论文标题
洪水与战利品:闪电网络的全身攻击
Flood & Loot: A Systemic Attack On The Lightning Network
论文作者
论文摘要
闪电网络有望减轻比特币的已知可伸缩性问题。这种第二层方法的操作取决于参与者转向区块链随时索赔资金的能力,这被认为很少发生。早期发现的风险之一是对协议的全身攻击广泛,其中攻击者一次触发了许多闪电通道的关闭。由此产生的区块链中的大量交易将不允许适当解决所有债务,并且攻击者可能会偷走一些资金。本文探讨了这种攻击的细节,并评估了其成本和对比特币和闪电网络的总体影响。具体来说,我们表明攻击者能够同时导致受害者节点与请求相当,并窃取锁定在渠道中的资金。我们继续研究闪电节点与费用估计机制的相互作用,并表明攻击者可以不断降低受害者试图收回资金的交易费用,这些交易后来将用于收回资金 - 最终达到了一个只有低比例的州,而该州只能用于雷电交易。随着雷击协议允许攻击者增加自己的交易所提供的费用,我们的攻击变得更加容易。我们继续从经验上表明,绝大多数节点同意引入未知来源的开放请求,因此容易受到此攻击的影响。我们重点介绍了闪电网络协议的各种实现之间的差异,并回顾了每个实现对攻击的敏感性。最后,我们提出缓解策略,以降低网络的系统性攻击风险。
The Lightning Network promises to alleviate Bitcoin's known scalability problems. The operation of such second layer approaches relies on the ability of participants to turn to the blockchain to claim funds at any time, which is assumed to happen rarely. One of the risks that was identified early on is that of a wide systemic attack on the protocol, in which an attacker triggers the closure of many Lightning channels at once. The resulting high volume of transactions in the blockchain will not allow for the proper settlement of all debts, and attackers may get away with stealing some funds. This paper explores the details of such an attack and evaluates its cost and overall impact on Bitcoin and the Lightning Network. Specifically, we show that an attacker is able to simultaneously cause victim nodes to overload the Bitcoin blockchain with requests and to steal funds that were locked in channels. We go on to examine the interaction of Lightning nodes with the fee estimation mechanism and show that the attacker can continuously lower the fee of transactions that will later be used by the victim in its attempts to recover funds - eventually reaching a state in which only low fractions of the block are available for lightning transactions. Our attack is made easier even further as the Lightning protocol allows the attacker to increase the fee offered by his own transactions. We continue to empirically show that the vast majority of nodes agree to channel opening requests from unknown sources and are therefore susceptible to this attack. We highlight differences between various implementations of the Lightning Network protocol and review the susceptibility of each one to the attack. Finally, we propose mitigation strategies to lower the systemic attack risk of the network.