Karl Johan Alm [ARCHIVE] on Nostr: 📅 Original date posted:2017-09-12 📝 Original message:On Wed, Sep 13, 2017 at ...
📅 Original date posted:2017-09-12
📝 Original message:On Wed, Sep 13, 2017 at 4:57 AM, Mark Friedenbach via bitcoin-dev
<bitcoin-dev at lists.linuxfoundation.org> wrote:
>> Without the limit I think we would be DoS-ed to dead
>
> 4MB of secp256k1 signatures takes 10s to validate on my 5 year old
> laptop (125,000 signatures, ignoring public keys and other things that
> would consume space). That's much less than bad blocks that can be
> constructed using other vulnerabilities.
Sidenote-ish, but I also believe it would be fairly trivial to keep a
per UTXO tally and demand additional fees when trying to respend a
UTXO which was previously "spent" with an invalid op count. I.e. if
you sign off on an input for a tx that you know is bad, the UTXO in
question will be penalized proportionately to the wasted ops when
included in another transaction later. That would probably kill that
DoS attack as the attacker would effectively lose bitcoin every time,
even if it was postponed until they spent the UTXO. The only thing
clients would need to do is to add a fee rate penalty ivar and a
mapping of outpoint to penalty value, probably stored as a separate
.dat file. I think.
Published at
2023-06-07 18:05:36Event JSON
{
"id": "ef8e873f31e3a1ab6f9b0f970035c6a4b0789cc42e335cf784678864753c7fae",
"pubkey": "cf98d015f410ea690e93370543fcb2c3129303ca3921fd6d463206f557722518",
"created_at": 1686161136,
"kind": 1,
"tags": [
[
"e",
"0d97933d6393537f8afa1f55574e0ec2278e08b49a828e8a6bf1f6fff59c2613",
"",
"root"
],
[
"e",
"44552af96d1ab4faf2bc2777f22ba0f0fbddfe1a3420ef5736802d2b93cb7145",
"",
"reply"
],
[
"p",
"1c61d995949cbfaf14f767784e166bde865c7b8783d7aa3bf0a1d014b70c0069"
]
],
"content": "📅 Original date posted:2017-09-12\n📝 Original message:On Wed, Sep 13, 2017 at 4:57 AM, Mark Friedenbach via bitcoin-dev\n\u003cbitcoin-dev at lists.linuxfoundation.org\u003e wrote:\n\u003e\u003e Without the limit I think we would be DoS-ed to dead\n\u003e\n\u003e 4MB of secp256k1 signatures takes 10s to validate on my 5 year old\n\u003e laptop (125,000 signatures, ignoring public keys and other things that\n\u003e would consume space). That's much less than bad blocks that can be\n\u003e constructed using other vulnerabilities.\n\nSidenote-ish, but I also believe it would be fairly trivial to keep a\nper UTXO tally and demand additional fees when trying to respend a\nUTXO which was previously \"spent\" with an invalid op count. I.e. if\nyou sign off on an input for a tx that you know is bad, the UTXO in\nquestion will be penalized proportionately to the wasted ops when\nincluded in another transaction later. That would probably kill that\nDoS attack as the attacker would effectively lose bitcoin every time,\neven if it was postponed until they spent the UTXO. The only thing\nclients would need to do is to add a fee rate penalty ivar and a\nmapping of outpoint to penalty value, probably stored as a separate\n.dat file. I think.",
"sig": "45739e7af2184ec37e415f516f75960402360ef3221da38b8155851fd82cf6142266b0e68975c40bd4079c01f2fd1042369fd466bef44250a623fa9f2b064ef4"
}