1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
|
Return-Path: <john@johnnewbery.com>
Received: from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138])
by lists.linuxfoundation.org (Postfix) with ESMTP id 9AED7C000A
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 2 Mar 2021 12:19:35 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
by smtp1.osuosl.org (Postfix) with ESMTP id 802FF83ED4
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 2 Mar 2021 12:19:35 +0000 (UTC)
X-Virus-Scanned: amavisd-new at osuosl.org
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001,
RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001,
URI_DOTEDU=0.001] autolearn=ham autolearn_force=no
Authentication-Results: smtp1.osuosl.org (amavisd-new);
dkim=pass (2048-bit key)
header.d=johnnewbery-com.20150623.gappssmtp.com
Received: from smtp1.osuosl.org ([127.0.0.1])
by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id wRCEDUXEln2w
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 2 Mar 2021 12:19:31 +0000 (UTC)
X-Greylist: delayed 00:07:53 by SQLgrey-1.8.0
Received: from mail-lf1-f52.google.com (mail-lf1-f52.google.com
[209.85.167.52])
by smtp1.osuosl.org (Postfix) with ESMTPS id 3B3CC83EA6
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 2 Mar 2021 12:19:31 +0000 (UTC)
Received: by mail-lf1-f52.google.com with SMTP id k9so11024370lfo.12
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 02 Mar 2021 04:19:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=johnnewbery-com.20150623.gappssmtp.com; s=20150623;
h=mime-version:references:in-reply-to:from:date:message-id:subject:to;
bh=1fSK3s23WRtNAouf12QEtSyJFO0yi0p8j9ilI2qAc0w=;
b=Yev3a1hMVilVGCRSkQHMUTq6tPMEP0Yh0x2fvW+Ft47187Ba3c+dFcafA/oyP0k0nf
zrcb0w1Zlt+bzE+LHI5bgCQHi1LWNVUu0b1JmCrmwK7NG7OSZh/EuXbVOZh1EFfcjOPw
XiPPnbINAYNd0zW723e9VR8i+yNlbvYW9x3HVLqbjpPZz0cf29XRJ9r2sySTi19YpWlZ
sPS4IEr8N+6i14qIb0X/qIuLTZRrY4T0NEF3HRmOMNJIlzFnXZqvbYXGIHoOT1VFaqBR
rE9iS2Y1pmZyYu/vfflCWeHHxlltU+z5sUwoGflyiL0oIM/zYpirujQLZLbLs/ydIZx4
O5Lw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to;
bh=1fSK3s23WRtNAouf12QEtSyJFO0yi0p8j9ilI2qAc0w=;
b=Z/aC0JDhsVz4GbKkeAeQ1Q8rmlenriwd/g0bAJnfNobQMFvVu6ictiNFOxe+FGWtSr
BoIExH/TVg/KeQ+jGhI1Hq6HgJdOR7FEGP+CcmSUX30AjILffoQXN+wvUkcr/+rPie3G
x3zOgCJIv99FFOSYlwzQ4zQNgMZKT25bOXuNgwA+PkbUZqZsAb7ndz3g12mzuuDUXsx9
+1tHO1kvmIEwRRPgrDbaHGnoimWIxqgHkwtq4cwMpP8xc2uzMC7RPSblNFnoF8p/Irbf
CPJvXLsjMdcQGFqO6kNnACebxw4/fMJuQywv/GvjJHabBX2kbMNzpTQ5uqPxZdKA+Prh
BmRw==
X-Gm-Message-State: AOAM531Dswa+olHonrOn/DkOZufxUPEEE+IbN/KL3KXJvrpbIiixvfwD
aUSAIg5gQox03dRE4poBSrLLY/NFQWFapLlh
X-Google-Smtp-Source: ABdhPJzElH/+IdK1lHJ/UITBVrb5ySU4BCiKxIUIBmRrwkRS5M6A5PLwWDjbU4jUE2N3Q++mJVxvDg==
X-Received: by 2002:a05:6512:1053:: with SMTP id
c19mr11804901lfb.518.1614687095549;
Tue, 02 Mar 2021 04:11:35 -0800 (PST)
Received: from mail-lf1-f46.google.com (mail-lf1-f46.google.com.
[209.85.167.46])
by smtp.gmail.com with ESMTPSA id c16sm2598982lfb.302.2021.03.02.04.11.34
for <bitcoin-dev@lists.linuxfoundation.org>
(version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
Tue, 02 Mar 2021 04:11:34 -0800 (PST)
Received: by mail-lf1-f46.google.com with SMTP id 18so22334603lff.6
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 02 Mar 2021 04:11:34 -0800 (PST)
X-Received: by 2002:a19:80c9:: with SMTP id
b192mr12646086lfd.130.1614687094322;
Tue, 02 Mar 2021 04:11:34 -0800 (PST)
MIME-Version: 1.0
References: <CAFp6fsE6gb2PaL3ikDRjS-hNnPLjvtWB+8qZJr3trQe2K9YN+g@mail.gmail.com>
<CAFmfg2sT0sVVHOe5ZbDo5iDwE1Tk2oOXJiCKhNZv_hZVOVLbRw@mail.gmail.com>
<CALZpt+HF0NwB=arz_buW1bzk7iT3s_Ytj+ZkEhT+iXpuRgmy2Q@mail.gmail.com>
In-Reply-To: <CALZpt+HF0NwB=arz_buW1bzk7iT3s_Ytj+ZkEhT+iXpuRgmy2Q@mail.gmail.com>
From: John Newbery <john@johnnewbery.com>
Date: Tue, 2 Mar 2021 12:11:23 +0000
X-Gmail-Original-Message-ID: <CAFmfg2ubukd4QTRGpB2-aczuiJ94T60xa-Fs1Kn843iQiEfKiQ@mail.gmail.com>
Message-ID: <CAFmfg2ubukd4QTRGpB2-aczuiJ94T60xa-Fs1Kn843iQiEfKiQ@mail.gmail.com>
To: Bitcoin Protocol Discussion <bitcoin-dev@lists.linuxfoundation.org>
Content-Type: multipart/alternative; boundary="000000000000ae39b105bc8ca229"
X-Mailman-Approved-At: Tue, 02 Mar 2021 12:22:23 +0000
Subject: Re: [bitcoin-dev] Proposal for new "disabletx" p2p message
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Mar 2021 12:19:35 -0000
--000000000000ae39b105bc8ca229
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Antoine,
Nothing in my proposal below precludes introducing a more comprehensive
feature negotiation mechanism at some later date. The only changes I'm
proposing are to Bitcoin Core's policy for how it treats its peer
connections.
> If we don't want to introduce a new message and
> corresponding code changes, it would be wise at least to extract VERSION'=
s
> `fRelay` and how Core handles it in its own BIP.
I believe this is what BIP 60 does, or did you have something else in
mind?
> Explicit addr-relay negotiation will offer more
> flexibility
I agree!
> (and more hygienic code paths rather than triggering data
> structures initialization in few different locations).
Not sure what you mean by hygienic here. This seems like a code style
preference.
> Given inbound connections might be attacker-controlled and tx-relay
opt-out
> signaling is also attacker-controlled, wouldn't this give a bias toward a=
n
> attacker in occupying our inbound slots ? Compared to honest inbound
peers,
> which in average are going to be full-relay.
Sorry - I meant that Bitcoin Core should allow a certain number of
inbound peers that do not relay txs. This would be in addition to the
full-relay inbound peers.
John
On Mon, Mar 1, 2021 at 11:11 PM Antoine Riard <antoine.riard@gmail.com>
wrote:
> Hi John,
>
> > I think a good counter-argument against simply using `fRelay` for this
> > purpose is that we shouldn't reuse a protocol feature designed for one
> > function to achieve a totally different aim. However, we know that node=
s
> > on the network have been using `fRelay` to disable transaction relay
> > since Bitcoin Core version 0.12 (when `-blocksonly` was added), and tha=
t
> > usage was expanded to _all_ nodes running Bitcoin Core version 0.19 or
> > later (when block-relay-only connections were introduced), so using
> > `fRelay` to disable transaction relay is now de facto part of the p2p
> > protocol.
>
>
> I don't think this is good practice ecosystem-wise. To understand tx-rela=
y
> opt-out from peers correctly, a _non_ Bitcoin Core client has to implemen=
t
> the `fRelay` subset of BIP37, but ignore the wider part around FILTER*
> messages. Or implement those messages, only to disconnect peers sending
> them, thus following BIP111 requirements.
>
> Thus, future developers of bitcoin software have the choice between
> implementing a standard in a non-compliant way or implementing p2p messag=
es
> for a light client protocol in a way of deprecation ? Even further, an
> interpretation of BIP 37 ("Being able to opt-out of _inv_ messages until
> the filter is set prevents a client being flooded with traffic in the bri=
ef
> window of time") would make it okay to send TX messages to your inbound
> block-relay-only peers. And that your client shouldn't be disconnected fo=
r
> such behavior.
>
> On the long-term, IMHO, better to have a well-defined standard with a
> clean negotiation mechanism rather than relying on code specifics of a
> given Bitcoin client. If we don't want to introduce a new message and
> corresponding code changes, it would be wise at least to extract VERSION'=
s
> `fRelay` and how Core handles it in its own BIP.
>
> > I think a better approach would be for Bitcoin Core to only relay addr
> > records to an inbound peer if it has previously received an `addr` or
> > `addrv2` message from that peer, since that indicates definitively that
> > the peer actively gossips `addr` records. This approach was first
> > suggested by AJ in the original block-relay-only PR[15].
>
> If a node is willingly to opt-out from addr-relay from one of its inbound
> peers, how is it supposed to do ? Of course, you can drop such messages o=
n
> the floor, your peer is just going to waste bandwidth for nothing. IIRC
> from past irc p2p meetings, we're really unclear about what a
> good-propagation-and-privacy-preserving addr-relay strategy should look
> like. Note, that distrusting your inbound peers with your addr-relay migh=
t
> be a sane direction. Explicit addr-relay negotiation will offer more
> flexibility (and more hygienic code paths rather than triggering data
> structures initialization in few different locations).
>
> > - update the inbound eviction logic to protect more inbound peers which
> > do not have transaction relay data structures.
>
> Given inbound connections might be attacker-controlled and tx-relay
> opt-out signaling is also attacker-controlled, wouldn't this give a bias
> toward an attacker in occupying our inbound slots ? Compared to honest
> inbound peers, which in average are going to be full-relay.
>
> Cheers,
> Antoine
>
>
>
> Le lun. 1 mars 2021 =C3=A0 16:07, John Newbery via bitcoin-dev <
> bitcoin-dev@lists.linuxfoundation.org> a =C3=A9crit :
>
>> Hi Suhas,
>>
>> Thank you for this proposal. I agree with your aims, but I think a new
>> P2P message isn't necessary to achieve them.
>>
>> # Motivation
>>
>> There are two distinct (but interacting) motivations:
>>
>> 1. Allow a node to accept more incoming connections which will only be
>> used for block propagation (no transaction relay or addr gossip),
>> while minimizing resource requirements.
>>
>> 2. Prevent `addr` gossip messages from being sent to peers which will
>> 'black hole' those addrs (i.e. not relay them further).
>>
>> These motivations interact because if we simply increase the number of
>> block-relay-only connections that nodes make without making any
>> allowance for the fact those connections won't gossip addr records, then
>> we'll increase the number of addr black holes and worsen addr gossip.
>>
>> # Using fRelay=3Dfalse to signal no transaction relay.
>>
>> `fRelay` is an optional field in the `version` message. There are three
>> BIPs concerned with `fRelay`:
>>
>> - BIP 37[1] introduced the `fRelay` field to indicate to the recipient
>> that they must not relay transactions over the connection until a
>> `filteradd` message has been received.
>>
>> - BIP 60[2] aimed to make the `fRelay` field mandatory. It is not clear
>> how widely this BIP has been adopted by implementations.
>>
>> - BIP 111[3] introduced a `NODE_BLOOM` service bit to indicate that
>> bloom filters are served by this node. According to this BIP, "If a
>> node does not support bloom filters but receives a "filterload",
>> "filteradd", or "filterclear" message from a peer the node should
>> disconnect that peer immediately."
>>
>> Within Bitcoin Core:
>>
>> - PR 1795[4] (merged in January 2013) added support for BIP 37 Bloom
>> filters.
>>
>> - Since PR 2763[5] (merged in June 2013), Bitcoin Core will _always_
>> include the `fRelay` flag in `version` messages that it sends. Bitcoin
>> Core will tolerate the `fRelay` field being present or absent in any
>> `version` message that it receives[6].
>>
>> - PR 6579[7] (merged in August 2015) implemented BIP 111. From that
>> point on, a Bitcoin Core node would disconnect peers that sent it
>> `filter*` messages if it hadn't enabled `NODE_BLOOM`, provided the
>> peer's version was >=3D 70011. In PR 7708[8] (merged in March 2016) th=
is
>> was extended to disconnect any peer that sends a `filter*` message,
>> regardless of its version (in general, a 'polite disconnect' for any
>> peer that requests an unsupported service is probably the best
>> behaviour). In PR 16152[9] (merged in July 2019), serving Bloom
>> filters was disabled by default, due to potential denial-of-service
>> attacks being possible against nodes which serve bloom filters on
>> public connections.
>>
>> - PR 6993[10] (merged in November 2015) started reusing the `fRelay`
>> field for the new `-blocksonly` mode. If Bitcoin Core is started with
>> `-blocksonly` configured, then it includes `fRelay=3Dfalse` in all of
>> the `version` messages it sends. In PR 15759[11] (merged in September
>> 2019), this usage of `fRelay` to permanently disable tx relay was
>> extended for use by the new block-relay only connection type.
>>
>> The net effect is that `fRelay` is already being used to indicate that
>> transactions should not be relayed over a connection. In the motivation
>> for your BIP, you write:
>>
>> > The low-bandwidth / minimal-resource nature of these connections is
>> > currently known only by the initiator of the connection; this is
>> > because the transaction relay field in the version message is not a
>> > permanent setting for the lifetime of the connection. Consequently, a
>> > node receiving an inbound connection with transaction relay disabled
>> > cannot distinguish between a peer that will never enable transaction
>> > relay (as described in BIP 37) and one that will...
>>
>> However, as AJ points out in his response [12], the Bitcoin Core node
>> _does_ know whether transaction relay can be supported as soon as the
>> `version` message is received:
>>
>> > [...] you either set m_tx_relay->fRelayTxes to true via the VERSION
>> > message (either explicitly or by not setting fRelay), or you enable it
>> > later with FILTERLOAD or FILTERCLEAR, both of which will cause a
>> > disconnect if bloom filters aren't supported. Bloom filter support is
>> > (optionally?) indicated via a service bit (BIP 111), so you could
>> > assume you know whether they're supported as soon as you receive the
>> > VERSION line.
>>
>> i.e. if Bitcoin Core node is running under normal configuration with
>> bloom filters disabled for public connections (which is both the default
>> setting and highly recommended due to DoS concerns), then as soon as it
>> receives a `version` message with `fRelay=3Dfalse`, it can be sure that
>> there will never be any transaction relay with that peer. If the peer
>> later tries to enable transaction relay by sending a `filterload`
>> message, then the node will disconnect that peer immediately.
>>
>> In summary, we can continue using the `fRelay` field to indicate that
>> no transaction relay can happen for the entire lifetime of the
>> connection. Bitcoin Core can postpone allocating resources for
>> transaction relay data structures until after the version message has
>> been received to minimize resource usage for incoming block-relay-only
>> connections. A rough implementation is here[13]. Obviously, a node that
>> has been configured to serve bloom filters on public connections would
>> not be able to take advantage of this and accept additional incoming
>> block-relay-only peers, but I think that's fine - we already discourage
>> that configuration.
>>
>> I think a good counter-argument against simply using `fRelay` for this
>> purpose is that we shouldn't reuse a protocol feature designed for one
>> function to achieve a totally different aim. However, we know that nodes
>> on the network have been using `fRelay` to disable transaction relay
>> since Bitcoin Core version 0.12 (when `-blocksonly` was added), and that
>> usage was expanded to _all_ nodes running Bitcoin Core version 0.19 or
>> later (when block-relay-only connections were introduced), so using
>> `fRelay` to disable transaction relay is now de facto part of the p2p
>> protocol.
>>
>> # Preventing addr black holes
>>
>> Addresses of potential peers are gossiped around the p2p network using
>> `addr` messages. When a Bitcoin Core node learns of a new `addr` record,
>> it will relay that record to one or two of its peers, chosen at
>> random[14]. The idea is that eventually the `addr` record will reach
>> most of the nodes on the network.
>>
>> If there are too many nodes on the network that receive `addr` records
>> and do not relay those records on to their peers (termed _addr black
>> hole_ nodes), then propagation of those `addr` records suffers -- any
>> individual `addr` record is unlikely to reach a large proportion of
>> nodes on the network.
>>
>> Since a motivation for block-relay-only connections is to protect
>> against eclipse attacks and thwart network topology analysis, Bitcoin
>> Core will not relay `addr` records on those connections, and will ignore
>> any `addr` record received over those connections. Therefore, increasing
>> the number of block-relay-only connections without changing the `addr`
>> gossip logic is likely to increase the prevalence of addr black holes,
>> and negatively impact addr propagation. This is why BIP 338 includes:
>>
>> > It is RECOMMENDED that a node that has sent or received a disabletx
>> > message to/from a peer not send any of these messages to the peer:
>> >
>> > - addr/getaddr
>> > - addrv2 (BIP 155)
>>
>> I think a better approach would be for Bitcoin Core to only relay addr
>> records to an inbound peer if it has previously received an `addr` or
>> `addrv2` message from that peer, since that indicates definitively that
>> the peer actively gossips `addr` records. This approach was first
>> suggested by AJ in the original block-relay-only PR[15].
>>
>> An advantage of this approach is that it will improve addr propagation
>> immediately and without any change to the P2P protocol, and will prevent
>> sending `addr` records to all addr black holes (such as light clients),
>> not just incoming block-relay-only connections.
>>
>> # Conclusion
>>
>> We can increase the permitted number of inbound block-relay-only peers
>> while minimizing resource requirement _and_ improving addr record
>> propagation, without any changes to the p2p protocol required.
>>
>> I propose that for Bitcoin Core version 22.0:
>>
>> - only initialize the transaction relay data structures after the
>> `version` message is received, and only if fRelay=3Dtrue and
>> `NODE_BLOOM` is not offered on this connection.
>> - only initialize the addr data structures for inbound connections when
>> an `addr`, `addrv2` or `getaddr` message is received on the
>> connection, and only consider a connection for addr relay if its addr
>> data structures are initialized.
>> - update the inbound eviction logic to protect more inbound peers which
>> do not have transaction relay data structures.
>>
>> Then, in version 23.0:
>>
>> - modestly increase the number of outbound block-relay-only connections.
>>
>> John
>>
>> [1] https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki
>> [2] https://github.com/bitcoin/bips/blob/master/bip-0060.mediawiki
>> [3] https://github.com/bitcoin/bips/blob/master/bip-0111.mediawiki
>> [4] https://github.com/bitcoin/bitcoin/pull/1795
>> [5] https://github.com/bitcoin/bitcoin/pull/2763
>> [6]
>> https://github.com/bitcoin/bitcoin/blob/e49117470b77fb7d53be122c6490ba16=
3c6e304d/src/net_processing.cpp#L2582-L2583
>> [7] https://github.com/bitcoin/bitcoin/pull/6579
>> [8] https://github.com/bitcoin/bitcoin/pull/7708
>> [9] https://github.com/bitcoin/bitcoin/pull/16152
>> [10] https://github.com/bitcoin/bitcoin/pull/6993
>> [11] https://github.com/bitcoin/bitcoin/pull/15759
>> [12]
>> https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-January/018=
347.html
>> [13] https://github.com/jnewbery/bitcoin/tree/2021-02-lazy-init-peer
>> [14]
>> https://github.com/bitcoin/bitcoin/blob/e52ce9f2b312b3cf3b0837918e07d760=
3e241d63/src/net_processing.cpp#L1696-L1700
>> [15] https://github.com/bitcoin/bitcoin/pull/15759#issuecomment-52701275=
7
>>
>> > Hi,
>> >
>> > I'm proposing the addition of a new, optional p2p message to allow
>> peers to communicate that they do not want to send or receive (loose)
>> transactions for the lifetime of a connection.
>> >
>> > The goal of this message is to help facilitate connections on the
>> network over which only block-related data (blocks/headers/compact
>> blocks/etc) are relayed, to create low-resource connections that help
>> protect against partition attacks on the network. In particular, by add=
ing
>> a network message that communicates that transactions will not be relaye=
d
>> for the life of the connection, we ease the implementation of software t=
hat
>> could have increased inbound connection limits for such peers, which in
>> turn will make it easier to add additional persistent block-relay-only
>> connections on the network -- strengthening network security for little
>> additional bandwidth.
>> >
>> > Software has been deployed for over a year now which makes such
>> connections, using the BIP37/BIP60 "fRelay" field in the version message=
to
>> signal that transactions should not be sent initially. However, BIP37
>> allows for transaction relay to be enabled later in the connection's
>> lifetime, complicating software that would try to distinguish inbound pe=
ers
>> that will never relay transactions from those that might.
>> >
>> > This proposal would add a single new p2p message, "disabletx", which
>> (if used at all) must be sent between version and verack. I propose tha=
t
>> this message is valid for peers advertising protocol version 70017 or
>> higher. Software is free to implement this BIP or ignore this message a=
nd
>> remain compatible with software that does implement it.
>> >
>> > Full text of the proposed BIP is below.
>> >
>> > Thanks,
>> > Suhas
>> >
>> > ---------------------------------------------------
>> >
>> > <pre>
>> > BIP: XXX
>> > Layer: Peer Services
>> > Title: Disable transaction relay message
>> > Author: Suhas Daftuar <sdaftuar@chaincode.com>
>> > Comments-Summary: No comments yet.
>> > Comments-URI:
>> > Status: Draft
>> > Type: Standards Track
>> > Created: 2020-09-03
>> > License: BSD-2-Clause
>> > </pre>
>> >
>> > =3D=3DAbstract=3D=3D
>> >
>> > This BIP describes a change to the p2p protocol to allow a node to tel=
l
>> a peer
>> > that a connection will not be used for transaction relay, to support
>> > block-relay-only connections that are currently in use on the network.
>> >
>> > =3D=3DMotivation=3D=3D
>> >
>> > For nearly the past year, software has been deployed[1] which initiate=
s
>> > connections on the Bitcoin network and sets the transaction relay fiel=
d
>> > (introduced by BIP 37 and also defined in BIP 60) to false, to prevent
>> > transaction relay from occurring on the connection. Additionally, addr
>> messages
>> > received from the peer are ignored by this software.
>> >
>> > The purpose of these connections is two-fold: by making additional
>> > low-bandwidth connections on which blocks can propagate, the robustnes=
s
>> of a
>> > node to network partitioning attacks is strengthened. Additionally, b=
y
>> not
>> > relaying transactions and ignoring received addresses, the ability of =
an
>> > adversary to learn the complete network graph (or a subgraph) is
>> reduced[2],
>> > which in turn increases the cost or difficulty to an attacker seeking
>> to carry
>> > out a network partitioning attack (when compared with having such
>> knowledge).
>> >
>> > The low-bandwidth / minimal-resource nature of these connections is
>> currently
>> > known only by the initiator of the connection; this is because the
>> transaction
>> > relay field in the version message is not a permanent setting for the
>> lifetime
>> > of the connection. Consequently, a node receiving an inbound
>> connection with
>> > transaction relay disabled cannot distinguish between a peer that will
>> never
>> > enable transaction relay (as described in BIP 37) and one that will.
>> Moreover,
>> > the node also cannot determine that the incoming connection will ignor=
e
>> relayed
>> > addresses; with that knowledge a node would likely choose other peers =
to
>> > receive announced addresses instead.
>> >
>> > This proposal adds a new, optional message that a node can send a peer
>> when
>> > initiating a connection to that peer, to indicate that connection
>> should not be
>> > used for transaction-relay for the connection's lifetime. In addition,
>> without
>> > a current mechanism to negotiate whether addresses should be relayed o=
n
>> a
>> > connection, this BIP suggests that address messages not be sent on
>> links where
>> > tx-relay has been disabled.
>> >
>> > =3D=3DSpecification=3D=3D
>> >
>> > # A new disabletx message is added, which is defined as an empty
>> message where pchCommand =3D=3D "disabletx".
>> > # The protocol version of nodes implementing this BIP must be set to
>> 70017 or higher.
>> > # If a node sets the transaction relay field in the version message to
>> a peer to false, then the disabletx message MAY also be sent in response=
to
>> a version message from that peer if the peer's protocol version is >=3D
>> 70017. If sent, the disabletx message MUST be sent prior to sending a
>> verack.
>> > # A node that has sent or received a disabletx message to/from a peer
>> MUST NOT send any of these messages to the peer:
>> > ## inv messages for transactions
>> > ## getdata messages for transactions
>> > ## getdata messages for merkleblock (BIP 37)
>> > ## filteradd/filterload/filterclear (BIP 37)
>> > ## mempool (BIP 35)
>> > # It is RECOMMENDED that a node that has sent or received a disabletx
>> message to/from a peer not send any of these messages to the peer:
>> > ## addr/getaddr
>> > ## addrv2 (BIP 155)
>> > # The behavior regarding sending or processing other message types is
>> not specified by this BIP.
>> > # Nodes MAY decide to not remain connected to peers that send this
>> message (for example, if trying to find a peer that will relay
>> transactions).
>> >
>> > =3D=3DCompatibility=3D=3D
>> >
>> > Nodes with protocol version >=3D 70017 that do not implement this BIP,
>> and nodes
>> > with protocol version < 70017, will continue to remain compatible with
>> > implementing software: transactions would not be relayed to peers
>> sending the
>> > disabletx message (provided that BIP 37 or BIP 60 has been
>> implemented), and while
>> > periodic address relay may still take place, software implementing thi=
s
>> BIP
>> > should not be disconnecting such peers solely for that reason.
