Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

test: fix intermittent failure in p2p_v2_earlykeyresponse #29352

Merged
merged 1 commit into from
Jan 31, 2024

Conversation

mzumsande
Copy link
Contributor

The test fails intermittently, see https://cirrus-ci.com/task/6403578080788480?logs=ci#L3521 and #24748 (comment).
I think it's because of a race between the python NetworkThread and the actual
test, which will both call initiate_v2_handshake. I could reproduce it by adding a sleep into initiate_v2_handshake after the line self.sent_garbage = random.randbytes(garbage_len).

Fix this by waiting for the first initiate_v2_handshake to have finished before calling it a second time.

@DrahtBot
Copy link
Contributor

DrahtBot commented Jan 30, 2024

The following sections might be updated with supplementary metadata relevant to reviewers and maintainers.

Code Coverage

For detailed information about the code coverage, see the test coverage report.

Reviews

See the guideline for information on the review process.

Type Reviewers
ACK theStack, stratospher, achow101

If your review is incorrectly listed, please react with 👎 to this comment and the bot will ignore it on the next update.

Conflicts

Reviewers, this pull request conflicts with the following ones:

  • #29358 (test: use v2 everywhere for P2PConnection if --v2transport is enabled by mzumsande)

If you consider this pull request important, please also help to review the conflicting pull requests. Ideally, start with the one that should be merged first.

Copy link
Contributor

@stratospher stratospher left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

clever find! will ACK after this is fixed.

@@ -59,6 +59,8 @@ def data_received(self, t):
# check that data can be received on recvbuf only when mismatch from V1_PREFIX happens (send_net_magic = False)
assert self.v2_state.can_data_be_received and not self.v2_state.send_net_magic

def on_open(self):
self.connection_made = True
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1d04d58: i think we should call it a different name - self.connected or something like that? i'm still getting a crash with the sleep statement because python is confusing connection_made variable and callback function.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks, renamed to connection_opened

@fanquake fanquake added this to the 27.0 milestone Jan 31, 2024
Copy link
Contributor

@theStack theStack left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Concept ACK

I think you need to also initialize the newly introduced variable in the PeerEarlyKey constructor, otherwise the following can happen in the wait_until loop:

AttributeError: 'PeerEarlyKey' object has no attribute 'connection_made2'

This fixes a possible race between the python NetworkThread and the actual
test, which will both call initiate_v2_handshake.
@mzumsande
Copy link
Contributor Author

Fixed both issues, thanks!

Copy link
Member

@sr-gi sr-gi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I wonder if we will not better off having a simpler initiate_v2_handshake in this case and avoiding sync + async logic. Given we end up having to manually send raw messages and accessing peer1 internal state anyway, I think it would be simpler to send everything manually:

class TestEncryptedP2PState(EncryptedP2PState):
    def __init__(self):
        super().__init__(initiating=True, net='regtest')
        self.magic_sent = False

    def initiate_v2_handshake(self):
        self.privkey_ours, self.ellswift_ours = ellswift_create()
        self.sent_garbage = random.randbytes(random.randrange(4096))
        # We'll take care to do the handshake manually
        return b""

class PeerEarlyKey(P2PInterface):
    """Custom implementation of P2PInterface which uses modified v2 P2P protocol functions for testing purposes."""
    def __init__(self):
        super().__init__()
        self.v2_state = None

    def connection_made(self, transport):
        """64 bytes ellswift is sent in 2 parts during `initial_v2_handshake()`"""
        self.v2_state = TestEncryptedP2PState()
        super().connection_made(transport)

    def data_received(self, t):
        # check that data can be received on recvbuf only when mismatch from V1_PREFIX happens
        assert self.v2_state.magic_sent


class P2PEarlyKey(BitcoinTestFramework):
    def set_test_params(self):
        self.num_nodes = 1
        self.extra_args = [["-v2transport=1", "-peertimeout=3"]]

    def run_test(self):
        self.log.info('Sending ellswift bytes in parts to ensure that response from responder is received only when')
        self.log.info('ellswift bytes have a mismatch from the 16 bytes(network magic followed by "version\\x00\\x00\\x00\\x00\\x00")')
        node0 = self.nodes[0]
        self.log.info('Sending first 4 bytes of ellswift which match network magic')
        self.log.info('If a response is received, assertion failure would happen in our custom data_received() function')
        peer1 = node0.add_p2p_connection(PeerEarlyKey(), wait_for_verack=False, send_version=False, supports_v2_p2p=True)
        # Send only the network magic first
        peer1.send_raw_message(b"\xfa\xbf\xb5\xda")
        peer1.v2_state.magic_sent = True
        self.log.info('Sending remaining ellswift and garbage which are different from V1_PREFIX. Since a response is')
        self.log.info('expected now, our custom data_received() function wouldn\'t result in assertion failure')
        # Send the remaining bytes, if any bytes were received before this point `data_received` would have resulted in an assertion fail
        peer1.send_raw_message(peer1.v2_state.ellswift_ours[4:] + peer1.v2_state.sent_garbage)
        peer1.wait_for_disconnect(timeout=5)
        self.log.info('successful disconnection when MITM happens in the key exchange phase')

if __name__ == '__main__':
    P2PEarlyKey().main()

Copy link
Contributor

@theStack theStack left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tested ACK 9642aef

Reproduced the issue and verified its fix by adding an artificial delay in initiate_v2_handshake, as suggested in the PR description.
(With artificial delays of 3 seconds or more, the test fails again with an IOError('Not connected'), but this is expected as the TestNode closes the connection if there is no activity: ... [InactivityCheck] [net] socket no message in first 3 seconds ...)

@mzumsande
Copy link
Contributor Author

I wonder if we will not better off having a simpler initiate_v2_handshake in this case and avoiding sync + async logic. Given we end up having to manually send raw messages and accessing peer1 internal state anyway, I think it would be simpler to send everything manually:

Sounds reasonable to me, but I'd like to refer that to @stratospher, who I believe has plans to extend / rewrite the test anyway (see the WIP branch linked here), and just fix the CI here straightforwardly.

@stratospher
Copy link
Contributor

tested ACK 9642aef.

Sounds reasonable to me, but I'd like to refer that to @stratospher, who I believe has plans to extend / rewrite the test anyway (see the WIP branch linked #24748 (comment)), and just fix the CI here straightforwardly.

yes, will look into it! extending this test for more v2 disconnection scenarios in this WIP branch

@DrahtBot DrahtBot removed the request for review from stratospher January 31, 2024 17:25
@achow101
Copy link
Member

ACK 9642aef

@achow101 achow101 merged commit 4b66877 into bitcoin:master Jan 31, 2024
16 checks passed
@mzumsande mzumsande deleted the 202401_fix_flaky_earlykey branch February 1, 2024 18:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

7 participants