A "Free" Relay Attack Taking Advantage of The Lack of Full-RBF In Core

Posted by Peter Todd

Jul 22, 2024/15:10 UTC

In the discussion about the intricacies of "free" relay attacks within the blockchain and cryptocurrency space, an important point is raised regarding the effectiveness of rebroadcasting transactions to mitigate such attacks. Rebroadcasting, contrary to making these attacks less expensive, actually increases their cost under certain conditions. When attackers broadcast conflicting transactions with different fee rates, the strategy of rebroadcasting the higher fee-rate transaction by nodes ensures that only the intended (higher fee) transaction remains in the mempool, thereby preventing the lower fee-rate conflict from being rebroadcast once the higher fee-rate transaction drops. This mechanism forces attackers to either get their original transaction mined or to opt for an even higher fee rate to maintain their attack, highlighting the importance of rebroadcast mechanisms in enhancing network security.

The dialogue then shifts to the topic of Replace-By-Fee (RBF) policy and its underutilization in the network. RBF offers a more efficient alternative to Child Pays For Parent (CPFP) solutions, potentially saving millions in fees, especially as technologies like Lightning Network gain more adoption. The financial implications are significant, with inefficient CPFP solutions already costing users millions. In the context of Lightning Network and similar protocols, the ability to dynamically adjust transaction fees through RBF becomes critically important during network congestion or mass failure scenarios, where prioritizing transactions through fee adjustments can ensure timely processing without excessive costs.

Furthermore, the conversation emphasizes the economic foundations of Layer 2 (L2) protocol security, contrasting it with traditional cryptography that relies on mathematical problem difficulty. The mention of LND's RBF sweeper feature in version 0.18 illustrates a practical application of RBF policy, aiming to optimize the mining of valuable transactions (like HTLCs) over less critical ones during periods of high demand for block space. This approach underscores the necessity of addressing pinning attacks and refining RBF policies to secure transaction processing in constrained environments.

For more insights into these discussions, Peter Todd's website provides additional depth on these topics and can be accessed here.

Link to Raw Post
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback