Why Nostr? What is Njump?
2023-06-09 12:45:48
in reply to

Mats Jerratsch [ARCHIVE] on Nostr: 📅 Original date posted:2016-03-09 📝 Original message: > If A sends many HTLCs ...

📅 Original date posted:2016-03-09
📝 Original message:
> If A sends many HTLCs through B, B can simply plot what the timeouts
> are and know that A is likely originating the HTLCs rather than relaying
> them for someone else.

Hm, right. If all payments that come from A have a timeout larger than
some minimum value X, he is generating all of them and is just trying to
randomize those. However, if he creates a payment with an initial refund
value lower than X, the payment might not succeed, because the
intermediate nodes deducted too much.

However, if we take into account that the amount of nodes in the route
is not a constant, and only known to the sender, this adds another
degree of freedom to choose the initial value.


>> However, I am inclined to use those timestamps in the onion object, as
>> the described attackvector still exists.
>
> Doesn't including timestamps in the onion provide explicit information
> on the number of previous hops though?

Not if they are randomized. The initial sender will choose a good
starting value (see above), and deduct MIN_TIMEOUT * MIN_OVERLAY *
RANDOM from it. Actually it doesn't provide any additional data, as that
is the very same mechanism the intermediate hops come to that value.

--
Mats Jerratsch
Backend Engineer, Blockchain
e: mats at blockchain.com
PGP: https://pgp.mit.edu/pks/lookup?op=get&search=0x7F3EC6CA

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: OpenPGP digital signature
URL: <http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20160309/d067aae0/attachment.sig>;
Author Public Key
npub1hz386xq4qszumlx5fsxa3kuxpaf8qvfrqqjg8zdl2l892hrcg55q6q5x8w