Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    4 memecoins could turn $1k to $200 in a few months

    August 13, 2025

    Ethereum still struggling to break 0.03 per bitcoin level

    August 13, 2025

    The Ethereum network is currently undergoing a DoS attack

    August 13, 2025
    Facebook X (Twitter) Instagram
    Wednesday, August 13
    • About
    • Contact us
    • Privacy Policy
    Facebook X (Twitter) LinkedIn YouTube
    Blockchain Echo
    Banner
    • Lithosphere News Releases
    • Bitcoin
    • Crypto
    • Ethereum
    • Litecoin
    • Altcoins
    • Blockchain
    Blockchain Echo
    Home » Transaction spam attack: Next Steps
    Ethereum

    Transaction spam attack: Next Steps

    Sophia BrownBy Sophia BrownAugust 12, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Today the network was attacked by a transaction spam attack that repeatedly called the EXTCODESIZE opcode (see trace sample here), thereby creating blocks that take up to ~20-60 seconds to validate due to the ~50,000 disk fetches needed to process the transaction. The result of this was a ~2-3x reduction in the rate of block creation while the attack was taking place; there was NO consensus failure (ie. network fork) and neither the network nor any client at any point fully halted. The attack has since, as of the time of this writing, mostly halted, and the network has for the time being recovered.

    The short-term fix is for users, including miners, enterprise users (including exchanges) and individuals to run geth with the flags:

    –cache 1024 –targetgaslimit 1500000 –gasprice 20000000000

    Or Parity with the flags:

    –cache-size-db 1024 –gas-floor-target 1500000 –gasprice 20000000000 –gas-cap 1500000

    This (i) increases the cache size, reducing the number of disk reads that nodes need to make, and (ii) votes the gas limit down by ~3x, reducing the maximum processing time of a block by a similar factor.

    In the medium term (ie. several days to a week), we are actively working on several fixes for the Go client that should both provide a more stable resolution for the present issue and mitigate the risk of similar attacks, including:

    • A change to miner software that automatically temporarily cuts the gas limit target by 2x when the miner sees a block that takes longer than 5 seconds to process, allowing for adjustments similar to what was coordinated today to happen automatically (see here for a pull request; note that this is a miner strategy change and NOT a soft fork or hard fork)
    • Numerical tweaks to cache settings
    • Adding additional caches
    • Adding an additional cache for EXTCODESIZE specifically (as it is likely that EXTCODESIZE reads are several times slower than other IO-heavy operations since the contracts that are being read are ~18 KB long)
    • An on-disk cache of state values that allows them to be more quickly (ie. O(log(n)) speedup) accessed

    We are also exploring the option of replacing the leveldb database with something more performant and optimized for our use case, though such a change would not come soon. The Parity team is working on their own performance improvements.

    In the longer term, there are low-level protocol changes that can also be explored. For example it may be wise to add a feature to Metropolis to increase the gas costs of opcodes that require reads of account state (SLOAD, EXTCODESIZE, CALL, etc), and especially read operations that read external accounts; increasing the gas cost of all of these operations to at least 500 would likely be sufficient, though care would need to be taken to avoid breaking existing contracts (eg. simultaneously implementing EIP 90 would suffice).

    This would put a much lower upper bound on the maximum number of bytes that a transaction may read, increasing safety against all potential attacks of this kind, and reducing the size of Merkle proofs and hence improving security for both light clients and sharding as a side effect. At present, we are focusing on the more immediate software-level changes; however, in the long term such proposals should be discussed and contract developers should be aware that changes of this sort may take place.




    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGrayscale targets Sui’s infrastructure layer via DEEP and WAL token trusts
    Next Article Trump memecoin guy wanted to throw $10K off Empire State Building
    Sophia Brown

    Related Posts

    The Ethereum network is currently undergoing a DoS attack

    August 13, 2025

    Announcement of imminent hard fork for EIP150 gas cost changes

    August 12, 2025

    FAQ: Upcoming Ethereum Hard Fork

    August 12, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Tickets are live for the Ethereum World’s Fair! And we’re launching the Supporter Program

    June 14, 2025

    Joe Lubin’s Sharplink crashes 91% in two weeks amid ETH treasury panic

    June 14, 2025

    MAP Protocol, Useless Coin, LUNC lead charge; BTC hits $105k

    June 14, 2025
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    About Us

    Stay updated on the world of cryptocurrency
    Your one-stop source for daily crypto news and insights
    Blockchainecho.info: Your trusted daily crypto companion

    Most Popular

    Tickets are live for the Ethereum World’s Fair! And we’re launching the Supporter Program

    June 14, 2025

    Joe Lubin’s Sharplink crashes 91% in two weeks amid ETH treasury panic

    June 14, 2025

    MAP Protocol, Useless Coin, LUNC lead charge; BTC hits $105k

    June 14, 2025
    Copyright © 2025
    • Home
    • Buy Now

    Type above and press Enter to search. Press Esc to cancel.