Paper 2018/236

Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network

Yuval Marcus, Ethan Heilman, and Sharon Goldberg

Abstract

We present eclipse attacks on Ethereum nodes that exploit the peer-to-peer network used for neighbor discovery. Our attacks can be launched using only two hosts, each with a single IP address. Our eclipse attacker monopolizes all of the victim's incoming and outgoing connections, thus isolating the victim from the rest of its peers in the network. The attacker can then filter the victim's view of the blockchain, or co-opt the victim's computing power as part of more sophisticated attacks. We argue that these eclipse-attack vulnerabilities result from Ethereum's adoption of the Kademlia peer-to-peer protocol, and present countermeasures that both harden the network against eclipse attacks and cause it to behave differently from the traditional Kademlia protocol. Several of our countermeasures have been incorporated in the Ethereum geth 1.8 client released on February 14, 2018.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
Ethereumeclipse attacksblockchain
Contact author(s)
goldbe @ cs bu edu
History
2018-03-05: received
Short URL
https://ia.cr/2018/236
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/236,
      author = {Yuval Marcus and Ethan Heilman and Sharon Goldberg},
      title = {Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network},
      howpublished = {Cryptology ePrint Archive, Paper 2018/236},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/236}},
      url = {https://eprint.iacr.org/2018/236}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.