New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DoS prevention: check for duplicate transactions earlier #1167
Comments
luke-jr
pushed a commit
to luke-jr/bitcoin
that referenced
this issue
May 20, 2012
luke-jr
pushed a commit
to luke-jr/bitcoin
that referenced
this issue
May 20, 2012
coblee
pushed a commit
to litecoin-project/litecoin
that referenced
this issue
Jul 17, 2012
suprnurd
pushed a commit
to chaincoin-legacy/chaincoin
that referenced
this issue
Dec 5, 2017
* Increase quorum for object deletion to 2/3 of MN network * Implement expiration of watchdog objects * Remove objects from the watchdog map itself * Message fix for invalid objects
lateminer
pushed a commit
to lateminer/bitcoin
that referenced
this issue
Jan 22, 2019
Fixes and simplifications from static analysis
lateminer
pushed a commit
to lateminer/bitcoin
that referenced
this issue
Dec 25, 2019
… back within range c24d2b1 [Trivial] Clean time offset warning when it gets back within range (random-zebra) Pull request description: Simple update (related to bitcoin#1128 and bitcoin#1138). Clear `strMiscWarning` if the median gets back within the offset limit (after being off, for example during startup when the node has very few time samples). ACKs for top commit: Fuzzbawls: utACK c24d2b1 furszy: utACK c24d2b1 Tree-SHA512: c0d4b206eb85cd6d6ba580a3e2b74d46b7518225733c88412cbf810f863910455b3daa35c72c9442d02a80593d79916f83eed26a2ca26903596f2a0182558906
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
If you include the same transaction in a block twice the block is rejected by ConnectInputs()... but that is only done after fetching transactions from disk, checking signatures, etc. And it doesn't trigger the DoS prevention code.
There should be a check for duplicate transactions in CheckBlock(), so blocks with duplicate transactions are rejected early and trigger the DoS code.
The text was updated successfully, but these errors were encountered: