Advertisement
AD

Main navigation

Advertisement
AD

Error message

Warning: Undefined array key 0 in amp_entity_view_alter() (line 156 of modules/contrib/amp/amp.module).
amp_entity_view_alter(Array, Object, Object) (Line: 545)
Drupal\Core\Extension\ModuleHandler->alter('node_view', Array, Object, Object) (Line: 304)
Drupal\Core\Entity\EntityViewBuilder->buildMultiple(Array) (Line: 238)
Drupal\Core\Entity\EntityViewBuilder->build(Array)
call_user_func_array(Array, Array) (Line: 111)
Drupal\Core\Render\Renderer->doTrustedCallback(Array, Array, 'Render #pre_render callbacks must be methods of a class that implements \Drupal\Core\Security\TrustedCallbackInterface or be an anonymous function. The callback was %s. See https://www.drupal.org/node/2966725', 'exception', 'Drupal\Core\Render\Element\RenderCallbackInterface') (Line: 788)
Drupal\Core\Render\Renderer->doCallback('#pre_render', Array, Array) (Line: 377)
Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
Drupal\Core\Render\Renderer->render(Array, ) (Line: 238)
Drupal\Core\Render\MainContent\HtmlRenderer->Drupal\Core\Render\MainContent\{closure}() (Line: 583)
Drupal\Core\Render\Renderer->executeInRenderContext(Object, Object) (Line: 239)
Drupal\Core\Render\MainContent\HtmlRenderer->prepare(Array, Object, Object) (Line: 128)
Drupal\Core\Render\MainContent\HtmlRenderer->renderResponse(Array, Object, Object) (Line: 90)
Drupal\Core\EventSubscriber\MainContentViewSubscriber->onViewRenderArray(Object, 'kernel.view', Object)
call_user_func(Array, Object, 'kernel.view', Object) (Line: 111)
Drupal\Component\EventDispatcher\ContainerAwareEventDispatcher->dispatch(Object, 'kernel.view') (Line: 187)
Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object, 1) (Line: 76)
Symfony\Component\HttpKernel\HttpKernel->handle(Object, 1, 1) (Line: 58)
Drupal\Core\StackMiddleware\Session->handle(Object, 1, 1) (Line: 48)
Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object, 1, 1) (Line: 191)
Drupal\page_cache\StackMiddleware\PageCache->fetch(Object, 1, 1) (Line: 128)
Drupal\page_cache\StackMiddleware\PageCache->lookup(Object, 1, 1) (Line: 82)
Drupal\page_cache\StackMiddleware\PageCache->handle(Object, 1, 1) (Line: 48)
Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object, 1, 1) (Line: 51)
Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object, 1, 1) (Line: 51)
Drupal\Core\StackMiddleware\StackedHttpKernel->handle(Object, 1, 1) (Line: 704)
Drupal\Core\DrupalKernel->handle(Object) (Line: 18)
Advertisement

Ethereum Network Fixes Eclipse, Disastrous and Easy to Exploit Bug

Advertisement
Mon, 5/03/2018 - 6:36
Ethereum Network Fixes Eclipse, Disastrous and Easy to Exploit Bug
Cover image via U.Today
Read U.TODAY on
Google News

Ethereum just released an update for their Geth client, fixing a potentially disastrous and easy-to-exploit attack vector. The exploit was called Eclipse, and it was so easy to execute that even a relatively inexperienced hacker, a so-called “script kiddie, ” could have pulled it off.

Advertisement

What is it?

Most cryptocurrencies, like Bitcoin and Ethereum, immediately connect a user to a number of other computers, “peers” in computing parlance, as they launch their wallet software. The user then downloads from these peers every new block that’s been added to the Blockchain since the last time they started their wallet.

Eclipse is an exploit that allows an attacker to substitute his own nodes for the nodes of peers. In other words, the user would immediately connect not to random peers on the network, but to the attacker’s own computers.

From the attacker’s nodes, the user’s software would download an inaccurate version of the Blockchain. Eclipse can be used to trick users into sending their funds to the attacker or to double pay for something. It can also be used to interfere with the operation of smart contracts.

Bitcoin too?

In two instances, in 2015 and 2016, Bitcoin has been vulnerable to the Eclipse attack. However, because of the design of Bitcoin’s software, in both cases, it would have taken a massive army of bots to execute the attack.

The scary thing about Ethereum’s vulnerability is that it could be executed by somebody with only a couple of computers. This suddenly put it in range of anybody, even the kid in his parent’s basement.

The fix

Researchers presented their findings to the Ethereum team in January, and the developers immediately began working on a fix. Ethereum developer Felix Lange wrote:

"We have done our best to mitigate the attacks within the limits of the protocol. The paper is concerned with 'low-resource' eclipse attacks. As far as we know, the bar has been raised high enough that eclipse attacks are not feasible without more substantial resources, with the patches that have been implemented in Geth v1.8.0.”

A
A
A

Related articles

Advertisement
TopCryptoNewsinYourMailbox
TopCryptoNewsinYourMailbox
Advertisement
Advertisement

Recommended articles

Latest Press Releases

Our social media
There's a lot to see there, too

Popular articles

Advertisement
AD