Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1Qu5Go-0006Rn-19 for bitcoin-development@lists.sourceforge.net; Thu, 18 Aug 2011 16:16:38 +0000 Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.210.42 as permitted sender) client-ip=209.85.210.42; envelope-from=gavinandresen@gmail.com; helo=mail-pz0-f42.google.com; Received: from mail-pz0-f42.google.com ([209.85.210.42]) by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1Qu5Gn-00050J-9z for bitcoin-development@lists.sourceforge.net; Thu, 18 Aug 2011 16:16:37 +0000 Received: by pzk37 with SMTP id 37so3226542pzk.1 for ; Thu, 18 Aug 2011 09:16:31 -0700 (PDT) MIME-Version: 1.0 Received: by 10.142.49.2 with SMTP id w2mr487099wfw.50.1313684191358; Thu, 18 Aug 2011 09:16:31 -0700 (PDT) Received: by 10.142.133.12 with HTTP; Thu, 18 Aug 2011 09:16:31 -0700 (PDT) In-Reply-To: References: <1313681783.14523.79.camel@mei> Date: Thu, 18 Aug 2011 12:16:31 -0400 Message-ID: From: Gavin Andresen To: Mike Hearn Content-Type: text/plain; charset=ISO-8859-1 X-Spam-Score: -1.3 (-) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (gavinandresen[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.3 AWL AWL: From: address is in the auto white-list X-Headers-End: 1Qu5Gn-00050J-9z Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] From the forums: one-confirmation attack X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 18 Aug 2011 16:16:38 -0000 > For vectors variant, I wonder if it'd be safe to report the number of > confirmations differently for the duration of a chain split. If you > have a block but a majority of peers relayed a block that split the > chain, subtract 1 from each confirmation reported via RPC. Or maybe report them as 'suspicious.' Changing the meaning of 'confirmations' is likely to break code (e.g. code like block = current_blockchain[blockcount-tx.confirmations] ... would give the wrong block). A floating-point 0.0-1.0 'confidence' measure might be a good idea to go along with the integer confirmations. I can think of all sorts of ways of gauging the reliability of transactions or blocks (did it come from a trusted peer-- assuming we eventually have trusted peers. Does it have a lot of confirmations? Are there no active block chain forks? Have we been getting new blocks at the rate we expect? etc etc etc) We could start with an as simple-as-possible "confidence == 0 if confirmations < 2, otherwise confidence = function(#confirmations)" and improve it from there. -- -- Gavin Andresen