Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (2,557)
  • Analysis (2,704)
  • Bitcoin (3,313)
  • Blockchain (2,025)
  • DeFi (2,431)
  • Ethereum (2,314)
  • Event (92)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (2,491)
  • Press Releases (10)
  • Reddit (1,983)
  • Regulation (2,312)
  • Security (3,185)
  • Thought Leadership (3)
  • Videos (43)
Hand picked
  • BlackRock just moved over $200 million worth of these 2 cryptos
  • Sei Crypto News: Is it an easy 5X crypto for 2026?
  • Telegram revenue rises 65% to $870 million thanks to Toncoin Boost, despite $500 million bond freeze: report
  • Crypto market is down on January 6, but risk sentiment is spreading
  • Lexinova Ultra marks a new phase in LEXINOVA product development
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Ethereum»Sepolia incident | Ethereum Foundation Blog
Ethereum

Sepolia incident | Ethereum Foundation Blog

August 17, 2024No Comments
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


This blog post reveals a threat to the Ethereum network that was present from the merge until the Dencun hard fork.

Background

Prior to the merge, different message size limits for RPC communication were defined to protect clients from denial-of-service (DOS) attacks. These limits, applied to messages received via HTTP endpoints, were carried over to the engine API, which plays a crucial role in connecting execution and consensus layer clients during block production. Due to the involvement of the engine API in block production, it became possible to produce blocks that exceeded the RPC size limits of some clients, but remained within the acceptable range for others.

If an attacker creates a message that exceeds the client’s size limit at the lowest setting, while still meeting gas limit requirements, and then waits for a block to be produced, this could result in a situation where some clients consider the block valid, while others reject it, issuing an HTTP error code “413: Content Too Large”.

Impact

An attacker able to create these messages could force the majority of nodes (=geth) to reject blocks that a minority would accept. These blocks would then be duplicated and the proposer would lose his rewards.

At first, we thought that it was only possible to create these blocks using builders or a modified version of a client. Geth has a built-in transaction limit of 128KB, meaning that a large transaction like the one we are talking about would not end up in a geth node’s transaction pools. It was possible, however, to trigger the limit by having a client with a higher limit propose the block and the CL request validation of this proposed larger block.

We proposed a solution to temporarily lower the RPC limit on all clients to the lowest value (5MB). This would render the block invalid and an attacker would be very limited in the chaos he could cause in the network since the majority of nodes would reject his blocks.

However, on February 7th, we discovered that it was possible to create a block that would reach the 5MB limit with a set of transactions below the 128KB limit and not exceeding 30 million gas.

This is a bigger problem because we realized that an attacker could create a bunch of highly rewarding transactions and send them to the network. Since he pays more than everyone else in the mempool, every node (even geth nodes) would include the attack transactions in their block, creating a block that would not be accepted by the majority of the network, leading to many forks (all deemed valid by the minority nodes) and the chain would continue to reorganize itself over and over again.

Later, on February 7, we came to the conclusion that increasing RPC limits by everyone would be the safest alternative.

Chronology

  • 2024-02-06 13:00: Toni (EF), Pari (EF), and Justin (Besu) attempt to submit a specifically shredded transaction to the network. The transaction contributes blocks up to 2.7 MB when compressed quickly.
  • 2024-02-06 13:25: Pari receives errors from his local Geth node although the transaction should be valid.
  • 2024-02-06 15:14: Justin successfully put the transaction into a block and submitted it via the Besu client.
  • 2024-02-06 20:46: Sam (EF) alerts Pari (special thanks to mysticryuujin on X), Toni and Alex about some troubled Sepolia nodes.
  • 2024-02-06 21:05: The team checks with Marius from Geth and confirms the bug.
  • 2024-02-06 21:10 : The gang gets together to debug it
  • 2024-02-07 23:40 : We have decided for all customers to limit their RPC request limit to 5MB
  • 2024-02-07 6:40: We discovered that there might be a bigger problem and that the attack can be executed with transactions smaller than 128KB.
  • 2024-02-07 10:00: We have decided for all customers to increase the RPC request limit.
  • 2024-02-07 21:00: Fix has been merged into geth.
  • 02/09/2024: Geth has been released


While Geth is the only client affected by this bug, other clients have also updated their default settings to be safe from this attack even if gas limits are increased. Client teams have reported that the following updates have the safe RPC limits:

Geth: v1.13.12

Void: v1.25.4

Version: 24.1.2

Erigon: v2.58.0

Reth: v0.1.0-alpha.18





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article“Crypto For Harris” Fails to Rally Industry Behind “Reset”
Next Article Crypto NFT Today: August Week 2

Related Posts

Ethereum

Ethereum not aiming for 5.3% yield, says Vitalik

January 6, 2026
Ethereum

Ethereum Dominates On-Chain Finance as Network Sees Record Stablecoin Flows – Here’s How Much

January 6, 2026
Ethereum

Ethereum Enters Overbought Levels With Weekend Pump, Why A Crash Could Come

January 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

Riyadh to Host Global AI Show 2026: Where Minds and Machines Meet

December 19, 2025

Riyadh is set to become the global stage for modern artificial intelligence with the upcoming Global…

Event

Powering the Future of Play: Riyadh Welcomes the Global Games Show 2026

December 18, 2025

Riyadh is ready to host gamers and developers from all over the world with Global…

1 2 3 … 68 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Telegram revenue rises 65% to $870 million thanks to Toncoin Boost, despite $500 million bond freeze: report

January 6, 2026

Alt/BTC MACD turns bullish for the first time in 22 months

January 6, 2026

Ethereum Validator Exit Queue Drops 99% – A Bullish First Quarter Ahead?

January 6, 2026
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2026 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 93,266.00
ethereum
Ethereum (ETH) $ 3,280.95
tether
Tether (USDT) $ 0.999586
xrp
XRP (XRP) $ 2.28
bnb
BNB (BNB) $ 913.52
usd-coin
USDC (USDC) $ 0.999914
staked-ether
Lido Staked Ether (STETH) $ 3,280.26
tron
TRON (TRX) $ 0.293248
dogecoin
Dogecoin (DOGE) $ 0.150142
cardano
Cardano (ADA) $ 0.41789