Skip to content

Commit 6f4de31

Browse files
committed
remove rmn blessing references and update diagrams
1 parent b143703 commit 6f4de31

File tree

10 files changed

+3
-46
lines changed

10 files changed

+3
-46
lines changed
245 KB
Loading
-119 KB
Loading
-30.8 KB
Loading
-7.34 KB
Loading

src/config/sidebar/ccip-dynamic.ts

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -186,10 +186,6 @@ export const CCIP_SIDEBAR_CONTENT: SectionEntry[] = [
186186
title: "Overview",
187187
url: "ccip/concepts/architecture/offchain/overview",
188188
},
189-
{
190-
title: "Risk Management Network",
191-
url: "ccip/concepts/architecture/offchain/risk-management-network",
192-
},
193189
],
194190
},
195191
{

src/content/ccip/concepts/architecture/key-concepts.mdx

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -70,19 +70,3 @@ Organizations with specialized expertise in running Chainlink nodes. Each operat
7070
## Decentralized Oracle Network (DON)
7171

7272
A **decentralized oracle network (DON)** consists of multiple independent Chainlink nodes. These nodes monitor and retrieve data from specified sources (e.g., a source chain), reach consensus off-chain, and post results to a blockchain (e.g., a destination chain) in a [trust-minimized manner](https://blog.chain.link/what-is-trust-minimization/). For more details on the DONs used in CCIP, refer to the CCIP Offchain architecture page.
73-
74-
## Risk Management Network
75-
76-
The Risk Management Network is a unique architectural feature of CCIP that reinforces system security through a defense-in-depth approach based on established engineering principles such as N-version programming. On blockchains where RMN is enabled, a distinct set of node operators—separate from those of the core CCIP DONs—manages RMN functions.
77-
78-
The RMN runs a minimal, separate implementation of the Chainlink node software using a different programming language than the primary CCIP system. This client diversity enhances robustness and minimizes external dependencies, thereby reducing the risk of supply chain attacks.
79-
80-
On the blockchains where RMN is enabled, the RMN nodes independently verify and attest to source chain actions. The core CCIP components on the destination chain verify these attestations. For more details, refer to the following section.
81-
82-
<Aside type="caution" title="Phased Deployments">
83-
Certain blockchains may be integrated with CCIP in a phased approach, with the Committing and Executing DONs deployed
84-
first and the Risk Management Network added in a later update. In cases of a phased deployment, merkle roots in
85-
relevant Commit Stores are always considered blessed until the Risk Management Network has been deployed for that
86-
blockchain. Please see the [CCIP Directory](/ccip/directory) for which integrations utilize a phased approach. Please
87-
review [CCIP Service Responsibility](/ccip/service-responsibility) for more information.
88-
</Aside>

src/content/ccip/concepts/architecture/onchain/aptos/components.mdx

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -184,11 +184,3 @@ The `ccip::receiver_registry` is a module where developers can register their cu
184184
## RMN (Risk Management Network) Remote
185185

186186
The `ccip::rmn_remote` module is a critical security component deployed on every CCIP-enabled chain. Various CCIP modules (like `OnRamp`, `OffRamp`, `Token Pools`) query this component to verify the status of other chains in the network. It maintains an onchain list of "cursed" (i.e., blocklisted) chains. If a source or destination chain is cursed, CCIP transactions involving that chain are halted.
187-
188-
<Aside type="caution" title="Phased Deployments">
189-
Certain blockchains may be integrated with CCIP in a phased approach, with the Committing and Executing DONs deployed
190-
first and the Risk Management Network added in a later update. In cases of a phased deployment, merkle roots in
191-
relevant Commit Stores are always considered blessed until the Risk Management Network has been deployed for that
192-
blockchain. Please see the [CCIP Directory](/ccip/directory) for which integrations utilize a phased approach. Please
193-
review [CCIP Service Responsibility](/ccip/service-responsibility) for more information.
194-
</Aside>

src/content/ccip/concepts/architecture/onchain/evm/components.mdx

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -102,9 +102,6 @@ During the **Commit Phase**, the following steps occur:
102102

103103
1. **Commit Report Submission**
104104
- The Committing DON calls the `commit()` function on the OffRamp with a Commit Report that includes messages and/or price reports.
105-
1. **Validation of RMN Blessing**
106-
- If the Commit Report includes blessed merkle roots from RMN-enabled source chains, the OffRamp verifies the RMN node signatures onchain via the `RMNRemote` contract.
107-
- If the Commit Report does not include RMN signatures, the OffRamp validates that all unblessed merkle roots originate from source chains where RMN is disabled.
108105
1. **Price Report Staleness Check**
109106
- The OffRamp validates the staleness of price reports before forwarding the price to the FeeQuoter.
110107
1. **Cursed Source Chain Check**
@@ -191,11 +188,8 @@ The `setPool()` method can be invoked by a registered CCIP token administrator v
191188

192189
Risk management in CCIP is performed by a separate, independent network that continuously monitors and validates cross-chain operations for anomalous activity, thereby providing an additional layer of security.
193190

