Author

Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency - page 1477. (Read 4670622 times)

legendary
Activity: 2268
Merit: 1141
Where is a current windows blockchain? The one in the op is over a month old.


I think we are all waiting patiently.  The devs need some sleep  Smiley
https://mega.co.nz/#!rbggbrgbrgbrgbLINKTRASHEDBrbrgbrgbrgbgrjw win64 blockchain #203437 block

If I recall correctly, this was not approved by the devs.
member
Activity: 87
Merit: 10
I am trying to sync my 12-day old windows x64 blockchain. It ended up on the wrong fork the first time but I'm trying again. If it syncs properly I'll upload it for everyone.
full member
Activity: 183
Merit: 100
That one's a month old. You still have to sync the rest and you might still end up on the wrong fork, I did.
Best to wait for an official update from the devs.
hero member
Activity: 697
Merit: 500
legendary
Activity: 1151
Merit: 1001
I'm have a problem with sync.

Seem to be stuck on 202656 so wrong fork i guess. Cry

I have deleted the 'blockchain.bin', downloaded one from 30 odd days ago (from the OP of this topic) and allowed everything to catch up. However, it is still stuck on 202656.

Any suggestions would be appreciated!
Same here
And I'm on windows... can I use linux blockchain?!
hero member
Activity: 697
Merit: 500
full member
Activity: 221
Merit: 100
I'm have a problem with sync.

Seem to be stuck on 202656 so wrong fork i guess. Cry

I have deleted the 'blockchain.bin', downloaded one from 30 odd days ago (from the OP of this topic) and allowed everything to catch up. However, it is still stuck on 202656.

Any suggestions would be appreciated!
legendary
Activity: 1151
Merit: 1001
Do we (miners) need to download new daemon&wallet ?
newbie
Activity: 50
Merit: 0
Where is a current windows blockchain? The one in the op is over a month old.


I think we are all waiting patiently.  The devs need some sleep  Smiley
https://mega.co.nz/#!rbggbrgbrgbrgbLINKTRASHEDBrbrgbrgbrgbgrjw win64 blockchain #203437 block
hero member
Activity: 658
Merit: 500
Admin of DwarfPool.com
If he was confident in finding the next block, assuming he did, that would have been a strong candidate for the purpose of the attack - who wouldn't want to know they could mine blocks on demand? He could deliver whole clusters of a Merkle tree.  But not sure that has happened here if you don't have any spikes in blocks.

edit

Atrides, I'm afraid you seem to be ground zero at the moment.

Its been a while since I've been on your pool, but can you tell when the miner linked to these blocks started and possibly finished on your pool?

Both users are relative small with 4 and 8 khs. First user started 30th Aug and other 1th Sep. And they are on the pool still.
I don't think they belongs to attacker. They were random blocks-hashes.

Attacker just send prepared bad TXs.
newbie
Activity: 52
Merit: 0
Where is a current windows blockchain? The one in the op is over a month old.


I think we are all waiting patiently.  The devs need some sleep  Smiley
sr. member
Activity: 308
Merit: 250
Where is a current windows blockchain? The one in the op is over a month old.
jr. member
Activity: 38
Merit: 14



I can't successly compile wallet&bitmonerod  from github source code now.
following is information by make :

Quote

rio@i2f14fd0fZ0a40Z:~/bitmonero/bitmonero$ git pull
Already up-to-date.
rio@i2f14fd0fZ0a40Z:~/bitmonero/bitmonero$ make
mkdir -p build/release
cd build/release && cmake -D CMAKE_BUILD_TYPE=Release ../..
-- Found Git: /usr/bin/git
-- Configuring done
-- Generating done
-- Build files have been written to: /home/rio/bitmonero/bitmonero/build/release
cd build/release && make
make[1]: Entering directory `/home/rio/bitmonero/bitmonero/build/release'
make[2]: Entering directory `/home/rio/bitmonero/bitmonero/build/release'
make[3]: Entering directory `/home/rio/bitmonero/bitmonero/build/release'
make[3]: Leaving directory `/home/rio/bitmonero/bitmonero/build/release'
make[3]: Entering directory `/home/rio/bitmonero/bitmonero/build/release'
fatal: No names found, cannot describe anything.
CMake Warning at src/version.cmake:3 (message):
  Cannot determine current revision.  Make sure that you are building either
  from a Git working tree or from a source archive.


make[3]: Leaving directory `/home/rio/bitmonero/bitmonero/build/release'
[  0%] Built target version
make[3]: Entering directory `/home/rio/bitmonero/bitmonero/build/release'
make[3]: Leaving directory `/home/rio/bitmonero/bitmonero/build/release'
make[3]: Entering directory `/home/rio/bitmonero/bitmonero/build/release'
[  1%] Building C object external/miniupnpc/CMakeFiles/upnpc-static.dir/igd_desc_parse.c.o
cc1: error: -Werror=maybe-uninitialized: no option -Wmaybe-uninitialized
cc1: error: unrecognized command line option ?std=c11?
make[3]: *** [external/miniupnpc/CMakeFiles/upnpc-static.dir/igd_desc_parse.c.o] Error 1
make[3]: Leaving directory `/home/rio/bitmonero/bitmonero/build/release'
make[2]: *** [external/miniupnpc/CMakeFiles/upnpc-static.dir/all] Error 2
make[2]: Leaving directory `/home/rio/bitmonero/bitmonero/build/release'
make[1]: *** [all] Error 2
make[1]: Leaving directory `/home/rio/bitmonero/bitmonero/build/release'
make: *** [build-release] Error 2
rio@i2f14fd0fZ0a40Z:~/bitmonero/bitmonero$


anyone had encountered that and  found  a solution?
who can give some help for me?


hero member
Activity: 529
Merit: 505
I'm on drugs, what's your excuse?
Together we survive   


 
One dies both Die


Jon  Cool
legendary
Activity: 2968
Merit: 1198
The 66 XMR fee tx is nowhere to be seen, so no idea where that is even coming from.

Fee is just (inputs - outputs). So if there are no outputs the entire input becomes a fee. That was used for the tiny transactions in the overflow block too.

legendary
Activity: 1484
Merit: 1005
I'm too tired to compute time differences now, when did they enter the mempool (relative to the timeline of the attack)? Was it around peak crisis management, at the darkest hour?

The 66 XMR fee tx is the wildcard. What's inside? No outputs? Why is it so 151byte-small and why is it in the mempool?

They entered the mempool a very long time ago, about 11 hours ago, a while after the initial attack.

Below is a current mempool state:
Code:
2014-Sep-05 01:10:17.257000 Pool state:
id:
blob_size: 2506
fee: 0.100000000000
kept_by_block: T
max_used_block_height: 202620
max_used_block_id: <0000000000000000000000000000000000000000000000000000000000000000>
last_failed_height: 203416
last_failed_id:
id: <9c0e2dd3adbb08e047567042ca0465d0979ecd2c00bb437cddfa83c3d121d3c5>
blob_size: 2079
fee: 0.100000000000
kept_by_block: T
max_used_block_height: 202617
max_used_block_id: <0000000000000000000000000000000000000000000000000000000000000000>
last_failed_height: 203126
last_failed_id: <87115ebd63abfbc812d762159dfc374c704acde531d429431915ec1616762289>
id: <38f731e69b37850efd27fcd281e3890ac7801e35f73c69f24a6099cf8f6ae152>
blob_size: 24057
fee: 0.100000000000
kept_by_block: T
max_used_block_height: 0
max_used_block_id: <0000000000000000000000000000000000000000000000000000000000000000>
last_failed_height: 0
last_failed_id: <0000000000000000000000000000000000000000000000000000000000000000>
id: <8ce209d697018eb4bc964c52f7e970059fe06531d009b950d9e8056f05cda934>
blob_size: 1393
fee: 0.005831060000
kept_by_block: T
max_used_block_height: 202729
max_used_block_id: <0000000000000000000000000000000000000000000000000000000000000000>
last_failed_height: 202975
last_failed_id: <1fd43b901c3970dce25b1c0930130af6951ea2d5d9a0fe0e4095d1cb0c2bf219>
id:
blob_size: 1942
fee: 0.100000000000
kept_by_block: T
max_used_block_height: 0
max_used_block_id: <0000000000000000000000000000000000000000000000000000000000000000>
last_failed_height: 202798
last_failed_id:
id:
blob_size: 1942
fee: 0.100000000000
kept_by_block: T
max_used_block_height: 0
max_used_block_id: <0000000000000000000000000000000000000000000000000000000000000000>
last_failed_height: 202798
last_failed_id:

The 66 XMR fee tx is nowhere to be seen, so no idea where that is even coming from.

It looks like those weird "45" tx are being invalidated because the inputs are considered invalid:
Code:
[P2P6]Transaction verification impossible:
sr. member
Activity: 252
Merit: 250
In case anyone is wondering, I dont believe the attacker would require a massive amount of hash power to achieve this attack or a relatively large amount of XMR, but there are some other interesting things to consider about how they did it:

It looks like they prepared for the attack from around 1200 blocks before, injecting their large txes with the 0.1XMR fee each time, so even if there was one tx per block that's still only 120XMR expended. Suggests they were running a system with some code to automate the generation of those txes and send them into the network via a normal bitmonerod.

Tacotime's analysis points out they must have mined the naughty block 202612 on their own custom daemon because it includes tiny tx fees (if they mined it themselves they would have got the fees back so I guess there was another reason for keeping the fee so low), but once they had the blockchain "prepared" they would only need 0.5MH/s on their own pool to have a 50/50 chance of mining their next block within an hour. We've already figured out that they have some code for crafting custom txes, so it probably isnt tricky for them to have customised a bitmonerod to include their specially crafted tx set when one of their miners finds a block. Must be a reason why they generated two slightly different blocks tho?

The block which then causes the fork, 202614 was apparently mined on Dwarfpool (both of them), so they werent using their pool for that. They dont really need to though, as this time they just wanted to inject their duplicate txes, so they can use their custom tx generator and send them out to the network that way.


Getting hypothetical now, I'm wondering if their usage of Dwarfpool was deliberate - I notice that they have two mining servers in different parts of the world so perhaps they realised they could leverage that and Dwarfpool's hashpower. First they transmit one version of block 202612 to DwarfEU and the other version to DwarfUSA - the block header matches so the controlling server accepts everything, but the individual daemons are now on different forks without realising it. Then by sending their custom txes to the Dwarf servers they know it will only take a few minutes to cause a fork. Havent yet figured out how that would result in a major fork though, rather than just causing a small portion of the network to diverge.

Assuming I havent made any major errors in the above (pls correct me if so), then its certainly a clever attack - from finding the flaw in the code to execution, but by no means beyond the capability of a single individual or small group who thought they could gain from it.
sr. member
Activity: 263
Merit: 250
Are the first two legal? They use nonstrandard denomination. Maybe that is the attack? Unmixable txo?

Is there any meaningful raw data in the corrupted tx? I don't know any way to access it.

Non-standard denominations are allowed. They are spending from the two overflow attack transactions in block 202612.

I'm too tired to compute time differences now, when did they enter the mempool (relative to the timeline of the attack)? Was it around peak crisis management, at the darkest hour?

The 66 XMR fee tx is the wildcard. What's inside? No outputs? Why is it so 151byte-small and why is it in the mempool?
legendary
Activity: 1456
Merit: 1000
Could you create a chain > amend some blocks to steal small amounts from a number (hundreds or targeted) of wallets > join one or several pools to hide among others > increase your hash rate > cause a fork > use your increased hash to force everyone to join your rogue chain?
legendary
Activity: 1484
Merit: 1005
Are the first two legal? They use nonstrandard denomination. Maybe that is the attack? Unmixable txo?

Is there any meaningful raw data in the corrupted tx? I don't know any way to access it.

Non-standard denominations are allowed. They are spending from the two overflow attack transactions in block 202612.
Jump to: