This EIP informationally defines the "Safe Range" and "Max Range" of ChainId based on a few known restrictions such as EIP-155 and major wallet and JsonPRC representation of ChainId.
We declared the following chainID range
MAX_CHAIN_ID := floor(MAX_UINT64 / 2) - 36 = 9,223,372,036,854,775,771
:The MAX_CHAIN_ID
is calculated to avoid overflow when performing uint64 math. For reference, a value of 0 or less is also disallowed.
Due to how the calculation for chain ID is performed, the maximum value seen during the arithmetic is CHAIN_ID * 2 + 36
, so clients must test to ensure no overflow conditions are encountered when the highest value is used. No underflow is possible.
EIP-155 introduces the Chain ID parameter, which is an important parameter used for domain separation (replay protection) of Ethereum protocol signed messages. However, it does not specify any properties about the size that this parameter takes. Allowing it to be 256-bit wide means that the RLP encoding of a transaction must use >256-bit arithmetic to calculate the v field.
and suggests a reasonable maximum enforced size in order to ensure that there are no issues when encoding this parameter. This would allow a sufficient amount of different values for this parameter, which is typically chosen by community consensus as a genesis parameter for a given chain and thus does not change often.
Without a well-chosen value of Chain ID, there could be differences in the implementation of EIP-155 (and EIP-1344 by derivative) in both client codebase and external tooling that could lead to consensus-critical vulnerabilities being introduced to the network. By making this limit explicit, we avoid this scenario for Ethereum and any project which uses the Ethereum codebase.
Also, the field chainID
have experienced increasing usage and dependencies, due more and more contracts are depending on EIP-1344 to expose CHAIN ID in the smart contract execution. For example when used with EIP-712, ERC-1271 for on-contract signature verification, chainId has been increasingly introduced for replay attack prevention. It's security critical to ensure clients depending on the chainId computation in cryptography yields identical result for verification in
all cases.
This EIP introduces a change that affects previous implementations of this feature. However, as of time of writing(2022-10-18) no known chain makes use of a value outside of the suggested bounds, there should not be an issue in adopting this limit on the size of this parameter, therefore the impact should be non-existent.
If any other chain is operating with an incompatible chainId
, we advised they make proper arrangement when this EIP becomes adopted.
Needs discussion.
Copyright and related rights waived via CC0.