Close Menu

    Subscribe to Updates

    What's Hot

    UniCredit brings BlackRock’s IBIT to Italy’s elite, merging BTC with TradFi

    July 1, 2025

    Inside OpenAI’s reported one-week shutdown — what’s really going on?

    July 1, 2025

    Hyperliquid rejects at $41.55 — healthy correction or breakdown ahead?

    July 1, 2025
    Facebook X (Twitter) Instagram
    laicryptolaicrypto
    Demo
    • Ethereum
    • Crypto
    • Altcoins
    • Blockchain
    • Bitcoin
    • Lithosphere News Releases
    laicryptolaicrypto
    Home Transaction spam attack: Next Steps
    Ethereum

    Transaction spam attack: Next Steps

    Michael JohnsonBy Michael JohnsonDecember 20, 2024No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Today the network was attacked by a transaction spam attack that repeatedly called the EXTCODESIZE opcode (see trace sample here), thereby creating blocks that take up to ~20-60 seconds to validate due to the ~50,000 disk fetches needed to process the transaction. The result of this was a ~2-3x reduction in the rate of block creation while the attack was taking place; there was NO consensus failure (ie. network fork) and neither the network nor any client at any point fully halted. The attack has since, as of the time of this writing, mostly halted, and the network has for the time being recovered.

    The short-term fix is for users, including miners, enterprise users (including exchanges) and individuals to run geth with the flags:

    –cache 1024 –targetgaslimit 1500000 –gasprice 20000000000

    Or Parity with the flags:

    –cache-size-db 1024 –gas-floor-target 1500000 –gasprice 20000000000 –gas-cap 1500000

    This (i) increases the cache size, reducing the number of disk reads that nodes need to make, and (ii) votes the gas limit down by ~3x, reducing the maximum processing time of a block by a similar factor.

    In the medium term (ie. several days to a week), we are actively working on several fixes for the Go client that should both provide a more stable resolution for the present issue and mitigate the risk of similar attacks, including:

    • A change to miner software that automatically temporarily cuts the gas limit target by 2x when the miner sees a block that takes longer than 5 seconds to process, allowing for adjustments similar to what was coordinated today to happen automatically (see here for a pull request; note that this is a miner strategy change and NOT a soft fork or hard fork)
    • Numerical tweaks to cache settings
    • Adding additional caches
    • Adding an additional cache for EXTCODESIZE specifically (as it is likely that EXTCODESIZE reads are several times slower than other IO-heavy operations since the contracts that are being read are ~18 KB long)
    • An on-disk cache of state values that allows them to be more quickly (ie. O(log(n)) speedup) accessed

    We are also exploring the option of replacing the leveldb database with something more performant and optimized for our use case, though such a change would not come soon. The Parity team is working on their own performance improvements.

    In the longer term, there are low-level protocol changes that can also be explored. For example it may be wise to add a feature to Metropolis to increase the gas costs of opcodes that require reads of account state (SLOAD, EXTCODESIZE, CALL, etc), and especially read operations that read external accounts; increasing the gas cost of all of these operations to at least 500 would likely be sufficient, though care would need to be taken to avoid breaking existing contracts (eg. simultaneously implementing EIP 90 would suffice).

    This would put a much lower upper bound on the maximum number of bytes that a transaction may read, increasing safety against all potential attacks of this kind, and reducing the size of Merkle proofs and hence improving security for both light clients and sharding as a side effect. At present, we are focusing on the more immediate software-level changes; however, in the long term such proposals should be discussed and contract developers should be aware that changes of this sort may take place.




    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Michael Johnson

    Related Posts

    Katana mainnet launch nears as pre-deposit closes with $200M in active deposits

    June 30, 2025

    Checkpoint #4: Berlinterop | Ethereum Foundation Blog

    June 19, 2025

    Ethereum ETFs hit ATH, SPX6900 cools off, XRP outlook remains bullish

    June 18, 2025
    Leave A Reply Cancel Reply

    Demo
    Don't Miss
    Crypto

    UniCredit brings BlackRock’s IBIT to Italy’s elite, merging BTC with TradFi

    By John SmithJuly 1, 20250

    Italy’s second-largest bank is inviting pros to tap Bitcoin’s gains while avoiding its chaos. The…

    Inside OpenAI’s reported one-week shutdown — what’s really going on?

    July 1, 2025

    Hyperliquid rejects at $41.55 — healthy correction or breakdown ahead?

    July 1, 2025

    This Shiba Inu alternative readies to outperform SHIB

    July 1, 2025

    LAI Crypto is a user-friendly platform that empowers individuals to navigate the world of cryptocurrency trading and investment with ease and confidence.

    Our Posts
    • Altcoins (609)
    • Bitcoin (30)
    • Blockchain (143)
    • Crypto (9,307)
    • Ethereum (629)
    • Lithosphere News Releases (160)

    Subscribe to Updates

    • Twitter
    • Instagram
    • YouTube
    • LinkedIn

    Type above and press Enter to search. Press Esc to cancel.