Chris Gough [ARCHIVE] on Nostr: 📅 Original date posted:2018-05-10 📝 Original message: On Fri, May 11, 2018 at ...
📅 Original date posted:2018-05-10
📝 Original message:
On Fri, May 11, 2018 at 9:18 AM, Jim Posen <jim.posen at gmail.com> wrote:
> Hmm, I'm not quite following the situation. What do you mean by "directs
> normal traffic"? Since the sender constructs the entire circuit, routing
> nodes do not get any discretion over which nodes to forward a payment to,
<facepalm>
> only whether to forward or fail. What an attacker could do is perform a loop
> attack and send a payment to another node that they control and delay the
> payment on the receiving end. Note that the sending node loses no
> reputation, only the receiving node. Since the hops being attacked are the
> ones in the middle and they are faithfully enforcing the reputation
> protocol, the receiving node's reputation should be penalized properly,
> making it unlikely the attack will succeed in a second attempt.
So the attacker can purchase reputation for the sacrificial node by
sending them legitimate payments, and then spend that reputation (at
the mutual expense of hops) by delaying targeted transactions. But my
question about obscuring the collusion by artificially lowering
reported risk was nonsense based on misunderstanding. Thanks for
helping me understand.
Chris Gough
Published at
2023-06-09 12:50:27Event JSON
{
"id": "a433365079273a3a6028418fe8d6d8ea605c7521d8bf0c2a6be0731cc2feb6ee",
"pubkey": "7dcf0ab721a725c5b60ca861acc882015ece95fd6c708f72074e2ff1c968f91e",
"created_at": 1686315027,
"kind": 1,
"tags": [
[
"e",
"ec647d42dc739e5a708f79cd6e7400519e655a3f7062723c1ca708888c19c0eb",
"",
"root"
],
[
"e",
"996ac196c71569e33f7d8a6ff6ad2b95e6ded7bf0b936f96412e2222bc076274",
"",
"reply"
],
[
"p",
"9e2723f47c6c16d3093735bd6acdc8b0dd1b91c78216f7001bdd2f7562b69ed1"
]
],
"content": "📅 Original date posted:2018-05-10\n📝 Original message:\nOn Fri, May 11, 2018 at 9:18 AM, Jim Posen \u003cjim.posen at gmail.com\u003e wrote:\n\u003e Hmm, I'm not quite following the situation. What do you mean by \"directs\n\u003e normal traffic\"? Since the sender constructs the entire circuit, routing\n\u003e nodes do not get any discretion over which nodes to forward a payment to,\n\n\u003cfacepalm\u003e\n\n\u003e only whether to forward or fail. What an attacker could do is perform a loop\n\u003e attack and send a payment to another node that they control and delay the\n\u003e payment on the receiving end. Note that the sending node loses no\n\u003e reputation, only the receiving node. Since the hops being attacked are the\n\u003e ones in the middle and they are faithfully enforcing the reputation\n\u003e protocol, the receiving node's reputation should be penalized properly,\n\u003e making it unlikely the attack will succeed in a second attempt.\n\nSo the attacker can purchase reputation for the sacrificial node by\nsending them legitimate payments, and then spend that reputation (at\nthe mutual expense of hops) by delaying targeted transactions. But my\nquestion about obscuring the collusion by artificially lowering\nreported risk was nonsense based on misunderstanding. Thanks for\nhelping me understand.\n\nChris Gough",
"sig": "21ab695c6038ca7d0ee8b4ad0bfb9168f461014bd2dd3a414632ae93a928b6d2df918bb04bdfd9d8875c2d86490b3f2ce11fc0c5a466d5f24a1ff030f6469b39"
}