Bitcoin News and Finance Lightning Network Developer Warns About Major Vulnerability, Abandons Security Tasks Skip to main content

Lightning Network Developer Warns About Major Vulnerability, Abandons Security Tasks

Lightning Network Developer Warns About Major Vulnerability, Abandons Security Tasks

Antoine Riard, a Lightning Network (LN) developer, recently disclosed a major vulnerability affecting Bitcoin’s scaling layer. This vulnerability, which was addressed with a series of mitigations, involves a “new transaction-relay jamming attack” that can affect shared funds in channels. Riard abandoned LN-related work after testing the feasibility of these attacks in the open.

Lightning Network Major Vulnerability Detected

Antoine Riard, security researcher and developer of the Lightning Network (LN), Bitcoin’s L2 scaling solution, has recently revealed a new major vulnerability affecting funds available in channels. The vulnerability involves what Riard calls “replacement cycling attacks,” which manipulate the state of Hash Time Lock Contracts (HTLC), a fundamental part of the inner workings of the LN.

The researcher introduced mitigations to this kind of attack on October 16, clarifying that he was not sure if these actions would stop malicious actors from taking advantage of these vulnerabilities. On the reach of these attacks, Riard stated:

I think this new class of replacement cycling attacks puts lightning in a very perilous position, where only a sustainable fix can happen at the base-layer, e.g adding a memory-intensive history of all-seen transactions or some consensus upgrade.

Furthermore, he clarified that the mitigations introduced only served to stop simple attacks, while more sophisticated attackers might be able to avoid them.

‘A Lesson in Terms of Bitcoin Protocol Deployment’

After disclosing the scope of the attack, Riard explained he would stop LN development tasks, which included handling these kinds of security issues at a protocol level. Due to the severity of the problems found, he thinks this might offer insight into today’s development process and how it might have to change for blockchain structures that handle millions in funds.

He explained:

There might be a lesson in terms of Bitcoin protocol deployment, we might have to get them right at first try. Little second chance to fix them in flight.

Other developers proposed different ideas to control this attack vector. Nonetheless, Bitcoin developer Matt Corallo acknowledged the severity of the issue, stressing that “fixing this in the Bitcoin Core stack is no trivial deal – the reason for this attack is to keep enough history to fix it Bitcoin Core would need unbounded memory.”

Corallo recently called Bitcoiners to calm down, declaring that LN was not broken but acknowledging they had work to do. “Lightning is (currently) for channel counterparties you trust to not to do a ton of work to build novel software to attack you,” he added.

According to a recent report, LN has grown by 1,212% in the last two years.

What do you think about the recently partially disclosed vulnerabilities in the Lightning Network? Tell us in the comments section below.

Comments

Popular posts from this blog

Custodial Lightning Network Service Attack Discovered by LN ‘Newbie’ — Hacker Strikes 6 LN Custodians

On September 18, a Redditor posted to the r/bitcoin forum and explained how he discovered a way to “attack [the] lightning Network’s custodial services.” The Reddit account dubbed “Reckless Satoshi” wanted to figure out if a “discrepancy between real routing fees and service’s transaction fee can be exploited for a profit.” The researcher disclosed that he wanted to see how large the damage could be and said “it is bad.” 6 Lightning Network Custodial Services Attacked, Researcher Discloses Findings to Offenders Prior to Public Disclosure A Redditor called Reckless Satoshi published a disclosure post on r/bitcoin this past Saturday and disclosed how he had found a vulnerability with routing fees and some of the Lightning Network’s custodial services. The research attack was done in good faith and after it was complete he disclosed the bugs to the offending services before publishing his findings. Reckless Satoshi used the Lightning Network (LN) attack on six different services incl...

Axie Infinity Down 40% Since Last Week’s Price High, Protocol Revenue Outshines Competitors

Last week, the game token leveraged within the Axie Infinity gaming universe skyrocketed to all-time highs, while other crypto markets remained extremely lackluster. During the last seven days, Axie Infinity’s platform token has dropped significantly in value shedding more than 12%. Meanwhile, the game platform’s smooth love potion token has slid over 8% over the last 24 hours. Axie Infinity Down More Than 40% Since All-Time High Not too long ago, the axie infinity (AXS) token was a topical conversation because it reached an all-time high on July 15. At the time, AXS managed to capture $28.93 per unit and since then it has shed 12.8% during the last seven days. The axie infinity (AXS) token is used within the blockchain-based game that involves battles between token-based creatures called “Axies.” AXS is used for the game’s governance system as well as other actions within the game. At the time of writing axie infinity (AXS) is exchanging hands for $16.70 per coin. AXS/USD on Ju...

Play-to-Earn Game From Polker (PKR) Exchange Listing – Endorsed by Akon

The Play-to-Earn NFT based Polker.Game ‘s native token $PKR has been officially listed on the popular centralized exchange BitMart. Polker.game has been in the spotlight recently as Akon, the American R&B superstar and record producer gave his official endorsement of polker stating that the “game is revolutionary” and that Polker is “hands down.. the best play to earn, NFT game in the space.”. With the BitMart listing and celebrity endorsement from Akon, Polker is perfectly positioned to become a major player in the Play-to-Earn league. Watch Akon’s Video Here What is Play-to-Earn? Although not a new concept, play-to-earn has become a trending term due to the popularity of the NFT game AXIE infinity. In the past, previous play-to-earn games have also achieved success – however, thanks to the huge amount of development in the blockchain space in recent years the gaming experience is now massively improved. Play-to-Earn games are essentially free to play and open to anyone and...

China to Crack Down on Copyright Infringement Through NFTs

Authorities in China are going after creators of digital collectibles based on other people’s works of art, the use of which was not authorized. The government offensive is part of a campaign to combat online copyright infringement and piracy with the participation of several departments. Regulators in China Move to Strengthen Copyright Supervision of Online Platforms The National Copyright Administration of China (NCAC) has recently launched a campaign against copyright infringement and piracy on the internet, together with the Ministry of Industry and Information Technology, the Ministry of Public Security, and the State Internet Information Office of the People’s Republic. A major objective of the initiative is to improve copyright supervision of online businesses by investigating cases involving the sale and distribution of infringing products on short video, live broadcast and e-commerce platforms, and promptly dealing with infringing content, the agency announced in a press r...
Blogarama - Blog Directory