You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

Cryptocurrencies are digital assets which depend upon the use of distributed peer-to-peer networks. The method a new peer uses to initially join a peer-to-peer network is known as bootstrapping. The ability to bootstrap without the use of a centralized resource is an unresolved challenge. In this paper we survey the bootstrapping techniques used by 74 cryptocurrencies and find that censorship-prone methods such as DNS seeding and IP hard-coding are the most prevalent. In response to this finding, we test two other bootstrapping techniques less susceptible to censorship, Tor and ZMap, to determine if they are operationally feasible alternatives more resilient to censorship. We perform a global measurement study of DNS query responses for each the 92 DNS seeds discovered across 42 countries using the distributed RIPE Atlas network. This provides details of each cryptocurrencies' peer-to-peer network topology and also highlights instances of DNS outages and query manipulation impacting the bootstrapping process. Our study also reveals that the source code of the cryptocurrencies researched comes from only five main repositories; hence accounting for the inheritance of legacy bootstrapping methods. Finally, we discuss the implications of our findings and provide recommendations to mitigate the risks exposed.

[1]  Neo,et al.  The collateral damage of internet censorship by DNS injection , 2012, Comput. Commun. Rev..

[2]  Alex Biryukov,et al.  Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.

[3]  J. Griffin,et al.  Is Bitcoin Really Un-Tethered? , 2019 .

[4]  Vern Paxson,et al.  SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[5]  Cristina Pérez-Solà,et al.  The Bitcoin P2P Network , 2014, Financial Cryptography Workshops.

[6]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[7]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[8]  J. Alex Halderman,et al.  Zippier ZMap: Internet-Wide Scanning at 10 Gbps , 2014, WOOT.

[9]  Nick Feamster,et al.  Global Measurement of DNS Manipulation , 2017, USENIX Security Symposium.

[10]  Gregor Schiele,et al.  Bootstrapping in Peer-to-Peer Systems , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.

[11]  Nick Feamster,et al.  The Effect of DNS on Tor's Anonymity , 2016, NDSS.

[12]  Carmela Troncoso,et al.  Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures , 2017, NDSS.

[13]  Arno Wacker,et al.  Bootstrapping Peer-to-Peer Systems Using IRC , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[14]  Ian Miers,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin (extended version) , 2014 .

[15]  Debasish Jena,et al.  Honeypot in network security: a survey , 2011, ICCCS '11.

[16]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[17]  Shane Greenstein,et al.  Evidence of Decreasing Internet Entropy: The Lack of Redundancy in Dns Resolution by Major Websites and Services , 2018, Journal of Quantitative Description: Digital Media.

[18]  Antonio Pescapè,et al.  Internet Censorship detection: A survey , 2015, Comput. Networks.

[19]  Tyler Moore,et al.  Revisiting the Risks of Bitcoin Currency Exchange Closure , 2018, ACM Trans. Internet Techn..

[20]  Christian Grothoff,et al.  Bootstrapping of Peer-to-Peer Networks , 2008, 2008 International Symposium on Applications and the Internet.