summaryrefslogtreecommitdiff
path: root/e4/9285e90ad4114311260457497da31e2f0c7356
blob: 8e03b4355a81603b3dd6ab31fe792dac052b1b4e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
Return-Path: <antoine.riard@gmail.com>
Received: from fraxinus.osuosl.org (smtp4.osuosl.org [140.211.166.137])
 by lists.linuxfoundation.org (Postfix) with ESMTP id EC84CC0859;
 Wed,  6 May 2020 09:06:24 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by fraxinus.osuosl.org (Postfix) with ESMTP id D3D9086914;
 Wed,  6 May 2020 09:06:24 +0000 (UTC)
X-Virus-Scanned: amavisd-new at osuosl.org
Received: from fraxinus.osuosl.org ([127.0.0.1])
 by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id gE1UvNe7JeG8; Wed,  6 May 2020 09:06:24 +0000 (UTC)
X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6
X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6
Received: from mail-pl1-f170.google.com (mail-pl1-f170.google.com
 [209.85.214.170])
 by fraxinus.osuosl.org (Postfix) with ESMTPS id 1F2218690E;
 Wed,  6 May 2020 09:06:24 +0000 (UTC)
Received: by mail-pl1-f170.google.com with SMTP id t16so227666plo.7;
 Wed, 06 May 2020 02:06:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=KYLwFIMTdZKUf2InUbVu4YrNjy/wNM4ifD/Z2h65KaM=;
 b=MVB6D3Qr8IyhzhdFHWnwI7EiAPG4cKQzXqcp3S3RYWDTMTf6renuSis9vjaNFCzncZ
 pi4bJ+9UjWV1BulZfQH4GlUFswmJpFgDXSrK+dUI9ioama1QoaM8F9TwZJev420qx9Iv
 UwvVmvK1r3h7t3arbjuv333m9YdHqzOSqXIahLQ9GySQaYZstE4+3nnuqGfTUFrKlxb+
 qI/Zfq5qXrG6HtHwAjI8lh7paQ+BtXEfW0hxugROcU1ZFktHrvknCTswk/IrNJjp2wiY
 PQO0Av2aSAf/zPauq2S7zaX5pqTbnFUkl4Q+keg/A/9Fzz2gr7ZssmtnKzfWQ2ii7H+G
 zoBQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=KYLwFIMTdZKUf2InUbVu4YrNjy/wNM4ifD/Z2h65KaM=;
 b=BQn1fWZe4n+1aPP6YPLrB6PJC0Q92IdjfMFpaohvDD2EdEfHo3sOnSRy+tqhK/w9JG
 53Of/Ti7c0hLZ+7Z/RHMOoBONgBSCxcStO2Aul+GOE7EHxfbIr7ZI5lp+XZkuzfBdVxw
 l4a9yxg9fjyhwjXjhCjWgZHIlnrdK3ggE7Tyte6QzmMhHVfvt9TLqO2gxPzMDBDc4uCR
 4xtF53QmPUmdryQjWCx05G1WqWKu2m+McBwBU/SneCCuYRzAIYjNF2d0hkdiocoWcGHO
 V+pBn6Cf7l+2ojiQvryxTxRV0AQeThMaQ0LOsXkP7oolf2/H3djlKVtNJirbwKfWjVBp
 XrWQ==
X-Gm-Message-State: AGi0PubJmwZ1sKUlCwZbMVRpvWSdVba2nX/y5shlVVBrvLDZ/qQIoJ3F
 ZC4r09sKp/myp+hipBdsh4KZ/K9XHa2Qas/VlYM=
X-Google-Smtp-Source: APiQypKg4KG3tu9+Vas0e25EU1VEUswrR+OVC4MK99v7X9NbP/QS12D5Da0J8XPT4/dkrsWCZkPo4985H6YO08s9QFs=
X-Received: by 2002:a17:90a:266c:: with SMTP id
 l99mr8199225pje.186.1588755983538; 
 Wed, 06 May 2020 02:06:23 -0700 (PDT)
MIME-Version: 1.0
References: <CALZpt+GBPbf+Pgctm5NViNons50aQs1RPQkEo3FW5RM4fL9ztA@mail.gmail.com>
 <202005051300.38836.luke@dashjr.org>
In-Reply-To: <202005051300.38836.luke@dashjr.org>
From: Antoine Riard <antoine.riard@gmail.com>
Date: Wed, 6 May 2020 05:06:11 -0400
Message-ID: <CALZpt+GR8L6Zo_4A8LJb=yndr32g62XFKBmGiWMSRaZqHrfOog@mail.gmail.com>
To: Luke Dashjr <luke@dashjr.org>
Content-Type: multipart/alternative; boundary="000000000000089d3605a4f71420"
X-Mailman-Approved-At: Wed, 06 May 2020 13:25:00 +0000
Cc: Bitcoin Protocol Discussion <bitcoin-dev@lists.linuxfoundation.org>,
 "lightning-dev\\\\@lists.linuxfoundation.org"
 <lightning-dev@lists.linuxfoundation.org>
Subject: Re: [bitcoin-dev] On the scalability issues of onboarding millions
 of LN mobile clients
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>, 
 <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>, 
 <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Wed, 06 May 2020 09:06:25 -0000

--000000000000089d3605a4f71420
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I do see the consensus capture argument by miners but in reality isn't this
attack scenario have a lot of assumptions on topology an deployment ?

For such attack to succeed you need miners nodes to be connected to clients
to feed directly the invalid headers and if these ones are connected to
headers/filters gateways, themselves doing full-nodes validation invalid
chain is going to be sanitized out ?

Sure now you trust these gateways, but if you have multiple connections to
them and can guarantee they aren't run by the same entity, that maybe an
acceptable security model, depending of staked amount and your
expectations. I more concerned of having a lot of them and being
diversified enough to avoid collusion between gateways/chain access
providers/miners.

But even if you light clients is directly connected to the backbone network
and may be reached by miners you can implement fork anomalies detection and
from then you may have multiples options:
* halt the wallet, wait for human intervention
* fallback connection to a trusted server, authoritative on your chain view
* invalidity proofs?

Now I agree you need a wide-enough, sane backbone network to build on top,
and we should foster node adoption as much as we can.

Le mar. 5 mai 2020 =C3=A0 09:01, Luke Dashjr <luke@dashjr.org> a =C3=A9crit=
 :

> On Tuesday 05 May 2020 10:17:37 Antoine Riard via bitcoin-dev wrote:
> > Trust-minimization of Bitcoin security model has always relied first an=
d
> > above on running a full-node. This current paradigm may be shifted by L=
N
> > where fast, affordable, confidential, censorship-resistant payment
> services
> > may attract a lot of adoption without users running a full-node.
>
> No, it cannot be shifted. This would compromise Bitcoin itself, which for
> security depends on the assumption that a supermajority of the economy is
> verifying their incoming transactions using their own full node.
>
> The past few years has seen severe regressions in this area, to the point
> where Bitcoin's future seems quite bleak. Without serious improvements to
> the
> full node ratio, Bitcoin is likely to fail.
>
> Therefore, all efforts to improve the "full node-less" experience are
> harmful,
> and should be actively avoided. BIP 157 improves privacy of fn-less usage=
,
> while providing no real benefits to full node users (compared to more
> efficient protocols like Stratum/Electrum).
>
> For this reason, myself and a few others oppose merging support for BIP
> 157 in
> Core.
>
> > Assuming a user adoption path where a full-node is required to benefit
> for
> > LN may deprive a lot of users, especially those who are already denied =
a
> > real financial infrastructure access.
>
> If Bitcoin can't do it, then Bitcoin can't do it.
> Bitcoin can't solve *any* problem if it becomes insecure itself.
>
> Luke
>
> P.S. See also
>
> https://medium.com/@nicolasdorier/why-i-dont-celebrate-neutrino-206bafa5f=
da0
>
> https://medium.com/@nicolasdorier/neutrino-is-dangerous-for-my-self-sover=
eignty-18fac5bcdc25
>

--000000000000089d3605a4f71420
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I do see the consensus capture argument by miners but=
 in reality isn&#39;t this attack scenario have a lot of assumptions on top=
ology an deployment ?<br><br></div><div>For such attack to succeed you need=
 miners nodes to be connected to clients to feed directly the invalid heade=
rs and if these ones are connected to headers/filters gateways, themselves =
doing full-nodes validation invalid chain is going to be sanitized out ?<br=
><br></div><div>Sure now you trust these gateways, but if you have multiple=
 connections to them and can guarantee they aren&#39;t run by the same enti=
ty, that maybe an acceptable security model, depending of staked amount and=
 your expectations. I more concerned of having a lot of them and being dive=
rsified enough to avoid collusion between gateways/chain access providers/m=
iners.<br><br></div><div>But even if you light clients is directly connecte=
d to the backbone network and may be reached by miners you can implement fo=
rk anomalies detection and from then you may have multiples options:<br></d=
iv><div>* halt the wallet, wait for human intervention<br></div><div>* fall=
back connection to a trusted server, authoritative on your chain view<br></=
div><div>* invalidity proofs?<br><br></div><div>Now I agree you need a wide=
-enough, sane backbone network to build on top, and we should foster node a=
doption as much as we can.<br></div></div><br><div class=3D"gmail_quote"><d=
iv dir=3D"ltr" class=3D"gmail_attr">Le=C2=A0mar. 5 mai 2020 =C3=A0=C2=A009:=
01, Luke Dashjr &lt;<a href=3D"mailto:luke@dashjr.org">luke@dashjr.org</a>&=
gt; a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex">On Tuesday 05 May 2020 10:17:37 Antoine Riard via bitcoin-dev wrote=
:<br>
&gt; Trust-minimization of Bitcoin security model has always relied first a=
nd<br>
&gt; above on running a full-node. This current paradigm may be shifted by =
LN<br>
&gt; where fast, affordable, confidential, censorship-resistant payment ser=
vices<br>
&gt; may attract a lot of adoption without users running a full-node.<br>
<br>
No, it cannot be shifted. This would compromise Bitcoin itself, which for <=
br>
security depends on the assumption that a supermajority of the economy is <=
br>
verifying their incoming transactions using their own full node.<br>
<br>
The past few years has seen severe regressions in this area, to the point <=
br>
where Bitcoin&#39;s future seems quite bleak. Without serious improvements =
to the <br>
full node ratio, Bitcoin is likely to fail.<br>
<br>
Therefore, all efforts to improve the &quot;full node-less&quot; experience=
 are harmful, <br>
and should be actively avoided. BIP 157 improves privacy of fn-less usage, =
<br>
while providing no real benefits to full node users (compared to more <br>
efficient protocols like Stratum/Electrum).<br>
<br>
For this reason, myself and a few others oppose merging support for BIP 157=
 in <br>
Core.<br>
<br>
&gt; Assuming a user adoption path where a full-node is required to benefit=
 for<br>
&gt; LN may deprive a lot of users, especially those who are already denied=
 a<br>
&gt; real financial infrastructure access.<br>
<br>
If Bitcoin can&#39;t do it, then Bitcoin can&#39;t do it.<br>
Bitcoin can&#39;t solve *any* problem if it becomes insecure itself.<br>
<br>
Luke<br>
<br>
P.S. See also<br>
<a href=3D"https://medium.com/@nicolasdorier/why-i-dont-celebrate-neutrino-=
206bafa5fda0" rel=3D"noreferrer" target=3D"_blank">https://medium.com/@nico=
lasdorier/why-i-dont-celebrate-neutrino-206bafa5fda0</a><br>
<a href=3D"https://medium.com/@nicolasdorier/neutrino-is-dangerous-for-my-s=
elf-sovereignty-18fac5bcdc25" rel=3D"noreferrer" target=3D"_blank">https://=
medium.com/@nicolasdorier/neutrino-is-dangerous-for-my-self-sovereignty-18f=
ac5bcdc25</a><br>
</blockquote></div>

--000000000000089d3605a4f71420--