-
endor00[m]
What would compel a node in the chain to forward that request to another node?
-
endor00[m]
Couldn't a bad node simply ignore it?
-
endor00[m]
And how long would the chain have to be before it stops?
-
endor00[m]
Are you trying to weed out bad nodes that send bad data to wallets? Why not simply have the option in the wallet to send the same request to a few different nodes at the same time and then compare?
-
endor00[m]
Alternatively, you could use a variant of this idea to add a new method for nodes to weed out bad peers
-
endor00[m]
Before connecting to a new (outgoing) peer, a node sends a "spot check" request to the peer, pretending to be a wallet asking for data to build a tx. If the reply matches with our own data, then we assume it's an honest peer and we initiate a p2p connection. If the reply is false, we add it to the banlist and move on
-
endor00[m]
But I guess the "pretending to be a wallet" part would have to be "reasonably long" to avoid getting immediately spotted, because no wallet simply connects out of the blue and asks for specific output data
-
iDunk
P2P and RPC are two different things.
-
endor00[m]
I know, my goal is for a node to spot a bad peer before initiating a p2p connection to it, by disguising itself as a wallet and looking for an honest reply
-
endor00[m]
* I know, my goal is for a node to spot a bad peer before initiating a p2p connection to it, by disguising itself as a wallet making rpc requests and looking for an honest reply
-
iDunk
Wallets connect to daemons' RPC ports. You seem to want to ban nodes for not having their RPC port open.
-
endor00[m]
If they're not available for rpc then this criterion is null and we skip it
-
endor00[m]
Although I guess there would be no way for a node to know if the peer is running rpc on a non-standard port different from 18081 or 18089
-
endor00[m]
But if they are available for rpc on a standard port, then we can try to check if they're honest or not, thus isolating bad public nodes from the rest of the network
-
cankerwort[m]
Would bad p2p nodes even bother keeping their RPC ports open?
-
gingeropolous
<endor00[m]> What would compel a node in the chain to forward that request to another node? >> the same thing that compels a node to relay any transaction. it would just be part of being a node.
-
gingeropolous
the goal is to prevent associating a remote node user's tx with an originating IP address. yes, you could just use tor / i2p.
-
endor00[m]
Oooh, so a node would request for the output data before forwarding a tx to check for a honest response from the peer
-
endor00[m]
Then my point about differentiating between a node vs a wallet making the request still stands
-
endor00[m]
A malicious node would give a honest reply to another node, but then send bad data to a wallet making the same request
-
endor00[m]
So you would need a way to make a node's "spot checks" impossible to differentiate from a genuine wallet syncing and building a tx
-
selsta
this was said before but most nodes don't even have open rpc access
-
endor00[m]
<cankerwort[m] "Would bad p2p nodes even bother "> Yes, if you want to feed bad data to remote node users
-
endor00[m]
(Which I assume is the topic at hand)
-
gingeropolous
endor00[m], I don't think we're talking about similar things. we might be, but im lost. basically, right now, a remote node can spy on a remote node user by assuming that the IP address of the remote node user can be associated with that users transaction
-
gingeropolous
but yeah iDunk and selsta , i take your point about p2p / rpc. this would have to be done on RPC nodes / ports to mimic a wallets behavior. but, i mean, request specific output data *could* be done via p2p
-
gingeropolous
requesting
-
gingeropolous
so basically we shift the system so that a remote node user (RNU) just connects via RPC to a node to refresh.
-
gingeropolous
once wallet sync, the wallet starts forming a transaction. it needs output data for 11 entries on the blockchain. it sends that request to some other random node.
-
gingeropolous
that node [A] returns those data to the original RNU, but then that node also requests the data from some other node [B]. Now [B] doesn
-
gingeropolous
n't know if [A] is the original RNU or not.
-
selsta
sounds simpler to add Tor
-
gingeropolous
:)
-
gingeropolous
well, slap some tor in the GUI
-
gingeropolous
and if it was simpler to add Tor, why'd we put danndelion in?
-
selsta
In general I think we want to avoid adding things to p2p as it just increases the potential attack vector.
-
jnphkwbvd
Remember kids. If you call project coral reef for what it is - fluffy embezzling half a mil usd from the monero fund for a website with smaller adoption than monero woo plugin, you will get excommunicated. Why do you think charities need Teslas? They don't and Elon won't support Monero 150k will sure buy a lot of party time for those that actually do get it.