i2pd specific attack? #1918
Replies: 29 comments 3 replies
-
Network is under attack right now.
I think developers have enough information about this attack. |
Beta Was this translation helpful? Give feedback.
-
Bitcoin network was affected too! |
Beta Was this translation helpful? Give feedback.
-
Note: i2pd v2.42.1 is not affected by the attack. One of the diva.exchange test networks is running on version v2.42.1 and it is doing fine. |
Beta Was this translation helpful? Give feedback.
-
Can you try to test 7c53515 with disabled SSU2? |
Beta Was this translation helpful? Give feedback.
-
Hi, i`am tested it on i2pd:latest docker image with ssu2.enable=false |
Beta Was this translation helpful? Give feedback.
-
Tx! But: which docker image is it (link to hub.docker.com, if possible, please)? Are you sure that 7c53515 is compiled in this image? |
Beta Was this translation helpful? Give feedback.
-
Hi, tested on this image |
Beta Was this translation helpful? Give feedback.
-
Thanks a lot! From Timestamp-perspective, seems like the latest commit is included in this image. We'll do some compiles on older versions (which are tagged) within the next hours/days to get a better understanding which older versions work (like v.2.45...). |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Marker of successful attack is large amount of Floodfills in web console (> 2000). |
Beta Was this translation helpful? Give feedback.
-
My i2pd quit within the last 24h with error code 137 (out of memory), with this error message:
Is this a symptom of the attack? |
Beta Was this translation helpful? Give feedback.
-
It is. |
Beta Was this translation helpful? Give feedback.
-
I saw 700 MB of RAM usage for my node because of attack. |
Beta Was this translation helpful? Give feedback.
-
Mine went well over 100k routers and floodfills on an 128GB machine, didn't check usage but killed it, because there was no point. |
Beta Was this translation helpful? Give feedback.
-
I'm with you, it's not over @Vort But I think it's worth to point out, that 2.42.1 resets router & floodfill count much more often, the numbers grow much more slowly with a considerably lower ratio of floodfills (before 4/5, now 1/3). Overall it is able to maintain my tunnels and allows me to be operational, while the newest versions (including the latest commit) die down very quickly. EDIT: The router count stays consistently 13k while the floodfill count stays around 2k, mostly under. |
Beta Was this translation helpful? Give feedback.
-
Extending the length of the exploration tunnel and reducing the mass to 6 hop 1 tunnel also seems to mitigate the attack |
Beta Was this translation helpful? Give feedback.
-
Debian 11.6 x86_64 i2pd version 2.47.0-36-g4ebc7c97 (0.9.58) i2pd.conf
kern.log
|
Beta Was this translation helpful? Give feedback.
-
This is expected considering the current situation. |
Beta Was this translation helpful? Give feedback.
-
Less then 170 MB a few hours before |
Beta Was this translation helpful? Give feedback.
-
Same here, my SAM app went from tons of peers to zero within minutes. |
Beta Was this translation helpful? Give feedback.
-
is the blocklist generated and held individually or is it shared? EDIT: On first glance, seems to be simply hardcoded: https://github.com/i2p/i2p.i2p/blob/master/installer/resources/blocklist.txt |
Beta Was this translation helpful? Give feedback.
-
For blocking to work correctly, attack origin needs to be uncovered first. |
Beta Was this translation helpful? Give feedback.
-
Please not haha I'm just brainstorming but I could imagine voting power measured by uptime being used as social proof when exchanging attack information, so that it's harder to be abused. Or is it the attack identification on every router individually? Because @TpNYxtt11ox5TgZ mentioned that Java I2P would already have working analysis and Redditors report that everything is fine on Java I2P. |
Beta Was this translation helpful? Give feedback.
-
@twofaktor I have been seeing the same with i2pd 2.47.0 for the past couple days. |
Beta Was this translation helpful? Give feedback.
-
Yes, I'm running the latest 2.47.0 too. Yesterday I noticed this altercation and last night it seems that it was solved in some of my nodes, in others the error continues to appear, and it seems that this problem has not yet been completely solved 😢 |
Beta Was this translation helpful? Give feedback.
-
@jonatack @twofaktor is it possible for you to try version 2.42.1 in the meantime? |
Beta Was this translation helpful? Give feedback.
-
I am try version 2.42.1
|
Beta Was this translation helpful? Give feedback.
-
Without me having changed i2pd version, I2P connections have recently begun to slowly recover. |
Beta Was this translation helpful? Give feedback.
-
Running i2pd v2.47.0 in a docker container, this one:
https://hub.docker.com/layers/divax/i2p/current/images/sha256-eb5561394b32b799768293432e752c5de46d23efaed19cccbb025529471a6b8b?context=explore
Results in:
Any feedback on this? Can diva.exchange help somehow to analyse the situation?
Beta Was this translation helpful? Give feedback.
All reactions