-
Notifications
You must be signed in to change notification settings - Fork 1.2k
backport 0.18 PR #14522 #14672 #14812 #14494 #14690 #14700 #14705 #14478 #14247 #4330
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
548c9e9
89731f5
c0e97bb
f169fef
705d36c
cd4f4ec
3c0926c
abd05eb
b2305dc
32f1460
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -78,9 +78,19 @@ def run_test(self): | |
| block2.vtx.append(tx2) | ||
| assert_equal(block2.hashMerkleRoot, block2.calc_merkle_root()) | ||
| assert_equal(orig_hash, block2.rehash()) | ||
| assert(block2_orig.vtx != block2.vtx) | ||
| assert block2_orig.vtx != block2.vtx | ||
|
|
||
| node.p2p.send_blocks_and_test([block2], node, success=False, request_block=False, reject_code=16, reject_reason=b'bad-txns-duplicate') | ||
| node.p2p.send_blocks_and_test([block2], node, success=False, reject_code=16, reject_reason=b'bad-txns-duplicate') | ||
|
|
||
| # Check transactions for duplicate inputs | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Why is 14247 partial? Why can't we do what's done in validation.cpp. If that was already done at some point, then this PR shouldN'T be marked partial |
||
| self.log.info("Test duplicate input block.") | ||
|
|
||
| block2_orig.vtx[2].vin.append(block2_orig.vtx[2].vin[0]) | ||
| block2_orig.vtx[2].rehash() | ||
| block2_orig.hashMerkleRoot = block2_orig.calc_merkle_root() | ||
| block2_orig.rehash() | ||
| block2_orig.solve() | ||
| node.p2p.send_blocks_and_test([block2_orig], node, success=False, reject_code=16, reject_reason=b'bad-txns-inputs-duplicate') | ||
|
|
||
| self.log.info("Test very broken block.") | ||
|
|
||
|
|
@@ -93,7 +103,7 @@ def run_test(self): | |
| block3.rehash() | ||
| block3.solve() | ||
|
|
||
| node.p2p.send_blocks_and_test([block3], node, success=False, request_block=False, reject_code=16, reject_reason=b'bad-cb-amount') | ||
| node.p2p.send_blocks_and_test([block3], node, success=False, reject_code=16, reject_reason=b'bad-cb-amount') | ||
|
|
||
| if __name__ == '__main__': | ||
| InvalidBlockRequestTest().main() | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,175 @@ | ||
| #!/usr/bin/env python3 | ||
| # Copyright (c) 2015-2018 The Bitcoin Core developers | ||
| # Distributed under the MIT software license, see the accompanying | ||
| # file COPYING or http://www.opensource.org/licenses/mit-license.php. | ||
| """Test node responses to invalid network messages.""" | ||
| import struct | ||
|
|
||
| from test_framework import messages | ||
| from test_framework.mininode import P2PDataStore | ||
| from test_framework.test_framework import BitcoinTestFramework | ||
|
|
||
|
|
||
| class msg_unrecognized: | ||
| """Nonsensical message. Modeled after similar types in test_framework.messages.""" | ||
|
|
||
| command = b'badmsg' | ||
|
|
||
| def __init__(self, str_data): | ||
| self.str_data = str_data.encode() if not isinstance(str_data, bytes) else str_data | ||
|
|
||
| def serialize(self): | ||
| return messages.ser_string(self.str_data) | ||
|
|
||
| def __repr__(self): | ||
| return "{}(data={})".format(self.command, self.str_data) | ||
|
|
||
|
|
||
| class msg_nametoolong(msg_unrecognized): | ||
|
|
||
| command = b'thisnameiswayyyyyyyyytoolong' | ||
|
|
||
|
|
||
| class InvalidMessagesTest(BitcoinTestFramework): | ||
|
|
||
| def set_test_params(self): | ||
| self.num_nodes = 1 | ||
| self.setup_clean_chain = True | ||
|
|
||
| def run_test(self): | ||
| """ | ||
| 0. Send a bunch of large (3MB) messages of an unrecognized type. Check to see | ||
| that it isn't an effective DoS against the node. | ||
|
|
||
| 1. Send an oversized (3MB+) message and check that we're disconnected. | ||
|
|
||
| 2. Send a few messages with an incorrect data size in the header, ensure the | ||
| messages are ignored. | ||
|
|
||
| 3. Send an unrecognized message with a command name longer than 12 characters. | ||
|
|
||
| """ | ||
| node = self.nodes[0] | ||
| self.node = node | ||
| node.add_p2p_connection(P2PDataStore()) | ||
| conn2 = node.add_p2p_connection(P2PDataStore()) | ||
|
|
||
| msg_limit = 3 * 1024 * 1024 # 3MB, per MAX_PROTOCOL_MESSAGE_LENGTH | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. As a tangent, @UdjinM6 do you know why our limit is different? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. IIRC: We bumped it while switching to 2MB blocks, they bumped it while implementing segwit (which we ignore so we never aligned this limit). |
