Bitcoin Forum
November 09, 2024, 10:33:20 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Ip from Segwit2x malicious nodes  (Read 247 times)
chek2fire (OP)
Legendary
*
Offline Offline

Activity: 3430
Merit: 1142


Intergalactic Conciliator


View Profile
October 23, 2017, 06:49:10 PM
 #1

Here is the list of the current nodes that support segwit2x hijack malicious fork

https://pastebin.com/iEyasvay

I will update it every Monday and Thursday with a new message in this topic.
I advice everyone that run a bitcoin node to ban this nodes asap.
And here is the script for everyone that run a node and want to ban this malicious nodes.

https://github.com/mariodian/ban-segshit8x-nodes

Bitcoin FTW!

http://www.bitcoin-gr.org
4411 804B 0181 F444 ADBD 01D4 0664 00E4 37E7 228E
.anto.
Full Member
***
Offline Offline

Activity: 179
Merit: 131


View Profile
November 06, 2017, 09:59:17 AM
 #2

Here is the list of the current nodes that support segwit2x hijack malicious fork

https://pastebin.com/iEyasvay

I assume there are a lot more IP addresses of the nodes supporting segwit2x by now. Is this list of that IP addreses up to date?

My 2 nodes have been on Bitcoin Core 0.15.0.1 since last month. But after the implementation of the disguise feature on this commit, I am not sure anymore how to ban the nodes running with that codes.

I don't like the idea of this hard fork, so I don't want to let my nodes listen and propagate those nodes to the network.
chek2fire (OP)
Legendary
*
Offline Offline

Activity: 3430
Merit: 1142


Intergalactic Conciliator


View Profile
November 06, 2017, 12:12:11 PM
 #3

is not upto date but is very difficult to create a new list without the previous ip. I have yesteday the script and it was 1917 segwit2x nodes. The best thing is everyone to download this script and run it manual.

http://www.bitcoin-gr.org
4411 804B 0181 F444 ADBD 01D4 0664 00E4 37E7 228E
.anto.
Full Member
***
Offline Offline

Activity: 179
Merit: 131


View Profile
November 06, 2017, 01:05:17 PM
 #4

How did you collect those IP addresses?

I have implemented a quick and dirty workaround to block the nodes that I thought bad ones as I explained on this post.

I am using a script to collect the IP addresses from the debug.log based on certain criteria, and I use iptables and ipset to block them accessing my nodes at my firewall.

Bitcoin Core 0.15.0.1 does that kind of banning smartly at protocol level for the segwit2x nodes. But now, since the disguise feature was implemented, I am not sure what kind of criteria that we can implement at user level, to collect the IP addresses of those segwit2x nodes which use that feature.

Does anybody else have any suggestions?
chek2fire (OP)
Legendary
*
Offline Offline

Activity: 3430
Merit: 1142


Intergalactic Conciliator


View Profile
November 06, 2017, 01:35:33 PM
 #5

How did you collect those IP addresses?

I have implemented a quick and dirty workaround to block the nodes that I thought bad ones as I explained on this post.

I am using a script to collect the IP addresses from the debug.log based on certain criteria, and I use iptables and ipset to block them accessing my nodes at my firewall.

Bitcoin Core 0.15.0.1 does that kind of banning smartly at protocol level for the segwit2x nodes. But now, since the disguise feature was implemented, I am not sure what kind of criteria that we can implement at user level, to collect the IP addresses of those segwit2x nodes which use that feature.

Does anybody else have any suggestions?


when you run the script in terminal you see and the ip that banned. The problem is that if you run it again it show them again the new and the old ones

http://www.bitcoin-gr.org
4411 804B 0181 F444 ADBD 01D4 0664 00E4 37E7 228E
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!