-
-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
E mined block failed verification #9496
Comments
When was the last time you saw this message? |
They are still happening. Started a few days ago. 2024-10-01 14:10:23.869 E Transaction not found in pool |
I restarted the container, immediately the same error started showing. |
Even a restricted RPC allows users to submit a mined block. Can you try if you get this message with no external RPC at all? |
Oh, I didn't know that. possibly just someone trying to submit bad blocks over and over? |
Possible, yes. But not sure why. |
Do you run with |
I see the same issue on my node starting at 2014-09-30 at 20:00 |
I do run with public-node. |
is there a way to see the IP of the sender which spams my node and add it to a block list? |
It might show up with log level 2 |
with log-level=2 I see this errors: and this: showing up regularly |
Doesn't seem related to me based on the error message. |
You should see (on loglevel 1) the ip which is contacting rpc endpoints |
this is more detail: looks like somebody tried to send 2 tx which are not accepted |
again more detail about the other error: |
I dont see the same mined block failed verification log. your issue seems unrelated @thilool |
it does not show up in the level 2 log. 024-10-04 22:12:46.650 I HTTP [194.233.152.128] POST /json_rpc |
here another one: btw I am running p2pool as well may this has something to do with it? |
these error are always in between: 2024-10-04 22:15:05.178 I Including transaction <96583190dda605d5b45597fd445a283c3f1c284bc5cf7bfc38a98cc2054970ac> maybe this is some hint what is going on there. |
I stopped p2pool to check but the errors still show up: The IP 162.218.65.219:18080 seems to always show up right before the error |
If youre not using --public-node, youve likely posted your node's address publicly on a website like monero.fail. you have a 194* ip using your RPC port and submitting bad blocks. You also have malicious node peers. restart you nlde and add |
enable-dns-blocklist is always on on my node so this did not prevent the issue. |
162.218.65.219:18080 this node should have been blocked by the dns blocklist |
monero | 2024-10-06 05:01:05.741 E Transaction not found in pool |
I have DNS blocklist set in my conf @nahuhh I guess restart monerod will force new DNS query for blocklist Shouldn't a peer be banned after submitting x bad blocks? Just realised as they are pushing to RPC they are not a peer, I think DNS blocklist is going to ban P2P peers and this might be why it don't work in this case |
Yah they are trying to DOS us by forcing constant block and TX verification I guess? |
The above ip is if a spy node peer. They arent the ones submitting the blocks dns blocklist only works for p2p peers. The bad blocks are being submit via RPC.
Those arent peers submitting bad blocks. do you have please see my previous comment - disable public-node and stop providing a remote node for strangers. |
They should spy through Tor lol that is dumb of them |
Probably they want this lol, I have the resources to absorb what they are doing so meh I can keep public RPC up |
I have been trying to think about what these nodes are trying to do, although just a general DOS attack would be a valid reason I find it weird how an entity like linking lion would want to do that. Obviously I am not 100% certain but they could be trying to exploit a timing difference when handling a block to see if a node has a stem pool transaction. When we receive a block from RPC, we try to build the full block, including all the txs using our tx-pool: monero/src/cryptonote_core/cryptonote_core.cpp Lines 1526 to 1538 in 9866a0e
As you can see we are using I did some rough tests submitting blocks to my own node with and without some unknown txs, when an unknown tx is included the response is around 50-100x faster. I think an easy way to fix this would be to not look at the whole pool for restricted RPC. FWIW this doesn't explain the other P2P messages/RPC requests that were happening around the same time. It would be good to get more log data if anyone has any. |
Ran this public node for years, has the latest version, restricted-rpc is enabled and CPU use doesn't show monerod mining at all. ..yet logs are flooded with these:
2024-09-23 17:51:00.906 E mined block failed verification
First i've seen it, I appear to be on the latest block and handling connections ok anyway.
The text was updated successfully, but these errors were encountered: