Lido on Ethereum Standard Node Operator Protocol - Validator Exits
STATUS: V2.0
A - Purpose
This Standard Node Operator Protocol (SNOP) outlines general validator exit mechanisms available in Ethereum (see Appendix A), the role that validator exits play in Lido on Ethereum (LoE), the rules around the usage of the SNOP, the algorithmic exit order in place in LoE, the protocol and governance levers for ad-hoc exit prioritization or triggered exits, the responsibilities Node Operators (NOs) using LoE have in processing validator exit requests, and the actions that can be expected in case of non-conformance with the SNOP.
In LoE, validator exits may be utilized for the following reasons:
- To satisfy unfinalized withdrawal redemption requests from users
- To reallocate stake across the NO set
- To rotate signing keys for validators
- To maintain Staking Module (SM) share limits
- To eject validators regardless of demand in the Withdrawal Queue (WQ)
B - Scope
This SNOP applies to LoE, the NOs who use one or more of the Staking Router (SR)'s Curated Module (CM), Simple Distributed Validator Technology Module (SDVTM), and Community Staking Module (CSM) and the validators the NOs operate as part of the Liquid Staking Protocol (LSP).
The below stipulated operational flows and expectations apply to all above-mentioned SMs, except in cases where specific mentions are made to alternate flows or expectations for specific SMs due to differences in their technical or operational characteristics.
NOTE: As terms can have different meanings based on how they are used and in different contexts, the below table aims to clarify the usage of various terms for the purposes of this SNOP and how they apply within the context of LoE.
Term |
Definition |
Context |
Node Operator |
An entity, individual, or set thereof who operate(s) nodes while using one or more of LoE's SMs to run Ethereum validators |
CM & CSM solo operation: A single entity or individual operating validators SDVTM operation: A cluster of independent entities and/or individuals operating validators as a group CSM DVT operation: An entity, individual, or cluster thereof operating validators |
Validator |
A validator, also referred to as a "key" in this SNOP, is the technical component of participating in Ethereum's consensus, that - if active - represents a stake weight of up to 32 ETH, is controlled by a public-private validator signing key pair and performs duties for the network – attesting to and proposing new blocks, participating in sync committees, and reporting network violations of the slashing rules |
CM & CSM solo operation: A validator run by a single NO SDVTM operation: A Distributed Validator (DV) run by a cluster of independent NOs utilizing Distributed Validator Technology (DVT) CSM DVT operation: A DV run by a single NO or cluster utilizing DVT |
C - Validator Exit Order
The exit sequence of LoE validators follows a deterministic order so exits can be computed independently and trustlessly if needed. The order is algorithmic and, in tandem with the incoming stake allocation algorithm, works to organically balance the stake throughout the SMs and across NOs within each SM. By default, and excluding ad-hoc flags (see below), validators are exited from NOs based on the (highest) number of active validators. An additional consideration arises when a group of NOs exceeds the per-NO soft-cap threshold of 1% of total ETH staked in the network. In such cases, NOs with higher stake weight, as determined by the number of long-running active validators, receive a higher priority for exits – i.e. in the case of two NOs both above the 1% threshold with an equal amount of active keys, the "oldest" keys will be exited first.
Other factors, such as the stakeShareLimit
(an SM-level property), targetLimit
and validator exits performance (both per-NO per-SM properties) also play a part in the order of validator exit requests.
In the SR 2.0, the priority of exits is determined by the following sorting predicate.
Sorting |
Staking Module |
Node Operator |
Validator |
V |
|
Lowest number of delayed validators |
|
V |
|
Highest number of targeted validators to boosted exit |
|
V |
|
Highest number of targeted validators to smooth exit |
|
V |
Highest deviation from the exit share limit (i.e. highest positive difference between currentShare and priorityExitShareThreshold ) |
|
|
V |
|
Highest stake weight |
|
V |
|
Highest number of active validators |
|
V |
|
|
Lowest index |
C.1 - Stake Share Limit
Each SM has the concept of a stakeShareLimit
, priorityExitShareThreshold
and currentShare
, where stakeShareLimit <= priorityExitShareThreshold
. The stakeShareLimit
is the maximum percentage of total ETH in LoE that can be allocated to an SM during the stake allocation process. The priorityExitShareThreshold
represents the stake share threshold after which validator exits from an SM are prioritized. The currentShare
is defined by the current amount of active validators within an SM.
Since the total stake in the protocol is dynamic as a result of inflows and outflows, it is possible that SMs temporarily end up with a currentShare
higher than their stakeShareLimit
. The Validators Exit Bus Oracle (VEBO) takes this into account when determining the next validators to be exited, by comparing an SM's currentShare
against its stakeShareLimit
and priorityExitShareThreshold
, and if over-allocated, determines that the SM must be prioritized for exits (multiple SMs can be prioritized for exits in this manner simultaneously). Thus, each SM is in one of three states at any given time.
When
currentShare < stakeShareLimit
, the SM has default allocation priority, and validators in the SM do not have extra priority for exit
stakeShareLimit <= currentShare <= priorityExitShareThreshold
, the SR does not allocate stake to the SM, and validators in the SM do not have extra priority for exit
priorityExitShareThreshold < currentShare
, the SR does not allocate stake to the SM, and validators in the SM have an increased priority for exit
C.2 - Target Limit
The concept of a targetLimit
and targetLimitMode
is applied to NOs on a per-SM basis – i.e. the targetLimit
is not shared by the same entity across SMs. The targetLimitMode
sets the approach through which exits are requested by LoE, and the targetLimit
the target number of active validators for an NO in an SM.
With the targetLimitMode
set to:
0
, i.e. disabled, the NO can receive stake without limitation up to the NO's capacity of vetted depositable keys, and the NO's validators have the default exit priority.
1
, the NO is in smooth exit mode, meaning that there is a limit to the NO's number of active validators. As long as the NO's validator amount does not exceed the specified targetLimit
, the NO may be allocated stake as per the default allocation algorithm. However, once the value is reached, the allocation of new stake to the NO is stopped. If the NO's active keys exceed the targetLimit
, the NO's validators are prioritized for exit when there is demand for withdrawal fulfilment that requires exits.
2
, the NO is in boosted exit mode, meaning that should the NO's active keys be or rise above the set targetLimit
, then exits will be requested from the NO regardless of withdrawal demand, and the NO's validator exits will be prioritized over exits of NOs with a targetLimitMode
of 0
or 1
.
Independent target limits may be implemented by each SM, but are set by LDO token holders via Easy Track or on-chain governance votes.
D - Node Operator Responsibilities
LoE contains on-chain signalling mechanisms that serve to notify NOs when to process validator exits. If exits for keys under their operation have been requested through the VEBO smart contract, NOs have the duty to fully, correctly, and timely exit validators as determined by the requirements and rules set by and for any of the reasons described in the sections A - Purpose and C - Validator Exit Order, as per the latest in force SNOP.
To determine whether NOs have appropriately executed the required actions, this SNOP outlines the operative timelines for exits processing, and specifies consequences of non-conformance. Generally, NOs are expected to exit the indicated validators in a reasonable time frame. The actual mechanisms for validators to be exited are at the discretion of the NOs, with community-built open-source tooling (see Appendix B) to aid the NOs in identifying and processing signalled requests being available in addition to any internal tooling, APIs, or manual processes NOs may use.
D.1 - Out of Order Exits
Out of order exits refer to exits that are made by an NO of one of or both the CM and SDVTM when a validator exit request has not been made through the VEBO. In such cases, the NO must notify the community via the Lido Research Forum that an out of order exit has been processed, how many and which validators have been exited, and the reason for it. As the CSM is permissionless and validators are bonded, this expectation is not extended to validators contained therein, CSM NOs are free to exit out of order at their discretion.
D.2 - Business Continuity
If, at any time, an NO of one of or both the CM and SDVTM is unable to continue operations, e.g. has become insolvent, the NO must notify the community via the Lido Research Forum of the circumstances and signal intent to exit all of the validators the NO operates using LoE. If LDO token holders, via a ratified vote within 8 days, do not instruct the NO otherwise, the NO must proceed with triggering all of the exits.
The VEBO settles on-chain reports that indicate which validators should be exited by which NO, and constitutes the validator exit requests signal. As with the other sub-modules of the Lido Oracle, the VEBO's work is delineated by equal time periods called frames, the duration of which is specified in an amount of Ethereum Consensus Layer (CL) epochs (~6.4 minutes) according to the respective instance of the Lido HashConsensus
smart contract. NOs have a duty to set up infrastructure to capture and process signalled exit requests pertaining to their validators as soon as possible.
For clarity, a validator exit request is considered:
signalled
once it is retrievable from a VEBO report,
processed
once it has been broadcast to the CL and included in a block proposed to the Beacon Chain (BC), and
fulfilled
once the validator has been fully exited and withdrawn.
Although the process can be largely automated, to account for differences in infrastructure, working hours, and mechanism timings, the below are the timing constraints regarding the processing of validator exits requests that NOs must adhere to. If NOs are processing signalled requests as soon as available from a VEBO report, the shortest possible time for a request to go from signalled
to processed
will be somewhere within the range of a few minutes to an hour.
With respect to validator exits performance, at any point in time, each NO may be considered to have one of the below three validator exit request statuses:
in good standing
– validator exit requests are being processed fully, correctly, and timely
delayed
– validator exit requests are being processed incompletely, incorrectly, or not within the desired time frame
delinquent
– validator exit requests are being processed incompletely, incorrectly, or not within the acceptable time frame
For every delinquent exit request, i.e. a request that has been unprocessed for longer than the delinquency threshold, an NO's per-SM stuckKeysCount
increases by 1
. An NO with a stuckKeysCount > 0
is delinquent, which may result in the NO's share of rewards being reduced and/or penalties imposed for the affected and possibly further frames, as determined by the respective SM. The time for an NO to recover to in good standing
depends on four aspects, (1) the NO having processed all delinquent exit requests, (2) the frame length of the Lido Oracle sub-module that reports updates on validator exit request statuses, (3) the frame length of the sub-module whose reports account for NO penalties related to unprocessed exit requests or delinquency, and (4) any SM-specific cooldown period for NO delinquency. For the CM and SDVTM, the relevant sub-module is the Accounting Oracle (AO), for the CSM it is the Performance Oracle (PO). The CM and SDVTM have a cooldown period for NO delinquency of 120 hours, long enough to determine whether, immediately after service restoration, subsequently received validator exit requests are processed timely. The CSM does not have such a cooldown period.
To avoid NO delinquency, NOs must adhere to the following time frames.
Event |
Requirement to not be considered delayed |
Requirement to not be considered delinquent |
Processing of signalled validator exit requests |
All signalled requests are processed in less than 24 hours after a VEBO report |
Some signalled requests are taking longer than 24 but less than 96 hours to process |
Escalation of inability to process signalled validator exit request with reason |
ASAP but no longer than 24 hours |
ASAP but no longer than 96 hours |
In case that an NO is not processing validator exit requests timely, the below actions shall be taken. Separate measures may be applied dependending on the technical characteristics of the SM within which the request originated. For example, while NOs are known for the permissioned CM and SDVTM, NOs of the permissionless CSM may remain anonymous and reaching the NOs is only possible if a contact is voluntarily shared with the community.
The following table outlines the consequences for non-adherence to validator exit request timing expectations, and for which SM each action applies.
Action |
CM |
SDVTM |
CSM |
If an NO has a status of delayed, contributors to the Node Operator Mechanisms (NOM) workstream will raise an issue and request remediative action by the NO. |
|
|
If NO is identifiable |
If an NO has a status of delayed or delinquent, the VEBO will assume that the NO is unresponsive and reroute newly incoming validator exit requests to NOs that are not considered delayed or delinquent. Due to the rerouting of exit requests, LDO token holders should consider - via an ad-hoc vote - overriding the total limit of active keys for the NO such that if the NO resumes in good standing, the NO is not benefiting at the expense of NOs who took over processing of rerouted exit requests. |
|
|
|
If an NO has a status of delinquent, contributors to the NOM workstream will raise a formal issue with the NO on the Lido Research Forum. |
|
|
If NO is identifiable |
While an NO has a status of delinquent, no new stake will be allocated to the NO. |
|
|
|
While an NO has a status of delinquent, the NO's share of rewards for the affected AO frame(s) will halve, with the remainder accruing towards the stETH rebase(s) instead. |
|
|
|
While an NO has a status of delinquent, no operator rewards will accrue to the NO for the affected PO reporting frame(s), with all operator rewards accruing towards the stETH rebase(s) instead. The NO still receives rewards related to its bond rebase. |
|
|
|
Once a delinquent NO has processed all signalled exit requests and its stuckKeysCount is updated to 0 , the NO may recommence receiving requests. The NO's validator exit request status will revert to in good standing after successful expiry of the NO delinquency cooldown period. During that period, the NO will continue to not be allocated new stake and receive halved rewards. |
|
|
|
Once a delinquent NO has processed all signalled exit requests and its stuckKeysCount is updated to 0 , the NO may recommence receiving requests. The NO's validator exit request status will revert to in good standing after successful expiry of the current PO frame. During that frame, the NO will continue to neither be allocated new stake, nor receive operator rewards. The NO still receives rewards related to its bond rebase. |
|
|
|
In the most egregious of cases, e.g. being delinquent for weeks on end, LDO token holders at any time may consider an on-chain vote to stop a misbehaving NO. A stopped NO will neither be allocated new stake, nor receive rewards. In case of a delinquent cluster, the SDVTM Committee may propose an Easy Track motion to request the exit of the cluster's remaining active DVs. If the NO continues to remain unresponsive, or a cluster cannot aggregate enough signatures to act, the NO/cluster is considered to have been effectively off-boarded from the CM or SDVTM as appropriate. LDO token holders should take further steps to formalize the exit and, in the case of an SDVTM cluster, to allow responsive participants to form a new cluster if applicable. |
|
|
|
In case an NO, for any reason, cannot exit a validator, e.g. due to loss of the associated private signing key, the NO is expected to reimburse stakers by supplying the maximum irretrievable balance of the unrecoverable validator – i.e. 32 ETH, since anything over that can be obtained via partial withdrawal of rewards. Doing so renders the validator in question reimbursed and does not count against the NO in terms of its validator exit request status. NOTE: With the Ethereum Pectra upgrade, previously unrecoverable validators will become withdrawable through triggerable exits, reducing the cost for NOs to reimburse stakers to the gas and contract transaction fees needed to call the method on the Execution Layer (EL). |
|
|
|
Appendix
Appendix A - Ethereum Validator Exit Mechanisms
Currently, there are two ways a validator can exit from Ethereum's CL. The first is a voluntary exit, a validator may choose to voluntarily stop performing duties for the network by submitting a voluntary exit message (VEM) to the BC. The second mechanism is forced ejection from the Ethereum protocol – this could be triggered by slashing or an insufficient effective balance. Additionally, the upcoming Pectra hardfork will introduce a third method of exiting validators, EL withdrawal credentials triggerable withdrawals.
A.1 - Voluntary Exit
A validator can initiate a voluntary exit at any time, provided that it has not been slashed, is currently active, and has been active for at least 256 epochs (~27 hours). It does so by signing a VEM using the private validator key, and broadcasting the message to the network to have it processed – either directly through a local CL client or indirectly, e.g. via an external CL node or API. Once the validator has reached the exit epoch and the NO confirmed that the validator was not selected for delayed sync committee participation, the validator ceases to perform duties and stops receiving rewards and penalties, i.e. enters the withdrawable state. In this state, the validator waits until its index is parsed by the withdrawals sweep operation and for its balance to be withdrawn to the specified withdrawal credentials.
NOTE: Validators with BLS 0x00 credentials will need to rotate to 0x01 for the withdrawal to be processed, otherwise they are skipped.
A.2 - Forced Exit
Forced exits are not relevant for the purposes of this SNOP, but occur either as a result of a validator being slashed or of its effective balance falling below Ethereum's current ejection balance threshold of 16 ETH.
A.3 - Triggerable Withdrawal
EIP-7002 introduces a new functionality to Ethereum that will allow EL withdrawal credentials to signal and initiate partial or full withdrawals of related validators on the CL. This will provide increased assurances with respect to the timely and orderly exit of validators for staking solutions, as well as potential countermeasures against malicious or ill-performing NOs. The downside, however, is that Triggerable Withdrawals (TWs) incur on-chain gas for transactions that do not exist on the CL, as well as variable request fees, and that the combined costs are partially non-refundable in case of accidental underspending. This makes triggerable withdrawals less suitable than the CL-initiated variant for the average validator exit use case, nor are they a cure-all since validators may still misbehave while in the exit queue. For LoE, the introduction of triggerable withdrawals nevertheless represents a key functional advancement in the offering of bond-based permissionless SMs like the CSM.
There is an assortment of community-built open-source tooling available for LoE and Ethereum staking in general, which may be used by NOs to monitor and perform semi- or fully-automated processing of validator exit requests. NOs may choose to utilize open-source "out of the box" implementations, design custom ones, or any combination thereof – e.g. connecting the Validator Ejector to a custom API, or generating requests in a just-in-time fashion.
Detailed descriptions and the source codes of these tools can be found on the Node Operator Portal.
Lido on Ethereum Standard Node Operator Protocol - Validator Exits
A - Purpose
This Standard Node Operator Protocol (SNOP) outlines general validator exit mechanisms available in Ethereum (see Appendix A), the role that validator exits play in Lido on Ethereum (LoE), the rules around the usage of the SNOP, the algorithmic exit order in place in LoE, the protocol and governance levers for ad-hoc exit prioritization or triggered exits, the responsibilities Node Operators (NOs) using LoE have in processing validator exit requests, and the actions that can be expected in case of non-conformance with the SNOP.
In LoE, validator exits may be utilized for the following reasons:
B - Scope
This SNOP applies to LoE, the NOs who use one or more of the Staking Router (SR)'s Curated Module (CM), Simple Distributed Validator Technology Module (SDVTM), and Community Staking Module (CSM) and the validators the NOs operate as part of the Liquid Staking Protocol (LSP).
The below stipulated operational flows and expectations apply to all above-mentioned SMs, except in cases where specific mentions are made to alternate flows or expectations for specific SMs due to differences in their technical or operational characteristics.
NOTE: As terms can have different meanings based on how they are used and in different contexts, the below table aims to clarify the usage of various terms for the purposes of this SNOP and how they apply within the context of LoE.
A single entity or individual operating validators
SDVTM operation:
A cluster of independent entities and/or individuals operating validators as a group
CSM DVT operation:
An entity, individual, or cluster thereof operating validators
A validator run by a single NO
SDVTM operation:
A Distributed Validator (DV) run by a cluster of independent NOs utilizing Distributed Validator Technology (DVT)
CSM DVT operation:
A DV run by a single NO or cluster utilizing DVT
C - Validator Exit Order
The exit sequence of LoE validators follows a deterministic order so exits can be computed independently and trustlessly if needed. The order is algorithmic and, in tandem with the incoming stake allocation algorithm, works to organically balance the stake throughout the SMs and across NOs within each SM. By default, and excluding ad-hoc flags (see below), validators are exited from NOs based on the (highest) number of active validators. An additional consideration arises when a group of NOs exceeds the per-NO soft-cap threshold of 1% of total ETH staked in the network. In such cases, NOs with higher stake weight, as determined by the number of long-running active validators, receive a higher priority for exits – i.e. in the case of two NOs both above the 1% threshold with an equal amount of active keys, the "oldest" keys will be exited first.
Other factors, such as the
stakeShareLimit
(an SM-level property),targetLimit
and validator exits performance (both per-NO per-SM properties) also play a part in the order of validator exit requests.In the SR 2.0, the priority of exits is determined by the following sorting predicate.
currentShare
andpriorityExitShareThreshold
)C.1 - Stake Share Limit
Each SM has the concept of a
stakeShareLimit
,priorityExitShareThreshold
andcurrentShare
, wherestakeShareLimit <= priorityExitShareThreshold
. ThestakeShareLimit
is the maximum percentage of total ETH in LoE that can be allocated to an SM during the stake allocation process. ThepriorityExitShareThreshold
represents the stake share threshold after which validator exits from an SM are prioritized. ThecurrentShare
is defined by the current amount of active validators within an SM.Since the total stake in the protocol is dynamic as a result of inflows and outflows, it is possible that SMs temporarily end up with a
currentShare
higher than theirstakeShareLimit
. The Validators Exit Bus Oracle (VEBO) takes this into account when determining the next validators to be exited, by comparing an SM'scurrentShare
against itsstakeShareLimit
andpriorityExitShareThreshold
, and if over-allocated, determines that the SM must be prioritized for exits (multiple SMs can be prioritized for exits in this manner simultaneously). Thus, each SM is in one of three states at any given time.When
currentShare < stakeShareLimit
, the SM has default allocation priority, and validators in the SM do not have extra priority for exitstakeShareLimit <= currentShare <= priorityExitShareThreshold
, the SR does not allocate stake to the SM, and validators in the SM do not have extra priority for exitpriorityExitShareThreshold < currentShare
, the SR does not allocate stake to the SM, and validators in the SM have an increased priority for exitC.2 - Target Limit
The concept of a
targetLimit
andtargetLimitMode
is applied to NOs on a per-SM basis – i.e. thetargetLimit
is not shared by the same entity across SMs. ThetargetLimitMode
sets the approach through which exits are requested by LoE, and thetargetLimit
the target number of active validators for an NO in an SM.With the
targetLimitMode
set to:0
, i.e. disabled, the NO can receive stake without limitation up to the NO's capacity of vetted depositable keys, and the NO's validators have the default exit priority.1
, the NO is in smooth exit mode, meaning that there is a limit to the NO's number of active validators. As long as the NO's validator amount does not exceed the specifiedtargetLimit
, the NO may be allocated stake as per the default allocation algorithm. However, once the value is reached, the allocation of new stake to the NO is stopped. If the NO's active keys exceed thetargetLimit
, the NO's validators are prioritized for exit when there is demand for withdrawal fulfilment that requires exits.2
, the NO is in boosted exit mode, meaning that should the NO's active keys be or rise above the settargetLimit
, then exits will be requested from the NO regardless of withdrawal demand, and the NO's validator exits will be prioritized over exits of NOs with atargetLimitMode
of0
or1
.Independent target limits may be implemented by each SM, but are set by LDO token holders via Easy Track or on-chain governance votes.
D - Node Operator Responsibilities
LoE contains on-chain signalling mechanisms that serve to notify NOs when to process validator exits. If exits for keys under their operation have been requested through the VEBO smart contract, NOs have the duty to fully, correctly, and timely exit validators as determined by the requirements and rules set by and for any of the reasons described in the sections A - Purpose and C - Validator Exit Order, as per the latest in force SNOP.
