Neo: Limit attacks by malicious nodes

Created on 2 Dec 2019  路  4Comments  路  Source: neo-project/neo

Summary or problem description

If we are under attack, a large number of transactions are sent from a certain node. Parallel verification of transactions in Blockchain will result in fewer opportunities for other normal user transactions to be verified. https://github.com/neo-project/neo/pull/1298#issuecomment-559341882

Do you have any solution you want to propose?

Need more discussion, one simple solution is to add message frequency limitation.

Neo Version

  • Neo 2
  • Neo 3

Where in the software does this update applies to?

  • P2P (TCP)
discussion

Most helpful comment

Also, verify signatures could be expensive, we should disconnect nodes if the fail the verify of the message that he relay.

All 4 comments

I think we need to implement weighted distribution to process messages per peer, in different queues. We could have priority nodes too, making them have a greater weight in message distribution.

Also, verify signatures could be expensive, we should disconnect nodes if the fail the verify of the message that he relay.

If we use index to synchronize the blocks, we also need to consider the attack with invalid blocks.

@Tommo-L, perhaps we should focus on NEO3 only.

@shargon, agreed with that, surely we should disconnect from nodes that sent invalid signatures, I do not see a normal case that this may happen.

@ShawnYun, do you think that the metrics we mentioned on #1397 should be discussed here as well?
Agree with you as well about the index of invalid blocks.

Was this page helpful?
0 / 5 - 0 ratings

Related issues

shargon picture shargon  路  4Comments

garrey332 picture garrey332  路  3Comments

shargon picture shargon  路  3Comments

igormcoelho picture igormcoelho  路  4Comments

vncoelho picture vncoelho  路  3Comments