Aaron Voisine [ARCHIVE] on Nostr: ๐
Original date posted:2014-09-25 ๐ Original message:Of course you wouldn't ...
๐
Original date posted:2014-09-25
๐ Original message:Of course you wouldn't want nodes to propagate alerts without
independently verifying them, otherwise anyone could just issue alerts
for every new transaction.
Aaron Voisine
breadwallet.com
On Thu, Sep 25, 2014 at 7:16 PM, Matt Whitlock <bip at mattwhitlock.name> wrote:
> Probably the first double-spend attempt (i.e., the second transaction to spend the same output(s) as another tx already in the mempool) would still need to be relayed. A simple "double-spend alert" wouldn't work because it could be forged. But after there have been two attempts to spend the same output, no further transactions spending that same output should be relayed, in order to prevent flooding the network.
>
>
> On Thursday, 25 September 2014, at 7:12 pm, Aaron Voisine wrote:
>> Something like that would be a great help for SPV clients that can't
>> detect double spends on their own. (still limited of course to sybil
>> attack concerns)
>>
>> Aaron Voisine
>> breadwallet.com
>>
>>
>> On Thu, Sep 25, 2014 at 7:07 PM, Matt Whitlock <bip at mattwhitlock.name> wrote:
>> > What's to stop an attacker from broadcasting millions of spends of the same output(s) and overwhelming nodes with slower connections? Might it be a better strategy not to relay the actual transactions (after the first) but rather only propagate (once) some kind of double-spend alert?
>> >
>> >
>> > On Thursday, 25 September 2014, at 7:02 pm, Aaron Voisine wrote:
>> >> There was some discussion of having nodes relay double-spends in order
>> >> to alert the network about double spend attempts.
>> >>
>> >> A lot more users will be using SPV wallets in the future, and one of
>> >> the techniques SPV clients use to judge how likely a transaction is to
>> >> be confirmed is if it propagates across the network. I wonder if and
>> >> when double-spend relaying is introduced, if nodes should also send
>> >> BIP61 reject messages or something along those lines to indicate which
>> >> transactions those nodes believe to be invalid, but are relaying
>> >> anyway.
>> >>
>> >> This would be subject to sybil attacks, as is monitoring propagation,
>> >> however it does still increase the cost of performing a 0 confirmation
>> >> double spend attack on an SPV client above just relaying double-spends
>> >> without indicating if a node believes the transaction to be valid.
>> >>
>> >> Aaron Voisine
>> >> breadwallet.com
>> >
Published at
2023-06-07 15:25:58Event JSON
{
"id": "5146cb0a136ffa315710192c458cf6e1e44b18539f96a1f4e2cb46ccdf700857",
"pubkey": "3a24ce2145c5488aebfb0fc113e7d44234e9d3733afa45e2d880eb259c3eade3",
"created_at": 1686151558,
"kind": 1,
"tags": [
[
"e",
"4f9ac54bd6567a8c3e1bbdc8600514d9552b8a33dc3e70bf70216815782b2480",
"",
"root"
],
[
"e",
"0b404fbc8a5fc859845c72268188f2b318a2e3eb75fbdd1d2f9b0c8a095e2c0b",
"",
"reply"
],
[
"p",
"f00d0858b09287e941ccbc491567cc70bdbc62d714628b167c1b76e7fef04d91"
]
],
"content": "๐
Original date posted:2014-09-25\n๐ Original message:Of course you wouldn't want nodes to propagate alerts without\nindependently verifying them, otherwise anyone could just issue alerts\nfor every new transaction.\n\nAaron Voisine\nbreadwallet.com\n\n\nOn Thu, Sep 25, 2014 at 7:16 PM, Matt Whitlock \u003cbip at mattwhitlock.name\u003e wrote:\n\u003e Probably the first double-spend attempt (i.e., the second transaction to spend the same output(s) as another tx already in the mempool) would still need to be relayed. A simple \"double-spend alert\" wouldn't work because it could be forged. But after there have been two attempts to spend the same output, no further transactions spending that same output should be relayed, in order to prevent flooding the network.\n\u003e\n\u003e\n\u003e On Thursday, 25 September 2014, at 7:12 pm, Aaron Voisine wrote:\n\u003e\u003e Something like that would be a great help for SPV clients that can't\n\u003e\u003e detect double spends on their own. (still limited of course to sybil\n\u003e\u003e attack concerns)\n\u003e\u003e\n\u003e\u003e Aaron Voisine\n\u003e\u003e breadwallet.com\n\u003e\u003e\n\u003e\u003e\n\u003e\u003e On Thu, Sep 25, 2014 at 7:07 PM, Matt Whitlock \u003cbip at mattwhitlock.name\u003e wrote:\n\u003e\u003e \u003e What's to stop an attacker from broadcasting millions of spends of the same output(s) and overwhelming nodes with slower connections? Might it be a better strategy not to relay the actual transactions (after the first) but rather only propagate (once) some kind of double-spend alert?\n\u003e\u003e \u003e\n\u003e\u003e \u003e\n\u003e\u003e \u003e On Thursday, 25 September 2014, at 7:02 pm, Aaron Voisine wrote:\n\u003e\u003e \u003e\u003e There was some discussion of having nodes relay double-spends in order\n\u003e\u003e \u003e\u003e to alert the network about double spend attempts.\n\u003e\u003e \u003e\u003e\n\u003e\u003e \u003e\u003e A lot more users will be using SPV wallets in the future, and one of\n\u003e\u003e \u003e\u003e the techniques SPV clients use to judge how likely a transaction is to\n\u003e\u003e \u003e\u003e be confirmed is if it propagates across the network. I wonder if and\n\u003e\u003e \u003e\u003e when double-spend relaying is introduced, if nodes should also send\n\u003e\u003e \u003e\u003e BIP61 reject messages or something along those lines to indicate which\n\u003e\u003e \u003e\u003e transactions those nodes believe to be invalid, but are relaying\n\u003e\u003e \u003e\u003e anyway.\n\u003e\u003e \u003e\u003e\n\u003e\u003e \u003e\u003e This would be subject to sybil attacks, as is monitoring propagation,\n\u003e\u003e \u003e\u003e however it does still increase the cost of performing a 0 confirmation\n\u003e\u003e \u003e\u003e double spend attack on an SPV client above just relaying double-spends\n\u003e\u003e \u003e\u003e without indicating if a node believes the transaction to be valid.\n\u003e\u003e \u003e\u003e\n\u003e\u003e \u003e\u003e Aaron Voisine\n\u003e\u003e \u003e\u003e breadwallet.com\n\u003e\u003e \u003e",
"sig": "b25953c6f865771ba3d2096874c897236c6ad78729c8079e217dd4f1f5460c53a268a1f23afa8159e26e6c7491c3115b063cbcc2b14dbd0b61c660cfb73feaab"
}