Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (3,034)
  • Analysis (3,164)
  • Bitcoin (3,775)
  • Blockchain (2,157)
  • DeFi (2,623)
  • Ethereum (2,546)
  • Event (116)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (2,714)
  • Press Releases (12)
  • Reddit (2,463)
  • Regulation (2,461)
  • Security (3,604)
  • Thought Leadership (3)
  • Videos (44)
Hand picked
  • Oobit enables instant stablecoin transfers to bank accounts worldwide
  • US Could Lose Industry to EU MiCA if Delays in CLARITY Act Bill Continue
  • All about Revolut moving $1.2 billion to Polygon and whether that makes it faster than SWIFT
  • Kalshi Moves Into Margin Trading With New Regulatory Approval
  • Ethereum Accumulation Map Reveals Price Roadmap to $20,000
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Ethereum»Transaction spam attack: following steps
Ethereum

Transaction spam attack: following steps

March 21, 2025No Comments
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Today, the network has been attacked by a transaction spam attack which has repeatedly called the Opcode Extcodésize (see the trace sample here), creating blocks which take up to ~ 20 to 60 seconds to validate due to the ~ 50,000 disk heating necessary to treat the transaction. The result of this was a reduction of ~ 2-3X of the rate of blocking of blocks while the attack took place; There was no consensual failure (i.e. network fork) and neither the network nor any customer at no time have stopped completely. The attack has since had, at the time of the writing of the present, most of the time, and the network has been recovered at the moment.

The short -term corrective is for users, including minors, business users (including exchanges) and individuals to execute Geth with flags:

– Cache 1024 – Targetgaslimit 1500000 – Gasprice 20000000000

Or parity with flags:

-CACHE-SIZE-DB 1024-GAS-SLOOR-TARGET 1500000-GASPRICE 200000000-GAS-CAP 1500000

This (i) increases the size of the cache, reducing the number of disc readings that the nodes must make, and (ii) vote the ~ 3x gas limit, reducing the maximum processing time of a block by a similar factor.

In the medium term (that is to say several days for a week), we are actively working on several fixes for the Go Customer who should both provide a more stable resolution for this problem and mitigate the risk of similar attacks, in particular:

  • A modification of the minor software which automatically temporarily reduces the 2x gas limit target when the minor sees a block which takes more than 5 seconds to be treated, allowing adjustments similar to what has been coordinated today (see (see (see (see (see here for a traction request; Note that this is a change in strategy of minors and not a gentle fork or a hard fork)
  • Digital adjustments for settings of parameters
  • Adding additional caches
  • The addition of an additional cache for the extrotedsize specifically (because it is likely that the readings of Extcodésize are several times slower than the other io-lond operations because the contracts which are read measure approximately 18 kb long)
  • A cache on disk values ​​that allows them to be faster (that is,. O (log (n)) accelerate) accessible

We also explore the possibility of replacing the DBALD level database with something more efficient and optimized for our use case, although such a change would not soon take place. The parity team works on their own performance improvements.

In the longer term, there are low -level protocol changes that can also be explored. For example, it may be judicious to add a functionality to Metropolis to increase the gas costs of OPCODES which require readings of the state of the account (SLOAD, EXTENSIZE, CALL, etc.), and in particular reading operations that read external accounts; The increase in the cost of gas of all these operations to at least 500 would probably be sufficient, although care should be taken to avoid breaking the existing contracts (for example, simultaneous implementation EIP 90 would be enough).

This would put a much lower higher limit on the maximum number of bytes than a transaction can read, increasing safety against all potential attacks of this type, and reducing the size of Merkle evidence and therefore improving safety for light customers and fragment as a side effect. Currently, we focus on more immediate software level changes; However, in the long term, these proposals should be discussed and that contract developers must be aware that changes of this type can take place.




Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePump.Fun Pumpswap lance on Solana: is it the end of Raydium (Ray)?
Next Article The Trump administration wants USAID on the blockchain

Related Posts

Ethereum

Ethereum Accumulation Map Reveals Price Roadmap to $20,000

March 28, 2026
Ethereum

Ethereum Super Trend Reversal: Why ETH Price Could Drop to $1,200

March 28, 2026
Ethereum

Ethereum Foundation Hosts Invitation-Only Event for New York Institutions

March 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

Africa’s Blockchain Leaders Convene in Lagos for ABDS 2026

March 26, 2026

Lagos, Nigeria – April 29–30, 2026 – The Africa Blockchain, DeFi & Web3 Summit (ABDS…

Event

After Token 2049 Dubai cancellation, industry attention turns to Paris Blockchain Week

March 24, 2026

Paris, March 24, 2026 – Following the announcement that Token 2049 Dubai will not take…

1 2 3 … 80 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

All about Revolut moving $1.2 billion to Polygon and whether that makes it faster than SWIFT

March 28, 2026

Goldman Sachs-backed Canton Crypto Chain Adds LayerZero Interoperability

March 28, 2026

Can RAIN crypto recover as $10M selloff sparks downside fears?

March 27, 2026
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2026 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 66,282.00
ethereum
Ethereum (ETH) $ 1,999.22
tether
Tether (USDT) $ 0.999358
bnb
BNB (BNB) $ 612.49
xrp
XRP (XRP) $ 1.34
usd-coin
USDC (USDC) $ 0.999765
solana
Solana (SOL) $ 83.15
tron
TRON (TRX) $ 0.311455
figure-heloc
Figure Heloc (FIGR_HELOC) $ 1.03
staked-ether
Lido Staked Ether (STETH) $ 2,265.05