Censorship Resistant Transaction Relay - Taking out the garbage(man)

May 27 - May 27, 2025

  • The recent surge in sybil attacks targeting Libre Relay nodes through the use of a fork named "garbageman" has raised significant concerns within the Bitcoin community.

This malicious fork advertises the NODE_LIBRE_RELAY service bit but silently discards transactions, undermining the integrity and reliability of transaction relaying. The attackers have not only demonstrated their capability to conduct such operations but have also expressed intentions to escalate their efforts, potentially increasing the costs associated with countering these Distributed Denial of Service (DoS) attacks on Bitcoin.

In response to these challenges, discussions around the effectiveness of sybil attacks and potential countermeasures have come to the forefront. A sybil attack's success largely depends on the attacker's ability to monopolize a node's outgoing connections with malicious nodes. Given the current networking configuration of Bitcoin Core and Libre Relay nodes, the probability of a successful attack is mathematically quantifiable and notably increases with the attacker's control over a larger fraction of the network. This situation underscores the necessity for robust defense mechanisms against such vulnerabilities.

A notable strategy employed by Bitcoin Core to mitigate block propagation sybil attacks is the feeler node system. This system periodically attempts to establish new connections to diversify the network's connectivity, ensuring access to the true most-work chain. However, tackling sybil attacks on transaction relaying presents unique challenges due to factors like resolution, bandwidth, and the non-consensus nature of mempools. A proposed solution involves leveraging metrics based on the amount of new transaction fees advertised by peers, encouraging nodes to prefer connections with peers that provide access to a wider range of transactions.

The development of cluster mempool functionality in Bitcoin Core aims to enhance this approach by organizing transactions in memory according to fee order. This would enable nodes to efficiently identify and prioritize transactions likely to be included in the upcoming blocks based on total fees. To ensure honesty among peers and prevent exclusion of valid transactions, techniques for efficient set reconciliation are suggested, allowing nodes to compare and synchronize their views of high-fee transactions.

Privacy considerations and the importance of manual peering with trusted nodes are also highlighted as critical components of a comprehensive strategy against sybil attacks. Manual peering, facilitated by an improved mechanism for exchanging connection information, could significantly bolster the network's resilience by leveraging personal trust relationships beyond algorithmic detection and mitigation methods.

This discourse reflects the ongoing efforts within the Bitcoin development community to address vulnerabilities and enhance the network's security against sophisticated adversarial tactics. The links provided offer further insights into the technical aspects and considerations underlying these discussions:

These resources and discussions serve as a testament to the dynamic and collaborative nature of open-source communities in navigating the complex landscape of cryptocurrency security.

Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback