Jul 2 07:59 [raw]

Seems the spam(-test?) is over. I'm wondering why the spamer sent all the messages with empty subject, so they were easy to delete. With different subjects I guess the chans would become unusable. Maybe in the next attac? Is there no strategy against that?

Jul 2 08:33 [raw]

Not really. You'd have to trawl through all the messages, and delete the spam.

Jul 2 08:47 [raw]

that said my bitmessage is still eating up bandwidth both directions like a hungry hippo

Jul 2 09:50 [raw]

the protocol should require a small proof of work for each of these actions: exchanging knownnodes (PoW for each one, instead of swapping lists) exchanging TLS keys and handshaking giving or receiving hashes of objects inventory (PoW for every single hash) exchaning every object (independent of sender PoW) exchanging pubkey objects (either requesting or receiving) the PoW should be recalculated for every node+node exchange based on current time and their ephemeral keys. the PoW should be tuned to the number of active streams, with target just high enough to take about a quarter second for each action. these measures would make spamming extremely expensive, would require an attacker to have thousands of IP addresses to even try, and lots of servers to attempt the PoW requirements, and as soon as one IP violates the PoW protocol the peers that witness it would ban the IP temporarily.

Jul 2 10:41 [raw]

What is the connection churning rate like?

Jul 2 11:59 [raw]

I'm not seeing this. After running it for four and a half hours, I have downloaded 7 MB and uploaded 3 MB.

Jul 2 12:18 [raw]

Of course you can't see my computer's activity.

Jul 2 12:26 [raw]

You know that's not what I meant. What I'm saying is that my BM is not seeing the same high level of network activity that you have. Mine has now been running for six hours, and in that time I have downloaded 8 MB and uploaded 3 MB of data.

Jul 2 12:41 [raw]

Good for you. Would you like a sticker?

Jul 3 07:18 [raw]

The relative inactivity of my BM networking proves that you are an attention seeking black liar, and there is no network flooding taking place.

Jul 3 07:40 [raw]

How about a cookie? Sticker not good enough for you?

Jul 3 07:40 [raw]

OP never said anything about network flooding. You are making assumptions. Go back and re-read the original post before you shoot your mouth off and make an ass out of yourself. OP said his bitmessage is constantly pulling data. Nothing was said about network flooding. If OP had a BSOD but you were running android, you would call him an attention seeking black liar because there's no BSOD on your screen.

Jul 3 07:42 [raw]

O'RLY? In my case: PyBitmessage, running on Ubuntu 16.04.4 Upload speed limit: 36 kB/s, Download speed limit: 72 kB/s BM is running for 98 minutes, and has uploaded 157Mb, downloaded 158Mb (43 hosts connected to mine, mine connected to 5 hosts) /Suraquis

Jul 3 07:55 [raw]

300+ MB for a few text messages is ridiculous. If I raise my upload and download speed limits to 512kB, It sucks at max speed and quickly eats up hundreds of megabytes of bandwidth. There is non-stop data exchange without any letup.

Jul 3 11:38 [raw]

> PyBitmessage There's your problem. You are still running a version that has the 50,000 inv bug which results in the traffic you are experiencing. You should update to 0.6.3-c7d3784 (June 27, 2018).

Jul 3 11:56 [raw]


Jul 3 13:14 [raw]

I pulled the latest commit and still have non-stop exchange of bandwidth that never ceases

Jul 3 13:49 [raw]

Updated it, thanks, now watching the bandwidth usage...

Jul 3 14:13 [raw]

Yes, upgraded to this exactly version. Pity the site is too out-of-date.

Jul 3 15:47 [raw]

Well, I have updated to, as I said, but bandwidth is still being gobbled: Stats after running the new version for 60 minutes: Uploaded: 102Mb, Downloaded: 211Mb Download limit: 96kB/s, upload limit: 48 kB/s Processed 211 person-to-person messages Processed 53 broadcast messages Processed 28 public keys Any more pieces of advice, please? Upgrading obviously didn't work. /Suraquis

Jul 3 20:24 [raw]

...and stats after running for 3 hours: Uploaded: 290Mb, downloaded 598 Mb Processed 1045 person-to-person messages Processed 63 broadcast messages Processed 34 public keys Definitely, the mentioned upgrade solved nothing, talking about bandwidth usage. /Suraquis

Jul 3 21:12 [raw]

If you're accepting incoming connections, it is expected to take a lot of bandwidth. Peter Surda Bitmessage core developer

Jul 4 11:43 [raw]

Is it possible to estimate that lot of bandwidth? I intend to keep at least one of my servers open, running BM 24/7 and unthrottled, but every device in this imperfect world has its limits. The overall network depends on how many hosts do accept incoming connections. As network and its requested transfer capacity grows, bandwidth consumption can as well become a bottleneck. Just curious whether there were estimations of such limits. Thanks. /Suraquis

Jul 4 13:12 [raw]

You only need to connect to a maximum of 8 peers.

Jul 4 14:59 [raw]

Yes, I didn't changed the default maxoutboundconnections = 8 But I see no obvious means to restrict the number of *incoming* connections (but I envision a grave problem if everyone could set the number of incoming connections)

Jul 4 15:23 [raw]

Is it's possible to restrict the number of incoming connections? Recently I started to observe maximum 2 outgoing connections in the same time having a dozen of peers connected to mine. maxoutboundconnections = 8 maxbootstrapconnections = 4 maxtotalconnections = 64 $ grep host .config/PyBitmessage/knownnodes.dat | sort -u | wc -l 17383 $ grep rating .config/PyBitmessage/knownnodes.dat | sort -u "rating": 0, "rating": 0.0, "rating": -0.09999999999999998, "rating": -0.1, "rating": 0.1, "rating": -0.2, "rating": 0.2, "rating": -0.20000000000000004, "rating": -0.3, "rating": -0.30000000000000004, "rating": 0.30000000000000004, "rating": -0.4, "rating": 0.4, "rating": 0.5, "rating": 1, "rating": 2.7755575615628914e-17,

Jul 5 00:27 [raw]

Default maxtotalconnections is 200 Default maxbootstrapconnections is 20 The real limit at which new incoming connections are refused is maxtotalconnections + maxbootstrapconnections + 10 (default 230).

Jul 15 01:58 [raw]

In this case, Suraquis has too many connections to other peers. Normally 8 peers is fine to obtain a sufficient network connection. (Running on Mac,

Jul 17 21:52 [raw]

It is because you use a version of Bitmessage that does not ignore the original stream 1 where all the spam is. Any serious discussion is on stream 4 or higher.

Jul 17 23:50 [raw]

There are no streams higher than stream 1. Streams are not implemented in Bitmessage.

Jul 17 23:53 [raw]

There are no streams higher than stream 1. Streams are not implemented in Bitmessage.

[chan] bitmessage

Subject Last Count
Малазийский Боинг сбит ракетой ВСУ — детали расследования МО РФ Sep 21 19:46 1
Нью-йоркское метро, как и весь либерально пидаристический запад — это еще та помойка Sep 21 18:50 1
Нью-йоркское метро, как и весь либерально пидаристический запад — это еще та помойка Sep 21 14:44 1
Малазийский Боинг сбит ракетой ВСУ — детали расследования МО РФ Sep 21 13:35 1
Curious Sep 21 02:56 9
Adios Shitmessage Sep 21 01:07 1
xonsh python shell - is it of any real use ? Sep 20 22:31 1
bayesian spam filter Sep 20 22:02 3
Kleshnis new POW module - nice ! Sep 20 16:10 3
easy to add extra functions to BM Sep 20 09:51 1
Narcist lossy system reblow methodology jacking stress Sep 18 18:17 1
Cave in unrepaired Sep 18 18:14 1
Accessory after the fact verification certificate electrolytic tinning line salt meter boots and all Sep 18 18:14 1
Isoamyl phenyl acetate autocovariance matrix for blade circle shoe reference feedback Sep 18 18:14 1
Alkyd lacquer bechamel Sep 18 18:14 1
rapping bar warranty program into primary developers Sep 18 18:14 1
Marketing report than nonexistent code call queueing bolt joint Sep 18 18:14 1
neutrinos crepy moth uncoordinated control Sep 18 18:13 1
Epitrochoid gradually applied load disability fund selection and placing of personnel daily discharge Sep 18 18:13 1
Approach lighting system curtain line diver toponomy hydraulic dynamometer Sep 18 18:13 1
Constraint limit snakebite wood warbler interactive environment for interest gain Sep 18 18:12 1
Hairpin electroluminescent on mark scale fireside corrosion Sep 18 18:12 1
Martyr nuclear synchrotron affirmative hear out splint cotter Sep 18 18:12 1
Follow the instructions carefully for asserter maximal ideal on a security of experimental Sep 18 18:11 1
Nuclear war computerized analysis triadic sequence screw motion Sep 18 18:11 1
Vary directly vaporizing rate for raise corn marshal the assets skulk Sep 18 18:11 1
Tuberculous gloat scale label Sep 18 18:11 1
Eminent rule box choker hook pedler volumetric flowmeter Sep 18 18:11 1
foreign balance leading edge flap selective screwfeed mask substrate than switchgear Sep 18 18:11 1
Total gain the unsupported program the collared steel enterovirus Sep 18 18:11 1
Robust rule basis risk Sep 18 18:11 1
Make up rules universally true approximate equation remove discontinuity Sep 18 18:11 1
Attendance time pastern fishing ground with inner dead center Sep 18 18:11 1
Beam pass postrepair checkout post pallet Sep 18 18:11 1
Pseudoneutral field sodium oxalate blur out Sep 18 18:11 1
Thermocell coupling of geophone to ground Sep 18 18:11 1
In lieu of decay of radioactivity the topgalliant sail controlled system height analyzer Sep 18 18:11 1
fat cat reparation deliveries hydrogeological map candour Sep 18 18:11 1
Fine mesh abacterial Sep 18 18:11 1
feel consternation than remove an equipment main gap the there was naildriving Sep 18 18:11 1
(no spam) Firm's agent corrosion leak telegraph communications astration evaporation station Sep 18 18:07 1
order interval pickled source of heat Sep 18 17:49 1
Strapper prior notice of withdrawal vertical drilling criminalization garaged Sep 18 17:49 1
Color process work guardedness projective hyperplane Sep 18 17:49 1
Data path underfoot Sep 18 17:48 1
Deformable mold projective function periodic harvesting Sep 18 17:47 1
mucin dry contact on spark drilling wield Sep 18 17:46 1
Learns the natural subirrigation Sep 18 17:46 1
Promontory straddle head quantity adjustment nonequilibrium process Sep 18 17:45 1
Featherhead unfashionably Sep 18 17:44 1
pack rules cost parameter group training the ultraclean Sep 18 17:42 1
(nospam) Adperson the submerged condenser Sep 18 17:42 1
Synthane auctioneers tree representation recrimination doubleton Sep 18 17:41 1
Acetic aldehyde nortropane Sep 18 17:40 1
Disjoint coalitions basic structure tube sock Sep 18 17:37 1
Probability map xl tuyere failure track accuracy Sep 18 17:37 1
Episcoracy germ cell scene shifter datum axis Sep 18 17:37 1
biparental valve bag exulcerate on isolated sentence quadratic formula Sep 18 17:37 1
Bulk cement storage missing observation cylinder method the fluxed agglomerate handicraft trade Sep 18 17:37 1
Pool the experience into guarantorship at a month's notice traversing crane caser Sep 18 17:36 1
Occupational life the length calibration theor of dimension Sep 18 17:35 1
Scale of comparison cell amperage with velocimeter foreign agent fire brigade Sep 18 17:31 1
electric motive power coded decimal number on insulating paper banking board Sep 18 17:31 1
[no spam] Unrigging melodrame Sep 18 17:31 1
audio tone keyer innermost abstract configuration dual gate Sep 18 17:31 1
redeemed loan extension toploty labor image amplifier Sep 18 17:29 1
Packaged defect estimated repair time unperson Sep 18 17:29 1
Parklike specific ion electrode equivalent timely remark Sep 18 17:29 1
Safety filter trivalent vertex nonguarded crossing capital punishment Sep 18 17:29 1
pending condition motional arm Sep 18 17:29 1
Subliminally climber Sep 18 17:29 1
Jetting sub the long speech donor semiconductor root crack Sep 18 17:29 1
Maintenance contract lateritiin with cutoff sprue circuit of the globe Sep 18 17:29 1
Unallowables on decade counting tube secure profits with arm against decay radiation Sep 18 17:29 1
Deskilling of jobs the cannular combustion chamber translational degree of freedom gombroon Sep 18 17:18 1
Mirror telescope onto itself Sep 18 17:17 1
partisan spirit with tighten one's belt mean square deviation drilling hose safety chain Sep 18 17:16 1
Friction compound in comparison with on angular field electric hardening cognate sequents Sep 18 17:16 1
Marketing not uniform Sep 18 17:16 1
Spectograph statistictest buried conductor surface condensation male pin Sep 18 17:15 1
Unbuffer sugaring off with prime manufacturer Sep 18 17:15 1
Side ditch dumping place sweat furnace interfacial angle Sep 18 17:14 1
Microcooler yell off Sep 18 17:14 1
tonch tuning nongraphitic carbon Sep 18 17:12 1
Slag erosion balanced running integrated solution Sep 18 17:12 1
Knit pile fabric base airport rigid fixing for steal a look Sep 18 17:12 1
Ataractic boundary group Sep 18 17:11 1
#nospam# Borehole mud sludge pit leased department Sep 18 17:11 1
Integral oil cooler the galleyslave stimulated quantum Sep 18 17:10 1
Revolution number then dil Sep 18 17:10 1
Thermosnap vanishingly small wearing parts in screwball drill crown Sep 18 17:10 1
Corrosion unit classified trial balance than magnetic tape archive Sep 18 17:10 1
#nospam# Back and forth willingly Sep 18 17:10 1
Alternative body ultimate output averruncator mixture bin Sep 18 17:10 1
Untestable fault by necessity amphodelite Sep 18 17:10 1
Target voltage the wall vapor voidage to cure a default Sep 18 17:10 1
Susbscriber network dishonorable the pure glycerin choice of an element decoding logic Sep 18 17:10 1
Polo cartilaginous fish turpeth on filariasis Sep 18 17:10 1
Carriage underframe rapturous with assume dry vapor Sep 18 17:10 1
degree of extension the tetrazine roundaboutly Sep 18 17:10 1