Stefan Thomas [ARCHIVE] on Nostr: 📅 Original date posted:2011-08-04 🗒️ Summary of this message: The creation of ...
📅 Original date posted:2011-08-04
🗒️ Summary of this message: The creation of nodes/clusters accepting 10000+ incoming connections while making few outgoing connections could be an argument for double spend protection. The shortage of listeners may be due to the network consisting largely of end-users with residential type networks. In the long term, trends favor more clients allowing incoming connections. Policies to temp ban malicious nodes can be implemented.
📝 Original message:On 8/5/2011 12:18 AM, Gregory Maxwell wrote:
> Except for the fact that such a party is a DOS attack on the network
> which is already short on functioning listeners.
To the transaction radar it doesn't much matter whether its connections
are outgoing or incoming (assuming it can keep its nodes' IPs secret and
it has reasonable uptime). So you could say that this is an argument
*for* this kind of double spend protection if it means the creation of
nodes/clusters accepting 10000+ incoming connections while making few
outgoing connections. My point is, the amount of connections a node has
has nothing to do with its effect on the in/out balance.
Some words on the shortage of listeners itself:
Could this be because the network right now consists largely of end
users with residential type networks? With BitTorrent a lot of users go
through the trouble of opening up ports in their router manually in
order to get more peers and better download speeds - this is not (yet?)
a widespread practice with Bitcoin. (I know Bitcoin has UPnP support,
but I haven't found any numbers on how widely the IGD protocol is
actually deployed. Wikipedia says that "some NAT routers" support it and
that it's not an IETF standard. All routers I've actually seen in real
life had it disabled by default.)
In the long term all the trends favor more clients allowing incoming
connections: End users will tend to move towards lighter clients and the
ones that stick with full nodes will tend to configure them better -
meaning opening ports etc. - as documentation improves.
As for downright malicious nodes: It should be possible to come up with
some sensible policies to temp ban nodes that don't relay any useful
messages or try to flood you. This is an ongoing optimization problem in
any peer-to-peer network and I expect us to make progress with this over
time.
On 8/5/2011 12:16 AM, Matt Corallo wrote:
> This is exactly what I've been suggesting this whole time.
I had only seen you mention a "miner backbone" which is sort of a more
long-term vision, whereas Transaction Radar exists today. I didn't read
everything though, so if you mentioned this idea specifically, please
just consider my post as further support for your position.
Published at
2023-06-07 02:12:47Event JSON
{
"id": "b2951e4cf0bcc4357a5b15a0995e60a0dcebc370721a35420cc033a983c30e13",
"pubkey": "49f07bd32c0108a2903a0fa59f904ed312e0ea427d3269eb5fa910eb4a9e22c4",
"created_at": 1686103967,
"kind": 1,
"tags": [
[
"e",
"f7bac66510d148bc7cd5c36f79897fafe3410a2bc9df45238a65f8429b9407f0",
"",
"root"
],
[
"e",
"70bc61568d215f111ab1828b76c419bd82a18bb3bd4166b856f422ee1b832b6e",
"",
"reply"
],
[
"p",
"cd753aa8fbc112e14ffe9fe09d3630f0eff76ca68e376e004b8e77b687adddba"
]
],
"content": "📅 Original date posted:2011-08-04\n🗒️ Summary of this message: The creation of nodes/clusters accepting 10000+ incoming connections while making few outgoing connections could be an argument for double spend protection. The shortage of listeners may be due to the network consisting largely of end-users with residential type networks. In the long term, trends favor more clients allowing incoming connections. Policies to temp ban malicious nodes can be implemented.\n📝 Original message:On 8/5/2011 12:18 AM, Gregory Maxwell wrote:\n\u003e Except for the fact that such a party is a DOS attack on the network\n\u003e which is already short on functioning listeners.\n\nTo the transaction radar it doesn't much matter whether its connections \nare outgoing or incoming (assuming it can keep its nodes' IPs secret and \nit has reasonable uptime). So you could say that this is an argument \n*for* this kind of double spend protection if it means the creation of \nnodes/clusters accepting 10000+ incoming connections while making few \noutgoing connections. My point is, the amount of connections a node has \nhas nothing to do with its effect on the in/out balance.\n\nSome words on the shortage of listeners itself:\n\nCould this be because the network right now consists largely of end \nusers with residential type networks? With BitTorrent a lot of users go \nthrough the trouble of opening up ports in their router manually in \norder to get more peers and better download speeds - this is not (yet?) \na widespread practice with Bitcoin. (I know Bitcoin has UPnP support, \nbut I haven't found any numbers on how widely the IGD protocol is \nactually deployed. Wikipedia says that \"some NAT routers\" support it and \nthat it's not an IETF standard. All routers I've actually seen in real \nlife had it disabled by default.)\n\nIn the long term all the trends favor more clients allowing incoming \nconnections: End users will tend to move towards lighter clients and the \nones that stick with full nodes will tend to configure them better - \nmeaning opening ports etc. - as documentation improves.\n\nAs for downright malicious nodes: It should be possible to come up with \nsome sensible policies to temp ban nodes that don't relay any useful \nmessages or try to flood you. This is an ongoing optimization problem in \nany peer-to-peer network and I expect us to make progress with this over \ntime.\n\n\nOn 8/5/2011 12:16 AM, Matt Corallo wrote:\n\u003e This is exactly what I've been suggesting this whole time.\n\nI had only seen you mention a \"miner backbone\" which is sort of a more \nlong-term vision, whereas Transaction Radar exists today. I didn't read \neverything though, so if you mentioned this idea specifically, please \njust consider my post as further support for your position.",
"sig": "58585e357091d174fb6cedee402c4da63f78dad04beb4afa236806fe019c710e4121e1ee1ee4e2295e87b9640b05329596eca56936710ee6c003da010a193f5d"
}