Skip to content
This repository has been archived by the owner on Oct 4, 2019. It is now read-only.

Addressing security issues with a January hardfork? #11

Closed
arvicco opened this issue Oct 3, 2016 · 2 comments
Closed

Addressing security issues with a January hardfork? #11

arvicco opened this issue Oct 3, 2016 · 2 comments

Comments

@arvicco
Copy link
Contributor

arvicco commented Oct 3, 2016

The latest round of attacks against ETH unearthed a number of possible attack vectors against the network. Some of them may be fixed/patched and thus mitigated, but a hard fork is required for a permanent solution, as discussed here:
ethereum/EIPs#150

My question is, should we strive to include such fix in a January hardfork, while we are at it? Would be interested in your perspective.

@whatisgravity @splix @igetgames @elaineo @mikeyb @ericsomdahl @avtarsehra @realcodywburns

@elaineo
Copy link
Member

elaineo commented Oct 3, 2016

I'm not a huge fan of the strategy that's being used there -- guessing at numbers for gas costs and seeing what happens. If the guesses are bad, we have to HF again. Surely we can come up with a better strategy? (Probably not in time for January though.)

Is it sufficient to set default geth gas limit lower?

@trustfarm-dev
Copy link
Contributor

trustfarm-dev commented Oct 4, 2016

@elaineo
I think make one time trasfer gas fee to low.
But, In case of multiple contract loop , eg

  1. for (1 ; xxx ; many) or while (many--)
  2. recursefunc() {
    recursefunc()
    }
  • like 1,2 case of codes, gas fee must increase multiple ratio and exponentially, when branch call or goto call, prevent DDOS contract attacks.

It needs more complicated approach, I think.

Recent days of ETH, there's several DDOS Attack vectors, so, most of geth and parity has big difficulties making blocks. theres' many Orphans blocks.

@elaineo elaineo closed this as completed Jan 20, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants