Bitcoin Forum
May 24, 2024, 12:00:57 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: testnet propagation problmes  (Read 689 times)
andygough1974 (OP)
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
April 25, 2015, 02:40:16 PM
 #1

Hello, we have problems sending transactions to testnet3 starting from yesterday.
code is stable for 2 months and was working perfect until yesterday.

All transactions rejected with such response:   
status: 'fail',
message: 'Propagation unsuccessful',
details: 'TX rejected',
code: 400

We know that code 400 is about wrong address (not sure IP or wallet address), but all wallet addresses that we have tried are correct and created with standard library.
And, again, this all stops working without any code changes.
Can we be blacklisted? How to check it?
achow101_alt
Sr. Member
****
Offline Offline

Activity: 268
Merit: 256


View Profile
April 25, 2015, 07:06:19 PM
 #2

Hello, we have problems sending transactions to testnet3 starting from yesterday.
code is stable for 2 months and was working perfect until yesterday.

All transactions rejected with such response:   
status: 'fail',
message: 'Propagation unsuccessful',
details: 'TX rejected',
code: 400

We know that code 400 is about wrong address (not sure IP or wallet address), but all wallet addresses that we have tried are correct and created with standard library.
And, again, this all stops working without any code changes.
Can we be blacklisted? How to check it?
You can be blacklisted, but only temporarily. Nodes will give your node a banscore, which, if too high, your node will be blocked. I don't know how to check this.

Also, are you using bitcoin core, an alternative client, or custom software?

Tip Me!: 1AQx99s7q1wVinbgXbA48BaZQVWpHe5gYM | My PGP Key: Fingerprint 0x17565732E08E5E41
Amph
Legendary
*
Offline Offline

Activity: 3206
Merit: 1069



View Profile
April 26, 2015, 07:56:13 AM
Last edit: April 26, 2015, 12:22:30 PM by Amph
 #3

well you don't need to know how to check it, because  the system tell you that msg about rejecting your transaction, which is enough to know if you are blacklisted or not

just change ip with your router or use a vpn
Barbasja
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile WWW
April 26, 2015, 10:40:24 AM
Last edit: April 26, 2015, 12:06:40 PM by Barbasja
 #4

I wonder...

Since yesterday I started seeing a large amount of new blocks propagating on Testnet, a somewhat disturbing amount of new blocks all with one single transaction. And they keep coming with only seconds in between. I haven't studied the content of the blocks, but that's easy for anyone who wants.

A similar thing happened not long ago. If you take a look at http://blockr.io/, click on Charts and click in the left on the Testnet coin (just under bitcoin, number 2 from above) and check the graphs, you will see a similar spike around April 14th (edit: direct link here: http://tbtc.blockr.io/charts). The current has started to decline in frequency at the time of writing this.

Since yesterday my self-developed node, which currently does not propagate anything, merely consumes everything it is handed from the network (it is Testnet after all, yeah? And I'm running it in a debugger). I received approximately 20,000 (yes, twentythousand) new blocks on testnet in a timeframe of around 24 hours. All neatly hashed with appropriate difficulty, as far as I can see. So yes, I wonder.... what is going on here?

I think your problem might well arise from the fact that since you also, probably, received thousands of new blocks within a very short timeframe, but actively propagate (forward) these to other Testnet nodes, you might trigger a ban-filter for too frequent updates. I don't know, I have never looked at the "official code" so cannot say for sure, but that's how I would implement it too, i.e. banning nodes that update me suspiciously frequently.

You might not be the only one having this problem.

This of course leads me to another question (or three): How come this is at all possible? Who has this sort of hashing power? What's happening?

I mean, I'm connected to a rather large amount of peers and changing them frequently for new addresses i receive. And each time I take the (debug) node down and up again, it starts over with the very few seeds I have. So I should have a pretty good variety, that is, not being fed blocks by only one malicious node.

Any ideas? Do I have a bug in my software that I'm unaware of?  Cheesy
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!