Reimagining Onion Messages as an Overlay Layer

Posted by ZmnSCPxj

Jul 1, 2025/12:00 UTC

The discussion highlights the intricacies and potential vulnerabilities associated with establishing onion links within a peer-to-peer network, particularly focusing on the balance between accessibility and protection against denial-of-service (DoS) attacks. The proposal suggests that requiring an existing channel between peers for the creation of an onion link could serve as a barrier, albeit not a foolproof one, to prevent frivolous or malicious requests. However, this measure alone might not be sufficient as it merely elevates the cost and effort required to establish such links without offering substantial DoS protection.

Further elaboration on the protocol suggests introducing mechanisms like upfront payments, the requirement of presenting a Unspent Transaction Output (UTXO) that is provably locked until a future time, or the continuous streaming of funds to maintain the uptime of the link as possible ways to enhance security. These methods aim to ensure that the establishment and maintenance of onion links bear a significant cost or commitment, thereby deterring potential attackers who rely on the generation of numerous fake identities through inexpensive means.

A critical point of concern raised is the ease with which an attacker can create seemingly legitimate public nodes by generating random numbers and fabricating onion_link_proof messages. This method exploits the network's inability to verify the existence of these nodes without an on-chain footprint. The argument posits that even strategies like locking UTXOs until a future date, while seemingly effective, might not offer robust protection since they ultimately require on-chain actions, which are inherently costly and thus, could still be exploited by those willing to incur such costs for the sake of launching a DoS attack.

This discourse underscores the nuanced challenges faced in securing peer-to-peer networks against DoS attacks while maintaining open and accessible channels for genuine participants. It calls for a careful consideration of the trade-offs involved in implementing security measures that do not unduly burden legitimate users but are stringent enough to deter malicious entities.

Link to Raw Post
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback