Author

Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency - page 705. (Read 4671660 times)

legendary
Activity: 1260
Merit: 1008
NB: https://forum.getmonero.org/1/news-announcements-and-editorials/2452/monero-network-malicious-fork-from-block-913193-updates-and-resolution

From that post (which will be kept updated) -

Hi all,

The Monero network was (once again) the subject of an attack. Due to an error during the development of 0.9, Hydrogen Helix, we omitted a check that allowed for v2 blocks to be added to the network prior to the hard fork block height. Thus instead of forking on March 20, at block height 1009827, a v2 block was added to the network at block height 913193.

This is obviously problematic as not all services have updated to 0.9, and the bulk of the network hash rate is still on 0.8.x. We are preparing a point release to 0.9 that resolves this, but in the meantime only if you are running 0.9 you can do the following as a quick patch:

Shut down your Monero daemon
Grab a checkpoints.json file from getmonero: https://downloads.getmonero.org/checkpoints.json
Put the file in your bitmonero working directory (eg. ~/.bitmonero or C:\ProgramData\bitmonero)
Restart the daemon
As soon as the patched point release is out you can remove the checkpoints.json file, if you wish, and run the updated version. The checkpoints.json patch is a quick fix and does not prevent the attacker from replaying their attack at a later block.


After all this time on testnet I'm surprised to hear this, isn't there anyone on the team adept at at debugging and exploit testing?
Does anyone actually have a position that actively attack testnet before release? If not there are those out there that relish in this and do it for the accolades.
Not trying to be insulting hear as I know how hard you guys work on this but alpha/beta stages are there for a reason and really this is a simple expliot that should have been on the first error checks before release. I wish I it was 16 years ago, as I would have jumped on this just for the lulz.

Also are all the devs listed active? Did they all check this prior to release?  What is the list that signed off on this?

While I agree with your frustration, I think its continuously important to remember the big 0 in front of the version number of Monero (and hell, of bitcoin). Even at the active on-the-mainchain state, all of this software is beta. (of course, we're at 0.9 now... so, we gonna be seeing a lot more decimals put in? I don't know how versioning works. It always fails me when I write manuscripts).

And having been witness to all of the work that went into 0.9, shits gonna happen and your never going to reach perfection in the lab. And at some point you just push things so they *do* break.

Like I said, this kind of stuff can be frustrating and disappointing... but your other option is to wait for a big 1 to go in front of the version number, when the developers feel that their code is really ready for production.

For instance, if some alien entity came to us and said "hey, we don't use currency, but we kind of like how it helps your civilization work. How can we implement it?" We wouldn't try to "sell" them on our experimental new technology. We'd introduce them to our incredibly arcane (but functioning) central banking system and say "yeah we know it sucks, so we're working on version 2" and then show them cryptocurrencies.
legendary
Activity: 2968
Merit: 1198
There was no fucking attack, it was just a bug!

Oh really? Where did the version 2 block come from?


Buggy code!

OK, which line?
legendary
Activity: 2968
Merit: 1198
Nice try from the attackers. Very fast answer, thanks to everyone who worked on the fix.
No harm done I believe.


No harm done ? Look at the net hash rate, it has halved...

So what, it had just doubled. Although that could have been the attacks. Any dev input on this?

No apparent connection

Quote
What was the timeframe of the attack?

The block that caused the network to fork was 913193

Quote
This must be why withdrawals are locked on bittrex, are they locked on all exchanges?

We notified exchanges as soon as possible. How they responded is a function of their own operations.
legendary
Activity: 2268
Merit: 1141
Nice try from the attackers. Very fast answer, thanks to everyone who worked on the fix.
No harm done I believe.


No harm done ? Look at the net hash rate, it has halved...

So what, it had just doubled. Although that could have been the attacks. Any dev input on this?

What was the timeframe of the attack?

This must be why withdrawals are locked on bittrex, are they locked on all exchanges?

LOL I always buy at the "Interesting" times! Cheesy

Yes, Poloniex' wallet is disabled as well.
sr. member
Activity: 378
Merit: 250
Kudos to the Monero development team for being alert and acting quickly to remedy the attack. Just like the fast response to the last major attack in 2014 the development team has proven itself. Thank you for being great stewards for Monero and continuing to improve upon the CryptoNote technology you inherited.

The Monero codebase looks nothing like it did in summer 2014 and that is a good thing. The Monero development team and Monero Research Lab deserve a tremendous amount of recognition for all of their work.
legendary
Activity: 1470
Merit: 1000
Want privacy? Use Monero!
There was no fucking attack, it was just a bug!

It was an attack.

Someone created a block that can't be created by just using the 0.9 client.
So the attacker changed the code of 0.9 a bit so he/she/they was/were able to mine a block that was a v2block in stead of the default v1block.
legendary
Activity: 1092
Merit: 1000
There was no fucking attack, it was just a bug!

Oh really? Where did the version 2 block come from?


Buggy code!
legendary
Activity: 2968
Merit: 1198
There was no fucking attack, it was just a bug!

Oh really? Where did the version 2 block come from?
legendary
Activity: 1092
Merit: 1000
There was no fucking attack, it was just a bug!
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
Nice try from the attackers. Very fast answer, thanks to everyone who worked on the fix.
No harm done I believe.


No harm done ? Look at the net hash rate, it has halved...

So what, it had just doubled. Although that could have been the attacks. Any dev input on this?

What was the timeframe of the attack?

This must be why withdrawals are locked on bittrex, are they locked on all exchanges?

LOL I always buy at the "Interesting" times! Cheesy
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
NB: https://forum.getmonero.org/1/news-announcements-and-editorials/2452/monero-network-malicious-fork-from-block-913193-updates-and-resolution

From that post (which will be kept updated) -

Hi all,

The Monero network was (once again) the subject of an attack. Due to an error during the development of 0.9, Hydrogen Helix, we omitted a check that allowed for v2 blocks to be added to the network prior to the hard fork block height. Thus instead of forking on March 20, at block height 1009827, a v2 block was added to the network at block height 913193.

This is obviously problematic as not all services have updated to 0.9, and the bulk of the network hash rate is still on 0.8.x. We are preparing a point release to 0.9 that resolves this, but in the meantime only if you are running 0.9 you can do the following as a quick patch:

Shut down your Monero daemon
Grab a checkpoints.json file from getmonero: https://downloads.getmonero.org/checkpoints.json
Put the file in your bitmonero working directory (eg. ~/.bitmonero or C:\ProgramData\bitmonero)
Restart the daemon
As soon as the patched point release is out you can remove the checkpoints.json file, if you wish, and run the updated version. The checkpoints.json patch is a quick fix and does not prevent the attacker from replaying their attack at a later block.

After all this time on testnet I'm surprised to hear this, isn't there anyone on the team adept at at debugging and exploit testing?
Does anyone actually have a position that actively attack testnet before release? If not there are those out there that relish in this and do it for the accolades.
Not trying to be insulting hear as I know how hard you guys work on this but alpha/beta stages are there for a reason and really this is a simple expliot that should have been on the first error checks before release. I wish I it was 16 years ago, as I would have jumped on this just for the lulz.

Also are all the devs listed active? Did they all check this prior to release?  What is the list that signed off on this?
hero member
Activity: 649
Merit: 500
Nice try from the attackers. Very fast answer, thanks to everyone who worked on the fix.
No harm done I believe.


No harm done ? Look at the net hash rate, it has halved...

It is down by 25%.  I guess that is the same as halved...

It half-halved maybe...
legendary
Activity: 1624
Merit: 1008
Nice try from the attackers. Very fast answer, thanks to everyone who worked on the fix.
No harm done I believe.


No harm done ? Look at the net hash rate, it has halved...

It is down by 25%.  I guess that is the same as halved...
legendary
Activity: 1260
Merit: 1008
Nice try from the attackers. Very fast answer, thanks to everyone who worked on the fix.
No harm done I believe.


No harm done ? Look at the net hash rate, it has halved...

Oh primer. I don't get you.
legendary
Activity: 1092
Merit: 1000
Nice try from the attackers. Very fast answer, thanks to everyone who worked on the fix.
No harm done I believe.


No harm done ? Look at the net hash rate, it has halved...
legendary
Activity: 1512
Merit: 1012
Still wild and free
Nice try from the attackers. Very fast answer, thanks to everyone who worked on the fix.
No harm done I believe.
full member
Activity: 219
Merit: 100
Another fuck-up by the devs. They had a whole year to work on this minor release and guess what, they fucked it up. Retards.

At least they really succeed to fuck the blockchain, not like you and your claim back in the day...
legendary
Activity: 1092
Merit: 1000
Another fuck-up by the devs. They had a whole year to work on this minor release and guess what, they fucked it up. Retards.
legendary
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
NB: https://forum.getmonero.org/1/news-announcements-and-editorials/2452/monero-network-malicious-fork-from-block-913193-updates-and-resolution

From that post (which will be kept updated) -

Hi all,

The Monero network was (once again) the subject of an attack. Due to an error during the development of 0.9, Hydrogen Helix, we omitted a check that allowed for v2 blocks to be added to the network prior to the hard fork block height. Thus instead of forking on March 20, at block height 1009827, a v2 block was added to the network at block height 913193.

This is obviously problematic as not all services have updated to 0.9, and the bulk of the network hash rate is still on 0.8.x. We are preparing a point release to 0.9 that resolves this, but in the meantime only if you are running 0.9 you can do the following as a quick patch:

Shut down your Monero daemon
Grab a checkpoints.json file from getmonero: https://downloads.getmonero.org/checkpoints.json
Put the file in your bitmonero working directory (eg. ~/.bitmonero or C:\ProgramData\bitmonero)
Restart the daemon
As soon as the patched point release is out you can remove the checkpoints.json file, if you wish, and run the updated version. The checkpoints.json patch is a quick fix and does not prevent the attacker from replaying their attack at a later block.

Nice fast response!

Mustangs 2
Trollblocks 0
legendary
Activity: 2268
Merit: 1141
- Poloniex was and is on the correct chain, coins are safe, wallet is currently disabled but trading is allowed.

- MyMonero is not affected, thus coins stored there are safe.

- The devs are preparing a point release to 0.9 that resolves the issue caused by the malicious fork.
Jump to: