Skip to content

0xB10C/peer-observer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

peer-observer

Tool to monitor for P2P anomalies and attacks using well-behaving, passive Bitcoin Core honeynodes (honeypot nodes).

Components and their interaction

The peer-observer consists of multiple components. One or more extractors that extract events from a Bitcoin Core node and multiple tools that process the extracted data. The extractors and tools are connected with a nats.io-based PUB-SUB connection via a NATS server. The exchanged messages are serialized protobuf structures.

The ebpf extractor uses the Bitcoin Core tracepoints to extract events like received and send P2P messages, open and closed P2P connections, mempool changes, and more. This is implemented using the USDT capabilites of libbpf-rs. The Bitcoin P2P protocol messages are deserialized using rust-bitcoin.

The rpc extractor periodically queries the Bitcoin Core RPC interface using corepc. Results are published to NATS as RPC events.

The tools are written in Python or Rust (or any other language that supports NATS and protobuf). They subscribe to the NATS server. For example, the logger tool simply prints out all messages that it receives, the metrics tool produces prometheus metrics, and the addr-connectivity tool tests received addresses if they are reachable. Python tools can make use of the protobuf/python-types to deserialize the Protobuf messages while Rust tools can use the types from the shared Rust module.

                                                              ┌──────────────────────┐
                                           protobuf           │ Tools                │
            Tracepoints                    messages           │                      │
            via libbpf                   ┌──────────┬─────────┼──►logger             │
┌─────────────┐    ┌───────────────┐     │          │         │                      │
│             ├────► ebpf-extractor├─────┤          ├─────────┼──►metrics            │
│   Bitcoin   │    └───────────────┘     │ NATS.io  │         │                      │
│  Core Node  │    ┌───────────────┐     │ PUB-SUB  ├─────────┼──►websocket          │
│             ├────► rpc-extractor ├─────┤          │         │                      │
└─────────────┘    └───────────────┘     │          ├─────────┼──►addr-connectivty   │
             RPC via                     │          │         │                      │
             corepc                      └──────────┴─────────┼──►...                │
                                                              │                      │
(edit on asciiflow.com)                                       └──────────────────────┘

Extractors

Extractors extract events from a Bitcoin Core node and publish them to the connected NATS server. Each extractor connects to a different interface:

extractor description details
ebpf uses tracepoints for real-time events extractors/ebpf/
rpc periodically fetches RPC for events tools/rpc/

Tools

Tools connect and subscribe to the NATS server to learn about new events. Each tool uses the events differently:

tool description language details
logger logs events to stdout. Event type can be filtered. rust tools/logger/
metrics produces prometheus metrics from events. rust tools/metrics/
websocket publishes events into a websocket as JSON rust tools/websocket/
connectivity-check connects to IP addresses received via addr(v2) messages and records the result rust tools/connectivity-check/
record-getblocktxn-py records sent and received getblocktxn messages python tools/record-getblocktxn-py/

Real-world usage

On public.peer.observer, I run a peer-observer instance with multiple Bitcoin Core honeynodes. To avoid leaking the IP addresses of these honeynodes (an P2P attacker would just not attack these), public access is limited.

Setting up a peer-observer instance is non-trivial as hooking into the Bitcoin Core tracepoints requires elevated system privileges. Additionally, a few not-yet-merged patches to Bitcoin Core are required at the moment. Documentation is sparse or non-existent. Feel free to open an issue if you still want to set up an instance and I'll do my best to add more documentation.

About

Tool to monitor for P2P anomalies and attacks using Bitcoin Core honeynodes

Topics

Resources

License

Stars

Watchers

Forks