Validator Security
Best practices for securing your Realm validator
Overview
Running a validator requires strong security practices. A compromised validator can result in slashing and loss of staked funds.
Critical
Never expose your validator keys. Keep backups in secure cold storage.
Security Layers
The Realm validator ISO includes multiple security layers:
- LUKS2 Encryption - Full disk encryption with Argon2id
- AppArmor - Mandatory access control for realmd
- nftables - Kernel-native firewall
- fail2ban - Intrusion prevention
- AIDE - File integrity monitoring
- Secure Boot - TPM2 attestation
Firewall Configuration
nftables.conftext
# /etc/nftables.conftable inet filter {chain input {type filter hook input priority 0; policy drop;# Allow established connectionsct state established,related accept# Allow SSH (rate limited)tcp dport 22 limit rate 3/minute accept# Allow gRPC APItcp dport 9090 accept# Allow P2Ptcp dport 26656 acceptudp dport 26656 accept}}
Key Management
Key Security
Your validator key signs blocks. If compromised, an attacker can double-sign and cause slashing.
- Generate keys offline on an air-gapped machine
- Store encrypted backups in multiple secure locations
- Consider hardware security modules (HSM) for production
- Never transmit keys over the network
Monitoring
Set up alerts for:
- Missed blocks
- Abnormal resource usage
- Failed login attempts
- File integrity changes
Slashing Conditions
Validators are slashed for:
- Double signing - 5% stake slashed
- Downtime - 0.1% per missed epoch
- Misbehavior - Up to 100% slashed