- Apr 02, 2015
-
-
Marek Kotewicz authored
-
- Apr 01, 2015
-
-
Marek Kotewicz authored
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
Read most protocol params from common/params.json
-
- Apr 02, 2015
-
-
Gustav Simonsson authored
* Add params package with exported variables generated from github.com/ethereum/common/blob/master/params.json * Use params package variables in applicable places * Add check for minimum gas limit in validation of block's gas limit * Remove common/params.json from go-ethereum to avoid outdated version of it
-
- Apr 01, 2015
-
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
* GetCode * GetNonce * GetStorage * GetBalance
-
Jeffrey Wilcke authored
The uncle rewards were changed in the block processor. This change will reflect those changes in the miner as well.
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
ab81bf2 go fail git-subtree-dir: tests/files git-subtree-split: ab81bf28d6157657b0a1c0d598785f1ed23fdbb1
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
5f8a010 go fials 6f7924a add cppjit fail c21f368 update genesis test de7266b update js example test git-subtree-dir: tests/files git-subtree-split: 5f8a0103c0456f9467b402fde3db4bcde345d53b
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
Discovery bonding protocol
-
Felix Lange authored
-
Felix Lange authored
-
Felix Lange authored
This a fix for an attack vector where the discovery protocol could be used to amplify traffic in a DDOS attack. A malicious actor would send a findnode request with the IP address and UDP port of the target as the source address. The recipient of the findnode packet would then send a neighbors packet (which is 16x the size of findnode) to the victim. Our solution is to require a 'bond' with the sender of findnode. If no bond exists, the findnode packet is not processed. A bond between nodes α and β is created when α replies to a ping from β. This (initial) version of the bonding implementation might still be vulnerable against replay attacks during the expiration time window. We will add stricter source address validation later.
-
Felix Lange authored
The primary motivation for doing this right now is that old PoC 8 nodes and newer PoC 9 nodes keep discovering each other, causing handshake failures.
-
Taylor Gerring authored
-
Jeffrey Wilcke authored
Issue #613
-
Jeffrey Wilcke authored
Frontier/sec 29
-
Viktor Trón authored
-
Viktor Trón authored
- add validation on TxMsg checking for nil - add test for nil transaction - add test for zero value transaction (no extra validation needed)
-
Viktor Trón authored
- rename Validate -> ValidateFields not to confure consensus block validation - add nil transaction and nil uncle header validation - remove bigint field checks: rlp already decodes *big.Int to big.NewInt(0) - add test for nil header, nil transaction
-
Viktor Trón authored
-
Viktor Trón authored
- add validate method to types.Block - validate after Decode -> error - add tests for NewBlockMsg
-
Jeffrey Wilcke authored
Frontier/513
-
Taylor Gerring authored
-
Taylor Gerring authored
-
Bas van Kervel authored
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
-
Jeffrey Wilcke authored
Configurable CORS domain
-
Bas van Kervel authored
-
Taylor Gerring authored
-
Taylor Gerring authored
-