Closed atoulme closed 4 years ago
CC @Nashatyrev
Sorry for the delay. Thank you @atoulme ! Although this wouldn't halt finality directly, (as you noted) it can utilized in more complex scenarios to cause finality issues so this qualifies for the $5k reward tier.
Can you reach out to me at eth2bounty@ethereum.org to get payment setup?
Also, note that this program is recently be deprecated in favor of the eth2bounty program. It should encompass any of the issues you might have found here and more. Current rewards are up to $50k! Happy bug hunting
Description
Using a malformed RLP packet, we crash the discovery service of Teku permanently.
Attack scenario
sha256(dest-node-id || "WHOAREYOU")
0xc1c0
as the body of the message, instead of the expected data.Impact
Details
This is a very simple attack to pull off, as it requires just one packet per node. It will not stop consensus right away. It may be used to knock all Teku nodes off the network and eclipse other nodes.
Exception thrown by Teku: