A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, Min Suk Kang May 2020
IEEE Symposium on Security and Privacy (IEEE S&P) 2020 https://erebus-attack.comp.nus.edu.sg/
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer - - PowerPoint PPT Presentation
IEEE Symposium on Security and Privacy ( IEEE S&P ) 2020 https://erebus-attack.comp.nus.edu.sg/ A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network Muoi Tran , Inho Choi, Gi Jun Moon, Anh V. Vu, Min Suk Kang May 2020
Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, Min Suk Kang May 2020
IEEE Symposium on Security and Privacy (IEEE S&P) 2020 https://erebus-attack.comp.nus.edu.sg/
blockchain
A à B: 10 C à D: 20
2
Bitcoin consensus rules Peer-to-peer network TX
3
Bitcoin network
Victim Bitcoin node
4
A à B: 10
Example: Double spending attack
A à C: 10
Partitioning enables/improves several other attacks: ü 51% attack ü selfish mining ü censoring transactions ü take down cryptocurrencies ü …
merchant Bitcoin network
Autonomous System (AS)
5
Victim node
Attacker AS
Lie: “I am the owner
ü Attacker AS uses BGP hijacking to hijack victim connections
1.2.3.4
All traffic to victim is routed through the attacker!
Only one attack instance observed in practice. Why?
M
targeted victim node
V G F A
Adversary AS
B E C D
changing peer connections
Idea: Indirectly force the victim node connects to “shadow” IPs:
ü Shadow IP has the victim-to-itself route includes adversary AS ü Attacker AS is the man-in-the-middle of all peer connections!
Challenge 1:
Is there enough shadow IPs that the attacker can use?
Challenge 2:
How to influence the target node’s peer selection?
7
Shadow IPs
If attacker AS is big enough (e.g., top-100), it can easily find
Victim node (e.g., Amazon) Attacker AS in Europe
hundreds of shadow ASes => millions of shadow IPs
Shadow AS
üConnect to the victim on behalf of the shadow IPs
üInfluence the victim to make connections to shadow IPs
9
Victim … …
8 outgoing connections 117 incoming connections
Attacker AS a b c d e …
a b c d e
Shadow IP addresses
(easier) (much harder!)
(*) 10 outgoing connections since Bitcoin version 0.19.1
10
Victim
?
new tried Tables for IP addresses
Randomly choose a reachable IP from either of two tables
(IPs learned from peers) (IPs that node has connected to) ~ 3K bots
Eclipse attack (Heilman et al., USENIX Sec’15)
Our goal: Dominate reachable IPs in two tables with shadow IPs Challenges:
In the old days…
11
Victim
new
Attacker AS … Shadow IP addresses insert
tried 1 IP / 2 mins Low-rate traffic
20 40 60 80 100 10 20 30 40 50 20 40 60 80 100 10 20 30 40 50
Reachable IPs in the new table Reachable IPs in the tried table Delete unreachable IP older than 30 days
Legitimate IP Shadow IP
Most are shadow IPs after 30 days Shadow IPs gradually increases
days days % %
12
0.2 0.4 0.6 0.8 1 2 4 6 8 10 20 30 40 50
Number of connections made to shadow IPs Probability of selecting a shadow IP days after attack begins Probability Number of
connections
All eight outgoing connections are
13
ümillions shadow IP addresses üseveral weeks of attack execution
üAT&T, CenturyLink, NTT, … üCan target any Bitcoin node!
üSingtel, China Telecom, … üCan target the majority of nodes!
üSome countries are believed to have direct control over their ISPs
14
üErebus attack also applies on 34 out of top-100 cryptocurrencies
15
All vulnerable!
not any specific bugs
üTrusted authority: Whitelist/Blacklist of IPs üThird-party proxies: VPNs, Tor, relay networks
üTable size reduction üMore outgoing connections üIncorporating AS topology in the peer selection üProtecting peers providing fresher block data
16
Deployed in the latest version Being tested Being tested
=> Hard to counter against! => not permissonless => not decentralized
üLow rate attack traffic (520 bit/s per node) üPatiently waiting for a few weeks üLarge ISPs can launch this attack against latest Bitcoin Core
üNo software bugs was exploited üAttackers only exploit the topological advantages of being ISPs
17
https://erebus-attack.comp.nus.edu.sg/
M
targeted victim node
V G F A
Adversary AS
B E C D
changing peer connections