Playing with full-rbf peers for fun and L2s security



Summary:

The discussion on the bitcoin-dev mailing list centered around the potential for a double-spend denial of service (DoS) attack on the Wasabi protocol. It was noted that the attacker could disrupt the protocol indefinitely without spending any funds. The attacker's input double spend would be at an impractical feerate and never included in a block, sitting at the bottom of the mempool. Other users' only practical choice would be to double-spend their own input at competitive rates higher than the attacker or wait and hope to win a propagation race somewhere. The conversation then shifted to the DoS vectors already mitigated by Wasabi, such as a participant stopping participation after the first phase of the round leading to coinjoin failure. Punishment for double-spends would be difficult since transactions are broadcasted after signing and before coinjoin tx broadcast. Inputs are already checked multiple times for double spend during the coinjoin round. If all inputs in the coinjoin transaction that failed to relay are checked and one or more are found to be spent later, it is unclear how punishment will be enforced and how this affects the attacker with thousands of UTXOs or normal users. Ultimately, it was noted that a motivated attacker can DoS attack Wasabi by spending money, and it is a design choice that has served them well so far.


Updated on: 2023-06-15T21:52:53.179187+00:00