From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from sog-mx-2.v43.ch3.sourceforge.com ([172.29.43.192] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1UOrC8-0003qu-TV for bitcoin-development@lists.sourceforge.net; Sun, 07 Apr 2013 15:07:48 +0000 X-ACL-Warn: Received: from olivere.de ([85.214.144.153] helo=mail.olivere.de) by sog-mx-2.v43.ch3.sourceforge.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.76) id 1UOrC3-0006i0-RA for bitcoin-development@lists.sourceforge.net; Sun, 07 Apr 2013 15:07:48 +0000 Received: from ip-81-210-197-250.unitymediagroup.de ([81.210.197.250]:36650 helo=[192.168.88.245]) by mail.olivere.de with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from ) id 1UOqod-0008CG-9W for bitcoin-development@lists.sourceforge.net; Sun, 07 Apr 2013 16:43:31 +0200 Message-ID: <51618612.9010603@olivere.de> Date: Sun, 07 Apr 2013 16:43:30 +0200 From: Oliver Egginger User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130308 Thunderbird/17.0.4 MIME-Version: 1.0 To: Bitcoin Development Content-Type: text/plain; charset=ISO-8859-15; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: -2.4 (--) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -2.4 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain X-Headers-End: 1UOrC3-0006i0-RA Subject: [Bitcoin-development] DOS-Attacks on bitcoin-client? X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 07 Apr 2013 15:07:49 -0000 Hello, I'm using your bitcoin-qt client (version 0.8.1). Normally everything is working pretty fine, but sometimes it seems that other nodes produce an enormous amount of traffic. I have not had the time to investigate thoroughly yet. I only have briefly viewed with tshark. So far I have just restarted the client in the hope that it no longer connects with the 'evil' node. This usually works quite well. Is anything about DOS-Attacks known to you? regards Oliver