7.1. Requirements for Light Clients
We list the requirements of a Light Client categorized along the three dimensions of Functionality, Efficiency, and Security.
Synchronize with full nodes to obtain the latest finalized Block Header Definition 10, and in turn, the state trie root.
(Optional) Verify validity of runtime transitions (Section 2.6.).
Make queries for data at the latest block height or across a range of blocks.
Append extrinsics (Section 2.3.) to the blockchain via full nodes.
Efficient bootstrapping and syncing: initializations and update functions of the state have tractable computation and communication complexity and grows at most linearly with the chain size. Generally, the complexity is proportional to the GRANDPA validator set change.
Querying operations happen by requesting the key-value pair from a full node.
Further, verifying the validity of responses by the full node is logarithmic in the size of the state.
Secure bootstrapping and Synchronizing: The probability that an adversarial full node convinces a light client of a forged blockchain state is negligible.
Secure querying: The probability that an adversary convinces a light client to accept a forged account state is negligible.
Assure that the submitted extrinsics are appended in a successor block or inform the user in case of failure.
Polkadot Specific Requirements:
The client MUST be able to connect to a relay chain using chain state.
The client MUST be able to retrieve the checkpoint state from a trusted source to speed up initialization.
The client MUST be able to subscribe/unsubscribe to/from any polkadot-spec-conformant relay chain (Polkadot, Westend, Kusama)
The client MUST be able to subscribe/unsubscribe to/from parachains that do not use custom protocols or cryptography methods other than those that Polkadot, Westend and Kusama use.
The client MUST support the following RPC methods:
The client MUST support the @substrate/connect connection extension protocol:
7.2. Warp Sync for Light Clients
Warp sync (Section 4.8.5.) only downloads the block headers where authority set changes occurred, so-called fragments (Definition 46), and by verifying the GRANDPA justifications (Definition 83). This protocol allows nodes to arrive at the desired state much faster than fast sync. Warp sync is primarily designed for Light Clients. Although, warp sync could be used by full nodes, the sync process may lack information to cater to complete functionality set of full nodes.
For light clients, it is too expensive to download the state (approx. 550MB) to respond to queries. Rather, the queries are submitted to the Full node, and only the response of the full node is validated using the hash of the state root. Requests for warp sync are performed using the
/dot/sync/warp Request-Response substream, the corresponding network messages are detailed in Section 4.7..
Light clients base their trust in provided snapshots and the ability to slash grandpa votes for equivocation for the period they are syncing via warp sync. Full nodes and above, in contrast, verify each block individually.
In theory, the
warp sync process takes the Genesis Block as input and outputs the hash of the state trie root at the latest finalized block. This root hash acts as proof to further validate the responses to queries by the full node. The
warp sync works by starting from a trusted specified block (e.g., from a snapshot) and verifying the block headers only at the authority set changes.
Eventually, the light client verifies the finality of the block returned by a full node to ensure that the block is indeed the latest finalized block. This entails two things:
Check the authenticity of GRANDPA Justifications messages from Genesis to the last finalized block.
Check the timestamp of the last finalized block to ensure that no other blocks might have been finalized at a later timestamp.
Long-Range Attack Vulnerabilities: Warp syncing is particularly vulnerable to what is called long-range attacks. The authorities allowed to finalize blocks can generate multiple proofs of finality for multiple different blocks of the same height. Hence, they can finalize more than one chain at a time. It is possible for two-thirds of the validators that were active at a certain past block N to collude and decide to finalize a different block N', even when N has been finalized for the first time several weeks or months in the past. When a client then warp syncs, it can be tricked to consider this alternative block N' as the finalized one. However, in practice, to mitigate Long-Range Attacks, the starting point of the warp syncing is not too far in the past. How far exactly depends on the logic of the runtime of the chain. For example, in Polkadot, the starting block for the sync should be at max 28 days old to be within the purview of the slashing period for misbehaving nodes. Hence, even though, in theory, warp sync can start from Genesis Block, it is not advised to implement the same in practice.
We outline the warp sync process, abstracting out details of verifying the finality and how the full node to sync with is selected.
Algorithm 23. Warp Sync Light Clients
Abstraction of Warp Sync and verification of the latest block’s finality.
: Determines the full node that the light client syncs with.
: Returns the header of the latest finalized block and a list of Grandpa Justifications by the full node.
: Verification algorithm which checks the authenticity of the header only at the end of an era where the authority set changes iteratively until reaching the latest era.
: Verifies the finality of the latest block using the Grandpa Justifications messages.
The warp syncing process is closely coupled with the state querying procedure used by the light client. We outline the process of querying the state by a light client and validating the response.
Algorithm 24. Querying State Light Clients
Querying State Algorithm.
: Returns the response to the query requested from the Full Node for the query at block height .
: Predicate that checks the validity of response and associated merkle proof by matching it against the Commit Root Hash obtained as a result of warp sync.
7.3. Runtime Environment for Light Clients
Technically, though a runtime execution environment is not necessary to build a light client, most clients require interacting with the Runtime and the state of the blockchain for integrity checks at the minimum. One can imagine an application scenario like an on-chain light client which only listens to the latest state without ever adding extrinsics. Current implementations of Light Nodes (for e.g., Smoldot) use the wasmtime as its runtime environment to drastically simplify the code. The performance of wasmtime is satisfying enough not to require a native runtime. The details of the runtime API that the environment needs to support can be found in (Appendix C).
7.4. Light Client Messages
Light clients are applications that fetch the required data that they need from a Polkadot node with an associated proof to validate the data. This makes it possible to interact with the Polkadot network without requiring to run a full node or having to trust the remote peers. The light client messages make this functionality possible.
All light client messages are protobuf encoded and are sent over the
A message with all possible request messages. All messages are sent as part of this message.
|The request type|
request can be one of the following fields:
|1||A remote call request (Definition 106)|
|2||A remote read request (Definition 108)|
|4||A remote read child request (Definition 110)|
A message with all possible response messages. All messages are sent as part of this message.
|The response type|
response can be one of the following fields:
|1||A remote call response (Definition 107)|
|2||A remote read response (Definition 109)|
7.4.3. Remote Call Messages
Execute a call to a contract at the given block.
Definition 106. Remote Call Request
Remote call request.
|2||Block at which to perform call|
Definition 107. Remote Call Response
Remote call response.
|2||An Option type (Definition 200) containing the call proof or None if proof generation failed.|
7.4.4. Remote Read Messages
Read a storage value at the given block.
Definition 108. Remote Read Request
Remote read request.
|2||Block at which to perform call|
Definition 109. Remote Read Response
Remote read response.
|2||An Option type (Definition 200) containing the read proof or None if proof generation failed.|
7.4.5. Remote Read Child Messages
Read a child storage value at the given block.
Definition 110. Remote Read Child Request
Remote read child request.
|2||Block at which to perform call|
|3||Child storage key, this is relative to the child type storage location|
The response is the same as for the Remote Read Request message, respectively Definition 109.
7.5. Storage for Light Clients
The light client requires a persistent storage for saving the state of the blockchain. In addition, it requires efficient Serialization/De-serialization methods to transform SCALE (Section A.2.2.) encoded network traffic for storing and reading from the persistent storage.