Gavin Andresen [ARCHIVE] on Nostr: 📅 Original date posted:2012-01-31 📝 Original message:> Cool design. It seems ...
📅 Original date posted:2012-01-31
📝 Original message:> Cool design. It seems resilient to many attacks. A Sybil attack
> coming from a large botnet (which controls addresses in many ranges)
> can still fill all buckets in both tables, I think. As far as I can
> tell, that wasn't possible with the old design.
Given the randomness in Pieter's design, that seems extremely unlikely
/ difficult to do. Is it possible to do a back-of-the-envelope
calculation to figure out what percentage of nodes on the network an
attacker would have to control to have a (say) 1% chance of a
successful Sybil attack?
I like this change; I'd like to pull it for the 0.6 release.
I've also been wondering if it is time to remove the IRC bootstrapping
mechanism; it would remove a fair bit of code and we'd stop getting
reports that various ISPs tag bitcoin as malware. When testing the
list of built-in bootstrapping IP addresses I always connect fairly
quickly, and the DNS seeding hosts seems to be working nicely, too.
--
--
Gavin Andresen
Published at
2023-06-07 03:00:33Event JSON
{
"id": "6ab4e0ba027d74a5cf9526c1c0a08d319e68688bbe2650fe81bd4ff0bf025290",
"pubkey": "857f2f78dc1639e711f5ea703a9fc978e22ebd279abdea1861b7daa833512ee4",
"created_at": 1686106833,
"kind": 1,
"tags": [
[
"e",
"c8cd18df3a4b91b5c814c19333fbefa9dd94a17bd1f2c1fb3e3d7e42339f0dfd",
"",
"root"
],
[
"e",
"04b4fce8736f45bfc0eb6dc8049aaf0ce77735204ec4aae675088835b341bc8f",
"",
"reply"
],
[
"p",
"3415c93783a275488e5c6b38892170eaef07d76147cfa1af131b95577b903df7"
]
],
"content": "📅 Original date posted:2012-01-31\n📝 Original message:\u003e Cool design. It seems resilient to many attacks. A Sybil attack\n\u003e coming from a large botnet (which controls addresses in many ranges)\n\u003e can still fill all buckets in both tables, I think. As far as I can\n\u003e tell, that wasn't possible with the old design.\n\nGiven the randomness in Pieter's design, that seems extremely unlikely\n/ difficult to do. Is it possible to do a back-of-the-envelope\ncalculation to figure out what percentage of nodes on the network an\nattacker would have to control to have a (say) 1% chance of a\nsuccessful Sybil attack?\n\nI like this change; I'd like to pull it for the 0.6 release.\n\nI've also been wondering if it is time to remove the IRC bootstrapping\nmechanism; it would remove a fair bit of code and we'd stop getting\nreports that various ISPs tag bitcoin as malware. When testing the\nlist of built-in bootstrapping IP addresses I always connect fairly\nquickly, and the DNS seeding hosts seems to be working nicely, too.\n\n-- \n--\nGavin Andresen",
"sig": "9f9a0c14dcf4261372f9fc458335d3b05776e8064e0bc1c585ba3901a9cb661ea4762bdf15c7a2a3e5d2bcc32d08d96b4f7739c0683bb78129eb1990362492fb"
}