Pages:
Author

Topic: [INFO - DISCUSSION] Eclipse Attack - page 2. (Read 436 times)

legendary
Activity: 1512
Merit: 7340
Farewell, Leo
October 01, 2023, 11:49:17 AM
#5
This is near to impossible, maybe the attacker can broadcast transaction that are already spent in the real largest chain.
It is possible to broadcast any transaction. What's impossible is to "fake" a transaction if it isn't against the protocol rules. Double-spending a transaction doesn't count as "faking" if you redo the work.

Unless the isolated node is mining there is no use of doing fake tx, even if it was mining, it wouldn't accept a fake tx unless you feed it with a fake longest chain
There is no "fake longest chain", no matter how much we'd want it. There is the difficultywise-longest chain, and it's always the correct chain. If another one comes up, with more work, that becomes the correct one.



What is needed to be emphasized is that an eclipse attack isn't going to be effective if the attacker doesn't spend a significant amount of resources to redo the Proof-of-Work, which in that case, the network would be under threat anyway. The reason is that the attacker must maintain an entire chain themselves. If your node receives no blocks for hours, or days, you can make out you're under an eclipse attack. The attacker must solve blocks every 10 minutes to go unnoticed, which requires to redo a lot of work. They cannot re-create their own, little-worked chain, because node software comes with checkpoints.

That is my understanding as to why an eclipse attack shouldn't be concerning, but please correct me if I'm wrong.
legendary
Activity: 3304
Merit: 8633
icarus-cards.eu
October 01, 2023, 11:16:47 AM
#4
i have found two more sources here that address this topic and also explain it well:

Quote
An eclipse attack is a relatively simple attack that a malicious actor may deploy to interfere with nodes on a network. As the name may suggest, the attack aims to obscure a participant’s view of the peer-to-peer network, in order to cause general disruption, or to prepare for more sophisticated attacks.
https://medium.com/crossfi-official/eclipse-attack-in-blockchain-1531f6e9c20a

Quote
Eclipse attacks occur when a node is isolated from all honest peers but remains connected to at least one malicious peer.
https://bitcoinops.org/en/topics/eclipse-attacks/


however, even if the nodes in the table are corrupted, the currently running nodes have already found all their peers, so they cannot affect the network and in addition, there is also an option to specify the desired peer, through which you can get the addresses of other peers
copper member
Activity: 1330
Merit: 899
🖤😏
October 01, 2023, 10:48:39 AM
#3
Broadcast fake transaction to which node? To the isolated node or all the other nodes? Unless the isolated node is mining there is no use of doing fake tx, even if it was mining, it wouldn't accept a fake tx unless you feed it with a fake longest chain, on top of that aren't mining nodes connected to several of other trusted/ honest nodes to prevent such attacks?

And in order to have unlimited time to generate blocks with double spends, wouldn't they need to eclipse 51% of nodes? And even if they do, what would they do with the majority of hash power which are comfortably mining the longest valid chain? So this is only good for a small network.
hero member
Activity: 862
Merit: 662
October 01, 2023, 10:32:32 AM
#2
Quote
Broadcast fake transactions

This is near to impossible, maybe the attacker can broadcast transaction that are already spent in the real largest chain.

But any invalid transaction is going to be dropped without problem.

Or maybe I am wrong how a fake transaction is done?
legendary
Activity: 3304
Merit: 8633
icarus-cards.eu
October 01, 2023, 10:18:49 AM
#1
with these 4 slides i would like to discuss with you the topic 'eclipse attack' and give you some information about it.
an eclipse attack targets specific nodes on a network by surrounding them and obscuring their view of the entire network, thus isolating them. for example, if a Bitcoin node has 8 connections to other nodes and an attacker controls all 8 of those nodes, the attacker may refuse to forward any new blocks that miners produce. although the rest of the network will continue to process new blocks, the victim node will not know that blocks are coming in. to prevent or eliminate this, you can use a hard-coded list of seed nodes. if they are unreachable, the node uses dns seeds and returns a list of ip addresses of active nodes when queried.

also, nodes can exchange peers by sending a 'getaddr' message and receiving addresses of the peer



https://twitter.com/BTCillustrated
Pages:
Jump to: