Activate the blocklist in the Monero GUI wallet or Monero node.
I’ve written this here before, but even if it only draws the attention of a few wallet and node operators to the banlist, it’s already worth it. It reduces the connections to suspicious, potentially useless or even counterproductive nodes in the Monero network.
Monero GUI wallet
If your run your own local node through the GUI wallet, go to Settings. In the “Daemon startup flags” box, input “–ban-list <file-path-to-ban-list>”. Then click the orange “Stop daemon” button. It will take a few seconds for the daemon to shut down. Then click the orange “Start daemon” button. If you use a remote node, whoever operates the remote node will decide if the ban list is enabled.
✋ node operators enable a ban list
The Monero Research Lab (MRL) has decided to recommend that all Monero node operators enable a ban list
https://github.com/Boog900/monero-ban-list/blob/main/ban_list.txt
Download the ban list and:
./monerod --ban-list <file-path-to-ban-list>
🧐 https://gist.github.com/Rucknium/76edd249c363b9ecf2517db4fab42e88
Needing to use a ban list is indicative of broken node software. This flaw has existed in Monero for a long time, is it a fundamental issue that will never be addressed?
Drop acid and watch aronofkys Noah for a good time (trust me) instead of talking crap you don’t understand
Shouldn’t the node network be able to automatically ban offending peers without needing a centralized ban list? Can you explain where my understanding falls short?
Yes.
You do not need to activate a banlist.
I’ll go into this in more detail, as you would obviously actually want to understand it. Switch on a blocklist or do not switch on a blocklist, this is up to you and every other user. You can create your own banlist or use another one, there are several. Maybe you hire some professional network researchers to connect to all kinds of nodes to analyze their behavior and their responses to connections and then share your findings with us. In the meantime, you can trust what MRL has found and recommends. Or you can just keep using the current default setting without a ban list. Do you think it’s news that there are misadjusted or allegedly misbehaving nodes out there in the worldwide permissionless network?
I was under the impression that there was a network attack going on which was disrupting node operations, as has had happened in the past and that is why this post was created.
My point is the nodes should be able to dynamically determine if misadjusted or allegedly misbehaving nodes are present and block/ignore those automatically without needing to apply a ban-list from a centralized authority. This is a long standing issue and measures in the protocol should be able to govern this, since it has not happened it appears that this is a fundamental flaw that cannot be addressed and instead a ban-list is the only solution.
My question is what is preventing this from being properly addressed so applying a centralized ban list is not necessary? Is it a whack-a-mole situation where attackers will just tweak some other parameters and get around any detection?
A centralized ban list is not necessary! If reading isn’t your thing, then print out what I’ve written and have someone around you read it to you. Or you can put the printout under your pillow at night and maybe it will sink in.
OK, thanks for the extra info, would have a been a good idea to include this in the post from the start.