-
This commit was signed with a verified signature.
laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits -
This commit was signed with a verified signature.
laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits
-
This commit was signed with a verified signature.
laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits
-
This commit was signed with a verified signature.
laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits -
doc: #6077 was reverted, don't mention in release notes
Reported by sipa
This commit was signed with a verified signature.laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits -
This commit was signed with a verified signature.
laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits -
This commit was signed with a verified signature.
laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits -
36f14bf In (strCommand == "tx"), return if AlreadyHave() (Tom Harding)
This commit was signed with a verified signature.laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits -
Update miniupnpc to 1.9.20151008
This version of miniupnpc fixes a buffer overflow in the XML (ugh) parser during initial network discovery. http://talosintel.com/reports/TALOS-2015-0035/ The commit fixing the vulnerability is: miniupnp/miniupnp@79cca97 Reported by timothy on IRC. Github-Pull: 6789 Rebased-From: 0cca024
This commit was signed with a verified signature.laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits -
In (strCommand == "tx"), return if AlreadyHave()
The main effect is to exit processing for recently-rejected hashes, in case they are pushed to us without prior advertisement. This behavior was seen in the wild. An additional effect is to do early checks for mempool or mapOrphan existence. No logging or nDoS tracking is needed for failures of these checks.
-
Test LowS in standardness, removes nuisance malleability vector.
This adds SCRIPT_VERIFY_LOW_S to STANDARD_SCRIPT_VERIFY_FLAGS which will make the node require the canonical 'low-s' encoding for ECDSA signatures when relaying or mining. Consensus behavior is unchanged. The rational is explained in a81cd96: Absent this kind of test ECDSA is not a strong signature as given a valid signature {r, s} both that value and {r, -s mod n} are valid. These two encodings have different hashes allowing third parties a vector to change users txids. These attacks are avoided by picking a particular form as canonical and rejecting the other form(s); in the of the LOW_S rule, the smaller of the two possible S values is used. If widely deployed this change would eliminate the last remaining known vector for nuisance malleability on boring SIGHASH_ALL p2pkh transactions. On the down-side it will block most transactions made by sufficiently out of date software. Unlike the other avenues to change txids on boring transactions this one was randomly violated by all deployed bitcoin software prior to its discovery. So, while other malleability vectors where made non-standard as soon as they were discovered, this one has remained permitted. Even BIP62 did not propose applying this rule to old version transactions, but conforming implementations have become much more common since BIP62 was initially written. Bitcoin Core has produced compatible signatures since a28fb70 in September 2013, but this didn't make it into a release until 0.9 in March 2014; Bitcoinj has done so for a similar span of time. Bitcoinjs and electrum have been more recently updated. This does not replace the need for BIP62 or similar, as miners can still cooperate to break transactions. Nor does it replace the need for wallet software to handle malleability sanely[1]. This only eliminates the cheap and irritating DOS attack. [1] On the Malleability of Bitcoin Transactions Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek http://fc15.ifca.ai/preproceedings/bitcoin/paper_9.pdf Rebased-From: b196b68 Github-Pull: #6769
This commit was signed with a verified signature.laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits
-
5094a81 Move recentRejects initialization to top of InitBlockIndex (Wladimir J. van der Laan) ec9b6c3 Keep track of recently rejected transactions (Peter Todd) 6eed52e Only use randomly created nonces in CRollingBloomFilter. (Pieter Wuille) 83671ef Make CRollingBloomFilter set nTweak for you (Peter Todd) 25cf122 Reuse vector hashing code for uint256 (Pieter Wuille) 2983fe0 Add uint256 support to CRollingBloomFilter (Peter Todd)
This commit was signed with a verified signature.laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits
-
Move recentRejects initialization to top of InitBlockIndex
This avoids that premature return in the condition that a new chain is initialized results in NULL pointer errors due to recentReject not being constructed. Also add assertions where it is used. (cherry picked from commit a8d0407)
This commit was signed with a verified signature.petertodd Peter Todd
GPG key ID: C085F21CE7F4B9DC Learn about signing commits -
Keep track of recently rejected transactions
Nodes can have divergent policies on which transactions they will accept and relay. This can cause you to repeatedly request and reject the same tx after its inved to you from various peers which have accepted it. Here we add rolling bloom filter to keep track of such rejections, clearing the filter every time the chain tip changes. Credit goes to Alex Morcos, who created the patch that this code is based on. Original code by Peter Todd. Refactored to not construct the filter at startup time by Pieter Wuille. (cherry picked from commit 0847d9c)
petertodd committedJul 17, 2015 -
Only use randomly created nonces in CRollingBloomFilter.
(cherry picked from commit d741371)
-
Make CRollingBloomFilter set nTweak for you
While CBloomFilter is usually used with an explicitly set nTweak, CRollingBloomFilter is only used internally. Requiring every caller to set nTweak is error-prone and redundant; better to have the class handle that for you with a high-quality randomness source. Additionally when clearing the filter it makes sense to change nTweak as well to recover from a bad setting, e.g. due to insufficient randomness at initialization, so the clear() method is replaced by a reset() method that sets a new, random, nTweak value. (cherry picked from commit d2d7ee0)
petertodd committedJul 19, 2015 -
Reuse vector hashing code for uint256
(cherry picked from commit a3d65fe)
-
Add uint256 support to CRollingBloomFilter
(cherry picked from commit bbe4108)
petertodd committedJul 17, 2015
-
This commit was signed with a verified signature.
laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits
-
45bfa13 PARTIAL: typofixes (found by misspell_fixer) (Veres Lajos) 21c406e add support for miniupnpc api version 14 (Pavel Vasin) 13bd5a7 rpc-tests: re-enable rpc-tests for Windows (Cory Fields) ccc4ad6 net: Set SO_REUSEADDR for Windows too (Cory Fields) 1f6772e add unit test for CNetAddr::GetGroup. (Alex Morcos) 13642a5 Fix masking of irrelevant bits in address groups. (Alex Morcos) 6b51b9b Replace boost::reverse_lock with our own. (Casey Rodarmor) 626c5e6 Make sure we re-acquire lock if a task throws (Casey Rodarmor) 4877053 Add missing files to files.md (fanquake) f171fee Handle leveldb::DestroyDB() errors on wipe failure (Adam Weiss) c5b89fe Fix race condition on test node shutdown (Casey Rodarmor) 4a37410 Handle no chain tip available in InvalidChainFound() (Ross Nicoll) f6d29a6 Use unique name for AlertNotify tempfile (Casey Rodarmor) e6adac7 Delay initial pruning until after wallet init (Adam Weiss) e0020d4 Make sure LogPrint strings are line-terminated (J Ross Nicoll) 7ff9d12 Make sure LogPrintf strings are line-terminated (Wladimir J. van der Laan) 5a39133 build: fix libressl detection (Cory Fields) f6355e6 Avoid leaking file descriptors in RegisterLoad (Casey Rodarmor) 60457d3 locking: fix a few small issues uncovered by -Wthread-safety (Cory Fields) a496e11 Remove bash test note from rpc-tests readme (fanquake) 49c6a64 tests: Remove old sh-based test framework (Wladimir J. van der Laan) a37567d Add autogen.sh to source tarball. (randy-waterhouse) 1f4d7cf travis: for travis generating an extra build (Cory Fields)
This commit was signed with a verified signature.laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits
-
This commit was signed with a verified signature.
laanwj Wladimir J. van der Laan
GPG key ID: 74810B012346C9A6 Learn about signing commits -
-
add support for miniupnpc api version 14
The value of new arg ttl is set to 2 as it's recommended default.
-
-
net: Set SO_REUSEADDR for Windows too
When running the rpc tests in Wine, nodes often fail to listen on localhost due to a stale socket from a previous run. This aligns the behavior with other platforms.
-
-
-
-
-
Handle leveldb::DestroyDB() errors on wipe failure
Add error checking to CLevelDBWrapper for errors from leveldb::DestroyDB(). Without it, if unlink() or DeleteFileW() fail to delete files, they will fail silent. If they fail to delete any files, CLevelDBWrapper will silently open and read the existing database. Typically any permissions issues would be caught by leveldb as it churns through many files as part of its compaction process, but it is conceivable that this could cause problems on Windows with anti-virus and indexing software.
-
-
Handle no chain tip available in InvalidChainFound()
Handle the case where no chain tip is available, in InvalidChainFound(). This fixes a null pointer deference when running unit tests, if the genesis block or block validation code is broken.
-
-
Delay initial pruning until after wallet init
Don't prune until any wallet rescanning has taken place to avoid potentially pruning blocks that the wallet rescan may need.