Gregory Maxwell [ARCHIVE] on Nostr: 📅 Original date posted:2016-06-28 📝 Original message:On Tue, Jun 28, 2016 at ...
📅 Original date posted:2016-06-28
📝 Original message:On Tue, Jun 28, 2016 at 11:33 PM, Eric Voskuil <eric at voskuil.org> wrote:
> I don't follow this comment. The BIP aims quite clearly at "SPV" wallets as its justifying scenario.
It cites SPV as an example, doesn't mention bloom filters.. and sure--
sounds like the bip text should make the
>> Without something like BIP151 network participants cannot have privacy for the transactions they originate within the protocol against network observers.
>
> And they won't get it with BIP151 either. Being a peer is easier than observing the network.
Not passively, undetectable, and against thousands of users at once at low cost.
> If one can observe the encrypted traffic one can certainly use a timing attack to determine what the node has sent.
Not against Bitcoin Core, transactions are batched and relayed in
sorted order. (obviously there are limits at what this provides;
ironically, the lack of link encryption has been used to argue against
privacy preserving relay behavior)
>> Even if, through some extraordinary effort, their own first hop is encrypted, unencrypted later hops would rapidly
>> expose significant information about transaction origins in the network.
>
> As will remain the case until all connections are encrypted and authenticated, and all participants are known to be good guys. Starting to sound like PKI?
Huh? The first and subsequent hops obscures the origin and timing.
>> Without something like BIP151 authenticated links are not possible, so
>> manually curated links (addnode/connect) cannot be counted on to provide protection against partitioning sybils.
>
> If we trust the manual links we don't need/want the other links. In fact retaining the other links enables the attack you described above. Of course there is no need to worry about Sybil attacks when all of your peers are authenticated. But again, let us not ignore the problems of requiring all peers on the network be authenticated.
Don't need and want them for what? For _partitioning_ resistance,
you are not partitioned if you have one honest connection to the
functional network. Additional peers purely reduce your partition
vulnerability-- so long as an active network attacker isn't
itercepting all your connections out.
For privacy, you have improve transaction privacy so long as your
transaction isn't initially relayed to a malicious peer-- but
malicious peers can lie further out because transit nodes obscure the
order of message creation. Bitcoin Core currently relays transactions
first and more frequently to outbound and whitelisted peers.
> Maybe I was insufficiently explicit. By "relies on identity" I meant that the BIP is not effective without it. I did not mean to imply that the BIP itself implements an identity scheme. I thought this was clear from the context.
I understood that, but my point was that Bitcoin cannot be used at
all_unless users have secure communication channels to share
addresses.
> then there is no reason to expect any effective improvement, since nodes will necessarily have to connect with anonymous peers.
They're not required to _only_ connect with anonymous peers. And
partition resistance requires that you have any one good link.
> Anyone with a node and the ability to monitor traffic should remain very effective.
Not via passive observation.
> Defining an auth implementation is not a hard problem, nor is it the concern I have raised.
Glad you agree.
We seem to be looping now. Feel free to not implement this proposal,
no one suggests making it mandatory.
Published at
2023-06-07 17:51:46Event JSON
{
"id": "6713a11ec068e651480b28c722f5654ffc0a5ee19b711cabb53efd32f64afc1b",
"pubkey": "4aa6cf9aa5c8e98f401dac603c6a10207509b6a07317676e9d6615f3d7103d73",
"created_at": 1686160306,
"kind": 1,
"tags": [
[
"e",
"d0e8bb25d553b30c0cc0d96d85855c267cf10b5981dd5042024df41c59046cbd",
"",
"root"
],
[
"e",
"3f350f121e83419042316dedd9691b7543172ed4ecb19e0bd49920957e097f0f",
"",
"reply"
],
[
"p",
"82205f272f995d9be742779a3c19a2ae08522ca14824c3a3b01525fb5459161e"
]
],
"content": "📅 Original date posted:2016-06-28\n📝 Original message:On Tue, Jun 28, 2016 at 11:33 PM, Eric Voskuil \u003ceric at voskuil.org\u003e wrote:\n\u003e I don't follow this comment. The BIP aims quite clearly at \"SPV\" wallets as its justifying scenario.\n\nIt cites SPV as an example, doesn't mention bloom filters.. and sure--\nsounds like the bip text should make the\n\n\u003e\u003e Without something like BIP151 network participants cannot have privacy for the transactions they originate within the protocol against network observers.\n\u003e\n\u003e And they won't get it with BIP151 either. Being a peer is easier than observing the network.\n\nNot passively, undetectable, and against thousands of users at once at low cost.\n\n\u003e If one can observe the encrypted traffic one can certainly use a timing attack to determine what the node has sent.\n\nNot against Bitcoin Core, transactions are batched and relayed in\nsorted order. (obviously there are limits at what this provides;\nironically, the lack of link encryption has been used to argue against\nprivacy preserving relay behavior)\n\n\u003e\u003e Even if, through some extraordinary effort, their own first hop is encrypted, unencrypted later hops would rapidly\n\u003e\u003e expose significant information about transaction origins in the network.\n\u003e\n\u003e As will remain the case until all connections are encrypted and authenticated, and all participants are known to be good guys. Starting to sound like PKI?\n\nHuh? The first and subsequent hops obscures the origin and timing.\n\n\u003e\u003e Without something like BIP151 authenticated links are not possible, so\n\u003e\u003e manually curated links (addnode/connect) cannot be counted on to provide protection against partitioning sybils.\n\u003e\n\u003e If we trust the manual links we don't need/want the other links. In fact retaining the other links enables the attack you described above. Of course there is no need to worry about Sybil attacks when all of your peers are authenticated. But again, let us not ignore the problems of requiring all peers on the network be authenticated.\n\nDon't need and want them for what? For _partitioning_ resistance,\nyou are not partitioned if you have one honest connection to the\nfunctional network. Additional peers purely reduce your partition\nvulnerability-- so long as an active network attacker isn't\nitercepting all your connections out.\n\nFor privacy, you have improve transaction privacy so long as your\ntransaction isn't initially relayed to a malicious peer-- but\nmalicious peers can lie further out because transit nodes obscure the\norder of message creation. Bitcoin Core currently relays transactions\nfirst and more frequently to outbound and whitelisted peers.\n\n\u003e Maybe I was insufficiently explicit. By \"relies on identity\" I meant that the BIP is not effective without it. I did not mean to imply that the BIP itself implements an identity scheme. I thought this was clear from the context.\n\nI understood that, but my point was that Bitcoin cannot be used at\nall_unless users have secure communication channels to share\naddresses.\n\n\u003e then there is no reason to expect any effective improvement, since nodes will necessarily have to connect with anonymous peers.\n\nThey're not required to _only_ connect with anonymous peers. And\npartition resistance requires that you have any one good link.\n\n\u003e Anyone with a node and the ability to monitor traffic should remain very effective.\n\nNot via passive observation.\n\n\u003e Defining an auth implementation is not a hard problem, nor is it the concern I have raised.\n\nGlad you agree.\n\nWe seem to be looping now. Feel free to not implement this proposal,\nno one suggests making it mandatory.",
"sig": "ddb8af198bbe30dfebc1c1c9e6b91d1dabcad7280ba540a2e0af5c114fc65f2dfbdc3584dea0849d2adf6dc7a3c64f80b2cd2a6ab0daf2013d1cbf20b9778a3b"
}