Why Nostr? What is Njump?
2023-06-09 12:58:43
in reply to

ZmnSCPxj [ARCHIVE] on Nostr: šŸ“… Original date posted:2020-02-11 šŸ“ Original message: Good morning darosior, ...

šŸ“… Original date posted:2020-02-11
šŸ“ Original message:
Good morning darosior, niftynei, and list,


>
> We could agree on an acceptable number of reuse in case on a non-malicious failure from the initiator after a valid PoDLE exchange ? (credits ZmnSCPxj)

The default of 3 for JoinMarket seems reasonable.


>
> Ok, so knowing where PoDLE originate from mitigates the flood we talked about with ZmnSCPxj.
> However I don't see how the number of utxos in the mempool is useful here, as you cannot distinguish which PoDLE is the real one out of the load you are receiving in case of a flood ?

No idea either, but if we limit accepted `node_id`s to those that we have seen in a `node_announcement` before, then we ride on the fact that `node_announcement` is costly in the sense that somebody has to allocate at least some small amount of funds to a channel that is visible onchain, because `node_announcement` requires a `channel_announcement` with an anchored channel.

Then if nodes on the network can just send PoDLE gossip that they did not sign themselves, but are signed by *some* node that was `node_announcement`ed before, we can identify those nodes that are spamming a lot of their own signed PoDLE gossip, and rate-limit those.

It is likely that announced nodes are the ones who will have such attack attempts performed on them, so they are in the best position to inform others of such attempts and are the most likely to have such data.

At some point we probably also need to have set reconciliation for these as well.

Regards,
ZmnSCPxj
Author Public Key
npub1g5zswf6y48f7fy90jf3tlcuwdmjn8znhzaa4vkmtxaeskca8hpss23ms3l