Bitcoin Forum
June 23, 2024, 06:18:36 PM *
News: Voting for pizza day contest
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Possibility of a DDoS attack  (Read 242 times)
coder0x15 (OP)
Jr. Member
*
Offline Offline

Activity: 36
Merit: 3


View Profile
July 16, 2019, 04:41:23 PM
Merited by ABCbits (1)
 #1

Theoretically. This is not a mechanism of any kind of attack, but It's about the "lost" coins. May be. It is just for an educational experiment.

What if someone has the ability to send transactions to the each node's memory pool. He have also the ability to send TCP packets from some list of the internet protocol addresses (65533 IPs against 9686 nodes, for example).

He send transactions, but R and S in it's signature are not formed by the such way as they can be formed by the real owner of the private key. Each node needs to get unsigned TX hash and then check it's Sig for to confirm the output's amount spending. It will take some time.

Is it a theoretically possible DDoS attack to [any]coin network? Each node need to verify signature and it takes some time. Provided that attacker has the full UTXO set locally on his [XXXX] machine IPs.

Or IPv6 folds this "problem"? Or what is really means "bitcoin full-node"?
achow101
Moderator
Legendary
*
expert
Offline Offline

Activity: 3430
Merit: 6720


Just writing some code


View Profile WWW
July 16, 2019, 04:53:48 PM
Merited by Foxpup (4), bones261 (2), ABCbits (1)
 #2

Node's have rate limiting and will disconnect and refuse connections to and from peers that misbehave (i.e. they ban that node). So if a node sends a bunch of transactions too quickly, they will be disconnected and banned. If they send too many invalid transactions, they will be disconnected and banned. At worst, such an attack would take up a few seconds of CPU time before every node that this attacker has connected to disconnects and bans him.

Also, signature verification isn't all that slow. Nodes already fully validate every transaction they receive which includes signatures. In fact, it's faster to check an invalid signature because it will exit the signature check algorithm early.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!