% Title = "The Stellar Consensus Protocol (SCP)" % abbrev = "scp" % category = "exp" % docName = "draft-mazieres-dinrg-scp-01" % ipr= "trust200902" % area = "Internet" % workgroup = "" % keyword = ["consensus"] % % date = 2018-03-30T00:00:00Z % % [[author]] % initials="N." % surname="Barry" % fullname="Nicolas Barry" % #role="editor" % organization = "Stellar Development Foundation" % [author.address] % email = "nicolas@stellar.org" % [author.address.postal] % street = "170 Capp St., Suite A" % city = "San Francisco, CA" % code = "94110" % country = "US" % % [[author]] % initials="D." % surname="Mazieres" % fullname="David Mazieres" % #role="editor" % organization = "Stanford University" % [author.address] % email = "dm@uun.org" % [author.address.postal] % street = "353 Serra Mall, Room 290" % city = "Stanford, CA" % code = "94305" % country = "US" % % [[author]] % initials="J." % surname="McCaleb" % fullname="Jed McCaleb" % #role="editor" % organization = "Stellar Development Foundation" % [author.address] % email = "jed@stellar.org" % [author.address.postal] % street = "170 Capp St., Suite A" % city = "San Francisco, CA" % code = "94110" % country = "US" % % [[author]] % initials="S." % surname="Polu" % fullname="Stanislas Polu" % #role="editor" % organization = "Stripe Inc." % [author.address] % email = "stan@stripe.com" % [author.address.postal] % street = "185 Berry Street, Suite 550" % city = "San Francisco, CA" % code = "94107" % country = "US"
.# Abstract
SCP is an open Byzantine agreement protocol resistant to Sybil attacks. It allows Internet infrastructure stakeholders to reach agreement on a series of values without unanimous agreement on what constitutes the set of important stakeholders. A big differentiator from other Byzantine agreement protocols is that, in SCP, nodes determine the composition of quorums in a decentralized way: each node selects sets of nodes it considers large or important enough to speak for the whole network, and a quorum must contain such a set for each of its members.
{mainmatter}
Various aspects of Internet infrastructure depend on irreversible and transparent updates to data sets such as authenticated mappings [cite Li-Man-Watson draft]. Examples include public key certificates and revocations, transparency logs [@?RFC6962], preload lists for HSTS [@?RFC6797] and HPKP [@?RFC7469], and IP address delegation [@?I-D.paillisse-sidrops-blockchain].
The Stellar Consensus Protocol (SCP) specified in this draft allows Internet infrastructure stakeholders to collaborate in applying irreversible transactions to public state. SCP is an open Byzantine agreement protocol that resists Sybil attacks by allowing individual parties to specify minimum quorum memberships in terms of specific trusted peers. Each participant chooses combinations of peers on which to depend such that these combinations can be trusted in aggregate. The protocol guarantees safety so long as these dependency sets transitively overlap and contain sufficiently many honest nodes correctly obeying the protocol.
Though bad configurations are theoretically possible, several analogies provide an intuition for why transitive dependencies overlap in practice. For example, given multiple entirely disjoint Internet-protocol networks, people would have no trouble agreeing on the fact that the network containing the world's top web sites is the Internet. Such a consensus can hold even without unanimous agreement on what constitute the world's top web sites. Similarly, if network operators listed all the ASes from whom they would consider peering or transit worthwhile, the transitive closures of these sets would contain significant overlap, even without unanimous agreement on the "tier-1 ISP" designation. Finally, while different browsers and operating systems have slightly different lists of valid certificate authorities, there is significant overlap in the sets, so that a hypothetical system requiring validation from "all CAs" would be unlikely to diverge.
A more detailed abstract description of SCP and its rationale, including an English-language proof of safety, is available in [@?SCP]. In particular, that reference shows that a necessary property for safety, termed quorum intersection despite ill-behaved nodes, is sufficient to guarantee safety under SCP, making SCP optimally safe against Byzantine node failure for any given configuration.
This document specifies the end-system logic and wire format of the messages in SCP.
This section describes the configuration and input/output values of the consensus protocol.
Each participant or node in the SCP protocol has a digital signature
key and is named by the corresponding public key, which we term a
NodeID
.
Each node also selects one or more sets of nodes (each of which includes itself) called quorum slices. A quorum slice represents a large or important enough set of peers that the node selecting the quorum slice believes the slice collectively speaks for the whole network.
A quorum is a non-empty set of nodes containing at least one quorum
slice of each of its members. For instance, suppose v1
has the
single quorum slice {v1, v2, v3}
, while each of v2
, v3
, and v4
has the single quorum slice {v2, v3, v4}
. In this case, {v2, v3, v4}
is a quorum because it contains a slice for each member. On the
other hand {v1, v2, v3}
is not a quorum, because it does not contain
a quorum slice for v2
or v3
. The smallest quorum including v1
in this example is the set of all nodes {v1, v2, v3, v4}
.
Unlike traditional Byzantine agreement protocols, nodes in SCP only
care about quorums to which they belong themselves (and hence that
contain at least one of their quorum slices). Intuitively, this is
what protects nodes from Sybil attacks. In the example above, if v3
deviates from the protocol, maliciously inventing 96 Sybils v5, v6, ..., v100
, the honest nodes' quorums will all still include one
another, ensuring that v1
, v2
, and v4
continue to agree on
output values.
Every message in the SCP protocol specifies the sender's quorum slices. Hence, by collecting messages, a node dynamically learns what constitutes a quorum and can decide when a particular message has been sent by a quorum to which it belongs. (Again, nodes do not care about quorums to which they do not belong themselves.)
SCP produces a series of output values for consecutively numbered slots. At the start of a slot, higher-layer software on each node supplies a candidate input value. SCP's goal is to ensure that non-faulty nodes agree on one or a combination of nodes' input values for the slot's output. 5 seconds after completing one slot, the protocol runs again for the next slot.
A value typically encodes a set of actions to apply to a replicated state machine. During the pause between slots, nodes to accumulate the next set of actions, thus amortizing the cost of consensus over arbitrarily many individual state machine operations.
In practice, only one or a small number of nodes' input values actually affect the output value for any given slot. As discussed in (#nomination), which nodes' input values to use depends on a cryptographic hash of the slot number, output history, and node public keys. A node's chances of affecting the output value depend on how often it appears in other nodes' quorum slices.
From SCP's perspective, values are just opaque byte arrays whose interpretation is left to higher-layer software. However, SCP requires a combining function that reduces multiple candidate values into a single composite value. When nodes nominate multiple values for a slot, SCP nodes invoke this function to converge on a single composite value. By way of example, in an application where values consist of sets of transactions, the combining function could take the union of transaction sets. Alternatively, if values represent a timestamp and a set of transactions, the combining function might pair the highest nominated timestamp with the transaction set that has the highest hash value.
The protocol consists of exchanging digitally-signed messages bound to nodes' quorum slices. The format of all messages is specified using XDR [@!RFC4506]. In addition to quorum slices, messages compactly convey votes on sets of conceptual statements. The core technique of voting with quorum slices is termed federated voting. We describe federated voting next, then detail protocol messages in the subsections that follow.
Federated voting is a process through which nodes confirm
statements. Not every attempt at federated voting may succeed--an
attempt to vote on some statement a
may get stuck, with the result
that nodes can confirm neither a
nor its negation !a
. However,
when a node succeeds in confirming a statement a
, federated voting
guarantees two things:
-
No two well-behaved nodes will confirm contradictory statements in any configuration and failure scenario in which any protocol can guarantee safety for the two nodes (i.e., quorum intersection for the two nodes holds despite ill-behaved nodes).
-
If a node that is guaranteed safety by #1 confirms a statement
a
, and that node is a member of one or more quorums consisting entirely of well-behaved nodes, then eventually every member of every such a quorum will also confirma
.
Intuitively, these conditions are key to ensuring agreement among nodes as well as a weak form of liveness (absence of stuck states) that is compatible with the FLP impossibility result [@?FLP].
As a node v
collects signed copies of a federated voting message m
from peers, two thresholds trigger state transitions in v
depending
on the message. We define these thresholds as follows:
-
quorum threshold: When every member of a quorum to which
v
belongs (includingv
itself) has issued messagem
-
blocking threshold: When at least one member of each of
v
's quorum slices (a set that does not necessarily includev
itself) has issued messagem
Each node v
can send several types of message with respect to a
statement a
during federated voting:
-
vote
a
states thata
is a valid statement and constitutes a promise byv
not to vote for any contradictory message, such as!a
. -
accept
a
says that nodes may or may not come to agree ona
, but if they don't, then the system has experienced a catastrophic set of Byzantine failures to the point that no quorum containingv
consists entirely of correct nodes. (Nonetheless, acceptinga
is not sufficient to act on it, as doing so could violate agreement, which is worse than merely getting stuck from lack of a correct quorum.) -
vote-or-accept
a
is the disjunction of the above two messages. A node implicitly sends such a message if it sends either votea
or accepta
. Where it is inconvenient and unnecessary to differentiate between vote and accept, a node can explicitly send a vote-or-accept message. -
confirm
a
indicates that accepta
has reached quorum threshold at the sender. This message is interpreted the same as accepta
, but allows recipients to optimize their quorum checks by ignoring the sender's quorum slices, as the sender asserts it has already checked them.
(#fig:voting) illustrates the federated voting process. A node v
votes for a valid statement a
that doesn't contradict statements in
past vote or accept messages sent by v
. When the vote message
reaches quorum threshold, the node accepts a
. In fact, v
accepts
a
if the vote-or-accept message reaches quorum threshold, as some
nodes may accept a
without first voting for it. Specifically, a
node that cannot vote for a
because it has voted for a
's negation
!a
still accepts a
when the message accept a
reaches blocking
threshold (meaning assertions about !a
have no hope of reaching
quorum threshold barring catastrophic Byzantine failure).
If and when the message accept a
reaches quorum threshold, then
v
has confirmed a
and the federated vote has succeeded. In
effect, the accept messages constitute a second vote on the fact
that the initial vote messages succeeded. Once v
enters the
confirmed state, it may issue a confirm a
message to help other
nodes confirm a
more efficiently by pruning their quorum search at
v
.
{#fig:voting} "vote-or-accept a" "accept a" reaches reaches quorum threshold quorum threshold +-----------------+ +-----------------+ | | | | | V | V +-----------+ +-----------+ +-----------+ a is +---->| voted a | |accepted a | |confirmed a| valid | +-----------+ +-----------+ +-----------+ | | ^ +-----------+ | | "accept a" reaches |uncommitted|------+-----------------+ blocking threshold +-----------+ | | | | +-----------+ +---->| voted !a | +-----------+ Figure: Federated voting process
SCP employs 32- and 64-bit integers, as defined below.
typedef unsigned int uint32;
typedef int int32;
typedef unsigned hyper uint64;
typedef hyper int64;
SCP uses the SHA-256 cryptograhpic hash function [@!RFC6234], and represents hash values as a simple array of 32 bytes.
typedef opaque Hash[32];
SCP employes the Ed25519 digital signature algorithm [@!RFC8032]. For cryptographic agility, however, public keys are represented as a union type that can later be compatibly extended with other key types.
typedef opaque uint256[32];
enum PublicKeyType
{
PUBLIC_KEY_TYPE_ED25519 = 0
};
union PublicKey switch (PublicKeyType type)
{
case PUBLIC_KEY_TYPE_ED25519:
uint256 ed25519;
};
// variable size as the size depends on the signature scheme used
typedef opaque Signature<64>;
Nodes are public keys, while values are simply opaque arrays of byes.
typedef PublicKey NodeID;
typedef opaque Value<>;
Theoretically a quorum slice can be an arbitrary set of sets of nodes. However, arbitrary predicates on sets cannot be encoded concisely. Instead we specify quorum slices as any set of k-of-n members, where each of the n members can either be an individual node ID, or, recursively, another k-of-n set.
// supports things like: A,B,C,(D,E,F),(G,H,(I,J,K,L))
// only allows 2 levels of nesting
struct SCPQuorumSet
{
uint32 threshold; // the k in k-of-n
PublicKey validators<>;
SCPQuorumSet1 innerSets<>;
};
struct SCPQuorumSet1
{
uint32 threshold; // the k in k-of-n
PublicKey validators<>;
SCPQuorumSet2 innerSets<>;
};
struct SCPQuorumSet2
{
uint32 threshold; // the k in k-of-n
PublicKey validators<>;
};
Let k
be the value of threshold
and n
the sum of the sizes of
the validators
and innerSets
vectors in a message sent by some
node v
. A message m
sent by v
reaches quorum threshold at v
when three things hold:
v
itself has issued (digitally signed) the message,- The number of nodes in
validators
who have signedm
plus the numberinnerSets
that (recursively) meet this condition is at leastk
, and - These three conditions apply (recursively) at some combination of nodes sufficient for condition #2.
A message reaches blocking threshold at v
when the number of
validators
making the statement plus (recursively) the number
innerSets
reaching blocking threshold exceeds n-k
. (Blocking
threshold is a local property that does not require a recursive check
on other nodes like step #3 above.)
As described in (#message-envelopes), every protocol message is paired
with a cryptographic hash of the sender's SCPQuorumSet
and digitally
signed. Inner protocol messages described in the next few sections
should be understood to be received in alongside such a quorum slice
specification and digital signature.
For each slot, the SCP protocol begins in a NOMINATION phase whose goal is to devise one or more candidate output values for the consensus protocol. Nodes send nomination messages that contain a monotonically growing set of values in the following format:
struct SCPNomination
{
Value votes<>; // X
Value accepted<>; // Y
};
The votes
and accepted
sets are disjoint; any value that is
eligible for for both sets is placed only in the accepted
set.
votes
consists of candidate values nominated by the sender. Each
node progresses through a series of nomination rounds in which it
may increase the set of values in its own votes
field by adding the
contents of the votes
and accepted
fields of SCPNomination
messages received from a growing set of peers. In round n
of slot
i
, each node determines an additional peer whose nominated values it
should incorporate in its own SCPNomination
message as follows:
-
Let
Gi(m) = SHA-256(i || output[i-1] || m)
, whereoutput[i-1]
is the consensus output of slot i-1 for slot i > 1 and the zero-byte value for slot 1. Recall that values are encoded as an XDR opaque vector, with a 32-byte length followed by contents zero-padded to a multiple of 4 bytes. Treat the output ofGi
as a 256-bit binary number in big-endian format. -
For each peer
v
, defineweight(v)
as the faction of quorum slices containingv
. -
Define the set of nodes
neighbors(n)
as the set of nodes v for whichGi("N" || n || v) < 2^{256} * weight(v)
. -
Define
priority(n, v)
asGi("P" || n || v)
.
For each round n
until nomination has finished (see below), a node
starts echoing the available peer v
with the highest value of
priority(n, v)
from among the nodes in neighbors(n)
. To echo v
,
the node merges any valid values from v
's votes
and accepted
sets to its own votes
set. The notion of message validity is
dictated by higher-layer software, but should be mostly independent of
replicated state. For instance, nodes might check that values can be
syntactically parsed, that signed transactions have correct digital
signatures, and that timestamp fields are not in the future.
Nodes must not send an SCPNomination
message until at least one of
the votes
or accepted
fields is non-empty. When these fields are
both empty, a node that has the highest priority among its neighbors
in the current round (and hence should be echoing its own votes) adds
the higher-layer software's input value to its votes
field. Nodes
that do not have the highest priority wait to hear SCPNomination
messages from the nodes whose nominations they are echoing.
If a particular valid value x
reaches quorum threshold in the
messages sent by peers (meaning that every node in a quorum contains
x
either in the votes
or the accepted
field), then the node at
which this happens moves x
from its votes
field to its accepted
field and broadcasts a new SCPNomination
message. Similarly, if x
reaches blocking threshold in a node's peers' accepted
field
(meaning every one of a node's quorum slices contains at least one
node with x
in its accepted
field), then the node adds x
to its
own accepted
field (removing it from votes
if applicable). These
two cases correspond to the two conditions for entering the accepted
state in (#fig:voting).
A node finishes the NOMINATION phase whenever any value x
reaches
quorum threshold in the accepted
fields. Following the terminology
of (#federated-voting), this condition corresponds to when the node
confirms x
as nominated. A node that has finished the NOMINATION
phase stops adding new values to its votes
set. However, the node
continues adding new values to accepted
as appropriate. Doing so
may lead to more values becoming confirmed nominated in the
background.
Round n
lasts for 2+n
seconds, after which, if the NOMINATION
phase has not finished, a node proceeds to round n+1
. Note that a
node continues to echo votes from the highest priority neighbor in
prior rounds as well as the current round. In particular, a node
continues expanding its votes
field with values nominated by highest
priority neighbors from prior rounds even when those values were added
after the end of the round.
XXX - expand votes
with only the 10 values with lowest SHA-256 hash
in any given round to avoid blowing out the message size?
After completing the NOMINATION phase (meaning after at least one candidate value is confirmed nominated), a node moves through three phases of balloting: PREPARE, COMMIT, and EXTERNALIZE. Balloting employs federated voting to chose between commit and abort statements for ballots. A ballot is a pair, consisting of a counter and candidate value:
// Structure representing ballot <n, x>
struct SCPBallot
{
uint32 counter; // n
Value value; // x
};
We use the notation <n, x>
to represent a ballot with counter == n
and value == x
.
Ballots are totally ordered with counter
more significant than
value
. Hence, we write b1 < b2
to mean that either b1.counter < b2.counter
or b1.counter == b2.counter && b1.value < b2.value
.
(Values are compared lexicographically as a strings of unsigned
octets.)
The protocol moves through federated voting on successively higher
ballots until nodes confirm commit b
for some ballot b
, at which
point consensus terminates and outputs b.value
for the slot. To
ensure that only one value can be chosen for a slot and that the
protocol cannot get stuck if individual ballots get stuck, there are
two restrictions on voting:
-
A node cannot vote for both
commit b
andabort b
on the same ballot (the two outcomes are contradictory), and -
A node may not vote for
commit b
for any ballotb
unless it has aborted every lesser ballot with a different value.
The second condition requires voting to abort large numbers of ballots
before voting to commit a ballot b
. We call this preparing ballot
b
, and introduce the following notation for the associated set of
abort statements.
-
prepare(b)
encodes anabort
statement for every ballot less thanb
containing a value other thanb.value
, i.e.,prepare(b) = { abort b1 | b1 < b AND b1.value != b.value }
. -
vote prepare(b)
stands for a set of vote messages for everyabort
statement inprepare(b)
. -
Similarly,
accept prepare(b)
,vote-or-accept prepare(b)
, andconfirm prepare(b)
encode sets of accept, vote-or-accept, and confirm messages for everyabort
statement inprepare(b)
.
Using this terminology, a node must confirm prepare(b)
before
issuing a vote message for the statement commit b
.
The first phase of balloting is the PREPARE phase. During this phase, nodes send the following message:
struct SCPPrepare
{
SCPBallot ballot; // b
SCPBallot *prepared; // p
SCPBallot *preparedPrime; // p'
uint32 hCounter; // h.counter or 0 if h == NULL
uint32 cCounter; // c.counter or 0 if c == NULL
};
This message compactly conveys the following (conceptual) federated voting messages:
vote-or-accept prepare(ballot)
- If
prepared != NULL
:accept prepare(prepared)
- If
preparedPrime != NULL
:accept prepare(preparedPrime)
- If
hCounter != 0
:confirm prepare(<hCounter, ballot.value>)
- If
cCounter != 0
:vote commit <n, ballot.value>
for everycCounter <= n <= hCounter
Note that to be valid, an SCPPrepare
message must satisfy
preparedPrime < prepared <= ballot
(for any non-NULL prepared
and
preparedPrime
), and cCounter <= hCounter <= ballot.counter
.
Based on the federated vote messages received, each node keeps track
of what ballots have been accepted and confirmed prepared. It uses
these ballots to set the following fields of its own SCPPrepare
messages as follows.
prepared
: The highest accepted prepared ballot or or NULL if no ballot has
been accepted prepared
preparedPrime
: The highest accepted prepared ballot such that preparedPrime.value != prepared.value
, or NULL if there is no such ballot
hCounter
: The counter
field of the highest confirmed prepared ballot, or 0
if no ballot has been confirmed prepared (Only the counter is
included because the value
of the highest confirmed prepared
ballot is always the same as ballot.value
.)
ballot
: The current ballot that a node is attempting to prepare and commit.
The rules for setting each field are detailed below.
ballot.counter
: The counter is set according to the following rules:
* Upon entering the PREPARE phase, the `counter` field is
initialized to 1.
* When a node sees sees messages from a quorum to which it belongs
such that each message's `ballot.counter` is greater than or
equal to the local `ballot.counter`, the node arms a timer for
its local `ballot.counter + 1` seconds. (Note that this
includes `ballot` fields in `SCPCommit` and `SCPExternalize`
messages as well as `SCPPrepare`.)
* If the timer fires, a node increments the ballot counter and
determines a new `value` according to the rules for the
`ballot.value` field.
* If nodes forming a blocking threshold all have `ballot.counter`
values greater than the local `ballot.counter`, then the local
node immediately increases `ballot.counter` to the lowest value
such that this is no longer the case. (When doing so, it also
disables any pending timers associated with the old `counter`.)
* If a new ballot `h` is confirmed prepared such that `ballot <
h`, then immediately set `ballot` to `h`.
<!-- -->
XXX - can this ever happen?
* To avoid exhausting the counter cannot be exhausted,
`ballot.counter` must always be less then 1,000,000 plus the
number of seconds a node has been running SCP on the current
slot. Should any of the above rules require increasing the
counter beyond this value, a node either simply increase
`ballot.counter` to the maximum permissible value, or if it is
already at its maximum, wait up to one second before increasing
the value.
ballot.value
: Each time the ballot counter is changed, the value is also
recomputed as follows: If any ballot has been confirmed prepared,
then the ballot.value
is taken to to be h.value
for the highest
confirmed prepared ballot h
. Otherwise (if hCounter == 0
), the
value is taken as the output of the deterministic combining function
applied to all confirmed nominated values. Note the that of
confirmed nominated values may continue to grow in the background
during the balloting phase, so ballot.value
may change even while
hCounter == 0
.
cCounter
: The value cCounter
is maintained based on an internally-maintained
"commit ballot" c
, initiall NULL
. cCounter
is 0 when while
c
is NULL
and c.counter
otherwise. c
is updated as follows:
* If either `prepared > c && prepared.value != c.value` or
`preparedPrime > c && preparedPrime.value != c.value`, then
reset `c = NULL`.
* If `c == NULL` and the highest confirmed prepared ballot `h`
(the one that determines `hCounter`) hasn't been aborted by
`prepared` or `preparedPrime`, then set `c` to the lowest ballot
such that `c.value == h.value && c.counter <= h.counter &&
ballot <= c`.
<!-- -->
XXX - just to set `c = ballot` given `ballot` rules?
The PREPARE phase ends at a node when the statement commit b
reaches
the accept state in federated voting for some ballot b
.