>> >
>> > Disabling address relay is suggested but not required by this BIP, to
>> allow for
>> > future protocol extensions that might specify more carefully how
>> address relay
>> > is to be negotiated. This BIP's recommendations for software to not
>> relay
>> > addresses is intended to be interpreted as guidance in the absence of
>> any such
>> > future protocol extension, to accommodate existing software behavior.
>> >
>> > Note that all messages specified in BIP 152, including blocktxn and
>> > getblocktxn, are permitted between peers that have sent/received a
>> disabletx
>> > message, subject to the feature negotiation of BIP 152.
>> >
>> > =3D=3DImplementation=3D=3D
>> >
>> > TBD
>> >
>> > =3D=3DReferences=3D=3D
>> >
>> > # Bitcoin Core has [https://github.com/bitcoin/bitcoin/pull/15759
>> implemented this functionality] since version 0.19.0.1, released in
>> November 2019.
>> > # For example, see
>> https://www.cs.umd.edu/projects/coinscope/coinscope.pdf and
>> https://arxiv.org/pdf/1812.00942.pdf.
>> >
>> > =3D=3DCopyright=3D=3D
>> >
>> > This BIP is licensed under the 2-clause BSD license.
>>
>> On Wed, Jan 6, 2021 at 4:35 PM Suhas Daftuar via bitcoin-dev <
>> bitcoin-dev@lists.linuxfoundation.org> wrote:
>>
>>> Hi,
>>>
>>> I'm proposing the addition of a new, optional p2p message to allow peer=
s
>>> to communicate that they do not want to send or receive (loose)
>>> transactions for the lifetime of a connection.
>>>
>>> The goal of this message is to help facilitate connections on the
>>> network over which only block-related data (blocks/headers/compact
>>> blocks/etc) are relayed, to create low-resource connections that help
>>> protect against partition attacks on the network. In particular, by ad=
ding
>>> a network message that communicates that transactions will not be relay=
ed
>>> for the life of the connection, we ease the implementation of software =
that
>>> could have increased inbound connection limits for such peers, which in
>>> turn will make it easier to add additional persistent block-relay-only
>>> connections on the network -- strengthening network security for little
>>> additional bandwidth.
>>>
>>> Software has been deployed for over a year now which makes such
>>> connections, using the BIP37/BIP60 "fRelay" field in the version messag=
e to
>>> signal that transactions should not be sent initially. However, BIP37
>>> allows for transaction relay to be enabled later in the connection's
>>> lifetime, complicating software that would try to distinguish inbound p=
eers
>>> that will never relay transactions from those that might.
>>>
>>> This proposal would add a single new p2p message, "disabletx", which (i=
f
>>> used at all) must be sent between version and verack. I propose that t=
his
>>> message is valid for peers advertising protocol version 70017 or higher=
.
>>> Software is free to implement this BIP or ignore this message and remai=
n
>>> compatible with software that does implement it.
>>>
>>> Full text of the proposed BIP is below.
>>>
>>> Thanks,
>>> Suhas
>>>
>>> ---------------------------------------------------
>>>
>>> <pre>
>>> BIP: XXX
>>> Layer: Peer Services
>>> Title: Disable transaction relay message
>>> Author: Suhas Daftuar <sdaftuar@chaincode.com>
>>> Comments-Summary: No comments yet.
>>> Comments-URI:
>>> Status: Draft
>>> Type: Standards Track
>>> Created: 2020-09-03
>>> License: BSD-2-Clause
>>> </pre>
>>>
>>> =3D=3DAbstract=3D=3D
>>>
>>> This BIP describes a change to the p2p protocol to allow a node to tell=
a peer
>>> that a connection will not be used for transaction relay, to support
>>> block-relay-only connections that are currently in use on the network.
>>>
>>> =3D=3DMotivation=3D=3D
>>>
>>> For nearly the past year, software has been deployed[1] which initiates
>>> connections on the Bitcoin network and sets the transaction relay field
>>> (introduced by BIP 37 and also defined in BIP 60) to false, to prevent
>>> transaction relay from occurring on the connection. Additionally, addr =
messages
>>> received from the peer are ignored by this software.
>>>
>>> The purpose of these connections is two-fold: by making additional
>>> low-bandwidth connections on which blocks can propagate, the robustness=
of a
>>> node to network partitioning attacks is strengthened. Additionally, by=
not
>>> relaying transactions and ignoring received addresses, the ability of a=
n
>>> adversary to learn the complete network graph (or a subgraph) is reduce=
d[2],
>>> which in turn increases the cost or difficulty to an attacker seeking t=
o carry
>>> out a network partitioning attack (when compared with having such knowl=
edge).
>>>
>>> The low-bandwidth / minimal-resource nature of these connections is cur=
rently
>>> known only by the initiator of the connection; this is because the tran=
saction
>>> relay field in the version message is not a permanent setting for the l=
ifetime
>>> of the connection. Consequently, a node receiving an inbound connectio=
n with
>>> transaction relay disabled cannot distinguish between a peer that will =
never
>>> enable transaction relay (as described in BIP 37) and one that will. M=
oreover,
>>> the node also cannot determine that the incoming connection will ignore=
relayed
>>> addresses; with that knowledge a node would likely choose other peers t=
o
>>> receive announced addresses instead.
>>>
>>> This proposal adds a new, optional message that a node can send a peer =
when
>>> initiating a connection to that peer, to indicate that connection shoul=
d not be
>>> used for transaction-relay for the connection's lifetime. In addition, =
without
>>> a current mechanism to negotiate whether addresses should be relayed on=
a
>>> connection, this BIP suggests that address messages not be sent on link=
s where
>>> tx-relay has been disabled.
>>>
>>> =3D=3DSpecification=3D=3D
>>>
>>> # A new disabletx message is added, which is defined as an empty messag=
e where pchCommand =3D=3D "disabletx".
>>> # The protocol version of nodes implementing this BIP must be set to 70=
017 or higher.
>>> # If a node sets the transaction relay field in the version message to =
a peer to false, then the disabletx message MAY also be sent in response to=
a version message from that peer if the peer's protocol version is >=3D 70=
017. If sent, the disabletx message MUST be sent prior to sending a verack.
>>> # A node that has sent or received a disabletx message to/from a peer M=
UST NOT send any of these messages to the peer:
>>> ## inv messages for transactions
>>> ## getdata messages for transactions
>>> ## getdata messages for merkleblock (BIP 37)
>>> ## filteradd/filterload/filterclear (BIP 37)
>>> ## mempool (BIP 35)
>>> # It is RECOMMENDED that a node that has sent or received a disabletx m=
essage to/from a peer not send any of these messages to the peer:
>>> ## addr/getaddr
>>> ## addrv2 (BIP 155)
>>> # The behavior regarding sending or processing other message types is n=
ot specified by this BIP.
>>> # Nodes MAY decide to not remain connected to peers that send this mess=
age (for example, if trying to find a peer that will relay transactions).
>>>
>>> =3D=3DCompatibility=3D=3D
>>>
>>> Nodes with protocol version >=3D 70017 that do not implement this BIP, =
and nodes
>>> with protocol version < 70017, will continue to remain compatible with
>>> implementing software: transactions would not be relayed to peers sendi=
ng the
>>> disabletx message (provided that BIP 37 or BIP 60 has been implemented)=
, and while
>>> periodic address relay may still take place, software implementing this=
BIP
>>> should not be disconnecting such peers solely for that reason.
>>>
>>> Disabling address relay is suggested but not required by this BIP, to a=
llow for
>>> future protocol extensions that might specify more carefully how addres=
s relay
>>> is to be negotiated. This BIP's recommendations for software to not rel=
ay
>>> addresses is intended to be interpreted as guidance in the absence of a=
ny such
>>> future protocol extension, to accommodate existing software behavior.
>>>
>>> Note that all messages specified in BIP 152, including blocktxn and
>>> getblocktxn, are permitted between peers that have sent/received a disa=
bletx
>>> message, subject to the feature negotiation of BIP 152.
>>>
>>> =3D=3DImplementation=3D=3D
>>>
>>> TBD
>>>
>>> =3D=3DReferences=3D=3D
>>>
>>> # Bitcoin Core has [https://github.com/bitcoin/bitcoin/pull/15759 imple=
mented this functionality] since version 0.19.0.1, released in November 201=
9.
>>> # For example, see https://www.cs.umd.edu/projects/coinscope/coinscope.=
pdf and https://arxiv.org/pdf/1812.00942.pdf.
>>>
>>> =3D=3DCopyright=3D=3D
>>>
>>> This BIP is licensed under the 2-clause BSD license.
>>>
>>> _______________________________________________
>>> bitcoin-dev mailing list
>>> bitcoin-dev@lists.linuxfoundation.org
>>> https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev
>>>
>> _______________________________________________
>> bitcoin-dev mailing list
>> bitcoin-dev@lists.linuxfoundation.org
>> https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev
>>
>
--000000000000ae39b105bc8ca229
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr"><div dir=3D"ltr">Antoine,<br><br>Nothing in my proposal be=
low precludes introducing a more comprehensive<br>feature negotiation mecha=
nism at some later date. The only changes I'm<br>proposing are to Bitco=
in Core's policy for how it treats its peer<br>connections.<br><br>>=
If we don't want to introduce a new message and<br>> corresponding =
code changes, it would be wise at least to extract VERSION's<br>> `f=
Relay` and how Core handles it in its own BIP.<br><br>I believe this is wha=
t BIP 60 does, or did you have something else in<br>mind?<br><br>> Expli=
cit addr-relay negotiation will offer more<br>> flexibility<br><br>I agr=
ee!<br><br>> (and more hygienic code paths rather than triggering data<b=
r>> structures initialization in few different locations).<br><br>Not su=
re what you mean by hygienic here. This seems like a code style<br>preferen=
ce.<br><br>> Given inbound connections might be attacker-controlled and =
tx-relay opt-out<br>> signaling is also attacker-controlled, wouldn'=
t this give a bias toward an<br>> attacker in occupying our inbound slot=
s ? Compared to honest inbound peers,<br>> which in average are going to=
be full-relay.<br><br>Sorry - I meant that Bitcoin Core should allow a cer=
tain number of<br>inbound peers that do not relay txs. This would be in add=
ition to the<br>full-relay inbound peers.<br><br>John<br></div><br><div cla=
ss=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 1, 202=
1 at 11:11 PM Antoine Riard <<a href=3D"mailto:antoine.riard@gmail.com">=
antoine.riard@gmail.com</a>> wrote:<br></div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex"><div dir=3D"ltr"><div><div>Hi John,<br></div><div><b=
r>> I think a good counter-argument against simply using `fRelay` for th=
is<br>> purpose is that we shouldn't reuse a protocol feature design=
ed for one<br>> function to achieve a totally different aim. However, we=
know that nodes<br>> on the network have been using `fRelay` to disable=
transaction relay<br>> since Bitcoin Core version 0.12 (when `-blockson=
ly` was added), and that<br>> usage was expanded to _all_ nodes running =
Bitcoin Core version 0.19 or<br>> later (when block-relay-only connectio=
ns were introduced), so using<br>> `fRelay` to disable transaction relay=
is now de facto part of the p2p<br>> protocol.<br><br><br>I don't t=
hink this is good practice ecosystem-wise. To understand tx-relay opt-out f=
rom peers correctly, a _non_ Bitcoin Core client has to implement the `fRel=
ay` subset of BIP37, but ignore the wider part around FILTER* messages. Or =
implement those messages, only to disconnect peers sending them, thus follo=
wing BIP111 requirements.<br><br>Thus, future developers of bitcoin softwar=
e have the choice between implementing a standard in a non-compliant way or=
implementing p2p messages for a light client protocol in a way of deprecat=
ion ? Even further, an interpretation of BIP 37 ("Being able to opt-ou=
t of _inv_ messages until the filter is set prevents a client being flooded=
with traffic in the brief window of time") would make it okay to send=
TX messages to your inbound block-relay-only peers. And that your client s=
houldn't be disconnected for such behavior.<br><br>On the long-term, IM=
HO, better to have a well-defined standard with a clean negotiation mechani=
sm rather than relying on code specifics of a given Bitcoin client. If we d=
on't want to introduce a new message and corresponding code changes, it=
would be wise at least to extract VERSION's `fRelay` and how Core hand=
les it in its own BIP.<br><br>> I think a better approach would be for B=
itcoin Core to only relay addr<br>> records to an inbound peer if it has=
previously received an `addr` or<br>> `addrv2` message from that peer, =
since that indicates definitively that<br>> the peer actively gossips `a=
ddr` records. This approach was first<br>> suggested by AJ in the origin=
al block-relay-only PR[15].<br><br></div><div>If a node is willingly to opt=
-out from addr-relay from one of its inbound peers, how is it supposed to d=
o ? Of course, you can drop such messages on the floor, your peer is just g=
oing to waste bandwidth for nothing. IIRC from past irc p2p meetings, we=
9;re really unclear about what a good-propagation-and-privacy-preserving ad=
dr-relay strategy should look like. Note, that distrusting your inbound pee=
rs with your addr-relay might be a sane direction. Explicit addr-relay nego=
tiation will offer more flexibility (and more hygienic code paths rather th=
an triggering data structures initialization in few different locations).<b=
r></div><div><br>> - update the inbound eviction logic to protect more i=
nbound peers which<br>> do not have transaction relay data structures.<b=
r><br></div><div>Given inbound connections might be attacker-controlled and=
tx-relay opt-out signaling is also attacker-controlled, wouldn't this =
give a bias toward an attacker in occupying our inbound slots ? Compared to=
honest inbound peers, which in average are going to be full-relay.<br></di=
v><div><br></div>Cheers,<br></div>Antoine<br><div><div><br><br></div></div>=
</div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">=
Le=C2=A0lun. 1 mars 2021 =C3=A0=C2=A016:07, John Newbery via bitcoin-dev &l=
t;<a href=3D"mailto:bitcoin-dev@lists.linuxfoundation.org" target=3D"_blank=
">bitcoin-dev@lists.linuxfoundation.org</a>> a =C3=A9crit=C2=A0:<br></di=
v><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;borde=
r-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr">Hi Suh=
as,<br><br>Thank you for this proposal. I agree with your aims, but I think=
a new<br>P2P message isn't necessary to achieve them.<br><br># Motivat=
ion<br><br>There are two distinct (but interacting) motivations:<br><br>1. =
Allow a node to accept more incoming connections which will only be<br>=C2=
=A0 =C2=A0used for block propagation (no transaction relay or addr gossip),=
<br>=C2=A0 =C2=A0while minimizing resource requirements.<br><br>2. Prevent =
`addr` gossip messages from being sent to peers which will<br>=C2=A0 =C2=A0=
'black hole' those addrs (i.e. not relay them further).<br><br>Thes=
e motivations interact because if we simply increase the number of<br>block=
-relay-only connections that nodes make without making any<br>allowance for=
the fact those connections won't gossip addr records, then<br>we'l=
l increase the number of addr black holes and worsen addr gossip.<br><br># =
Using fRelay=3Dfalse to signal no transaction relay.<br><br>`fRelay` is an =
optional field in the `version` message. There are three<br>BIPs concerned =
with `fRelay`:<br><br>- BIP 37[1] introduced the `fRelay` field to indicate=
to the recipient<br>=C2=A0 that they must not relay transactions over the =
connection until a<br>=C2=A0 `filteradd` message has been received.<br><br>=
- BIP 60[2] aimed to make the `fRelay` field mandatory. It is not clear<br>=
=C2=A0 how widely this BIP has been adopted by implementations.<br><br>- BI=
P 111[3] introduced a `NODE_BLOOM` service bit to indicate that<br>=C2=A0 b=
loom filters are served by this node. According to this BIP, "If a<br>=
=C2=A0 node does not support bloom filters but receives a "filterload&=
quot;,<br>=C2=A0 "filteradd", or "filterclear" message =
from a peer the node should<br>=C2=A0 disconnect that peer immediately.&quo=
t;<br><br>Within Bitcoin Core:<br><br>- PR 1795[4] (merged in January 2013)=
added support for BIP 37 Bloom<br>=C2=A0 filters.<br><br>- Since PR 2763[5=
] (merged in June 2013), Bitcoin Core will _always_<br>=C2=A0 include the `=
fRelay` flag in `version` messages that it sends. Bitcoin<br>=C2=A0 Core wi=
ll tolerate the `fRelay` field being present or absent in any<br>=C2=A0 `ve=
rsion` message that it receives[6].<br><br>- PR 6579[7] (merged in August 2=
015) implemented BIP 111. From that<br>=C2=A0 point on, a Bitcoin Core node=
would disconnect peers that sent it<br>=C2=A0 `filter*` messages if it had=
n't enabled `NODE_BLOOM`, provided the<br>=C2=A0 peer's version was=
>=3D 70011. In PR 7708[8] (merged in March 2016) this<br>=C2=A0 was ext=
ended to disconnect any peer that sends a `filter*` message,<br>=C2=A0 rega=
rdless of its version (in general, a 'polite disconnect' for any<br=
>=C2=A0 peer that requests an unsupported service is probably the best<br>=
=C2=A0 behaviour). In PR 16152[9] (merged in July 2019), serving Bloom<br>=
=C2=A0 filters was disabled by default, due to potential denial-of-service<=
br>=C2=A0 attacks being possible against nodes which serve bloom filters on=
<br>=C2=A0 public connections.<br><br>- PR 6993[10] (merged in November 201=
5) started reusing the `fRelay`<br>=C2=A0 field for the new `-blocksonly` m=
ode. If Bitcoin Core is started with<br>=C2=A0 `-blocksonly` configured, th=
en it includes `fRelay=3Dfalse` in all of<br>=C2=A0 the `version` messages =
it sends. In PR 15759[11] (merged =C2=A0in September<br>=C2=A0 2019), this =
usage of `fRelay` to permanently disable tx relay was<br>=C2=A0 extended fo=
r use by the new block-relay only connection type.<br><br>The net effect is=
that `fRelay` is already being used to indicate that<br>transactions shoul=
d not be relayed over a connection. In the motivation<br>for your BIP, you =
write:<br><br>> The low-bandwidth / minimal-resource nature of these con=
nections is<br>> currently known only by the initiator of the connection=
; this is<br>> because the transaction relay field in the version messag=
e is not a<br>> permanent setting for the lifetime of the connection.=C2=
=A0 Consequently, a<br>> node receiving an inbound connection with trans=
action relay disabled<br>> cannot distinguish between a peer that will n=
ever enable transaction<br>> relay (as described in BIP 37) and one that=
will...<br><br>However, as AJ points out in his response [12], the Bitcoin=
Core node<br>_does_ know whether transaction relay can be supported as soo=
n as the<br>`version` message is received:<br><br>> [...] you either set=
m_tx_relay->fRelayTxes to true via the VERSION<br>> message (either =
explicitly or by not setting fRelay), or you enable it<br>> later with F=
ILTERLOAD or FILTERCLEAR, both of which will cause a<br>> disconnect if =
bloom filters aren't supported. Bloom filter support is<br>> (option=
ally?) indicated via a service bit (BIP 111), so you could<br>> assume y=
ou know whether they're supported as soon as you receive the<br>> VE=
RSION line.<br><br>i.e. if Bitcoin Core node is running under normal config=
uration with<br>bloom filters disabled for public connections (which is bot=
h the default<br>setting and highly recommended due to DoS concerns), then =
as soon as it<br>receives a `version` message with `fRelay=3Dfalse`, it can=
be sure that<br>there will never be any transaction relay with that peer. =
If the peer<br>later tries to enable transaction relay by sending a `filter=
load`<br>message, then the node will disconnect that peer immediately.<br><=
br>In summary, we can continue using the `fRelay` field to indicate that<br=
>no transaction relay can happen for the entire lifetime of the<br>connecti=
on.=C2=A0 Bitcoin Core can postpone allocating resources for<br>transaction=
relay data structures until after the version message has<br>been received=
to minimize resource usage for incoming block-relay-only<br>connections. A=
rough implementation is here[13]. Obviously, a node that<br>has been confi=
gured to serve bloom filters on public connections would<br>not be able to =
take advantage of this and accept additional incoming<br>block-relay-only p=
eers, but I think that's fine - we already discourage<br>that configura=
tion.<br><br>I think a good counter-argument against simply using `fRelay` =
for this<br>purpose is that we shouldn't reuse a protocol feature desig=
ned for one<br>function to achieve a totally different aim. However, we kno=
w that nodes<br>on the network have been using `fRelay` to disable transact=
ion relay<br>since Bitcoin Core version 0.12 (when `-blocksonly` was added)=
, and that<br>usage was expanded to _all_ nodes running Bitcoin Core versio=
n 0.19 or<br>later (when block-relay-only connections were introduced), so =
using<br>`fRelay` to disable transaction relay is now de facto part of the =
p2p<br>protocol.<br><br># Preventing addr black holes<br><br>Addresses of p=
otential peers are gossiped around the p2p network using<br>`addr` messages=
. When a Bitcoin Core node learns of a new `addr` record,<br>it will relay =
that record to one or two of its peers, chosen at<br>random[14]. The idea i=
s that eventually the `addr` record will reach<br>most of the nodes on the =
network.<br><br>If there are too many nodes on the network that receive `ad=
dr` records<br>and do not relay those records on to their peers (termed _ad=
dr black<br>hole_ nodes), then propagation of those `addr` records suffers =
-- any<br>individual `addr` record is unlikely to reach a large proportion =
of<br>nodes on the network.<br><br>Since a motivation for block-relay-only =
connections is to protect<br>against eclipse attacks and thwart network top=
ology analysis, Bitcoin<br>Core will not relay `addr` records on those conn=
ections, and will ignore<br>any `addr` record received over those connectio=
ns. Therefore, increasing<br>the number of block-relay-only connections wit=
hout changing the `addr`<br>gossip logic is likely to increase the prevalen=
ce of addr black holes,<br>and negatively impact addr propagation. This is =
why BIP 338 includes:<br><br>> It is RECOMMENDED that a node that has se=
nt or received a disabletx<br>> message to/from a peer not send any of t=
hese messages to the peer:<br>> <br>> - addr/getaddr<br>> - addrv2=
(BIP 155)<br><br>I think a better approach would be for Bitcoin Core to on=
ly relay addr<br>records to an inbound peer if it has previously received a=
n `addr` or<br>`addrv2` message from that peer, since that indicates defini=
tively that<br>the peer actively gossips `addr` records. This approach was =
first<br>suggested by AJ in the original block-relay-only PR[15].<br><br>An=
advantage of this approach is that it will improve addr propagation<br>imm=
ediately and without any change to the P2P protocol, and will prevent<br>se=
nding `addr` records to all addr black holes (such as light clients),<br>no=
t just incoming block-relay-only connections.<br><br># Conclusion<br><br>We=
can increase the permitted number of inbound block-relay-only peers<br>whi=
le minimizing resource requirement _and_ improving addr record<br>propagati=
on, without any changes to the p2p protocol required.<br><br>I propose that=
for Bitcoin Core version 22.0:<br><br>- only initialize the transaction re=
lay data structures after the<br>=C2=A0 `version` message is received, and =
only if fRelay=3Dtrue and<br>=C2=A0 `NODE_BLOOM` is not offered on this con=
nection.<br>- only initialize the addr data structures for inbound connecti=
ons when<br>=C2=A0 an `addr`, `addrv2` or `getaddr` message is received on =
the<br>=C2=A0 connection, and only consider a connection for addr relay if =
its addr<br>=C2=A0 data structures are initialized.<br>- update the inbound=
eviction logic to protect more inbound peers which<br>=C2=A0 do not have t=
ransaction relay data structures.<br><br>Then, in version 23.0:<br><br>- mo=
destly increase the number of outbound block-relay-only connections.<br><br=
>John<br><br>[1] <a href=3D"https://github.com/bitcoin/bips/blob/master/bip=
-0037.mediawiki" target=3D"_blank">https://github.com/bitcoin/bips/blob/mas=
ter/bip-0037.mediawiki</a><br>[2] <a href=3D"https://github.com/bitcoin/bip=
s/blob/master/bip-0060.mediawiki" target=3D"_blank">https://github.com/bitc=
oin/bips/blob/master/bip-0060.mediawiki</a><br>[3] <a href=3D"https://githu=
b.com/bitcoin/bips/blob/master/bip-0111.mediawiki" target=3D"_blank">https:=
//github.com/bitcoin/bips/blob/master/bip-0111.mediawiki</a><br>[4] <a href=
=3D"https://github.com/bitcoin/bitcoin/pull/1795" target=3D"_blank">https:/=
/github.com/bitcoin/bitcoin/pull/1795</a><br>[5] <a href=3D"https://github.=
com/bitcoin/bitcoin/pull/2763" target=3D"_blank">https://github.com/bitcoin=
/bitcoin/pull/2763</a><br>[6] <a href=3D"https://github.com/bitcoin/bitcoin=
/blob/e49117470b77fb7d53be122c6490ba163c6e304d/src/net_processing.cpp#L2582=
-L2583" target=3D"_blank">https://github.com/bitcoin/bitcoin/blob/e49117470=
b77fb7d53be122c6490ba163c6e304d/src/net_processing.cpp#L2582-L2583</a><br>[=
7] <a href=3D"https://github.com/bitcoin/bitcoin/pull/6579" target=3D"_blan=
k">https://github.com/bitcoin/bitcoin/pull/6579</a><br>[8] <a href=3D"https=
://github.com/bitcoin/bitcoin/pull/7708" target=3D"_blank">https://github.c=
om/bitcoin/bitcoin/pull/7708</a><br>[9] <a href=3D"https://github.com/bitco=
in/bitcoin/pull/16152" target=3D"_blank">https://github.com/bitcoin/bitcoin=
/pull/16152</a><br>[10] <a href=3D"https://github.com/bitcoin/bitcoin/pull/=
6993" target=3D"_blank">https://github.com/bitcoin/bitcoin/pull/6993</a><br=
>[11] <a href=3D"https://github.com/bitcoin/bitcoin/pull/15759" target=3D"_=
blank">https://github.com/bitcoin/bitcoin/pull/15759</a><br>[12] <a href=3D=
"https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-January/01834=
7.html" target=3D"_blank">https://lists.linuxfoundation.org/pipermail/bitco=
in-dev/2021-January/018347.html</a><br>[13] <a href=3D"https://github.com/j=
newbery/bitcoin/tree/2021-02-lazy-init-peer" target=3D"_blank">https://gith=
ub.com/jnewbery/bitcoin/tree/2021-02-lazy-init-peer</a><br>[14] <a href=3D"=
https://github.com/bitcoin/bitcoin/blob/e52ce9f2b312b3cf3b0837918e07d7603e2=
41d63/src/net_processing.cpp#L1696-L1700" target=3D"_blank">https://github.=
com/bitcoin/bitcoin/blob/e52ce9f2b312b3cf3b0837918e07d7603e241d63/src/net_p=
rocessing.cpp#L1696-L1700</a><br>[15] <a href=3D"https://github.com/bitcoin=
/bitcoin/pull/15759#issuecomment-527012757" target=3D"_blank">https://githu=
b.com/bitcoin/bitcoin/pull/15759#issuecomment-527012757</a><br><br>> Hi,=
<br>> <br>> I'm proposing the addition of a new, optional p2p mes=
sage to allow peers to communicate that they do not want to send or receive=
(loose) transactions for the lifetime of a connection. <br>> <br>> T=
he goal of this message is to help facilitate connections on the network ov=
er which only block-related data (blocks/headers/compact blocks/etc) are re=
layed, to create low-resource connections that help protect against partiti=
on attacks on the network.=C2=A0 In particular, by adding a network message=
that communicates that transactions will not be relayed for the life of th=
e connection, we ease the implementation of software that could have increa=
sed inbound connection limits for such peers, which in turn will make it ea=
sier to add additional persistent block-relay-only connections on the netwo=
rk -- strengthening network security for little additional bandwidth.<br>&g=
t; <br>> Software has been deployed for over a year now which makes such=
connections, using the BIP37/BIP60 "fRelay" field in the version=
message to signal that transactions should not be sent initially.=C2=A0 Ho=
wever, BIP37 allows for transaction relay to be enabled later in the connec=
tion's lifetime, complicating software that would try to distinguish in=
bound peers that will never relay transactions from those that might.<br>&g=
t; <br>> This proposal would add a single new p2p message, "disable=
tx", which (if used at all) must be sent between version and verack.=
=C2=A0 I propose that this message is valid for peers advertising protocol =
version 70017 or higher.=C2=A0 Software is free to implement this BIP or ig=
nore this message and remain compatible with software that does implement i=
t.<br>> <br>> Full text of the proposed BIP is below.<br>> <br>>=
; Thanks,<br>> Suhas<br>> <br>> ----------------------------------=
-----------------<br>> <br>> <pre><br>> =C2=A0 BIP: XXX<br>&=
gt; =C2=A0 Layer: Peer Services<br>> =C2=A0 Title: Disable transaction r=
elay message<br>> =C2=A0 Author: Suhas Daftuar <<a href=3D"mailto:sda=
ftuar@chaincode.com" target=3D"_blank">sdaftuar@chaincode.com</a>><br>&g=
t; =C2=A0 Comments-Summary: No comments yet.<br>> =C2=A0 Comments-URI:<b=
r>> =C2=A0 Status: Draft<br>> =C2=A0 Type: Standards Track<br>> =
=C2=A0 Created: 2020-09-03<br>> =C2=A0 License: BSD-2-Clause<br>> <=
;/pre><br>> <br>> =3D=3DAbstract=3D=3D<br>> <br>> This BIP d=
escribes a change to the p2p protocol to allow a node to tell a peer<br>>=
; that a connection will not be used for transaction relay, to support<br>&=
gt; block-relay-only connections that are currently in use on the network.<=
br>> <br>> =3D=3DMotivation=3D=3D<br>> <br>> For nearly the pas=
t year, software has been deployed[1] which initiates<br>> connections o=
n the Bitcoin network and sets the transaction relay field<br>> (introdu=
ced by BIP 37 and also defined in BIP 60) to false, to prevent<br>> tran=
saction relay from occurring on the connection. Additionally, addr messages=
<br>> received from the peer are ignored by this software.<br>> <br>&=
gt; The purpose of these connections is two-fold: by making additional<br>&=
gt; low-bandwidth connections on which blocks can propagate, the robustness=
of a<br>> node to network partitioning attacks is strengthened.=C2=A0 A=
dditionally, by not<br>> relaying transactions and ignoring received add=
resses, the ability of an<br>> adversary to learn the complete network g=
raph (or a subgraph) is reduced[2],<br>> which in turn increases the cos=
t or difficulty to an attacker seeking to carry<br>> out a network parti=
tioning attack (when compared with having such knowledge).<br>> <br>>=
The low-bandwidth / minimal-resource nature of these connections is curren=
tly<br>> known only by the initiator of the connection; this is because =
the transaction<br>> relay field in the version message is not a permane=
nt setting for the lifetime<br>> of the connection.=C2=A0 Consequently, =
a node receiving an inbound connection with<br>> transaction relay disab=
led cannot distinguish between a peer that will never<br>> enable transa=
ction relay (as described in BIP 37) and one that will.=C2=A0 Moreover,<br>=
> the node also cannot determine that the incoming connection will ignor=
e relayed<br>> addresses; with that knowledge a node would likely choose=
other peers to<br>> receive announced addresses instead.<br>> <br>&g=
t; This proposal adds a new, optional message that a node can send a peer w=
hen<br>> initiating a connection to that peer, to indicate that connecti=
on should not be<br>> used for transaction-relay for the connection'=
s lifetime. In addition, without<br>> a current mechanism to negotiate w=
hether addresses should be relayed on a<br>> connection, this BIP sugges=
ts that address messages not be sent on links where<br>> tx-relay has be=
en disabled.<br>> <br>> =3D=3DSpecification=3D=3D<br>> <br>> # =
A new disabletx message is added, which is defined as an empty message wher=
e pchCommand =3D=3D "disabletx".<br>> # The protocol version o=
f nodes implementing this BIP must be set to 70017 or higher.<br>> # If =
a node sets the transaction relay field in the version message to a peer to=
false, then the disabletx message MAY also be sent in response to a versio=
n message from that peer if the peer's protocol version is >=3D 7001=
7. If sent, the disabletx message MUST be sent prior to sending a verack.<b=
r>> # A node that has sent or received a disabletx message to/from a pee=
r MUST NOT send any of these messages to the peer:<br>> ## inv messages =
for transactions<br>> ## getdata messages for transactions<br>> ## ge=
tdata messages for merkleblock (BIP 37)<br>> ## filteradd/filterload/fil=
terclear (BIP 37)<br>> ## mempool (BIP 35)<br>> # It is RECOMMENDED t=
hat a node that has sent or received a disabletx message to/from a peer not=
send any of these messages to the peer:<br>> ## addr/getaddr<br>> ##=
addrv2 (BIP 155)<br>> # The behavior regarding sending or processing ot=
her message types is not specified by this BIP.<br>> # Nodes MAY decide =
to not remain connected to peers that send this message (for example, if tr=
ying to find a peer that will relay transactions).<br>> <br>> =3D=3DC=
ompatibility=3D=3D<br>> <br>> Nodes with protocol version >=3D 700=
17 that do not implement this BIP, and nodes<br>> with protocol version =
< 70017, will continue to remain compatible with<br>> implementing so=
ftware: transactions would not be relayed to peers sending the<br>> disa=
bletx message (provided that BIP 37 or BIP 60 has been implemented), and wh=
ile<br>> periodic address relay may still take place, software implement=
ing this BIP<br>> should not be disconnecting such peers solely for that=
reason.<br>> <br>> Disabling address relay is suggested but not requ=
ired by this BIP, to allow for<br>> future protocol extensions that migh=
t specify more carefully how address relay<br>> is to be negotiated. Thi=
s BIP's recommendations for software to not relay<br>> addresses is =
intended to be interpreted as guidance in the absence of any such<br>> f=
uture protocol extension, to accommodate existing software behavior.<br>>=
; <br>> Note that all messages specified in BIP 152, including blocktxn =
and<br>> getblocktxn, are permitted between peers that have sent/receive=
d a disabletx<br>> message, subject to the feature negotiation of BIP 15=
2.<br>> <br>> =3D=3DImplementation=3D=3D<br>> <br>> TBD<br>>=
<br>> =3D=3DReferences=3D=3D<br>> <br>> # Bitcoin Core has [<a hr=
ef=3D"https://github.com/bitcoin/bitcoin/pull/15759" target=3D"_blank">http=
s://github.com/bitcoin/bitcoin/pull/15759</a> implemented this functionalit=
y] since version 0.19.0.1, released in November 2019.<br>> # For example=
, see <a href=3D"https://www.cs.umd.edu/projects/coinscope/coinscope.pdf" t=
arget=3D"_blank">https://www.cs.umd.edu/projects/coinscope/coinscope.pdf</a=
> and <a href=3D"https://arxiv.org/pdf/1812.00942.pdf" target=3D"_blank">ht=
tps://arxiv.org/pdf/1812.00942.pdf</a>.<br>> <br>> =3D=3DCopyright=3D=
=3D<br>> <br>> This BIP is licensed under the 2-clause BSD license.<b=
