A Brief Breakdown of Monero's Ongoing Network Attacks | sethforprivacy.com


In this blog post I’ll break down a rough timeline of events, a short list of the known attacks that have happened or are still occurring, and what users can do to mitigate these attacks and others like them in the future



Onion Details



Page Clicks: 0

First Seen: 03/12/2024

Last Indexed: 10/23/2024

Domain Index Total: 84



Onion Content



Table of Contents Introduction Timeline The Attack Disproportionately Gaining Network Share Injecting Peer Lists of Malicious Nodes Block Height Mirroring Spying on Transactions Wallet DoS via Block Height +2 Transaction DoS via Dropping Stem-Phase Transactions Node DoS via out-of-memory crash Mitigations You Can Implement Moving Forward Credits Introduction # As many of you may know, Monero’s peer-to-peer (p2p) network has been undergoing several different types of attack by an entity who has consistently attacked, spammed, and attempted to undermine the Monero network and community for years. Their latest attack is an attempt to undermine the reputation of the Monero network via long-lasting Sybil and Eclipse attacks, which have been ongoing since before the network upgrade on October 17th, 2020. While the motives are known to be malicious and the attacker has proven he does not want to improve the Monero network via code or responsible disclosure, this is a great chance for the Monero community and developers to work together to harden the p2p network under these attacks. In the below blog post I’ll break down a rough timeline of events, a short list of the known attacks that have happened or are still occurring, and what users can do to mitigate these attacks and others like them in the future. It’s important to note before jumping in that while these attacks specifically target the Monero network, they share a common attack surface with most other cryptocurrency networks and so are valuable for any community to be aware of and attempt to mitigate or resolve to harden the network before these attacks happen. The two best sources for info on this attack that have already been shared are this Reddit post by u/dEBRUYNE_1 this Twitter thread by @fluffypony: Recently, a largely incompetent attacker bumbled their way through a Sybil attack against Monero, trying to correlate transactions to the IP address of the node that broadcast it. Whilst novel in that it is the 1st Sybil attack of this sort, it was also quite ineffective. 1/n - Riccardo Spagni (@fluffypony) November 10, 2020 Timeline # The attack’s origin date is unknown exactly, but prior to the implementation of Dandelion++ it seems to have been mostly harmless and being built out. We will focus here on the attack starting from the upgrade on October 17th, 2020: 2020-10-14 - Monero v0.17.1.0 released 2020-10-17 - Monero network upgrades to v0.17 via hard-fork including Dandelion++ and CLSAG 2020-10-18 - Rapid increase in users unable to send transactions successfully due to malicious nodes dropping transactions 2020-10-18 - PR6916 implemented to increase out_peers, lessening impact of malicious nodes 2020-10-20 - Some reports of an inability to sync successfully due to all peers showing incorrect chain-tip 2020-10-21 - Monero v0.17.1.1 released 2020-10-27 - PR6939 implemented to reduce effectiveness of running multiple nodes behind one IP address 2020-11-02 - PR6961 implemented to allow passing a banlist to monerod (like selsta’s block.txt ) 2020-11-03 - PR6971 implemented to avoid DoS vector using specially crafted packets 2020-11-03 - PR6973 implemented to mitigate transaction DoS caused by malicious nodes dropping transactions 2020-11-05 - Attacker announces the attack publicly 2020-11-05 - PR6983 implemented to prevent hiding of IPv4 nodes in IPv6 addresses 2020-11-10 - Users notice that wallet will not sync as malicious nodes are reporting a block height of +2 to the actual height 2020-11-12 - PR7018 implemented to further improve Dandelion++ resistance to malicious nodes reporting incorrect height by avoiding selecting attacker nodes during Dandelion++ stem phase 2020-11-16 - Monero v0.17.1.3 released 2020-11-18 - PR7025 implemented to further improve Dandelion++ handling of malicious peers in regards to transaction sending times 2020-11-26 - Monero v0.17.1.5 released 2020-12-02 - PR7055 implemented to further mitigate misbehaving peers 2020-12-04 - PR7072 implemented to prevent malicious nodes spamming large peer lists 2020-12-05 - PR7081 implemented to allow simplified passing of banned hosts from monerod to fail2ban etc. 2020-12-08 - Monero v0.17.1.6 released 2020-12-12 - PR7135 proposed as the long-term fix for +2 height issue proposed that requires majority of nodes to upgrade 2020-12-13 - PR7138 implemented to allow using a DNS-based block-list of malicious nodes (similar to PR6961 ) 2020-12-14 - Monero v0.17.1.7 released 2020-12-24 - Users first notice DoS attack being carried out against nodes with exposed p2p ports using large crafted network packets to cause out-of-memory node crashes 2020-12-26 - PR7188 implemented to resolve +2 height issue until PR7135 is live and adopted 2020-12-26 - PR7190 implemented to resolve the node DoS attack vector 2020-12-30 - Monero v0.17.1.8 released 2021-01-01 - Multiple PRs merged to fix new DoS vector ( PR7250 , PR7256 , PR7261 , and PR7263 ) 2021-01-08 - Monero v0.17.1.9 released Note: There are many, many more PRs that have been proposed/merged to fix smaller attack vectors and edge cases, for a full list please see monero-project pull requests . The Attack # The core of the attack is a cluster of malicious nodes running customized clients, hosted across ~130 IP addresses on OVH and Digital Ocean. These nodes increase their share of the p2p network by spamming outgoing connections to valid nodes, spamming of large peer lists containing only the malicious nodes, and utilizing a flaw in the node peering system that gives multiple nodes running behind one IP address a higher chance of being used as outgoing connections by valid nodes. This overwhelming of a valid node’s peer list allows the attacker to feed false block heights, intercept transactions, and if a node has only malicious peers, allows the attacker to prevent them from syncing or sending transactions at all. Let’s break down each (known) attack below. Disproportionately Gaining Network Share # This portion of the attack helped the attacker become a larger than normally allowed portion of the peer lists of valid nodes, and made the other attacks more effective by increasing their share of the network disproportionately. Mitigated by PR6939 . Injecting Peer Lists of Malicious Nodes # This is another method used by the attacker to inject their malicious nodes into valid node peer lists and consists of only sending malicious nodes via their own peer lists when requested by valid nodes while spamming very large peer lists. This attack, when combined with the use of excessively large peer lists above was the key to increasing the effectiveness of the attacks we’ll break down below, as it drastically increased the attack surface available without increasing cost or node count to the attacker. Mitigated by PR7072 . Block Height Mirroring # This was one of the first attacks, and it is very simple. The attacker edited the Monero code to query valid nodes for their existing block height, and then when the malicious node was asked for the latest block it reported that the chain-tip was the same height that the valid node was currently at. This attack prevents eclipsed nodes from syncing while potentially slowing down initial block download by valid nodes containing any malicious node in their peer list but not fully eclipsed by limiting the number of peers providing valid blocks. This attack was partially mitigated by increasing outgoing peer count defaults, but is not harmful and requires no further mitigation. Spying on Transactions # The particular attack made public by the attacker is an attempt to link the IP address of a node with particular transactions. This is done by spamming peer lists as we discussed above, and then attributing transactions to the node that first shares the transaction via p2p with the spying nodes. This attack is the most dangerous in most networks as it could allow linking of transactions with user’s node IP addresses if not using Tor/i2p. Thankfully, Monero has implemented Dandelion++ which makes it very difficult for nodes on the network to deterministically link IP addresses with transactions, as transactions are slowly published (via the stem phase) to a randomized set of nodes, and then “fluffed” to the rest of the network after a set number of hops (or a timeout). The use of Dandelion++ drastically increases the portion of the network needing to be controlled by the attacker to accurately link node IP addresses with transactions, and makes the linkage probabilistic instead of deterministic. Mitigated by Dandelion++ and/or Tor/i2p usage. Wallet DoS via Block Height +2 # This attack is a simple DoS that relies on expected behavior of the Monero wallet. This behavior prevents the wallet from searching blocks for transactions until the node is fully synced. Because of this behavior, any node with malicious peers run by the attacker will be told that the chain-tip is 2 blocks away from their valid block height, preventing their wallet from ever beginning to sync. Note that this is not an issue for the Monero CLI wallet, and only for the GUI and mobile wallets due to the wrapper library in-use. Mitigated by (short-term) PR7055 , PR6961 , PR7138 , PR7188 , and (long-term) PR7135 . Transaction DoS via Dropping Stem-Phase Transactions # This particular attack has caused a lot of headache for users as anyone using the “Simple Mode” in the GUI was particularly susceptible to this. If the first node the transaction was sent through was malicious, “Simple Mode” was unable to relay the transaction properly to the rest of the network after the set Dandelion++ timeout, causing the transaction to fail completely. Mitigated by a combination of Dandelion++ PRs. Node DoS via out-of-memory crash # Attack uses an excessively large crafted network packet to cause an out-of-memory crash on nodes with exposed p2p ports, and is carried out over Tor to make blocking the source-nodes more difficult. From u/selsta: A short explanation what is going on: An attacker is sending crafted 100MB binary packets, once it is internally parsed to JSON the request grows significantly in memory, which causes the out of memory issue. While this attack was able to cause some nodes to be brought down, the network did not see any large outage, consensus issues, or large re-orgs as a result. Mitigated by PR7190 . Mitigations You Can Implement # Most of these mitigations will be familiar to the more privacy conscious or technical users, but are a common way to help protect yourself against malicious nodes in general across p2p networks: Run your own node and keep it up to date If you’re running your own node, please make sure to update to the latest version containing all the mentioned mitigations, v0.17.1.8 or greater Utilize anonymity networks like Tor or i2p for relaying transactions Make use of the -ban-list flag, (a list of offending IPs managed by selsta can be