forked from comit-network/xmr-btc-swap
-
Notifications
You must be signed in to change notification settings - Fork 47
ASB: DOS resiliance #911
Copy link
Copy link
Open
2 / 52 of 5 issues completedLabels
asbRelated to the ASB (maker side)Related to the ASB (maker side)enhancementNew feature or requestNew feature or requestlibp2pRelated to P2P NetworkingRelated to P2P NetworkingmetaHigh level issueHigh level issue
Description
The asb needs to be made more resilient to DOS attacks, since there is an economic incentive to block other people from operating an asb.
Beyond tweaking parameters and other low hanging fruit this will ultimately require some form of incurring cost on attackers. The classic example is requiring POW before any connection is accepted. #910 implements that (currently a prototype).
Apart from a basic POW requirement we can also gate more expensive protocols behind another layer of POW, with the difficulty chosen based on the cost of the protocol.
In some protocols we might be able to restructure/reorder the protocol to further deter DOS attacks.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
asbRelated to the ASB (maker side)Related to the ASB (maker side)enhancementNew feature or requestNew feature or requestlibp2pRelated to P2P NetworkingRelated to P2P NetworkingmetaHigh level issueHigh level issue