Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Guides

Setting Up Shared Validator Infrastructure Models

A technical guide for developers to deploy, configure, and manage shared validator infrastructure using Distributed Validator Technology (DVT), MEV-Boost relays, and multi-operator consensus.
Chainscore © 2026
introduction
ARCHITECTURE GUIDE

Setting Up Shared Validator Infrastructure Models

A practical guide to implementing shared validator models, from simple multi-operator setups to advanced distributed key generation (DKG) systems.

Shared validator infrastructure allows multiple entities to collaboratively operate a single validator node, distributing trust and reducing single points of failure. The core models range from simple multi-signature (multisig) setups to sophisticated Distributed Validator Technology (DVT). A basic shared model might involve a 2-of-3 multisig wallet, where two out of three designated operators must sign to propose a block or attest. This model, while improving security over a single key, still centralizes the actual validation duty on a single server operated by one of the signers.

For true fault tolerance, the infrastructure must separate the signing key from the execution client. This is where DVT protocols like the Obol Network or SSV Network come in. They use a cryptographic technique called Distributed Key Generation (DKG) to split a validator's private key into multiple Key Shares. Each share is held by a different operator running their own node software. Consensus requires a threshold (e.g., 3-of-4) of these nodes to sign, ensuring the validator stays online even if one operator's node fails.

Setting up a basic DVT cluster involves several steps. First, operators generate their key shares collaboratively using a DKG ceremony, resulting in a Distributed Validator Key and individual operator key shares. Each operator then configures their execution client (e.g., Geth, Nethermind) and consensus client (e.g., Lighthouse, Teku) as usual. The critical addition is the DVT middleware (like an Obol Charon client or SSV node), which intercepts duties from the consensus client, coordinates with other operators, and only signs with its local key share when the threshold is met.

Operational models vary. In an equal-operators model, all participants run identical infrastructure and share rewards equally. A delegated-staker model allows a single staker to delegate signing authority to a set of professional node operators, who run the infrastructure for a fee. Infrastructure can be deployed on diverse setups: bare-metal servers, cloud VPS providers (AWS, GCP), or even home setups, maximizing geographic and client diversity to protect against correlated failures.

Monitoring and slashing protection are paramount. Each operator must run a Validator Client Slashing Protection Database locally. The DVT middleware ensures slashable messages are only signed if the threshold agrees, providing an extra layer of safety. Tools like Grafana dashboards should aggregate metrics from all nodes in the cluster, tracking attestation performance, sync status, and proposal success to ensure the shared validator maintains high effectiveness.

prerequisites
SHARED VALIDATOR INFRASTRUCTURE

Prerequisites and System Requirements

Before deploying a shared validator infrastructure model, you must establish a robust technical foundation. This guide outlines the essential hardware, software, and operational prerequisites.

Shared validator infrastructure refers to a model where multiple validator clients (e.g., for Ethereum, Solana, or Cosmos) operate on a common set of physical or cloud-hosted servers. The core prerequisite is a deep understanding of the target blockchain's consensus mechanism—be it Proof-of-Stake (PoS), Delegated Proof-of-Stake (DPoS), or another variant. You must be proficient in managing the specific validator client software, such as Lighthouse, Teku, Prysm, or Nimbus for Ethereum, and understand their resource requirements and key management protocols.

The hardware baseline depends on the network's demands. For a mainnet Ethereum validator, you typically need a machine with at least 4-8 CPU cores, 16-32 GB of RAM, and a 2 TB NVMe SSD to handle the growing state. For high-availability setups across multiple chains, consider enterprise-grade servers or cloud instances (e.g., AWS m6i.2xlarge or equivalent) with dedicated resources. A reliable power supply, cooling, and a stable internet connection with low latency and high uptime (>99.5%) are non-negotiable to avoid slashing penalties.

Your software stack must include a secure operating system like a minimal Linux distribution (Ubuntu Server 22.04 LTS is common), configured with automatic security updates and a hardened firewall (using ufw or iptables). Essential tools are Docker (for containerized clients), Prometheus and Grafana for monitoring, and a log aggregation service. You will also need the blockchain's CLI tools, like geth or erigon for an Ethereum execution client, and the ability to compile from source if necessary.

Security prerequisites are paramount. You must establish a secure key generation and storage process, often using an air-gapped machine for generating mnemonic seeds. Implement a robust backup strategy for validator keys and withdrawal credentials. Operational security includes setting up alerting for missed attestations or proposals, using tools like Ethereum 2.0 Client Monitor or custom scripts. Familiarity with using a Hardware Security Module (HSM) or a cloud KMS for enterprise deployments is a significant advantage.

Finally, ensure you have the requisite stake amount for the network (32 ETH for Ethereum, variable for others) and understand the financial mechanics of staking, including rewards, penalties (slashing), and withdrawal processes. Test your entire setup on a testnet (like Goerli, Sepolia, or a chain-specific devnet) to validate configuration, monitoring, and failover procedures before committing real funds.

key-concepts-text
SETTING UP SHARED VALIDATOR INFRASTRUCTURE MODELS

Key Concepts: DVT, MEV, and Multi-Operator Consensus

This guide explains the core technical concepts required to build and operate secure, decentralized Ethereum validator infrastructure.

Distributed Validator Technology (DVT) is a protocol that splits the private key and signing duties of a single Ethereum validator across multiple nodes, known as operators. This creates a fault-tolerant cluster where the validator remains active as long as a threshold (e.g., 3 out of 4) of operators are online. DVT mitigates single points of failure, enhances security by eliminating a single key holder, and democratizes staking by enabling collaborative node operation. Protocols like SSV Network and Obol Network implement DVT using threshold BLS signatures and consensus mechanisms to coordinate the distributed key shares.

Maximal Extractable Value (MEV) refers to the profit that can be extracted by reordering, including, or excluding transactions within a block. For validators, this primarily comes from block-building auctions, where specialized searchers and builders submit bids for optimal block construction. Shared infrastructure must have a strategy for MEV. Options include running a local builder, using a relay like Flashbots Protect or bloXroute, or outsourcing to a professional block-building service. Capturing MEV revenue is critical for validator profitability, but it introduces centralization risks and ethical considerations around transaction fairness.

Multi-Operator Consensus is the underlying mechanism that allows a DVT cluster to function. It's a two-layer system: first, operators run an Internal Consensus protocol (like Istanbul BFT) to agree on the validator duties for the current slot (e.g., attest or propose a block). Once consensus is reached, operators use Distributed Key Generation (DKG) and threshold cryptography to produce a single, valid signature for the Ethereum network. This architecture ensures liveness (the cluster can act even if some nodes fail) and safety (malicious operators cannot forge signatures or act unilaterally).

Setting up a shared validator involves several technical steps. First, a cluster is formed by a group of operators who run DVT client software. They perform a DKG ceremony to create the distributed key shares. Each operator then runs the consensus client and the DVT middleware, which intercepts duties from the Beacon Chain, coordinates with the cluster, and triggers the distributed signing process. Configuration requires setting the withdrawal credentials to the cluster's threshold signature address and managing the operator fee structure for reward distribution.

The primary benefits of this model are resilience and decentralization. A DVT-based validator has significantly higher uptime than a solo node, reducing slashing risks from downtime. It also reduces the capital requirement for staking, allowing smaller operators to participate. However, challenges include increased complexity in setup and coordination, reliance on peer operators' performance, and the current immaturity of some DVT client implementations compared to standard Ethereum consensus clients.

When architecting shared infrastructure, key decisions include choosing a DVT protocol, selecting reliable operator peers, defining a clear governance and fee model, and integrating an MEV strategy. This model represents a fundamental shift from single-operator validators to validator-as-a-service networks, forming the backbone for more robust and permissionless Ethereum staking pools and institutional staking services.

ARCHITECTURE

Shared Validator Model Comparison

Key differences between solo, pooled, and delegated validator infrastructure models.

FeatureSolo StakingPooled Staking (e.g., Lido, Rocket Pool)Delegated Staking (e.g., Coinbase, Kraken)

Infrastructure Control

Full

None (Pool Operator)

None (Custodian)

Minimum Stake

32 ETH

< 0.1 ETH

Varies (~0.001 ETH)

Validator Key Ownership

Slashing Risk

Bearer (100%)

Bearer (pro-rata)

Absorbed by Provider

Exit Queue Management

Manual

Automated by Pool

Managed by Provider

Typical Commission Fee

0%

5-10%

15-25%

Liquidity Token

Time to Withdraw Funds

~2-7 days

Instant (via DEX)

1-3 business days

setup-dvt-ssv
INFRASTRUCTURE

Step 1: Setting Up a DVT Cluster with SSV Network

Distributed Validator Technology (DVT) decentralizes Ethereum staking by splitting a validator key among multiple operators. This guide walks through creating a fault-tolerant cluster using the SSV Network.

Distributed Validator Technology (DVT) is a protocol that splits the private key of an Ethereum validator among a group of independent node operators, known as a cluster. No single operator holds the full key. Instead, a threshold of operators (e.g., 4 out of 7) must collaborate to sign attestations and propose blocks. This setup, pioneered by the SSV Network, eliminates single points of failure and significantly improves validator resilience and decentralization.

Before creating a cluster, you need three core components: your validator key shares, a set of operator nodes, and SSV tokens. First, use the official SSV Key Distributor CLI or a trusted DVT launchpad to split your validator's BLS private key into n shares. You then select n operators from the SSV network's public registry to run these shares. Each operator runs the SSV client software, which manages their key share and participates in the IBFT consensus to produce signatures.

The cluster configuration is defined by an Operator ID list and a threshold value. For a cluster of 4 operators, a common threshold is 3, meaning any 3 operators can sign. You configure this via the SSV web app or by sending a transaction to the SSV smart contracts. The configuration also sets the fee structure, where each operator earns a periodic fee in SSV tokens for their service, paid from the validator's rewards.

Once your cluster is active on the SSV network, the operators begin performing validator duties. The SSV network's smart contracts manage the cluster's state, while off-chain Message Queues facilitate secure, private communication between operators for consensus. You can monitor your cluster's performance, including attestation effectiveness and operator health, through the SSV explorer or your own monitoring setup using the SSV API.

A key advantage of DVT is graceful handling of node failures. If one operator goes offline, the remaining operators in the cluster can reach the signing threshold and keep the validator active, avoiding penalties. This makes DVT ideal for solo stakers seeking robustness and staking pools aiming for institutional-grade SLA. The SSV network's slashing protection is also distributed, ensuring safety even if a minority of operators are malicious.

setup-mev-boost
VALIDATOR SETUP

Step 2: Integrating MEV-Boost for Revenue Sharing

MEV-Boost is a middleware service that allows Ethereum validators to outsource block building to a competitive marketplace of specialized builders, significantly increasing their staking rewards.

To begin, you must run a consensus client (e.g., Lighthouse, Teku, Prysm, Nimbus, Lodestar) and an execution client (e.g., Geth, Nethermind, Besu, Erigon). MEV-Boost acts as a separate service that sits between them. Instead of the consensus client requesting a block from its local execution client, it requests a block header from the MEV-Boost service, which sources it from the highest-bidding builder on the network. This process is governed by the builder API specification.

The core configuration involves starting the mev-boost binary with flags pointing to your consensus client's REST API and a list of relays. Relays are trusted intermediaries that receive blocks from builders, perform basic validity and censorship resistance checks, and forward them to validators. You must choose at least one relay. A common startup command looks like: ./mev-boost -mainnet -relay-check -relays https://0xrelay1.example.com,https://0xrelay2.example.com. The -relay-check flag is recommended to validate relay registration.

Your consensus client must be configured to use MEV-Boost. This is done by setting the --builder or --http-mev-boost flag to point to your local MEV-Boost instance (typically http://127.0.0.1:18550). For example, in Lighthouse, you would add --builder http://127.0.0.1:18550 to your beacon node command. Once configured, your validator will automatically start proposing blocks via the MEV-Boost flow, receiving payments in the form of priority fees and MEV rewards directly into its specified fee recipient address.

Understanding the flow is critical for monitoring. When your validator is selected to propose a block: 1) Your consensus client requests a block header from MEV-Boost. 2) MEV-Boost requests bids from connected relays. 3) It selects the header with the highest value. 4) The consensus client signs the header and returns it. 5) MEV-Boost requests the full block body for that header. 6) The consensus client publishes the full block. This ensures the validator never sees the transaction order, reducing regulatory risk and operational complexity.

For optimal performance and decentralization, connect to multiple relays from different providers. Key public relays include those operated by Flashbots, BloxRoute, Eden Network, and Ultrasound Money. Diversifying relays mitigates the risk of a single point of failure or censorship. Monitor your validator's performance using logs from MEV-Boost and your consensus client, and track your increased rewards on block explorers like beaconcha.in by checking the "MEV Reward" field for your proposed blocks.

setup-multi-operator
SHARED INFRASTRUCTURE

Step 3: Configuring a Multi-Operator Validator Setup

This guide details the technical configuration for a multi-operator validator, a setup where key management, block proposal, and attestation duties are distributed across separate entities to enhance security and resilience.

A multi-operator validator splits the single validator key into distinct components managed by different parties. The core concept involves separating the withdrawal key, which authorizes exiting the validator and accessing funds, from one or more signing keys used for day-to-day consensus duties. This architecture, formalized by standards like Ethereum's EIP-3076 (Slashing Protection Interchange Format), mitigates single points of failure. The withdrawal key is typically held in deep cold storage, while signing keys are delegated to operational nodes run by yourself or a trusted third-party service.

The technical setup begins with key generation. Using the official Ethereum deposit CLI, you generate a mnemonic seed that will derive your withdrawal key. Crucially, you then use this seed to generate one or more derived signing keystores for your validator(s). Each keystore corresponds to a specific validator client (e.g., Prysm, Lighthouse) and contains only the public key and encrypted private key needed for attestations and block proposals. The command structure looks like: ./deposit new-mnemonic --num_validators 1 --execution_address 0x... --eth1_withdrawal_address 0x.... This process outputs the keystore files and a deposit_data.json for staking.

Configuration of the validator client is the next critical step. You must configure your client (e.g., Lighthouse, Teku) to use the generated keystores and connect to a Beacon Node API. For a multi-operator setup, you specify the path to the keystores and the location of the slashing protection database, a mandatory component that prevents the validator from signing conflicting messages. A sample Lighthouse validator_definitions.yml entry would include fields for the keystore path, voting public key, and the path to the slashing protection database, ensuring the client only signs messages that are safe according to its local history.

Finally, you must establish secure communication and define operational boundaries. The validator client(s) operated by you or your partners connect to Beacon Nodes, which can also be distributed for redundancy. Clear protocols must be established for key rotation, client software updates, and monitoring slashing protection interchange files if duties are transferred between operators. This model's primary security benefit is that a compromise of an operational signing key does not risk the staked ETH principal, as the attacker cannot initiate a withdrawal without the separate, secured withdrawal key.

VALIDATOR INFRASTRUCTURE MODELS

Security and Configuration Checklist

Critical security and operational parameters for comparing shared validator infrastructure setups.

Configuration ParameterSolo Staking (Baseline)Distributed Validator Technology (DVT)Managed Node Service

Client Diversity Enforcement

Single-Client Slashing Risk

High

Low

Medium

Validator Key Custody

Self-managed

Distributed (SSS/MPC)

Provider-managed

Hardware Redundancy

User responsibility

Built-in (cluster)

Provider SLA

Uptime SLA Guarantee

None

99.5%

99.9%

MEV-Boost Relay Defaults

User configurable

Pre-configured, decentralized set

Provider-curated set

Upgrade & Maintenance Window

Manual, user-managed

Zero-downtime rolling upgrades

Scheduled, announced

Cross-Client Bug Mitigation

No

Yes (failover)

Partial (provider failover)

SHARED VALIDATOR INFRASTRUCTURE

Troubleshooting Common Issues

Common challenges and solutions for teams implementing shared validator models for improved security, cost-efficiency, and decentralization.

The effective balance on Ethereum is a lagging metric, updated only when your validator's actual balance changes by at least 0.25 ETH. It's capped at 32 ETH. This is a protocol design, not an error.

Key points:

  • Your actual balance can exceed 32 ETH from rewards.
  • Your effective balance is used to calculate rewards/penalties and caps at 32 ETH.
  • It only increases when your actual balance reaches 32.25 ETH, then resets to 32 ETH.
  • It only decreases when your actual balance falls below 31.75 ETH.

This mechanism reduces the frequency of state changes, optimizing network performance. Monitor your actual balance on a beacon chain explorer like beaconcha.in.

VALIDATOR INFRASTRUCTURE

Frequently Asked Questions

Common questions and troubleshooting for developers setting up shared validator infrastructure, covering key management, slashing, and operational best practices.

A shared validator infrastructure model is an architectural pattern where multiple validator clients (e.g., for Ethereum, Solana, Cosmos) run on a single, managed set of physical or cloud hardware. Instead of deploying one server per validator, you run a consensus client (like Lighthouse, Prysm) and an execution client (like Geth, Erigon) that serve multiple validator keys.

This model centralizes the compute and networking layer while keeping signing keys separate, often in Hardware Security Modules (HSMs) or remote signers. It's used by staking pools, exchanges, and institutional operators to achieve better resource utilization, simplified maintenance, and enhanced security through key isolation. The primary challenge is ensuring high availability and mitigating correlated slashing risks across all validators on the shared node.

conclusion
IMPLEMENTATION SUMMARY

Conclusion and Next Steps

You have explored the core models for building shared validator infrastructure, from multi-operator clusters to distributed validator technology (DVT).

Implementing a shared validator setup is a strategic decision that balances decentralization, resilience, and operational complexity. The choice between a simple multi-operator cluster using tools like charon from Obol or a fully integrated DVT solution like SSV Network depends on your specific requirements for fault tolerance, key management, and desired level of protocol-level coordination. Each model shifts the trust assumptions from a single point of failure to a defined committee of operators.

For next steps, begin with a testnet deployment. Use the --goerli flag (or equivalent for other testnets) in your launchpad commands to practice without risking real funds. Tools like the Obol Splits UI or the SSV Network Explorer provide interfaces to monitor your cluster's performance and health. Key metrics to track include attestation effectiveness, proposal success rate, and committee participation to ensure your infrastructure is performing optimally.

As you move to mainnet, formalize operational procedures. This includes establishing clear communication channels between operators, defining upgrade and key refresh policies, and setting up redundant monitoring and alerting systems. Consider using MEV-boost relays in your validator client configuration to maximize rewards. The shared infrastructure landscape is evolving rapidly, with ongoing development in areas like single-secret leader election and light client support.

To deepen your understanding, engage with the core development communities. Review the specifications for Ethereum's Distributed Key Generation (DKG) and the work of the DVT ecosystem. The Ethereum R&D Discord and repositories for Obol and SSV are excellent resources. Contributing to testnets and providing feedback on these protocols helps advance the security and decentralization of Ethereum's consensus layer.