That’s a good question. One should not exclude that an attacker might alternate between “failing” jamming traffic and “succeeding” jamming traffic, even just to navigate around a static threshold if more than %80 traffic is jamming and can the remaining traffic being flagged as jamming.
As a reminder, the decaying algorithm is currently the following:
Track the following values for each rolling window:
* `last_update`: stores the timestamp of the last update to the decaying
average, expressed in seconds.
* `decaying_average`: stores the value of the decaying average.
* `decay_rate`: a constant rate of decay based on the rolling window chosen,
calculated as: `((1/2)^(2/window_length_seconds))`.
As an enhancement of the graphic, it could be interesting to add the HTLC traffic success in a discrete fashion, not continuous. Just to observe if the current decaying algorithm displayed any smoothing statistical bias, in the sense of discounting the marginal jamming HTLC temporally ordered.
This is unclear in this simple example, if it assumes that A, T and B are running local resource conservation algorithms themselves. If they’re and assuming the bi-reputation algorithm satisfies its transitivity property, they should be compensated by HTLC traffic on their local links, i.e M0-A and B-M1, afaiu.
Of course, that would also assume that local resource conversation algorithms are tuned with the same settings as downside, otherwise I believe it might generate exploitable jamming surface.
If local resource conservation algorithms are deployed in a recursive fashion over the graph, both for entries and exit edges, this is more or less what is done today for internet DDoS ingress / outgress filtering. Now, of course, a routing node can deviate at the price of the higher jamming DoS, they might offer lower fee_base_msat
and fee_proportional_millionths
.
In a world where onion-routing is native for payments, this is an interesting question if the payer could over-compensate routing nodes for forwarding payments along a low-reputation path. Somehow, amt_to_forward
is part of the per-hop onion payload, I believe.