Questions tagged [eclipse-attack]

11 questions
13
votes
2 answers

Eclipse attack vs. Sybil attack

I came across this paper Eclipse Attacks on Bitcoin’s Peer-to-Peer Network ∗ that sounds very similar to the Sybil attack. Can someone point out the difference between both attacks.
user123
  • 131
  • 1
  • 4
9
votes
3 answers

Why is connecting bitcoin exclusively over Tor considered bad practice?

I've heard that a bitcoin node with only Tor connections is "trivial" to eclipse attack and that such nodes should maintain at least one (or more?) clearnet connections in addition. What is it about Tor that makes eclipse attacks trivial?
pinhead
  • 4,932
  • 2
  • 23
  • 38
7
votes
1 answer

What is a block-relay-only connection? What is it used for?

Modern versions of bitcoin core establish a fixed number of outbound connections: 8 outbound-full-relay connections and 2 block-relay-only connections. What is the purpose of block-relay-only connections and how are they used? Here are two example…
vnprc
  • 365
  • 1
  • 10
6
votes
2 answers

What is a Feeler Connection? When is it used?

The bitcoin client hard codes a limit of 8 outbound connections and 2 block-only connections. Your node will try to always maintain these 10 outbound connections with reliable peers as a defense against network attacks. But there is an ephemeral…
vnprc
  • 365
  • 1
  • 10
2
votes
1 answer

What is the prior work or inspiration for the new/tried table design?

In Eclipse Attacks on Bitcoin’s Peer-to-Peer Network section 8 Related Work, the authors describe how some of the countermeasures to eclipse attacks were inspired by botnets. What inspired the design of the address sharing mechanism between full…
vnprc
  • 365
  • 1
  • 10
2
votes
2 answers

What resources are needed to implement an Eclipse attack?

I have read this paper of Eclipse attack. And I want to konw that what resources are needed to implement an Eclipse attack? IP addresses and investing attack time are needed, and is there anything else you need? Thank you for your answer! Eclipse…
A-qiu
  • 21
  • 2
2
votes
0 answers

Monitor domains used by DNS seeds in Bitcoin Core and Bitcoin Knots

Problem: DNS seeds and security Solution: I want to create a website which does the following: Check 'A' record for all domains used by 9 DNS seeds every 5 minutes Save all IP addresses in local database Check if these are bitcoin nodes Mark ✅ for…
user103136
1
vote
1 answer

How does Bitcoin currently mitigate Sybil and Eclipse attacks?

What countermeasures does Bitcoin currently have in place to limit Sybil attacks (ie of full nodes [not miners]) and eclipse attacks? In particular, it seems like an important countermeasure would be to attempt to give your connections only about…
B T
  • 1,569
  • 13
  • 27
0
votes
2 answers

Attack the network by having 51% of full nodes?

Tell me if I'm missing something here: If a government recognised that an adversery of theirs had a lot of bitcoin reserves, couldn't they just 'crash' the bitcoin network by spinning up enough full nodes to gain 51% of the network (not a hard thing…
rackers
  • 11
  • 1
0
votes
1 answer

Collisions when adding an address entry to the new table

What does the bitcoin protocol do to handle collisions when adding addresses to the new table?
Vinay Shetty
  • 115
  • 5
0
votes
2 answers

Could a government or company run thousands of unique nodes?

Let’s say you’re a tech giant or control a tech giant. So you have access to money, computers & thousands of unique ip addresses. Could these giants spin up so many unique nodes that they could perform a 51% attack?
Trevor Wood
  • 181
  • 9