-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Patch against eclipse attack #1023
Comments
Which of the counter measures listed in part V of the white paper do you propose implementing? |
@zilm13 @adonley
It seems that there is no such |
Take a look at ethereumj.conf : maxActivePeers = 30 It might be worth it to do what geth did, associate and limit the number of peers from the same IP. |
@adonley BTW, after checking I found the |
If you take a look at Let's check to see if the "packet-of-death", the open window for incoming connections upon boot or the ability to predict the Kademlia like buckets works on ethereumj. Also we could check to see if seeding from the DB happens even if the table is not empty. Ethereumj does not implement any IP restrictions on peers at the moment. |
Hi guys, I'm one of the ETH and BTC eclipse paper authors. I think the most important countermeasure from the ETH paper is limiting the number of node IDs that have the same IP address that are stored in the peer tables. This is countermeasure 2 in our paper. The other ones are relevant as well, but if you don't have countermeasure 2 I would be very worried, since this opens the door to low resource (e.g. 1 or 2 attack machine) eclipse attacks of some sort. Even if they attack is not identical to the one in our paper, I am pretty sure a low-resource attack could be found somehow. |
So the check for this would go in |
@RichardH92 Basically, we already have a protection against a spam from same IP address. To continue work on this you better start from learning the paper. |
Check whether EthereumJ is affected and in what aspects: https://bitcoinmagazine.com/articles/researchers-explore-eclipse-attacks-ethereum-blockchain/
Geth patch: https://github.com/ethereum/go-ethereum/milestone/62?closed=1
The text was updated successfully, but these errors were encountered: