You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Issue #3315 points out that malicious validator can DDoS other validator by sending block response spam.
To solve this problem, in addition to putting the deserialization logic into a separate rayon thread #3316, we should also:
Check the request frequency of block request
Check whether the block response has a corresponding block request
In fact, node/router has already implemented the above two checks:
Thanks for bringing this up @elderhammer, I believe that this is something we should address, and should in theory be fairly straightforward to do so. The changes should resolve #3315.
@vicsn It may be easier for you to tackle the rayon thread for deserialization in the block deserialization since you already did it for the Router - #3304.
I can tackle the cache checks here, which hopefully should also be pretty simple.
@vicsn It may be easier for you to tackle the rayon thread for deserialization in the block deserialization since you already did it for the Router - #3304.
There is already a pull request to tackle this part of the issue: #3316
💥 Proposal
Issue #3315 points out that malicious validator can DDoS other validator by sending block response spam.
To solve this problem, in addition to putting the deserialization logic into a separate rayon thread #3316, we should also:
In fact, node/router has already implemented the above two checks:
snarkOS/node/router/src/inbound.rs
Lines 87 to 92 in 5d4de02
snarkOS/node/router/src/inbound.rs
Lines 111 to 114 in 5d4de02
The text was updated successfully, but these errors were encountered: