bitcoin-dev

A "Free" Relay Attack Taking Advantage of The Lack of Full-RBF In Core

A "Free" Relay Attack Taking Advantage of The Lack of Full-RBF In Core

Original Postby Peter Todd

Posted on: July 22, 2024 15:10 UTC

In the discussion about the intricacies of "free" relay attacks within the blockchain and cryptocurrency space, an important point is raised regarding the effectiveness of rebroadcasting transactions to mitigate such attacks.

Rebroadcasting, contrary to making these attacks less expensive, actually increases their cost under certain conditions. When attackers broadcast conflicting transactions with different fee rates, the strategy of rebroadcasting the higher fee-rate transaction by nodes ensures that only the intended (higher fee) transaction remains in the mempool, thereby preventing the lower fee-rate conflict from being rebroadcast once the higher fee-rate transaction drops. This mechanism forces attackers to either get their original transaction mined or to opt for an even higher fee rate to maintain their attack, highlighting the importance of rebroadcast mechanisms in enhancing network security.

The dialogue then shifts to the topic of Replace-By-Fee (RBF) policy and its underutilization in the network. RBF offers a more efficient alternative to Child Pays For Parent (CPFP) solutions, potentially saving millions in fees, especially as technologies like Lightning Network gain more adoption. The financial implications are significant, with inefficient CPFP solutions already costing users millions. In the context of Lightning Network and similar protocols, the ability to dynamically adjust transaction fees through RBF becomes critically important during network congestion or mass failure scenarios, where prioritizing transactions through fee adjustments can ensure timely processing without excessive costs.

Furthermore, the conversation emphasizes the economic foundations of Layer 2 (L2) protocol security, contrasting it with traditional cryptography that relies on mathematical problem difficulty. The mention of LND's RBF sweeper feature in version 0.18 illustrates a practical application of RBF policy, aiming to optimize the mining of valuable transactions (like HTLCs) over less critical ones during periods of high demand for block space. This approach underscores the necessity of addressing pinning attacks and refining RBF policies to secure transaction processing in constrained environments.

For more insights into these discussions, Peter Todd's website provides additional depth on these topics and can be accessed here.