Mike Hearn [ARCHIVE] on Nostr: 📅 Original date posted:2014-08-20 📝 Original message:> > Misbehaving addresses ...
📅 Original date posted:2014-08-20
📝 Original message:>
> Misbehaving addresses can have their connecting difficulty
> scaled up, which should make it uneconomic to try to DoS the usage of
> Tor exit nodes for connecting to Bitcoin.
>
You can't solve DoS by requiring all clients to do complicated work, all
that means is that weak clients (like users mobile phones and tablets) are
successfully DoSd whereas the attackers botnet of stolen computers sit
there solving PoWs.
The correct way to solve DoS is by having work prioritisation and queueing
mechanisms, then finding ways to distinguish "good" clients from "bad"
clients. Doing this whilst preserving privacy is hard. Long term the only
way to solve it may be to require clients to present some kind of cookie
during resource exhaustion events that prove they've been around for a
while, thus allowing them to jump the queue.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140820/20558085/attachment.html>
Published at
2023-06-07 15:25:15Event JSON
{
"id": "76ed2163545b4897444599315f9919a4e405ce4888abfc40f09318d87a5aa050",
"pubkey": "f2c95df3766562e3b96b79a0254881c59e8639f23987846961cf55412a77f6f2",
"created_at": 1686151515,
"kind": 1,
"tags": [
[
"e",
"80a757e3b2f1d86d813e0717a90fbda7728e80e8101fee5dfa8c6e0ee512c624",
"",
"root"
],
[
"e",
"a5b409e12418bcc3ca5860a3eb44e46d42d57940f17757fd711d4ef75176d93a",
"",
"reply"
],
[
"p",
"70950d9ef527ee56cd47d1cec909c3ddfa69de32fbea13cad10641ee6dc93e39"
]
],
"content": "📅 Original date posted:2014-08-20\n📝 Original message:\u003e\n\u003e Misbehaving addresses can have their connecting difficulty\n\u003e scaled up, which should make it uneconomic to try to DoS the usage of\n\u003e Tor exit nodes for connecting to Bitcoin.\n\u003e\n\nYou can't solve DoS by requiring all clients to do complicated work, all\nthat means is that weak clients (like users mobile phones and tablets) are\nsuccessfully DoSd whereas the attackers botnet of stolen computers sit\nthere solving PoWs.\n\nThe correct way to solve DoS is by having work prioritisation and queueing\nmechanisms, then finding ways to distinguish \"good\" clients from \"bad\"\nclients. Doing this whilst preserving privacy is hard. Long term the only\nway to solve it may be to require clients to present some kind of cookie\nduring resource exhaustion events that prove they've been around for a\nwhile, thus allowing them to jump the queue.\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140820/20558085/attachment.html\u003e",
"sig": "636e635f61b46c500cece6a5a6d9f7642a6dcf59018bdcd38478bbc3ab0d7844452d144a285269edcda1b2fd08b6588fe6ce7fc2f189e2fd2f8e5f5287d9e2be"
}