Jeremy Spilman [ARCHIVE] on Nostr: 📅 Original date posted:2013-12-24 📝 Original message:Some really nice efforts ...
📅 Original date posted:2013-12-24
📝 Original message:Some really nice efforts out there to map and analyze the bitcoin P2P
network.
The current protocol apparently recommends returning up to 2500 addresses
from 'getaddr'. I'm not sure how much clients are expected to probe the
address space in order to select 'far-apart' peers, or how much such an
process would even attempt to achieve.
How much does it matter if the ability to discover the entire network of
peers is fast or slow? There are probably pros and cons to both.
Is there any thought to how existing bitcoin node relations, and the ease
at which peers can be discovered, becomes a service in itself, or even
possibly a vulnerability?
Are there any past instances of applications hijacking or interfacing with
the exiting p2p messages, or abusing 'getaddr' functionality? Are there
any guidelines on this, or should there be?
Published at
2023-06-07 15:11:05Event JSON
{
"id": "b915b2b3450b83198e1b2076a256958521f13fa5c8bd02a67ce7b3fd1b6d0b52",
"pubkey": "7e57666cff7c86f9410d33d4d34ef3e5105395b3c74af472541dbeeb743f9de3",
"created_at": 1686150665,
"kind": 1,
"tags": [
[
"e",
"ce8ff211361e93b11853b41817b7eaefa29d734689e875bf1be51c54a8edc158",
"",
"reply"
],
[
"p",
"a23dbf6c6cc83e14cc3df4e56cc71845f611908084cfe620e83e40c06ccdd3d0"
]
],
"content": "📅 Original date posted:2013-12-24\n📝 Original message:Some really nice efforts out there to map and analyze the bitcoin P2P \nnetwork.\n\nThe current protocol apparently recommends returning up to 2500 addresses \n from 'getaddr'. I'm not sure how much clients are expected to probe the \naddress space in order to select 'far-apart' peers, or how much such an \nprocess would even attempt to achieve.\n\nHow much does it matter if the ability to discover the entire network of \npeers is fast or slow? There are probably pros and cons to both.\n\nIs there any thought to how existing bitcoin node relations, and the ease \nat which peers can be discovered, becomes a service in itself, or even \npossibly a vulnerability?\n\nAre there any past instances of applications hijacking or interfacing with \nthe exiting p2p messages, or abusing 'getaddr' functionality? Are there \nany guidelines on this, or should there be?",
"sig": "24b9bdfc7d5edf3a09ae41552b3736dd1ed9058b11b950e6c6dd77ad03b7a1e6f16ce1660e4afa602473fe13bc5aeb9a45118ee883e3912b902817f9a8b78b38"
}