Return-Path: Received: from smtp4.osuosl.org (smtp4.osuosl.org [140.211.166.137]) by lists.linuxfoundation.org (Postfix) with ESMTP id A011CC0037 for ; Thu, 21 Dec 2023 21:59:18 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp4.osuosl.org (Postfix) with ESMTP id 74299402D1 for ; Thu, 21 Dec 2023 21:59:18 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org 74299402D1 Authentication-Results: smtp4.osuosl.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20230601 header.b=l71ACqTt X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -2.098 X-Spam-Level: X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from smtp4.osuosl.org ([127.0.0.1]) by localhost (smtp4.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I_xmC8UTD5sz for ; Thu, 21 Dec 2023 21:59:16 +0000 (UTC) Received: from mail-io1-xd35.google.com (mail-io1-xd35.google.com [IPv6:2607:f8b0:4864:20::d35]) by smtp4.osuosl.org (Postfix) with ESMTPS id 67ED6402AB for ; Thu, 21 Dec 2023 21:59:16 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp4.osuosl.org 67ED6402AB Received: by mail-io1-xd35.google.com with SMTP id ca18e2360f4ac-7b7a9f90f34so64615139f.2 for ; Thu, 21 Dec 2023 13:59:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1703195955; x=1703800755; darn=lists.linuxfoundation.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=8qlYX/qKQFBjFJm6pAm7v+4aOErPyinYvLD9of1PLZ4=; b=l71ACqTt7MhUJD4T64EPWis9hfeVoa5Q/pz099IUZEYqUJTgzKY16YJGDH7ub4PZmo tG9FnuzIAblZofLljkAu1Sa/YKl+8IJyWb7mqzQj0q5Mhp4JXBInIXLRPMJvd4vwwi5w /7JJI0/Bkwu0rreQTrw2croRkCfmlbQbWwlk7CXFtg+Qmp8G884dbjpxVYDB2FTPfWH4 jWh7GAuBr0Z8DC/rBzVRhe6GQg4YD4Ayjm7NSRypdQdTPitWddpCjLGLMv8q18jHAkO+ hBFNYNw6F5wBv8S8PZOyioD5nTJeBHRqP4sK1pkCoIBdO+1ArTeR36dCJWxuocgn3CpU 6djw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1703195955; x=1703800755; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=8qlYX/qKQFBjFJm6pAm7v+4aOErPyinYvLD9of1PLZ4=; b=p1ujxjgxmlo4XyIp5Z9VQN86s9ToAfOORjrmjkd9567gf+ttd11uCOGOzxCGk+0nVo zGk7AYIk/1inHBks1UeHV3M423gQduncOu76RqR5XPi6ejK84XXHqETodrazkrJK2hxi LG/dkKN/onvwrqQLItD7oXru0aKPrBh1BsqfPgRWpuYyGVXDfUSICuuCTfp0NtdMFQiS XMhGIj3IA9B3yEuRCtOguackzFOMEcttJGqhde9XQFsh0FmVAvLjzvCAVRjl88cCuHV3 EPyJPnvAN0CZfP0dNuWsOMNIFL29sdcR4huY6zQZDbJe7FoI3mN6Ht3xE39lPHWic33S nDKQ== X-Gm-Message-State: AOJu0YzYmW8TEsD1te7ZhEpnMB6Jfw7oDUXRmziqOpbbo4J1eQzPVKLx EP0Cibyrw4JEbnsLNa11dFwg6jJqk6SYdoaeG5E= X-Google-Smtp-Source: AGHT+IE9TAmIhBGk6M5ScfYTC2J63V0Dly8CJLc7Ad0LMkQu2+mF+lxJ49ocX5kYCrO/Ffdj/XVgh1PSBQakvJifuxI= X-Received: by 2002:a05:6602:1218:b0:7b7:6f6e:adda with SMTP id y24-20020a056602121800b007b76f6eaddamr395131iot.14.1703195955283; Thu, 21 Dec 2023 13:59:15 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Antoine Riard Date: Thu, 21 Dec 2023 21:59:04 +0000 Message-ID: To: Peter Todd Content-Type: multipart/alternative; boundary="000000000000e5cdc5060d0c3545" X-Mailman-Approved-At: Fri, 22 Dec 2023 01:02:15 +0000 Cc: Bitcoin Protocol Discussion Subject: Re: [bitcoin-dev] Altruistic Rebroadcasting - A Partial Replacement Cycling Mitigation X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Dec 2023 21:59:18 -0000 --000000000000e5cdc5060d0c3545 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi Peter, > Obviously a local replacement cache is a possibility. The whole point of my > email is to show that a local replacement cache isn't necessarily needed, as > any alturistic party can implement that cache for all nodes. Sure, note as soon as you start to introduce an altruistic party rebroadcasting for everyone in the network, we're talking about a different security model for time-sensitive second-layers. And unfortunately, one can expect the same dynamics we're seeing with BIP157 filter servers, a handful of altruistic nodes for a large swarm of clients. > 1) That is trivially avoided by only broadcasting txs that meet the local > mempool min fee, plus some buffer. There's no point to broadcasting txs that > aren't going to get mined any time soon. > > 2) BIP-133 feefilter avoids this as well, as Bitcoin Core uses the feefilter > P2P message to tell peers not to send transactions below a threshold fee rate. > > https://github.com/bitcoin/bips/blob/master/bip-0133.mediawiki I know we can introduce BIP-133 style of filtering here only the top % of the block template is altruistically rebroadcast. I still think this is an open question how a second-layer node would discover the "global" mempool min fee, and note an adversary might inflate the top % of block template to prevent rebroadcast of malicious HTLC-preimage. > Did you actually read my email? I worked out the budget required in a > reasonable worst case scenario: Yes. I think my uncertainty lies in the fact that an adversary can rebroadcast _multiple_ times the same UTXO amount under different txids, occupying all your altruistic bandwidth. Your economic estimation makes an assumption per-block (i.e 3.125 BTC / 10 minutes). Where it might be pernicious is that an adversary should be able to reuse those 3.125 BTC of value for each inter-block time. Of course, you can introduce an additional rate-limitation per-UTXO, though I think this is very unsure how this rate-limit would not introduce a new pinning vector for "honest" counterparty transaction. > Here, we're talking about an attacker that has financial resources high enough > to possibly do 51% attacks. And even in that scenario, storing the entire > replacement database in RAM costs under $1000 > The reality is such an attack would probably be limited by P2P bandwidth, not > financial resources, as 2MB/s of tx traffic would likely leave mempools in an > somewhat inconsistent state across the network due to bandwidth limitations. > And that is *regardless* of whether or not anyone implements alturistic t= x > broadcasting. Sure, I think we considered bandwidth limitations in the design of the package relay. Though see my point above, the real difficulty in your proposed design sounds to me in the ability to reuse the same UTXO liquidity for an unbounded number of concurrent replacement transactions exhausting all the altruistic bandwidth. One can just use a 0.1 BTC UTXO and just fan-out 3.125 BTC of concurrent replacement transactions from then. So I don't think the assumed adversary financial resources are accurate. I think the best long-term way to fix replacement cycling is still more in the direction of things like: https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-December/02219= 1.html With the additional constraint of removing package malleability, where all the feerate is coming from package self-contained fee-bumping reserves UTXOs. Best, Antoine Le dim. 17 d=C3=A9c. 2023 =C3=A0 10:57, Peter Todd a = =C3=A9crit : > On Fri, Dec 15, 2023 at 10:29:22PM +0000, Antoine Riard wrote: > > Hi Peter, > > > > > Altruistic third parties can partially mitigate replacement cycling(1= ) > > attacks > > > by simply rebroadcasting the replaced transactions once the replaceme= nt > > cycle > > > completes. Since the replaced transaction is in fact fully valid, and > the > > > "cost" of broadcasting it has been paid by the replacement > transactions, > > it can > > > be rebroadcast by anyone at all, and will propagate in a similar way = to > > when it > > > was initially propagated. Actually implementing this simply requires > code > > to be > > > written to keep track of all replaced transactions, and detect > > opportunities to > > > rebroadcast transactions that have since become valid again. Since an= y > > > interested third party can do this, the memory/disk space requirement= s > of > > > keeping track of these replacements aren't important; normal nodes ca= n > > continue > > > to operate exactly as they have before. > > > > I think there is an alternative to altruistic and periodic rebroadcasti= ng > > still solving replacement cycling at the transaction-relay level, namel= y > > introducing a local replacement cache. > > > > https://github.com/bitcoin/bitcoin/issues/28699 > > > > One would keep in bounded memory a list of all seen transactions, which > > have entered our mempool at least once at current mempool min fee. > > Obviously a local replacement cache is a possibility. The whole point of = my > email is to show that a local replacement cache isn't necessarily needed, > as > any alturistic party can implement that cache for all nodes. > > > For the full-nodes which cannot afford extensive storage in face of > > medium-liquidity capable attackers, could imagine replacement cache nod= es > > entering into periodic altruistic rebroadcast. This would introduce a > > tiered hierarchy of full-nodes participating in transaction-relay. I > think > > such topology would be more frail in face of any sybil attack or scarce > > inbound slots connections malicious squatting. > > > > The altruistic rebroadcasting default rate could be also a source of > > amplification attacks, where there is a discrepancy between the feerate > of > > the rebroadcast traffic and the current dynamic mempool min fee of the > > majority of network mempools. As such wasting bandwidth for everyone. > > 1) That is trivially avoided by only broadcasting txs that meet the local > mempool min fee, plus some buffer. There's no point to broadcasting txs > that > aren't going to get mined any time soon. > > 2) BIP-133 feefilter avoids this as well, as Bitcoin Core uses the > feefilter > P2P message to tell peers not to send transactions below a threshold fee > rate. > > https://github.com/bitcoin/bips/blob/master/bip-0133.mediawiki > > > Assuming some medium-liquidity or high-liquidity attackers might reveal > any > > mitigation as insufficient, as an unbounded number of replacement > > transactions might be issued from a very limited number of UTXOs, all > > concurrent spends. In the context of multi-party time-sensitive protoco= l, > > the highest feerate spend of an "honest" counterparty might fall under > the > > lowest concurrent replacement spend of a malicious counterparty, > occupying > > all the additional replacement cache storage. > > Did you actually read my email? I worked out the budget required in a > reasonable worst case scenario: > > > > Suppose the DoS attacker has a budget equal to 50% of the total block > > > reward. > > > That means they can spend 3.125 BTC / 10 minutes, or 520,833sats/s. > > > > > > 520,833 sats/s > > > -------------- =3D 2,083,332 bytes / s > > > 0.25 sats/byte > > > > > > Even in this absurd case, storing a one day worth of replacements wou= ld > > > require > > > just 172GB of storage. 256GB of RAM costs well under $1000 these days= , > > > making > > > altruistic rebroadcasting a service that could be provided to the > network > > > for > > > just a few thousand dollars worth of hardware even in this absurd cas= e. > > Here, we're talking about an attacker that has financial resources high > enough > to possibly do 51% attacks. And even in that scenario, storing the entire > replacement database in RAM costs under $1000 > > The reality is such an attack would probably be limited by P2P bandwidth, > not > financial resources, as 2MB/s of tx traffic would likely leave mempools i= n > an > somewhat inconsistent state across the network due to bandwidth > limitations. > And that is *regardless* of whether or not anyone implements alturistic t= x > broadcasting. > > -- > https://petertodd.org 'peter'[:-1]@petertodd.org > --000000000000e5cdc5060d0c3545 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hi Peter,

> Obviously a local replac= ement cache is a possibility. The whole point of my
> email is to sho= w that a local replacement cache isn't necessarily needed, as
> a= ny alturistic party can implement that cache for all nodes.
<= br>
Sure, note as soon as you start to introduce an altruistic pa= rty rebroadcasting for everyone in the network, we're talking about a d= ifferent security model for time-sensitive second-layers. And unfortunately= , one can expect the same dynamics we're seeing with BIP157 filter serv= ers, a handful of altruistic nodes for a large swarm of clients.
=
> 1) That is trivially avoided by only broadcasting txs t= hat meet the local
> mempool min fee, plus some buffer. There's n= o point to broadcasting txs that
> aren't going to get mined any = time soon.
>
> 2) BIP-133 feefilter avoids this as well, as Bit= coin Core uses the feefilter
> P2P message to tell peers not to send = transactions below a threshold fee rate.
>
>=C2=A0https://github.com/bitcoin/bips/blob/master/bip-013= 3.mediawiki

I know we can introduce BIP-13= 3 style of filtering here only the top % of the block template is altruisti= cally rebroadcast. I still think this is an open question how a second-laye= r node would discover the "global" mempool min fee, and note an a= dversary might inflate the top % of block template to prevent rebroadcast o= f malicious HTLC-preimage.

> Did you actually r= ead my email? I worked out the budget required in a
> reasonable wors= t case scenario:

Yes. I think my uncertainty l= ies in the fact that an adversary can rebroadcast _multiple_ times the same= UTXO amount under different txids, occupying all your altruistic bandwidth= . Your economic estimation makes an assumption per-block (i.e 3.125 BTC / 1= 0 minutes). Where it might be pernicious is that an adversary should be abl= e to reuse those 3.125 BTC of value for each inter-block time.
Of course, you can introduce an additional rate-limitation per= -UTXO, though I think this is very unsure how this rate-limit would not int= roduce a new pinning vector for "honest" counterparty transaction= .

> Here, we're talking about an attacker t= hat has financial resources high enough
> to possibly do 51% attacks.= And even in that scenario, storing the entire
> replacement database= in RAM costs under $1000

> The reality is such an attack would p= robably be limited by P2P bandwidth, not
> financial resources, as 2M= B/s of tx traffic would likely leave mempools in an
> somewhat incons= istent state across the network due to bandwidth limitations.
> And t= hat is *regardless* of whether or not anyone implements alturistic tx
&g= t; broadcasting.

Sure, I think we considered b= andwidth limitations in the design of the package relay. Though see my poin= t above, the real difficulty in your proposed design sounds to me in the ab= ility to reuse the same UTXO liquidity for an unbounded number of concurren= t replacement transactions exhausting all the altruistic bandwidth.

One can just use a 0.1 BTC UTXO and just fan-out 3.125 BT= C of concurrent replacement transactions from then. So I don't think th= e assumed adversary financial resources are accurate.

<= div>I think the best long-term way to fix replacement cycling is still more= in the direction of things like:
https://list= s.linuxfoundation.org/pipermail/bitcoin-dev/2023-December/022191.html

With the additional constraint of removing package = malleability, where all the feerate is coming from package self-contained f= ee-bumping reserves UTXOs.

Best,
Antoine= =C2=A0

Le=C2=A0dim. 17 d=C3=A9c. 2023 =C3=A0=C2=A010:57, Peter Todd &l= t;pete@petertodd.org> a =C3=A9= crit=C2=A0:
On Fri, Dec 15, 2023 at 10:29:22PM +0= 000, Antoine Riard wrote:
> Hi Peter,
>
> > Altruistic third parties can partially mitigate replacement cycli= ng(1)
> attacks
> > by simply rebroadcasting the replaced transactions once the repla= cement
> cycle
> > completes. Since the replaced transaction is in fact fully valid,= and the
> > "cost" of broadcasting it has been paid by the replacem= ent transactions,
> it can
> > be rebroadcast by anyone at all, and will propagate in a similar = way to
> when it
> > was initially propagated. Actually implementing this simply requi= res code
> to be
> > written to keep track of all replaced transactions, and detect > opportunities to
> > rebroadcast transactions that have since become valid again. Sinc= e any
> > interested third party can do this, the memory/disk space require= ments of
> > keeping track of these replacements aren't important; normal = nodes can
> continue
> > to operate exactly as they have before.
>
> I think there is an alternative to altruistic and periodic rebroadcast= ing
> still solving replacement cycling at the transaction-relay level, name= ly
> introducing a local replacement cache.
>
> https://github.com/bitcoin/bitcoin/issues/28699<= /a>
>
> One would keep in bounded memory a list of all seen transactions, whic= h
> have entered our mempool at least once at current mempool min fee.

Obviously a local replacement cache is a possibility. The whole point of my=
email is to show that a local replacement cache isn't necessarily neede= d, as
any alturistic party can implement that cache for all nodes.

> For the full-nodes which cannot afford extensive storage in face of > medium-liquidity capable attackers, could imagine replacement cache no= des
> entering into periodic altruistic rebroadcast. This would introduce a<= br> > tiered hierarchy of full-nodes participating in transaction-relay. I t= hink
> such topology would be more frail in face of any sybil attack or scarc= e
> inbound slots connections malicious squatting.
>
> The altruistic rebroadcasting default rate could be also a source of > amplification attacks, where there is a discrepancy between the feerat= e of
> the rebroadcast traffic and the current dynamic mempool min fee of the=
> majority of network mempools. As such wasting bandwidth for everyone.<= br>
1) That is trivially avoided by only broadcasting txs that meet the local mempool min fee, plus some buffer. There's no point to broadcasting txs= that
aren't going to get mined any time soon.

2) BIP-133 feefilter avoids this as well, as Bitcoin Core uses the feefilte= r
P2P message to tell peers not to send transactions below a threshold fee ra= te.

https://github.com/bitcoin/bips/blob/m= aster/bip-0133.mediawiki

> Assuming some medium-liquidity or high-liquidity attackers might revea= l any
> mitigation as insufficient, as an unbounded number of replacement
> transactions might be issued from a very limited number of UTXOs, all<= br> > concurrent spends. In the context of multi-party time-sensitive protoc= ol,
> the highest feerate spend of an "honest" counterparty might = fall under the
> lowest concurrent replacement spend of a malicious counterparty, occup= ying
> all the additional replacement cache storage.

Did you actually read my email? I worked out the budget required in a
reasonable worst case scenario:

> > Suppose the DoS attacker has a budget equal to 50% of the total b= lock
> > reward.
> > That means they can spend 3.125 BTC / 10 minutes, or 520,833sats/= s.
> >
> >=C2=A0 =C2=A0 =C2=A0520,833 sats/s
> >=C2=A0 =C2=A0 =C2=A0-------------- =3D 2,083,332 bytes / s
> >=C2=A0 =C2=A0 =C2=A00.25 sats/byte
> >
> > Even in this absurd case, storing a one day worth of replacements= would
> > require
> > just 172GB of storage. 256GB of RAM costs well under $1000 these = days,
> > making
> > altruistic rebroadcasting a service that could be provided to the= network
> > for
> > just a few thousand dollars worth of hardware even in this absurd= case.

Here, we're talking about an attacker that has financial resources high= enough
to possibly do 51% attacks. And even in that scenario, storing the entire replacement database in RAM costs under $1000

The reality is such an attack would probably be limited by P2P bandwidth, n= ot
financial resources, as 2MB/s of tx traffic would likely leave mempools in = an
somewhat inconsistent state across the network due to bandwidth limitations= .
And that is *regardless* of whether or not anyone implements alturistic tx<= br> broadcasting.

--
http= s://petertodd.org 'peter'[:-1]@petertodd.org
--000000000000e5cdc5060d0c3545--