Bitcoin Forum
July 16, 2024, 10:48:14 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Does an Eclipse Attack pose a huge threat to the entire Bitcoin network?  (Read 150 times)
Felicity_Tide (OP)
Member
**
Offline Offline

Activity: 98
Merit: 117

cout << "Bitcoin";


View Profile
July 03, 2024, 05:06:38 AM
Merited by ABCbits (2), vapourminer (1)
 #1

I am here again with questions that have raised my curiosity, but this time, they are security related. Security matters are practically the concern of everyone, whether it be within or outside Bitcoin matters. But there are needs to pay massive attention in this area so as to protect a true technology(Bitcoin) with value and transparency.

we can't underestimate the number of users who have chosen to run a node inorder to contribute more security to the Bitcoin network. These has strengthen decentralization and transparency among every participants that are connected to the network in one way or another. An attack on the network is practically what most people have learnt about, or will learn about in their Bitcoin journey.

51% attack happens to be very common, since majority of us must have come across a written article that provides explanation either here on BTT or elsewhere. it involves an entity gaining control of more than half of a blockchain network’s computing power(hash rate). This attack is proposed to have so many consequences such as reordering of the blocks, stealing and altering of transactions, etc.

Not until recently, when I came across Eclipse Attack. This attack sounds different from the one above, as it involves:
An attack that is been targeted at a specific node within P2P network. This attack obscure(make things unseen) a node's view, thereby rendering it isolated.

If by trying to manipulate a single node so as to prevent it from receiving information from other genuine nodes, then how does it become a threat when all other nodes are not disturb, but just only one?. like, isn't it a waste of time for anyone who is trying to manipulate just a single node?.

I really don't know how beneficial this type of attack can be to anyone who is having it in mind, because it's not even as threatening compared to the 51% attack. I also came across Sybil attack, which I might be confusing it with an Eclipse attack, so here are...

 My Question:
1. Are miners major targets or just those who runs a node?.
2. does an eclipse attack pose a massive threat to the network compared to a 51% attack?.
3. Is Eclipse Attack same as Sybil Attack?.



I am 100% open to correction as I still see myself as a learner. Pardon any of my error and share your personal opinion. You might want to also DYOR after reading this.

un_rank
Hero Member
*****
Offline Offline

Activity: 784
Merit: 785


- Jay -


View Profile WWW
July 03, 2024, 06:36:57 AM
Merited by vapourminer (2), ABCbits (2)
 #2

Here is a good topic[1] that discussed Eclipse Attack, it is the most detailed one I could find that contains relevant and recent information, like this article[2] which talks about the implications of such an attack, many of which fixes has been implemented in subsequent versions of Bitcoin core[3]

1. Are miners major targets or just those who runs a node?.
2. does an eclipse attack pose a massive threat to the network compared to a 51% attack?.
3. Is Eclipse Attack same as Sybil Attack?.
1. Any node could be the target of this attack.
2. Not as massive a threat, it can be used as a prop to a 51% attack or an attempt to double spend.
3. No. A sybil attack as I understand it, is an attempt to pass of a false chain as the real one. It is almost impossible to do with Bitcoin and PoW mechanism which requires you to do lots of work, making it unprofitable, it is more common in other blockchains which operate on a different mechanism.

[1] https://bitcointalk.org/index.php?topic=5468788.20
[2] https://eprint.iacr.org/2015/263.pdf
[3] http://web.archive.org/web/20220412122303/http://cs-people.bu.edu/heilman/eclipse/

- Jay -

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io    Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
ABCbits
Legendary
*
Offline Offline

Activity: 2940
Merit: 7665


Crypto Swap Exchange


View Profile
July 03, 2024, 09:20:31 AM
Merited by vapourminer (1), Felicity_Tide (1)
 #3

My Question:
1. Are miners major targets or just those who runs a node?.
2. does an eclipse attack pose a massive threat to the network compared to a 51% attack?.
3. Is Eclipse Attack same as Sybil Attack?.

1. Anyone can become the target. But i expect there's more reason to attack node owned by miner/pool rather than random node.
2. No, especially when Bitcoin Core already fixed most of possible Eclipse attack.
3. No, although both of them are related. Eclipse Attack is about isolating your node from rest of the network, while Sybil Attack is about attack where you gain influence/power by running node/create multiple fake identity. Although in case of Bitcoin, running lots of node doesn't let anyone perform Sybil attack.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Felicity_Tide (OP)
Member
**
Offline Offline

Activity: 98
Merit: 117

cout << "Bitcoin";


View Profile
July 03, 2024, 05:35:41 PM
 #4

Here is a good topic[1] that discussed Eclipse Attack, it is the most detailed one I could find that contains relevant and recent information, like this article[2] which talks about the implications of such an attack, many of which fixes has been implemented in subsequent versions of Bitcoin core[3]
[1] https://bitcointalk.org/index.php?topic=5468788.20

Very interesting topic. The op used a good pictorial representation to make an explanation. But I observed that there seem to be contradiction, as few people couldn't agree that the quoted text below is part of what a supposed attacker can do. Any clarification on that?.
Quote
Broadcast fake transactions



Quote

I will go through this.



1. Anyone can become the target. But i expect there's more reason to attack node owned by miner/pool rather than random node.

Makes proper sense to me now.

Quote
3. while Sybil Attack is about attack where you gain influence/power by running node/create multiple fake identity. Although in case of Bitcoin, running lots of node doesn't let anyone perform Sybil attack.

Could this be possible on the Ethereum network?

And I also noticed this reply:
Mining pools can't accept the incoming connection of dozens of thousands of Bitcoin nodes, and neither should they. The network is peer-to-peer. That's why we have DNS seeds.

So, If I decide to run a full node, then my node will have to connect to other people's node who are within same geo-location(region) with me?, Rather than connecting to the pool directly?.
un_rank
Hero Member
*****
Offline Offline

Activity: 784
Merit: 785


- Jay -


View Profile WWW
July 04, 2024, 06:23:10 AM
 #5

But I observed that there seem to be contradiction, as few people couldn't agree that the quoted text below is part of what a supposed attacker can do. Any clarification on that?.
Quote
Broadcast fake transactions
There is no way to broadcast a fake transaction, either to an isolated node or to the entire network, if a transaction does not meet protocol standards, it cannot be be created or broadcasted. The attempt can be be to try and double spend a transaction.

- Jay -

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io    Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
NotATether
Legendary
*
Offline Offline

Activity: 1666
Merit: 7034


In memory of o_e_l_e_o


View Profile WWW
July 04, 2024, 07:27:16 AM
Merited by Felicity_Tide (1)
 #6

So, If I decide to run a full node, then my node will have to connect to other people's node who are within same geo-location(region) with me?, Rather than connecting to the pool directly?.

Bitcoin Core doesn't know anything about location of your peers, and it does not have a geo-lookup service to find the location of an IP address. So actually, it doesn't care who it's connected to, as long as the other peer is responsive and continues to send valid messages in a timely manner.

Key word here being *valid* because if any attempt is made to manipulate the other bitcoin node then it is placed in the node's banlist and will not connect to it anymore.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
ABCbits
Legendary
*
Offline Offline

Activity: 2940
Merit: 7665


Crypto Swap Exchange


View Profile
July 04, 2024, 09:11:31 AM
 #7

Quote
3. while Sybil Attack is about attack where you gain influence/power by running node/create multiple fake identity. Although in case of Bitcoin, running lots of node doesn't let anyone perform Sybil attack.

Could this be possible on the Ethereum network?

Short answer, no. You also need tons of staked ETH to attempt Sybil attack.

So, If I decide to run a full node, then my node will have to connect to other people's node who are within same geo-location(region) with me?, Rather than connecting to the pool directly?.

Bitcoin Core doesn't know anything about location of your peers, and it does not have a geo-lookup service to find the location of an IP address. So actually, it doesn't care who it's connected to, as long as the other peer is responsive and continues to send valid messages in a timely manner.

Key word here being *valid* because if any attempt is made to manipulate the other bitcoin node then it is placed in the node's banlist and will not connect to it anymore.

Although it's worth to mention Bitcoin Core perform IP bucketing, see https://bitcoincore.reviews/16702.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!