r></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr=
">On Wed, Jan 6, 2021 at 4:35 PM Suhas Daftuar via bitcoin-dev <<a href=
=3D"mailto:bitcoin-dev@lists.linuxfoundation.org" target=3D"_blank">bitcoin=
-dev@lists.linuxfoundation.org</a>> wrote:<br></div><blockquote class=3D=
"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(2=
04,204,204);padding-left:1ex"><div dir=3D"ltr">Hi,<div><br></div><div>I'=
;m proposing the addition of a new, optional p2p message to allow peers to =
communicate that they do not want to send or receive (loose) transactions f=
or the lifetime of a connection.=C2=A0</div><div><br></div><div>The goal of=
this message is to help facilitate=C2=A0connections on the network over wh=
ich only block-related data (blocks/headers/compact blocks/etc) are relayed=
, to create low-resource connections that help protect against partition at=
tacks on the network.=C2=A0 In particular, by adding a network message that=
communicates that transactions will not be relayed for the life of the con=
nection, we ease the implementation of software that could have increased i=
nbound connection limits for such peers, which in turn will make it easier =
to add additional persistent block-relay-only connections on the network --=
strengthening network security for little additional bandwidth.</div><div>=
<br></div><div>Software has been deployed for over a year now which makes s=
uch connections, using the BIP37/BIP60 "fRelay" field in the vers=
ion message to signal that transactions should not be sent initially.=C2=A0=
However, BIP37 allows for transaction relay to be enabled=C2=A0later in th=
e connection's lifetime, complicating software that would try to distin=
guish inbound peers that will never relay transactions from those that migh=
t.</div><div><br></div><div>This proposal would add a single new p2p messag=
e, "disabletx", which (if used at all) must be sent between versi=
on and verack.=C2=A0 I propose that this message is valid for peers adverti=
sing protocol version 70017 or higher.=C2=A0 Software=C2=A0is free to imple=
ment this BIP or ignore this message and remain compatible with software th=
at does implement it.</div><div><br></div><div>Full text of the proposed BI=
P is below.</div><div><br></div><div>Thanks,<br></div><div>Suhas<br></div><=
div><br></div><div>---------------------------------------------------</div=
><div><br></div><div><pre style=3D"color:rgb(0,0,0);white-space:pre-wrap">&=
lt;pre>
BIP: XXX
Layer: Peer Services
Title: Disable transaction relay message
Author: Suhas Daftuar <<a href=3D"mailto:sdaftuar@chaincode.com" targe=
t=3D"_blank">sdaftuar@chaincode.com</a>>
Comments-Summary: No comments yet.
Comments-URI:
Status: Draft
Type: Standards Track
Created: 2020-09-03
License: BSD-2-Clause
</pre>
=3D=3DAbstract=3D=3D
This BIP describes a change to the p2p protocol to allow a node to tell a p=
eer
that a connection will not be used for transaction relay, to support
block-relay-only connections that are currently in use on the network.
=3D=3DMotivation=3D=3D
For nearly the past year, software has been deployed[1] which initiates
connections on the Bitcoin network and sets the transaction relay field
(introduced by BIP 37 and also defined in BIP 60) to false, to prevent
transaction relay from occurring on the connection. Additionally, addr mess=
ages
received from the peer are ignored by this software.
The purpose of these connections is two-fold: by making additional
low-bandwidth connections on which blocks can propagate, the robustness of =
a
node to network partitioning attacks is strengthened. Additionally, by not
relaying transactions and ignoring received addresses, the ability of an
adversary to learn the complete network graph (or a subgraph) is reduced[2]=
,
which in turn increases the cost or difficulty to an attacker seeking to ca=
rry
out a network partitioning attack (when compared with having such knowledge=
).
The low-bandwidth / minimal-resource nature of these connections is current=
ly
known only by the initiator of the connection; this is because the transact=
ion
relay field in the version message is not a permanent setting for the lifet=
ime
of the connection. Consequently, a node receiving an inbound connection wi=
th
transaction relay disabled cannot distinguish between a peer that will neve=
r
enable transaction relay (as described in BIP 37) and one that will. Moreo=
ver,
the node also cannot determine that the incoming connection will ignore rel=
ayed
addresses; with that knowledge a node would likely choose other peers to
receive announced addresses instead.
This proposal adds a new, optional message that a node can send a peer when
initiating a connection to that peer, to indicate that connection should no=
t be
used for transaction-relay for the connection's lifetime. In addition, =
without
a current mechanism to negotiate whether addresses should be relayed on a
connection, this BIP suggests that address messages not be sent on links wh=
ere
tx-relay has been disabled.
=3D=3DSpecification=3D=3D
# A new disabletx message is added, which is defined as an empty message wh=
ere pchCommand =3D=3D "disabletx".
# The protocol version of nodes implementing this BIP must be set to 70017 =
or higher.
# If a node sets the transaction relay field in the version message to a pe=
er to false, then the disabletx message MAY also be sent in response to a v=
ersion message from that peer if the peer's protocol version is >=3D=
70017. If sent, the disabletx message MUST be sent prior to sending a vera=
ck.
# A node that has sent or received a disabletx message to/from a peer MUST =
NOT send any of these messages to the peer:
## inv messages for transactions
## getdata messages for transactions
## getdata messages for merkleblock (BIP 37)
## filteradd/filterload/filterclear (BIP 37)
## mempool (BIP 35)
# It is RECOMMENDED that a node that has sent or received a disabletx messa=
ge to/from a peer not send any of these messages to the peer:
## addr/getaddr
## addrv2 (BIP 155)
# The behavior regarding sending or processing other message types is not s=
pecified by this BIP.
# Nodes MAY decide to not remain connected to peers that send this message =
(for example, if trying to find a peer that will relay transactions).
=3D=3DCompatibility=3D=3D
Nodes with protocol version >=3D 70017 that do not implement this BIP, a=
nd nodes
with protocol version < 70017, will continue to remain compatible with
implementing software: transactions would not be relayed to peers sending t=
he
disabletx message (provided that BIP 37 or BIP 60 has been implemented), an=
d while
periodic address relay may still take place, software implementing this BIP
should not be disconnecting such peers solely for that reason.
Disabling address relay is suggested but not required by this BIP, to allow=
for
future protocol extensions that might specify more carefully how address re=
lay
is to be negotiated. This BIP's recommendations for software to not rel=
ay
addresses is intended to be interpreted as guidance in the absence of any s=
uch
future protocol extension, to accommodate existing software behavior.
Note that all messages specified in BIP 152, including blocktxn and
getblocktxn, are permitted between peers that have sent/received a disablet=
x
message, subject to the feature negotiation of BIP 152.
=3D=3DImplementation=3D=3D
TBD
=3D=3DReferences=3D=3D
# Bitcoin Core has [<a href=3D"https://github.com/bitcoin/bitcoin/pull/1575=
9" target=3D"_blank">https://github.com/bitcoin/bitcoin/pull/15759</a> impl=
emented this functionality] since version 0.19.0.1, released in November 20=
19.
# For example, see <a href=3D"https://www.cs.umd.edu/projects/coinscope/coi=
nscope.pdf" target=3D"_blank">https://www.cs.umd.edu/projects/coinscope/coi=
nscope.pdf</a> and <a href=3D"https://arxiv.org/pdf/1812.00942.pdf" target=
=3D"_blank">https://arxiv.org/pdf/1812.00942.pdf</a>.
=3D=3DCopyright=3D=3D
This BIP is licensed under the 2-clause BSD license.</pre></div></div>
_______________________________________________<br>
bitcoin-dev mailing list<br>
<a href=3D"mailto:bitcoin-dev@lists.linuxfoundation.org" target=3D"_blank">=
bitcoin-dev@lists.linuxfoundation.org</a><br>
<a href=3D"https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev" =
rel=3D"noreferrer" target=3D"_blank">https://lists.linuxfoundation.org/mail=
man/listinfo/bitcoin-dev</a><br>
</blockquote></div>
_______________________________________________<br>
bitcoin-dev mailing list<br>
<a href=3D"mailto:bitcoin-dev@lists.linuxfoundation.org" target=3D"_blank">=
bitcoin-dev@lists.linuxfoundation.org</a><br>
<a href=3D"https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev" =
rel=3D"noreferrer" target=3D"_blank">https://lists.linuxfoundation.org/mail=
man/listinfo/bitcoin-dev</a><br>
</blockquote></div>
</blockquote></div></div>
--000000000000ae39b105bc8ca229--
|