Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1WueLg-0003ue-JG for bitcoin-development@lists.sourceforge.net; Wed, 11 Jun 2014 08:57:36 +0000 Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.214.179 as permitted sender) client-ip=209.85.214.179; envelope-from=mh.in.england@gmail.com; helo=mail-ob0-f179.google.com; Received: from mail-ob0-f179.google.com ([209.85.214.179]) by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1WueLf-0007qf-Jk for bitcoin-development@lists.sourceforge.net; Wed, 11 Jun 2014 08:57:36 +0000 Received: by mail-ob0-f179.google.com with SMTP id uz6so4071479obc.10 for ; Wed, 11 Jun 2014 01:57:30 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.182.114.229 with SMTP id jj5mr16234474obb.53.1402477050135; Wed, 11 Jun 2014 01:57:30 -0700 (PDT) Sender: mh.in.england@gmail.com Received: by 10.76.71.162 with HTTP; Wed, 11 Jun 2014 01:57:29 -0700 (PDT) In-Reply-To: <20140610170846.GB21293@savin> References: <20140610170846.GB21293@savin> Date: Wed, 11 Jun 2014 10:57:29 +0200 X-Google-Sender-Auth: c7w7dimssHOXAYwRO6vs5k4D_Y0 Message-ID: From: Mike Hearn To: Peter Todd Content-Type: multipart/alternative; boundary=001a11c2f644610b5c04fb8ba2ed X-Spam-Score: -0.5 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (mh.in.england[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1WueLf-0007qf-Jk Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] Bloom bait X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Jun 2014 08:57:36 -0000 --001a11c2f644610b5c04fb8ba2ed Content-Type: text/plain; charset=UTF-8 > > Is this any different from my bloom filter IO attack code? Nope. > It's obviously different; a thin client trying to obtain more privacy is not attempting to deny service to anyone. You can't simply state that a feature which uses resources for a legitimate reason is a DoS attack, that's a spurious definition that would reclassify innocuous things like web browser prefetching as DoS attacks too. With respect to the work you're proposing, trying to retroactively make Bloom filtering an optional part of the protocol is just wasting people's time at this point: - There is no evidence there's an actual problem today. - There is no evidence there will be a problem any time soon, given the meagre levels of traffic growth we have. - It involves a complicated rollout strategy that would create work for many people. - Gavin, Wladimir and myself have all concluded it's not worth the cost. - The only justification you have provided is that two node implementations hardly anyone uses can't be bothered to implement Bloom filtering, but want to advertise support in their ver message anyway. They can simply lower the number they advertise in their ver message. That said, if you want to implement better support for archival nodes then that'd be great. The way to do it would be either to implement block ranges in the addr announcements as has been discussed many times before, or perhaps introduce a new protocol optimised for serving the chain. Nodes that are CPU limited won't want to take part in the rest of the P2P protocol anyway, it's not just Bloom filtering that uses CPU time but also block and tx relay. But until you have done these things, please stop attempting to reclassify any feature you can imagine a more efficient version of as an "attack". It's just silly. --001a11c2f644610b5c04fb8ba2ed Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Is this any different from my bloom filter IO attack code? = Nope.

It's obviously different; a= thin client trying to obtain more privacy is not attempting to deny servic= e to anyone. You can't simply state that a feature which uses resources= for a legitimate reason is a DoS attack, that's a spurious definition = that would reclassify innocuous things like web browser prefetching as DoS = attacks too.

With respect to the work you're proposing, trying t= o retroactively make Bloom filtering an optional part of the protocol is ju= st wasting people's time at this point:
  • There is no e= vidence there's an actual problem today.
  • There is no evidence there will be a problem any time soon, given the m= eagre levels of traffic growth we have.
  • It involves a complicated r= ollout strategy that would create work for many people.
  • Gavin, Wlad= imir and myself have all concluded it's not worth the cost.
  • The only justification you have provided is that two node implementatio= ns hardly anyone uses can't be bothered to implement Bloom filtering, b= ut want to advertise support in their ver message anyway. They can simply l= ower the number they advertise in their ver message.
That said, if you want to implement better support for archi= val nodes then that'd be great. The way to do it would be either to imp= lement block ranges in the addr announcements as has been discussed many ti= mes before, or perhaps introduce a new protocol optimised for serving the c= hain. Nodes that are CPU limited won't want to take part in the rest of= the P2P protocol anyway, it's not just Bloom filtering that uses CPU t= ime but also block and tx relay.=C2=A0

But until you have done these things, please stop attem= pting to reclassify any feature you can imagine a more efficient version of= as an "attack". It's just silly.=C2=A0
--001a11c2f644610b5c04fb8ba2ed--