From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138]) by lists.linuxfoundation.org (Postfix) with ESMTP id 1B945C002D for ; Fri, 10 Jun 2022 06:44:14 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id 0B3438419F for ; Fri, 10 Jun 2022 06:44:14 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id utUs850ZEoMG for ; Fri, 10 Jun 2022 06:44:12 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0 Received: from bebhionn.uberspace.de (bebhionn.uberspace.de [185.26.156.155]) by smtp1.osuosl.org (Postfix) with ESMTPS id 46F5F84179 for ; Fri, 10 Jun 2022 06:44:12 +0000 (UTC) Received: (qmail 1119 invoked by uid 989); 10 Jun 2022 06:44:10 -0000 Authentication-Results: bebhionn.uberspace.de; auth=pass (plain) From: Elias Rohrer To: alicexbt , Bitcoin Protocol Discussion Date: Fri, 10 Jun 2022 08:44:05 +0200 X-Mailer: MailMate (1.14r5852) Message-ID: <31411E6C-B1BF-45B7-848A-0AC8ECDFFCB3@tnull.de> In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Rspamd-Bar: --- X-Rspamd-Report: BAYES_HAM(-2.999999) MIME_GOOD(-0.1) X-Rspamd-Score: -3.099999 Received: from unknown (HELO unkown) (::1) by bebhionn.uberspace.de (Haraka/2.8.28) with ESMTPSA; Fri, 10 Jun 2022 08:44:10 +0200 X-Mailman-Approved-At: Fri, 10 Jun 2022 08:03:52 +0000 Subject: Re: [bitcoin-dev] BGP hijacking on Bitcoin p2p network X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jun 2022 06:44:14 -0000 Hi alicexbt, Routing attacks have actually been studied quite a bit in literature. You may be interested in the research articles of Maria Apostolaki et al.= [1,2], Muoi Tran et al.[3], and related works. Best, Elias [1]: https://arxiv.org/pdf/1605.07524.pdf [2]: https://arxiv.org/pdf/1808.06254.pdf [3]: https://allquantor.at/blockchainbib/pdf/tran2020stealthier.pdf On 9 Jun 2022, at 20:24, alicexbt via bitcoin-dev wrote: > Hi Bitcoin Developers, > > Based on this [answer][1] from 2014, bitcoin nodes are vulnerable to BG= P hijacking. There was an incident in March 2022, twitter prefix was hija= cked and details are shared in 2 blog posts: > > https://isc.sans.edu/diary/rss/28488 > > https://www.manrs.org/2022/03/lesson-learned-twitter-shored-up-its-rout= ing-security/ > > 'nusenu' had written an article about Tor network being vulnerable to B= GP hijacking attacks: https://nusenu.medium.com/how-vulnerable-is-the-tor= -network-to-bgp-hijacking-attacks-56d3b2ebfd92 > > After doing some research I found that RPKI ROA and BGP prefix length c= an help against BGP hijacking attacks. I checked BGP prefix length and RP= KI ROA for first 10 IP addresses returned in `getnodeaddresses` in bitcoi= n core and it had vulnerable results. > > https://i.stack.imgur.com/KD7jH.png > > Has anyone written a detailed blog post or research article like nusenu= ? If not I would be interested to write one in next couple of weeks? > Looking for some "technical" feedback, links if this was already discus= sed in past with some solutions. > > =C2=A0 [1]: https://bitcoin.stackexchange.com/a/30305/133407 > > > /dev/fd0 > > Sent with Proton Mail secure email. > _______________________________________________ > bitcoin-dev mailing list > bitcoin-dev@lists.linuxfoundation.org > https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev