I hope there are some bright ideas as to how to get Bitcoin XT adopted by miners because right now it's looking pretty bleak. I don't mean to be a negative Nancy but there needs to be a real campaign and concerted effort to bring this change about.--
The number of XT nodes are dropping. Does anyone know of a specific reason why?
It seems like there is a lot of negative talk at bitcointalk about it (and that's probably because that's all that is allowed with the censorship). But that is what people are seeing because we have a dictator of sorts running all major Bitcoin social media sites.
I still don't have an answer for how to defeat the censorship, but if 0.11.B is going to come out to fix some issues that are preventing miners from using it, then this needs to happen yesterday. I know devs are working hard, but this is a race.
You received this message because you are subscribed to the Google Groups "bitcoin-xt" group.
To unsubscribe from this group and stop receiving emails from it, send an email to bitcoin-xt+...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
[nxtchg:] The job of miners is to collect our votes, unfortunately right now due to all the complicating factors they are doing a very poor job.
And assessing where the economic majority will be is in their best interest.
Here's some ideas about possible strategies:
* prepare to block any other block size increases, like BIP100
* and in general send a clear message that we will not back down.
--
You received this message because you are subscribed to the Google Groups "bitcoin-xt" group.
To unsubscribe from this group and stop receiving emails from it, send an email to bitcoin-xt+...@googlegroups.com.
One way to find out (and this depends on your ISP) is for your IP to be null-routed as the ISP's DDoS mitigation strategy. This effectively plays right into the attacker's hand, but there you go.My ISP sent a section of a log that shows udp packets from remote port 53 (DNS) routed to my port 8333. I assume the attackers forge a DNS request packet in such a way that DNS servers send their response to the wrong place (my node), thus shielding their own location and probably amplifying their attack.I have renamed my Bitcoin XT node by changing the clientversion.cpp file, line:const std::string CLIENT_NAME("Bitcoin XT");It *is* still Bitcoin XT, and will have all the network benefits of an XT node. But it just does not broadcast to the world that it is XT. I'll update once I know if this works (ie whether or not it gets attacked again), and then I'll also re-enable the other 2 nodes.I guess I am running "Not Bitcoin XT" now.All this made me think about how to mitigate this threat in the future, without needing to shut down nodes or lie about the version. And it made me wonder why all nodes need to service all IP addresses at all. It sounds a bit crazy, but would it not make sense for a node to serve only x% of the IP addresses, ie 10%, and ignore the rest of the world? This could be done randomly, ieif (f(IP_NODE) xor f(IP_REMOTE) xor RANDOM mod 10 = 0) {// serve request} else {// drop connection}All nodes would still get all transactions and all blocks, just not all nodes are accessible to them. It introduces randomness in the network. It would not be possible for anyone to generate a complete set of all nodes and get a list to DDoS. This can be combined with bitcoin running on a random non-standard port to prevent such lists being made with large scale port scanning.Bootstrapping would get a bit trickier (ie DNS seeds would include addresses that cannot be reached, so more attempts would be needed). I'd need to do some calculations to ensure that nodes would not work as islands (my "gut feeling" says this will not happen, but that is hardly scientific.) Would it be worthwhile pursuing this idea a bit further?Arnoud
On Wed, Sep 2, 2015 at 12:07 PM, Mike Hearn <he...@vinumeris.com> wrote:
He doesn't seem to be attacking all nodes. Probably a limitation of his "bitkiller" program.
--
Hi Steve,
Thanks.
I use supervise, part of the cr.yp.to daemontools package. It works great for monitoring services including bitcoind and restarts bitcoind perfectly.
In this case bitcoind does not crash. I don't even think udp packets will hit the application even if they get sent to the same port.
in this case the DDoS takes bandwidth and kernel resources to the point where mostly the ISP is unhappy. They null route the IP which means that no one can reach the node.
Could the USB stick I/O be an issue?