Secure Validator

Validators are charged with protecting the network against denial-of-service attacks. A recommended strategy is to use a 'sentry node architecture.'

Sentry Node Protection

Sentry nodes, also known as relay nodes or gateway nodes, are an important component in the infrastructure of a blockchain network. They serve as intermediaries between the validator nodes and the rest of the network, providing enhanced security and network efficiency.

  • Validator nodes should only connect to trusted full-nodes.

  • Typically, a validator node will run in a data center, which often has direct links to major cloud providers.

  • Validators can use these links to connect to sentry nodes in the cloud, shifting the burden of attacks to the sentry nodes.

  • Sentry nodes can be quickly adjusted or created to fend off attacks.

  • The links to the sentry nodes are in private IP space, protecting them from internet-based disturbances.

By using this architecture, validator block proposals and votes are ensured to reach the rest of the network, maintaining the stability and integrity of MANTRA Chain.

Key Management

Key management plays a crucial role in securing and controlling access to your accounts and assets. Some important aspects of key management are:

  1. Key Generation: To interact with the MANTRA network, you need a cryptographic key pair consisting of a public key and a private key. The private key should be kept securely and should not be shared with anyone.

  2. Wallets and Key Storage: Wallet applications or software provide a user-friendly interface for managing your keys and interacting with the network. These wallets often use secure storage mechanisms to protect your private keys, such as encrypted databases or hardware wallets.

  3. Backups and Recovery: It's crucial to create backups of your private keys and store them securely. Losing access to your private key can result in permanent loss of funds or assets. You should follow best practices for backing up your keys, such as creating offline or encrypted backups, and storing them in multiple secure locations.

  4. Key Security: Protecting your private key is paramount. Ensure that your devices, including computers and mobile devices, are secure, updated with the latest security patches, and free from malware or keyloggers. Be cautious when entering your private key, especially on shared or public computers.

  5. Key Sharing and Delegation: In some cases, you may want to delegate your stake to a validator or authorize someone else to manage your assets on your behalf. It's important to exercise caution when sharing your private key or granting access to your accounts.

  6. Hardware Security Modules (HSMs): HSMs provide dedicated hardware-based security measures and extra layers of protection against key theft or unauthorized access. Utilizing hardware security modules (HSMs) is a key strategy in safeguarding a validator's key and mitigating the risk of compromising the entire delegated stake, as it significantly reduces the likelihood of an attacker successfully stealing the key.

Last updated