In the COMMIT phase, a node has accepted commit b
for some ballot
b
, and must confirm that statement to act on the value in
b.counter
. A node sends the following message in this phase:
struct SCPCommit
{
SCPBallot ballot; // b
uint32 preparedCounter; // prepared.counter
uint32 hCounter; // h.counter
uint32 cCounter; // c.counter
};
The message conveys the following federated vote messages, where where
infinity
is 2^{32} (a value greater than any ballot counter
representable in marshaled form):
accept commit <n, ballot.value>
for everycCounter <= n <= hCounter
vote-or-accept prepare(<infinity, ballot.value>)
accept prepare(<preparedCounter, ballot.value>)
confirm prepare(<hCounter, ballot.value>)
vote commit <n, ballot.value>
for everyn >= cCounter
A node computes the fields in the SCPCommit
messages it sends as
follows:
ballot
: This field is maintained identically to how it is maintained in the
PREPARE phase, though ballot.value
can no longer change, only
ballot.counter
. Note that the value ballot.counter
does not
figure in any of the federated voting messages. The purpose of
continuing to update and send this field is to assist other nodes
still in the PREPARE phase in synchronizing their counters.
preparedCounter
: This field is the counter of the highest accepted prepared
ballot--maintained identically to the prepared
field in the PREPARE
phase. Since the value
field will always be the same as ballot
,
only the counter is sent in the COMMIT phase.
cCounter
: The counter of the lowest ballot c
for which the node has accepted
commit c
. (No value is included in messages since c.value == ballot.value
.)
hCounter
: The counter of the highest ballot h
for which the node has
accepted commit c
. (No value is included in messages since h.value == ballot.value
.)
As soon as a node confirms commit b
for any ballot b
, it moves to
the EXTERNALIZE stage.
A node enters the EXTERNALIZE when it confirms commit b
for any
ballot b
. As soon as this happens, SCP outputs b.value
as the
value of the current slot. In order to help other nodes achieve
consensus on the slot more quickly, a node reaching this phase also
sends the following message:
struct SCPExternalize
{
SCPBallot commit; // c
uint32 hCounter; // h.counter
} externalize;
An SCPExternalize
message conveys the following federated voting
messages:
accept commit <n, commit.value>
for everyn >= commit.counter
confirm commit <n, commit.value>
for everycommit.counter <= n <= hCounter
vote-or-accept prepare(<infinity, commit.value>)
confirm prepare(<infinity, commit.value>)
The fields are set as follows
commit
: The lowest confirmed committed ballot.
hCounter
: The counter of the highest confirmed committed ballot.
In order to provide full context for each signed message, all signed
messages are part of an SCPStatement
union type that includes the
slotIndex
naming the slot to which the message applies, as well as
the type
of the message. A signed message and its signature are
packed together in an SCPEnvelope
structure.
enum SCPStatementType
{
SCP_ST_PREPARE = 0,
SCP_ST_COMMIT = 1,
SCP_ST_EXTERNALIZE = 2,
SCP_ST_NOMINATE = 3
};
struct SCPStatement
{
NodeID nodeID; // v (node signing message)
uint64 slotIndex; // i
union switch (SCPStatementType type)
{
case SCP_ST_PREPARE:
SCPPrepare prepare;
case SCP_ST_COMMIT:
SCPCommit confirm;
case SCP_ST_EXTERNALIZE:
SCPExternalize externalize;
case SCP_ST_NOMINATE:
SCPNomination nominate;
}
pledges;
};
struct SCPEnvelope
{
SCPStatement statement;
Signature signature;
};
If nodes do not pick quorum slices well, the protocol will not be safe.
The Stellar development foundation supported development of the protocol and produced the first production deployment of SCP. The IRTF DIN group including Dirk Kutscher, Sydney Li, Colin Man, Melinda Shore, and Jean-Luc Watson helped with the framing and motivation for this specification.
{{reference.scp.xml}} {{reference.flp.xml}}
{backmatter}