Chris Gough [ARCHIVE] on Nostr: 📅 Original date posted:2018-05-10 📝 Original message: On Fri, May 11, 2018 at ...
📅 Original date posted:2018-05-10
📝 Original message:
On Fri, May 11, 2018 at 9:18 AM, Jim Posen <jim.posen at gmail.com> wrote:
> Hmm, I'm not quite following the situation. What do you mean by "directs
> normal traffic"? Since the sender constructs the entire circuit, routing
> nodes do not get any discretion over which nodes to forward a payment to,
<facepalm>
> only whether to forward or fail. What an attacker could do is perform a loop
> attack and send a payment to another node that they control and delay the
> payment on the receiving end. Note that the sending node loses no
> reputation, only the receiving node. Since the hops being attacked are the
> ones in the middle and they are faithfully enforcing the reputation
> protocol, the receiving node's reputation should be penalized properly,
> making it unlikely the attack will succeed in a second attempt.
So the attacker can purchase reputation for the sacrificial node by
sending them legitimate payments, and then spend that reputation (at
the mutual expense of hops) by delaying targeted transactions. But my
question about obscuring the collusion by artificially lowering
reported risk was nonsense based on misunderstanding. Thanks for
helping me understand.
Chris Gough
📝 Original message:
On Fri, May 11, 2018 at 9:18 AM, Jim Posen <jim.posen at gmail.com> wrote:
> Hmm, I'm not quite following the situation. What do you mean by "directs
> normal traffic"? Since the sender constructs the entire circuit, routing
> nodes do not get any discretion over which nodes to forward a payment to,
<facepalm>
> only whether to forward or fail. What an attacker could do is perform a loop
> attack and send a payment to another node that they control and delay the
> payment on the receiving end. Note that the sending node loses no
> reputation, only the receiving node. Since the hops being attacked are the
> ones in the middle and they are faithfully enforcing the reputation
> protocol, the receiving node's reputation should be penalized properly,
> making it unlikely the attack will succeed in a second attempt.
So the attacker can purchase reputation for the sacrificial node by
sending them legitimate payments, and then spend that reputation (at
the mutual expense of hops) by delaying targeted transactions. But my
question about obscuring the collusion by artificially lowering
reported risk was nonsense based on misunderstanding. Thanks for
helping me understand.
Chris Gough