Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Temporary "Spy-node" banlist #1

Open
0xB10C opened this issue May 15, 2023 · 1 comment
Open

Temporary "Spy-node" banlist #1

0xB10C opened this issue May 15, 2023 · 1 comment

Comments

@0xB10C
Copy link
Owner

0xB10C commented May 15, 2023

Long-lived connections from Bitcoin clients that only listen to transaction INVs but never request transactions caused problem. While this problem is fixed in the most recent releases (23.2, 24.1, and 25.0), some network participants (e.g. mining pools running custom patches) might not be able to upgrade immediately. A solution is to ban the entities making these long-lived connections. Some of the entities are likely "spy-nodes" while others are "network monitoring tools" by researchers.

There's a special and temporary version of this banlist that bans these entities for 90 days. It can be found in this branch.

Banlists:

@0xB10C 0xB10C changed the title Temporary "INV-eater" banlist Temporary "Spy-node" banlist Oct 11, 2024
@0xB10C
Copy link
Owner Author

0xB10C commented Oct 11, 2024

This banlist was originally constructed as a short-term mitigation against the DoS described in https://bitcoincore.org/en/2024/10/08/disclose-large-inv-to-send/ - in case someone (e.g. a miner) can't upgrade reasonably fast due to e.g. custom patches.

Many of these IPs are still active spy-nodes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant