**Date:** 2026 / 04 / 30
**Hosts:** Raul
**Time:** 10:00
## Part 1: ETH P2P Vision & Design Principles
### Motivation
ETH P2P is a fresh, Ethereum-specific networking stack to replace the libp2p-based status quo. libp2p was a pragmatic choice during the ETH2 bootstrap when networking wasn't a bottleneck — but it increasingly is. The new design treats networking and protocol as **two sides of the same coin** rather than independent concerns.
### Four Design Principles
1. **Vertical Integration**
- Stack is aware of slot phases, deadlines, priorities, and object specificities
- Example: attestations in a slot/committee context can be represented as bitmaps and reconciled, rather than gossiped as individual hash-addressed objects
2. **Mechanical Sympathy**
- Goal: minimize idle resources; nodes self-measure bandwidth and impose appropriate caps
- **Pushback:** "Zero idle" is antithetical to elasticity, resilience under adverse conditions, and home staker viability (residential lines need spare capacity for other uses). Zero-idle should be reframed as a path to *resilience*, not maximal throughput
- Discussion of organic "supernodes" (DVTs, cloud-hosted nodes) — emerging bottom-up rather than designated, but incentivization remains an open hard problem
3. **Privacy by Default**
- Cannot be bolted on later; attestations are currently the worst correlation offender
- Proposal: set propagation upper-bound caps (e.g., P90 attestation propagation at 500ms) and use the slack within that budget for anonymization primitives (mixnets, RLNs, OHTTP-style two-hop relays, Privacy Pass tokens)
- Spam prevention in encrypted mixnets via **rate-limiting nullifiers**
4. **Consistent Performance**
- Performance consistency is part of correctness
- Couples to graceful-degradation finality research and consensus pacing
### Stack Layers
**Transport:** QUIC over TLS 1.3 (native multiplexing, 0-RTT, session resumption, Encrypted Client Hello). Ethereum traffic should be **indistinguishable from generic web traffic**. TCP fallback is open question — pending real-world mainnet measurement of QUIC-vs-TCP preference between dual-capable peers to detect UDP-hostile middleboxes. QMUX (QUIC-over-TCP) noted as future option.
**Peering:** Built on discv5; ~9 MB RAM to hold full CL discovery view. Background connection pre-warming with session resumption tokens enables single-message sends without handshake latency — critical foundation for deterministic mini-mixnets.
### Censorship Resistance Discussion
- Effectiveness depends on adversary sophistication
- Looking like normal HTTPS/QUIC traffic + proxying (MASQUE-style) helps against middleboxes/ISPs
- Against state actors (GFW), the goal is making DPI expensive
- Tor-style fingerprinting research shows real hiding requires either heavy cover traffic or significant slowdown
- Distinction noted: user-level censorship resistance ("post a tx") vs. validator-level privacy (much harder)
### Critical Concern: Overlay Bloat (Lighthouse dev)
> "We're running five overlays today: discv4, discv5 twice, libp2p, devp2p. Unless we get rid of them, all these promises are vacuous."
Some agreement: the other overlays should be retired to avoid compounding complexity.
### History / Sync Architecture Tangent
- Opinion: should be **one master number** for retained history, applied uniformly across blobs, EL, weak subjectivity, etc. (Currently ~5 months, derived from longest plausible WS period)
- Raul: even with that number set, the **validator P2P network shouldn't serve historical data** — that belongs to a separate cohort of disk/bandwidth-optimized nodes (conceptually similar to Portal Network)
- Some agreement that history retrieval is "personal interest" while recent-final-state sync is essential participation behavior
- Open design question: content negotiation layer to segregate workloads on shared library/transport
---
## Part 2: Erasure Coded Broadcast
### Problem
GossipSub is store-and-forward: each peer must fully receive and validate before forwarding. Inefficient and slow as payload sizes grow.
### Simulation Results (Shadow, 2000 nodes, degree 10, 2.4 MB payload, second/warm message)
| Metric | GossipSub | RS Broadcast |
|---|---|---|
| P95 latency | ~13 s | ~2 s |
| Bandwidth multiplier | ~6–8× | ~3–4× |
### Key Design Elements
**Reed-Solomon (systematic):** original data + parity (currently 2× multiplier, 16 KB chunks). Chosen over RLNC primarily due to **patent encumbrance on RLNC** (MIT/Optimum portfolio specifically targeting blockchains).
**Two innovations:**
1. **Convergence phase with bitmaps** — once peers reach a local availability threshold, they switch from random gossip to bitmap reconciliation, mitigating the coupon-collector tail problem
2. **Sessions** — a slot-scoped state container. Origin opens with a **preamble** announcing coder config (shard count, parity, chunk size, authentication commitment). All state torn down when slot elapses; thereafter served via request-response. Provides rapid network-wide announcement primitive
**Authentication:** chunks authenticated at source by builder signatures (preferred) or per-chunk Merkle proofs against an upfront commitment (rejected by Raul because it blocks streaming).
### Significant Technical Debate: RS vs. RLNC
**Pushback:**
- Earlier RLNC simulations showed **<1s P99** for 2 MB payloads over 10,000 nodes; ~1000-node real network tested up to 2 MB
- RLNC authentication uses homomorphic commitments — a **single signature** on the block plus per-chunk commitment verification (orders of magnitude faster than per-chunk signature verification at ~5–10 ms each)
- Coefficient-size bloat is a blob concern, not a payload concern
- Claims EF lawyers indicated RLNC **broadcasting** use (vs. storage) appeared clear; suggests pursuing MIT for a grant similar to Arbitrum/Princeton precedent
**Raul's position:**
- Patent uncertainty in a globally-deployed decentralized network is unacceptable risk
- Optimum (MIT-licensed) is actively commercializing against blockchain clients — unlikely to grant
- Fast RS encoding/decoding also has associated patents — neither path is patent-clean
- Authentication cost can be optimized; RS allows reuse of the erasure scheme already used elsewhere in the protocol
- Open to benchmarking signature-verification cost and exploring vector commitments over RS chunks
### Action Items / Follow-ups
- Benchmark per-chunk signature verification cost in the RS scheme
- Investigate vector commitments over RS chunks as RLNC-equivalent authentication
- Mainnet measurement campaign: QUIC vs. TCP preference between dual-capable peers
- Schedule Part 2 session — simulator walkthrough, deployment/testing/multi-language interop not yet covered
- Showcase of: EL mempool observatory + 30-second discv5 crawler with identify support
---
## Open Questions Left Hanging
- Concrete plan and timeline for retiring discv4 / second discv5 / devp2p
- How "trailing security" tiers (head-1, head-2) for low-bandwidth nodes would integrate with consensus rewards
- Scope of TCP fallback work given discv5's hard UDP dependency
- Whether historical data serving lives on a separate overlay or is content-negotiated on the same stack
- Final RLNC patent posture — is a Princeton/Arbitrum-style grant from MIT worth pursuing?