To determine whether NOs have appropriately executed the required actions, this SNOP outlines the operative timelines for exits processing, and specifies consequences of non-conformance. Generally, NOs are expected to exit the indicated validators in a reasonable time frame. The actual mechanisms for validators to be exited are at the discretion of the NOs, with community-built open-source tooling (see Appendix B) to aid the NOs in identifying and processing signalled requests being available in addition to any internal tooling, APIs, or manual processes NOs may use.
D.1 - Out of Order Exits
Out of order exits refer to exits that are made by an NO of one of or both the CM and SDVTM when a validator exit request has not been made through the VEBO. In such cases, the NO must notify the community via the Lido Research Forum that an out of order exit has been processed, how many and which validators have been exited, and the reason for it. As the CSM is permissionless and validators are bonded, this expectation is not extended to validators contained therein, CSM NOs are free to exit out of order at their discretion.
D.2 - Business Continuity
If, at any time, an NO of one of or both the CM and SDVTM is unable to continue operations, e.g. has become insolvent, the NO must notify the community via the Lido Research Forum of the circumstances and signal intent to exit all of the validators the NO operates using LoE. If LDO token holders, via a ratified vote within 8 days, do not instruct the NO otherwise, the NO must proceed with triggering all of the exits.
D.3 - Validator Exits Performance
The VEBO settles on-chain reports that indicate which validators should be exited by which NO, and constitutes the validator exit requests signal. As with the other sub-modules of the Lido Oracle, the VEBO's work is delineated by equal time periods called frames, the duration of which is specified in an amount of Ethereum Consensus Layer (CL) epochs (~6.4 minutes) according to the respective instance of the Lido
HashConsensus
smart contract. NOs have a duty to set up infrastructure to capture and process signalled exit requests pertaining to their validators as soon as possible.For clarity, a validator exit request is considered:
signalled
once it is retrievable from a VEBO report,processed
once it has been broadcast to the CL and included in a block proposed to the Beacon Chain (BC), andfulfilled
once the validator has been fully exited and withdrawn.Although the process can be largely automated, to account for differences in infrastructure, working hours, and mechanism timings, the below are the timing constraints regarding the processing of validator exits requests that NOs must adhere to. If NOs are processing signalled requests as soon as available from a VEBO report, the shortest possible time for a request to go from
signalled
toprocessed
will be somewhere within the range of a few minutes to an hour.With respect to validator exits performance, at any point in time, each NO may be considered to have one of the below three validator exit request statuses:
in good standing
– validator exit requests are being processed fully, correctly, and timelydelayed
– validator exit requests are being processed incompletely, incorrectly, or not within the desired time framedelinquent
– validator exit requests are being processed incompletely, incorrectly, or not within the acceptable time frameFor every delinquent exit request, i.e. a request that has been unprocessed for longer than the delinquency threshold, an NO's per-SM
stuckKeysCount
increases by1
. An NO with astuckKeysCount > 0
is delinquent, which may result in the NO's share of rewards being reduced and/or penalties imposed for the affected and possibly further frames, as determined by the respective SM. The time for an NO to recover toin good standing
depends on four aspects, (1) the NO having processed all delinquent exit requests, (2) the frame length of the Lido Oracle sub-module that reports updates on validator exit request statuses, (3) the frame length of the sub-module whose reports account for NO penalties related to unprocessed exit requests or delinquency, and (4) any SM-specific cooldown period for NO delinquency. For the CM and SDVTM, the relevant sub-module is the Accounting Oracle (AO), for the CSM it is the Performance Oracle (PO). The CM and SDVTM have a cooldown period for NO delinquency of 120 hours, long enough to determine whether, immediately after service restoration, subsequently received validator exit requests are processed timely. The CSM does not have such a cooldown period.To avoid NO delinquency, NOs must adhere to the following time frames.
E - Consequences of Non-conformance
In case that an NO is not processing validator exit requests timely, the below actions shall be taken. Separate measures may be applied dependending on the technical characteristics of the SM within which the request originated. For example, while NOs are known for the permissioned CM and SDVTM, NOs of the permissionless CSM may remain anonymous and reaching the NOs is only possible if a contact is voluntarily shared with the community.
The following table outlines the consequences for non-adherence to validator exit request timing expectations, and for which SM each action applies.
stuckKeysCount
is updated to0
, the NO may recommence receiving requests. The NO's validator exit request status will revert toin good standing
after successful expiry of the NO delinquency cooldown period. During that period, the NO will continue to not be allocated new stake and receive halved rewards.stuckKeysCount
is updated to0
, the NO may recommence receiving requests. The NO's validator exit request status will revert toin good standing
after successful expiry of the current PO frame. During that frame, the NO will continue to neither be allocated new stake, nor receive operator rewards. The NO still receives rewards related to its bond rebase.NOTE: With the Ethereum Pectra upgrade, previously unrecoverable validators will become withdrawable through triggerable exits, reducing the cost for NOs to reimburse stakers to the gas and contract transaction fees needed to call the method on the Execution Layer (EL).
Appendix
Appendix A - Ethereum Validator Exit Mechanisms
Currently, there are two ways a validator can exit from Ethereum's CL. The first is a voluntary exit, a validator may choose to voluntarily stop performing duties for the network by submitting a voluntary exit message (VEM) to the BC. The second mechanism is forced ejection from the Ethereum protocol – this could be triggered by slashing or an insufficient effective balance. Additionally, the upcoming Pectra hardfork will introduce a third method of exiting validators, EL withdrawal credentials triggerable withdrawals.
A.1 - Voluntary Exit
A validator can initiate a voluntary exit at any time, provided that it has not been slashed, is currently active, and has been active for at least 256 epochs (~27 hours). It does so by signing a VEM using the private validator key, and broadcasting the message to the network to have it processed – either directly through a local CL client or indirectly, e.g. via an external CL node or API. Once the validator has reached the exit epoch and the NO confirmed that the validator was not selected for delayed sync committee participation, the validator ceases to perform duties and stops receiving rewards and penalties, i.e. enters the withdrawable state. In this state, the validator waits until its index is parsed by the withdrawals sweep operation and for its balance to be withdrawn to the specified withdrawal credentials.
NOTE: Validators with BLS 0x00 credentials will need to rotate to 0x01 for the withdrawal to be processed, otherwise they are skipped.
A.2 - Forced Exit
Forced exits are not relevant for the purposes of this SNOP, but occur either as a result of a validator being slashed or of its effective balance falling below Ethereum's current ejection balance threshold of 16 ETH.
A.3 - Triggerable Withdrawal
EIP-7002 introduces a new functionality to Ethereum that will allow EL withdrawal credentials to signal and initiate partial or full withdrawals of related validators on the CL. This will provide increased assurances with respect to the timely and orderly exit of validators for staking solutions, as well as potential countermeasures against malicious or ill-performing NOs. The downside, however, is that Triggerable Withdrawals (TWs) incur on-chain gas for transactions that do not exist on the CL, as well as variable request fees, and that the combined costs are partially non-refundable in case of accidental underspending. This makes triggerable withdrawals less suitable than the CL-initiated variant for the average validator exit use case, nor are they a cure-all since validators may still misbehave while in the exit queue. For LoE, the introduction of triggerable withdrawals nevertheless represents a key functional advancement in the offering of bond-based permissionless SMs like the CSM.
Appendix B - Tooling
There is an assortment of community-built open-source tooling available for LoE and Ethereum staking in general, which may be used by NOs to monitor and perform semi- or fully-automated processing of validator exit requests. NOs may choose to utilize open-source "out of the box" implementations, design custom ones, or any combination thereof – e.g. connecting the Validator Ejector to a custom API, or generating requests in a just-in-time fashion.
Detailed descriptions and the source codes of these tools can be found on the Node Operator Portal.