194-
With the latest CCIP release, the Risk Management Network (RMN) blessing occurs offchain. In this process, the Committing DON interacts offchain with RMN nodes to obtain a blessing, and the resulting RMN node signatures are included in the Commit Report posted on the OffRamp at the destination chain.
195191
The RMN Contract is deployed on every chain where CCIP is integrated, even on chains where RMN is not enabled. Its key functions include:
196192

197-
1. **Blessing Verification**
198-
- **Verify function**: The RMNRemote contract's `verify()` function is used by the OffRamp to verify RMN signatures for messages originating from RMN-enabled source chains.
199193
1. **Cursing Mechanism**
200194
- **Curse Initiation**: When the CCIP Owner manually initiates a curse, the `curse()` function is invoked to mark the appropriate subjects as cursed.
201195
- **Curse Detection**: Onchain components (such as the Router, OnRamp, OffRamp, and TokenPool) call the `isCursed()` function on the RMNRemote contract to detect global curses or curses targeting a remote chain.

src/content/ccip/concepts/architecture/onchain/svm/components.mdx

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -193,13 +193,7 @@ The FeeQuoter is a central component in Chainlink CCIP that maintains token and
193193

194194
## Risk Management Network
195195

196-
The Risk Management Network (RMN) adds an additional security layer to CCIP by performing offchain risk validation and maintaining an onchain "cursing" mechanism. The RMN program enables verification of cross-chain messages and can halt message transmission for specific blockchains or globally when security threats are detected.
197-
198-
### Blessing and Verification
199-
200-
- Offchain RMN nodes generate ECDSA signatures over merkle roots representing cross-chain message batches.
201-
- CCIP programs (such as Router or OffRamp) make CPI calls to the `verify_not_cursed` function to check whether the relevant chain (source or destination) is cursed.
202-
- The RMN program checks its `Curses` account to verify the subject isn't cursed before allowing the transaction to proceed.
196+
The Risk Management Network (RMN) adds an additional security layer to CCIP by maintaining an onchain "cursing" mechanism. The RMN program enables verification of cross-chain messages and can halt message transmission for specific blockchains or globally when security threats are detected.
203197

204198
### Cursing Mechanism
205199

src/content/ccip/concepts/architecture/overview.mdx

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ CCIP is a cross-chain messaging protocol built on Chainlink and secured by its d
1919
- **Data Transmission**: Send arbitrary data (i.e., bytes) to a receiving contract.
2020
- **Programmable Token Transfers**: Transfer tokens along with instructions for handling them to a receiving contract (referred to as a programmable token transfer or PTT).
2121

22-
CCIP supports several token transfer mechanisms—including Burn-and-Mint, Lock-and-Mint, and Lock-and-Unlock—using a common interface. Token developers can enable permissionless cross-chain transfers of their tokens via the Chainlink CCT (Cross-Chain Token) standard (detailed documentation is available here). Additionally, CCIP includes an independent Risk Management Network (RMN) that provides layered security through a defense-in-depth approach.
22+
CCIP supports several token transfer mechanisms—including Burn-and-Mint, Lock-and-Mint, and Lock-and-Unlock—using a common interface. Token developers can enable permissionless cross-chain transfers of their tokens via the Chainlink CCT (Cross-Chain Token) standard (detailed documentation is available here).
2323

2424
<Aside title="Terminology">
2525

@@ -39,8 +39,6 @@ CCIP delivers cross-chain messages from a source chain to a destination chain by
3939
- Decentralized Oracle Network (DON) with nodes that perform distinct roles:
4040
- Commit: Observes and validates source-chain events to build a consensus-based report.
4141
- Execution: Validates pending messages and optimizes them for execution on the destination chain.
42-
- Risk Management Network:
43-
- Operating independently from the main DON, the Risk Management Network "blesses" the committed messages offchain by generating independent attestations. This additional step enhances overall security with a defense-in-depth design.
4442

4543
1. **Onchain Architecture**
4644
- Router:
@@ -51,14 +49,13 @@ CCIP delivers cross-chain messages from a source chain to a destination chain by
5149
- Dispatching the message (data and/or tokens).
5250
- On the destination blockchain, offramping functionality consists of:
5351
- Accepting and verifying commit reports from the Committing DON.
54-
- Validating Risk Management Network nodes signatures when receiving messages from the Executing DON.
5552
- Releasing or minting tokens to the receiver.
5653
- Routing the processed message to the designated receiver.
5754

5855
**Note:** These high-level descriptions outline the core principles of CCIP. The detailed architectures for offchain and onchain architecture—and variations across implementations (e.g., on Solana, the Router incorporates OnRamp functionalities)—can be found in the relevant documentation.
5956

6057
<ClickToZoom
61-
src="/images/ccip/ccip-hl-v1.6.gif"
58+
src="/images/ccip/ccip-hl-v1.7.png"
6259
alt="CCIP High-Level Architecture"
6360
style="display: block; margin: 2rem auto; max-height: 60vh; width: auto;"
6461
/>

0 commit comments

Comments
 (0)