As a fundamental technology of decentralized finance (DeFi), blockchain's ability to maintain a distributed fair ledger is threatened by manipulation of block/transaction order. In this paper, we propose a frontrunning block attack against the Clique-based Proof of Authority (PoA) algorithms. Our attack can frontrun blocks from honest in-turn sealers by breaking the proper order of leader selection. By falsifying the priority parameters (both \textit{difficulty} and \textit{delay time}), a malicious out-of-turn sealer can always successfully occupy the leader position and produce advantageous blocks that may contain profitable transactions. As a typical instance, we apply our attack to a mature Clique-engined project, HPB (\$3,058,901, as of April 2022). Experimental results demonstrate the effectiveness and feasibility. Then, we further recommend fixes that make identity checks effective. Our investigation and suggestion have been submitted to its official team and got their approval. We believe this work can act as, at least, a warning case for Clique variants to avoid repeating these design mistakes.
翻译:作为分权金融的基本技术(DeFi),块链维持分布式公平分类账的能力受到控制区块/交易秩序的威胁。在本文中,我们提议对基于Clique的管理局证明(PoA)算法进行前方轮式攻击。我们的攻击可以打破领导者选择的正确秩序,从而将诚实的转弯封印器挡在前方。通过伪造优先参数(包括 textit{ difficulty}和\ textit{delay time}),恶意的超日封条总是能够成功地占据领导位置,产生有利条件,可能包含有利可图的交易。作为典型的例子,我们把攻击应用到成熟的Clique-engined项目HPB(截至2022年4月,为3,058,901美元),实验结果表明其有效性和可行性。然后,我们进一步建议使身份检查有效。我们的调查和建议已提交其正式团队并获得批准。我们认为,这项工作至少可以作为Clique变体的警告理由,以避免重复这些设计错误。