Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (3,010)
  • Analysis (3,140)
  • Bitcoin (3,753)
  • Blockchain (2,157)
  • DeFi (2,623)
  • Ethereum (2,536)
  • Event (114)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (2,714)
  • Press Releases (12)
  • Reddit (2,439)
  • Regulation (2,461)
  • Security (3,591)
  • Thought Leadership (3)
  • Videos (44)
Hand picked
  • The Bank of England’s plan to cap stablecoin holdings is sparking an industry revolt
  • Monero price hits a wall: why $370 is the key to success for XMR
  • Hyperliquid rebounds 70% to $48, but THIS still blocks HYPE’s rise
  • Ethereum Tops $2,100 as BitMine Ups Its ETH Bet
  • CLARITY Act Hits a March 1 Pressure Window
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Ethereum»Transaction spam attack: following steps
Ethereum

Transaction spam attack: following steps

March 21, 2025No Comments
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Today, the network has been attacked by a transaction spam attack which has repeatedly called the Opcode Extcodésize (see the trace sample here), creating blocks which take up to ~ 20 to 60 seconds to validate due to the ~ 50,000 disk heating necessary to treat the transaction. The result of this was a reduction of ~ 2-3X of the rate of blocking of blocks while the attack took place; There was no consensual failure (i.e. network fork) and neither the network nor any customer at no time have stopped completely. The attack has since had, at the time of the writing of the present, most of the time, and the network has been recovered at the moment.

The short -term corrective is for users, including minors, business users (including exchanges) and individuals to execute Geth with flags:

– Cache 1024 – Targetgaslimit 1500000 – Gasprice 20000000000

Or parity with flags:

-CACHE-SIZE-DB 1024-GAS-SLOOR-TARGET 1500000-GASPRICE 200000000-GAS-CAP 1500000

This (i) increases the size of the cache, reducing the number of disc readings that the nodes must make, and (ii) vote the ~ 3x gas limit, reducing the maximum processing time of a block by a similar factor.

In the medium term (that is to say several days for a week), we are actively working on several fixes for the Go Customer who should both provide a more stable resolution for this problem and mitigate the risk of similar attacks, in particular:

  • A modification of the minor software which automatically temporarily reduces the 2x gas limit target when the minor sees a block which takes more than 5 seconds to be treated, allowing adjustments similar to what has been coordinated today (see (see (see (see (see here for a traction request; Note that this is a change in strategy of minors and not a gentle fork or a hard fork)
  • Digital adjustments for settings of parameters
  • Adding additional caches
  • The addition of an additional cache for the extrotedsize specifically (because it is likely that the readings of Extcodésize are several times slower than the other io-lond operations because the contracts which are read measure approximately 18 kb long)
  • A cache on disk values ​​that allows them to be faster (that is,. O (log (n)) accelerate) accessible

We also explore the possibility of replacing the DBALD level database with something more efficient and optimized for our use case, although such a change would not soon take place. The parity team works on their own performance improvements.

In the longer term, there are low -level protocol changes that can also be explored. For example, it may be judicious to add a functionality to Metropolis to increase the gas costs of OPCODES which require readings of the state of the account (SLOAD, EXTENSIZE, CALL, etc.), and in particular reading operations that read external accounts; The increase in the cost of gas of all these operations to at least 500 would probably be sufficient, although care should be taken to avoid breaking the existing contracts (for example, simultaneous implementation EIP 90 would be enough).

This would put a much lower higher limit on the maximum number of bytes than a transaction can read, increasing safety against all potential attacks of this type, and reducing the size of Merkle evidence and therefore improving safety for light customers and fragment as a side effect. Currently, we focus on more immediate software level changes; However, in the long term, these proposals should be discussed and that contract developers must be aware that changes of this type can take place.




Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePump.Fun Pumpswap lance on Solana: is it the end of Raydium (Ray)?
Next Article The Trump administration wants USAID on the blockchain

Related Posts

Ethereum

Ethereum Goes Institutional With Yield, Opening Up New Income Opportunities

March 23, 2026
Ethereum

$33 million worth of ETH withdrawn from exchanges in just a few hours

March 23, 2026
Ethereum

8-year Ethereum convergence that indicates a stronger Altcoin season than 2021 is coming

March 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

UN:BLOCK Northern Europe’s Largest Blockchain and Fintech Conference

March 20, 2026

Riga, Latvia — UN:BLOCK, Northern Europe’s largest blockchain and fintech conference, returns to Riga, bringing…

Videos

📊 BTC vs ETH: Where Is Smart Money Moving?

March 19, 2026

In this conversation with 3.0 TV, Jason Fernandes, Co-founder of AdLunam Inc and Altcoin Observer,…

1 2 3 … 79 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Hyperliquid rebounds 70% to $48, but THIS still blocks HYPE’s rise

March 24, 2026

Monero Price Prediction: XMR stuck below $180 as exchange liquidity dries up

March 24, 2026

Sui and other gems of agentic AI commerce

March 23, 2026
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2026 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 71,090.00
ethereum
Ethereum (ETH) $ 2,156.63
tether
Tether (USDT) $ 0.999635
xrp
XRP (XRP) $ 1.42
bnb
BNB (BNB) $ 636.58
usd-coin
USDC (USDC) $ 0.999903
solana
Solana (SOL) $ 91.92
tron
TRON (TRX) $ 0.309215
figure-heloc
Figure Heloc (FIGR_HELOC) $ 1.03
staked-ether
Lido Staked Ether (STETH) $ 2,265.05