||
| valid_data_limit = msg_limit - 5 # Account for the 4-byte length prefix | ||
|
|
||
| # | ||
| # 0. | ||
| # | ||
| # Send as large a message as is valid, ensure we aren't disconnected but | ||
| # also can't exhaust resources. | ||
| # | ||
| msg_at_size = msg_unrecognized("b" * valid_data_limit) | ||
| assert len(msg_at_size.serialize()) == msg_limit | ||
|
|
||
| with node.assert_memory_usage_stable(increase_allowed=0.5): | ||
| self.log.info( | ||
| "Sending a bunch of large, junk messages to test " | ||
| "memory exhaustion. May take a bit...") | ||
|
|
||
| # Run a bunch of times to test for memory exhaustion. | ||
| for _ in range(80): | ||
| node.p2p.send_message(msg_at_size) | ||
|
|
||
| # Check that, even though the node is being hammered by nonsense from one | ||
| # connection, it can still service other peers in a timely way. | ||
| for _ in range(20): | ||
| conn2.sync_with_ping(timeout=2) | ||
|
|
||
| # Peer 1, despite serving up a bunch of nonsense, should still be connected. | ||
| self.log.info("Waiting for node to drop junk messages.") | ||
| node.p2p.sync_with_ping(timeout=30) | ||
| assert node.p2p.is_connected | ||
|
|
||
| # | ||
| # 1. | ||
| # | ||
| # Send an oversized message, ensure we're disconnected. | ||
| # | ||
| msg_over_size = msg_unrecognized("b" * (valid_data_limit + 1)) | ||
| assert len(msg_over_size.serialize()) == (msg_limit + 1) | ||
|
|
||
| with node.assert_debug_log(["Oversized message from peer=0, disconnecting"]): | ||
| # An unknown message type (or *any* message type) over | ||
| # MAX_PROTOCOL_MESSAGE_LENGTH should result in a disconnect. | ||
| node.p2p.send_message(msg_over_size) | ||
| node.p2p.wait_for_disconnect(timeout=4) | ||
|
|
||
| node.disconnect_p2ps() | ||
| conn = node.add_p2p_connection(P2PDataStore()) | ||
| conn.wait_for_verack() | ||
|
|
||
| # | ||
| # 2. | ||
| # | ||
| # Send messages with an incorrect data size in the header. | ||
| # | ||
| actual_size = 100 | ||
| msg = msg_unrecognized("b" * actual_size) | ||
|
|
||
| # TODO: handle larger-than cases. I haven't been able to pin down what behavior to expect. | ||
| for wrong_size in (2, 77, 78, 79): | ||
| self.log.info("Sending a message with incorrect size of {}".format(wrong_size)) | ||
|
|
||
| # Unmodified message should submit okay. | ||
| node.p2p.send_and_ping(msg) | ||
|
|
||
| # A message lying about its data size results in a disconnect when the incorrect | ||
| # data size is less than the actual size. | ||
| # | ||
| # TODO: why does behavior change at 78 bytes? | ||
| # | ||
| node.p2p.send_raw_message(self._tweak_msg_data_size(msg, wrong_size)) | ||
|
|
||
| # For some reason unknown to me, we sometimes have to push additional data to the | ||
| # peer in order for it to realize a disconnect. | ||
| try: | ||
| node.p2p.send_message(messages.msg_ping(nonce=123123)) | ||
| except IOError: | ||
| pass | ||
|
|
||
| node.p2p.wait_for_disconnect(timeout=10) | ||
| node.disconnect_p2ps() | ||
| node.add_p2p_connection(P2PDataStore()) | ||
|
|
||
| # | ||
| # 3. | ||
| # | ||
| # Send a message with a too-long command name. | ||
| # | ||
| node.p2p.send_message(msg_nametoolong("foobar")) | ||
| node.p2p.wait_for_disconnect(timeout=4) | ||
|
|
||
| # Node is still up. | ||
| conn = node.add_p2p_connection(P2PDataStore()) | ||
| conn.sync_with_ping() | ||
|
|
||
|
|
||
| def _tweak_msg_data_size(self, message, wrong_size): | ||
| """ | ||
| Return a raw message based on another message but with an incorrect data size in | ||
| the message header. | ||
| """ | ||
| raw_msg = self.node.p2p.build_message(message) | ||
|
|
||
| bad_size_bytes = struct.pack("<I", wrong_size) | ||
| num_header_bytes_before_size = 4 + 12 | ||
|
|
||
| # Replace the correct data size in the message with an incorrect one. | ||
| raw_msg_with_wrong_size = ( | ||
| raw_msg[:num_header_bytes_before_size] + | ||
| bad_size_bytes + | ||
| raw_msg[(num_header_bytes_before_size + len(bad_size_bytes)):] | ||
| ) | ||
| assert len(raw_msg) == len(raw_msg_with_wrong_size) | ||
|
|
||
| return raw_msg_with_wrong_size | ||
|
|
||
|
|
||
|
|
||
| if __name__ == '__main__': | ||
| InvalidMessagesTest().main() | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
imo 14705 should not be marked partial. the test_runner changes aren't really relevant to us.