- learn/infrastructure/guardians.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index 9cd099341..4edec3af4 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -67,4 +67,4 @@ However, once all the full nodes are running, the Guardian Network's actual comp ### Upgradeability -Over time, the Guardian Set can be expanded beyond 19 using threshold signatures. Various relaying models will emerge, each with their own strengths and weaknesses. ZKPs can be used on chains where they are well-supported. The cross-chain application ecosystem will grow, and cross-chain applications will become increasingly intermingled. There are very few APIs in Wormhole, and most items are implementation details from an integrator's perspective. This creates a clear pathway towards a fully trustlessness interoperability layer that spans decentralized computing. +Over time, the Guardian set can be expanded beyond 19 using threshold signatures. Various relaying models will emerge, each with their own strengths and weaknesses. ZKPs can be used on chains where they are well-supported. The cross-chain application ecosystem will grow, and cross-chain applications will become increasingly intermingled. There are very few APIs in Wormhole, and most items are implementation details from an integrator's perspective. This creates a clear pathway towards a fully trustless interoperability layer that spans decentralized computing. From 0d8df796b4ea82cb22c468768997e770788bb274 Mon Sep 17 00:00:00 2001 From: Ilaria Enache Date: Wed, 31 Jul 2024 15:48:47 +0200 Subject: [PATCH 14/17] grammar fixes --- learn/infrastructure/guardians.md | 34 +++++++++++++++---------------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index 4edec3af4..233dfd08f 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -1,6 +1,6 @@ --- title: Guardians -description: Discover Wormhole's Guardian Network, a decentralized, modular system enabling secure and scalable cross-chain communication across multiple blockchain ecosystems. +description: Explore Wormhole's Guardian Network, a decentralized system for secure, scalable cross-chain communication across various blockchain ecosystems. --- ## Guardian @@ -11,9 +11,9 @@ It is the Guardians' role to observe messages and sign the corresponding payload ## Guardian Network -The Guardian Network is designed to serve as Wormhole's oracle component, and the entire Wormhole ecosystem is founded on its technical underpinnings. It is the most critical element of the Wormhole ecosystem and represents the single most crucial component to learn about if you want a deep understanding of Wormhole. +The Guardian Network is designed to serve as Wormhole's oracle component, and the entire Wormhole ecosystem is founded on its technical underpinnings. It is the most critical element of the Wormhole ecosystem and represents the most crucial component to learn about if you want a deep understanding of it. -To understand not just _how_ the Guardian Network works but _why_ it works the way it does, let's first take a step back and review the key design considerations. To become the best-in-class interoperability platform, Wormhole needed to have five critical features: +To understand not just _how_ the Guardian Network works but _why_ it works the way it does, it is important to review the key design considerations. To become the best-in-class interoperability platform, Wormhole needed to have five critical features: - **Decentralization** - control of the network needs to be distributed amongst many parties - **Modularity** - disparate parts of the ecosystem, such as the oracle, relayer, applications, etc., should be kept as separate and modular as possible so they can be designed, modified, and upgraded independently @@ -21,50 +21,50 @@ To understand not just _how_ the Guardian Network works but _why_ it works the w - **Scalability** - Wormhole should be able to secure a large amount of value immediately and be able to handle the large transaction volume - **Upgradeability** - as the decentralized computing ecosystem evolves, Wormhole will need to be able to change the implementation of its existing modules without breaking integrators -Next, let's examine how Wormhole achieves these one at a time. +Next, the ways by which Wormhole achieves this will be examined individually. ### Decentralization Decentralization is the biggest concern. Previous interoperability solutions have largely been entirely centralized, and even newer solutions utilizing things like adversarial relayers still tend to have single points of failure or collusion thresholds as low as one or two. -When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system; this turns out to be a suboptimal solution. PoS is designed for blockchain consensus in smart-contract enabled environments, so it's less suitable when the network verifies the output of many blockchains and does not support its own smart contracts. While it looks appealing from a decentralization perspective, the network security remains to be seen, and it can make some other outlined goals more difficult to achieve. Let's explore other options. +When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system; this is a suboptimal solution. PoS is designed for blockchain consensus in smart-contract enabled environments, so it's less suitable when the network verifies the output of many blockchains and does not support its own smart contracts. While it looks appealing from a decentralization perspective, network security remains to be seen, and it can make some other outlined goals more challenging to achieve. Different options need to be explored. -The next option would be to rush straight for the finish line and use zero-knowledge proofs to secure the network. From a decentralization perspective, this would be a good solution, as it's trustless. However, zero-knowledge proofs are still a nascent technology, and it's not feasible to verify them on-chain, especially on chains with limited computational environments. That means a form of multi-sig will be needed to secure the network. +Another option is to use Zero-Knowledge Proofs (ZKP) to secure the network. This would be a good solution from a decentralization perspective, as it's trustless. However, ZKPs are still a nascent technology, and verifying them on-chain is not feasible, especially on chains with limited computational environments. That means a form of multisig will be needed to secure the network. -If we look at the current De-Fi landscape, most of the top blockchains are secured by the same handful of validator companies. Currently, there are only a limited number of companies in the world with the skills and capital to run top-notch validator companies. +In the current De-Fi landscape, most of the top blockchains are secured by the same handful of validator companies. Currently, only a limited number of companies in the world have the skills and capital to run top-notch validator companies. If a protocol could unite a large number of those validator companies into a purpose-built consensus mechanism optimized for chain interoperability, that design would likely be more performant and secure than a network bootstrapped by a tokenomics model. Assuming the validators would be on board, how many could Wormhole realistically utilize? -If Wormhole were to use threshold signatures, the answer would be 'as many as are willing to participate.' However, threshold signatures need more support across the blockchain world, meaning verifying the signatures would be difficult and expensive, ultimately limiting scalability and chain agnosticism. Thus, a t-schnorr multisig presents itself as the best option: cheap and well-supported, despite the fact that its verification costs increase linearly with the number of signatures included. +If Wormhole used threshold signatures, the answer would be 'as many as are willing to participate.' However, threshold signatures need more support across the blockchain world, meaning verifying the signatures would be difficult and expensive, ultimately limiting scalability and chain agnosticism. Thus, a t-schnorr multisig presents itself as the best option: cheap and well-supported, even though its verification costs increase linearly with the number of signatures included. All these things considered, 19 seems to be the maximum number and a good tradeoff. If two-thirds of the signatures are needed for consensus, then 13 signatures must be verified on-chain, which remains reasonable from a gas-cost perspective. -Rather than securing the network with tokenomics, it is better to initially secure the network by involving robust companies that are heavily invested in the success of De-Fi as a whole. The 19 Guardians are not anonymous or small--they are many of the largest and most widely known validator companies in cryptocurrency. +Rather than securing the network with tokenomics, it is better to initially secure the network by involving robust companies that are heavily invested in De-Fi's success. The 19 Guardians are not anonymous or small, they are many of the largest and most widely known validator companies in cryptocurrency. -That's how we ended up with the network of 19 Guardians, each with an equal stake and joined in a purpose-built Proof of Authority consensus mechanism. As threshold signatures become better supported, the Guardian set can expand, and once ZKPs are ubiquitous, the Guardian Network will become fully trustless. +This led to a network of 19 Guardians, each with an equal stake, and joined in a purpose-built Proof-of-Authority consensus mechanism. As threshold signatures become better supported, the Guardian Set can expand, and once ZKPs are ubiquitous, the Guardian Network will become fully trustless. -With our perspective on Decentralization laid out, the remaining elements fall into place. +With the perspective on Decentralization laid out, the remaining elements fall into place. ### Modularity The Guardian Network is robust and trustworthy by itself, so there's no need for components like the relayer to contribute to the security model. That makes Wormhole able to have simple components that are very good at their one thing. Guardians only need to verify on-chain activity and produce VAAs, while relayers only need to interact with blockchains and deliver messages. -The VAAs' signing scheme can be changed without affecting downstream users, and multiple relay mechanisms can exist independently. xAssets can be implemented purely at the application layer and cross-chain applications can use whatever components suit them. +The VAAs' signing scheme can be changed without affecting downstream users, and multiple relay mechanisms can exist independently. xAssets can be implemented purely at the application layer, and cross-chain applications can use whatever components suit them. ### Chain Agnosticism Today, Wormhole supports a broader range of ecosystems than any other interoperability protocol because it uses simple tech (t-schnorr signatures), an adaptable, heterogeneous relayer model, and a robust validator network. -Wormhole can expand to new ecosystems as quickly as a Core Contract can be developed for the smart contract runtime. Relayers don't need to be factored into the security model--they just need to be able to upload messages to the blockchain. The Guardians are able to observe every transaction on every chain without taking shortcuts. +Wormhole can expand to new ecosystems as quickly as a Core Contract can be developed for the smart-contract runtime. Relayers don't need to be factored into the security model; they just need to be able to upload messages to the blockchain. The Guardians are able to observe every transaction on every chain without taking shortcuts. ### Scalability -Wormhole scales well, as demonstrated by its ability to handle huge TVL and transaction volume--even during tumultuous events. +Wormhole scales well, as demonstrated by its ability to handle huge TVL and transaction volume even during tumultuous events. -The requirements for running a Guardian are relatively heavy, as they need to run a full node for every single blockchain in the ecosystem. This is another reason why a limited number of robust validator companies are beneficial for this design. +The requirements for running a Guardian are relatively heavy, as they must run a full node for every single blockchain in the ecosystem. This is another reason why a limited number of robust validator companies are beneficial for this design. -However, once all the full nodes are running, the Guardian Network's actual computation and network overheads become lightweight. The performance of the blockchains themselves tends to be the bottleneck in Wormhole, rather than anything happening inside the Guardian Network. +However, once all the full nodes are running, the Guardian Network's actual computation and network overheads become lightweight. The blockchains' performance tends to be the bottleneck in Wormhole rather than anything happening inside the Guardian Network. ### Upgradeability -Over time, the Guardian set can be expanded beyond 19 using threshold signatures. Various relaying models will emerge, each with their own strengths and weaknesses. ZKPs can be used on chains where they are well-supported. The cross-chain application ecosystem will grow, and cross-chain applications will become increasingly intermingled. There are very few APIs in Wormhole, and most items are implementation details from an integrator's perspective. This creates a clear pathway towards a fully trustless interoperability layer that spans decentralized computing. +Over time, the Guardian Set can be expanded beyond 19 using threshold signatures. Various relaying models will emerge, each with their own strengths and weaknesses. ZKPs can be used on chains where they are well-supported. The cross-chain application ecosystem will grow, and cross-chain applications will become increasingly intermingled. There are very few APIs in Wormhole, and most items are implementation details from an integrator's perspective. This creates a clear pathway towards a fully trustless interoperability layer that spans decentralized computing. From 9f3e32bcb08787fc76665f47874974a4052795b3 Mon Sep 17 00:00:00 2001 From: Ilaria <43253244+ilariae@users.noreply.github.com> Date: Wed, 31 Jul 2024 18:17:56 +0200 Subject: [PATCH 15/17] Update learn/infrastructure/guardians.md Co-authored-by: Erin Shaben --- learn/infrastructure/guardians.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index 233dfd08f..ff0747e96 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -27,7 +27,7 @@ Next, the ways by which Wormhole achieves this will be examined individually. Decentralization is the biggest concern. Previous interoperability solutions have largely been entirely centralized, and even newer solutions utilizing things like adversarial relayers still tend to have single points of failure or collusion thresholds as low as one or two. -When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system; this is a suboptimal solution. PoS is designed for blockchain consensus in smart-contract enabled environments, so it's less suitable when the network verifies the output of many blockchains and does not support its own smart contracts. While it looks appealing from a decentralization perspective, network security remains to be seen, and it can make some other outlined goals more challenging to achieve. Different options need to be explored. +When designing a decentralized oracle network, the first option to consider is likely a Proof-of-Stake (PoS) system; this is a suboptimal solution. PoS is designed for blockchain consensus in smart contract-enabled environments, so it's less suitable when the network verifies the output of many blockchains and does not support its own smart contracts. While it looks appealing from a decentralization perspective, network security remains to be seen, and it can make some of the other outlined goals more challenging to achieve. Different options need to be explored. Another option is to use Zero-Knowledge Proofs (ZKP) to secure the network. This would be a good solution from a decentralization perspective, as it's trustless. However, ZKPs are still a nascent technology, and verifying them on-chain is not feasible, especially on chains with limited computational environments. That means a form of multisig will be needed to secure the network. From b2262ac84e91a64bdee4055e16b30b255531ddb8 Mon Sep 17 00:00:00 2001 From: Ilaria <43253244+ilariae@users.noreply.github.com> Date: Wed, 31 Jul 2024 18:18:08 +0200 Subject: [PATCH 16/17] Update learn/infrastructure/guardians.md Co-authored-by: Erin Shaben --- learn/infrastructure/guardians.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index ff0747e96..47f56a866 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -35,7 +35,7 @@ In the current De-Fi landscape, most of the top blockchains are secured by the s If a protocol could unite a large number of those validator companies into a purpose-built consensus mechanism optimized for chain interoperability, that design would likely be more performant and secure than a network bootstrapped by a tokenomics model. Assuming the validators would be on board, how many could Wormhole realistically utilize? -If Wormhole used threshold signatures, the answer would be 'as many as are willing to participate.' However, threshold signatures need more support across the blockchain world, meaning verifying the signatures would be difficult and expensive, ultimately limiting scalability and chain agnosticism. Thus, a t-schnorr multisig presents itself as the best option: cheap and well-supported, even though its verification costs increase linearly with the number of signatures included. +If Wormhole used threshold signatures, the answer would be "as many as are willing to participate." However, threshold signatures need more support across the blockchain world, meaning verifying the signatures would be difficult and expensive, ultimately limiting scalability and chain agnosticism. Thus, a t-schnorr multisig presents itself as the best option: cheap and well-supported, even though its verification costs increase linearly with the number of signatures included. All these things considered, 19 seems to be the maximum number and a good tradeoff. If two-thirds of the signatures are needed for consensus, then 13 signatures must be verified on-chain, which remains reasonable from a gas-cost perspective. From d5df2ec66b9b7f06ca3f6ff784040335ae2cd851 Mon Sep 17 00:00:00 2001 From: Ilaria <43253244+ilariae@users.noreply.github.com> Date: Wed, 31 Jul 2024 18:18:17 +0200 Subject: [PATCH 17/17] Update learn/infrastructure/guardians.md Co-authored-by: Erin Shaben --- learn/infrastructure/guardians.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/learn/infrastructure/guardians.md b/learn/infrastructure/guardians.md index 47f56a866..8e2b789b1 100644 --- a/learn/infrastructure/guardians.md +++ b/learn/infrastructure/guardians.md @@ -55,7 +55,7 @@ The VAAs' signing scheme can be changed without affecting downstream users, and Today, Wormhole supports a broader range of ecosystems than any other interoperability protocol because it uses simple tech (t-schnorr signatures), an adaptable, heterogeneous relayer model, and a robust validator network. -Wormhole can expand to new ecosystems as quickly as a Core Contract can be developed for the smart-contract runtime. Relayers don't need to be factored into the security model; they just need to be able to upload messages to the blockchain. The Guardians are able to observe every transaction on every chain without taking shortcuts. +Wormhole can expand to new ecosystems as quickly as a Core Contract can be developed for the smart contract runtime. Relayers don't need to be factored into the security model; they just need to be able to upload messages to the blockchain. The Guardians are able to observe every transaction on every chain without taking shortcuts. ### Scalability