|
|
|
#!/usr/bin/env python3
|
|
|
|
# Copyright (c) 2017 The Bitcoin Core developers
|
|
|
|
# Distributed under the MIT software license, see the accompanying
|
|
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
"""Test message sending before handshake completion.
|
|
|
|
|
|
|
|
A node should never send anything other than VERSION/VERACK/REJECT until it's
|
|
|
|
received a VERACK.
|
|
|
|
|
|
|
|
This test connects to a node and sends it a few messages, trying to intice it
|
|
|
|
into sending us something it shouldn't.
|
|
|
|
|
|
|
|
Also test that nodes that send unsupported service bits to bitcoind are disconnected
|
|
|
|
and don't receive a VERACK. Unsupported service bits are currently 1 << 5 and
|
|
|
|
1 << 7 (until August 1st 2018)."""
|
|
|
|
|
|
|
|
from test_framework.mininode import *
|
|
|
|
from test_framework.test_framework import BitcoinTestFramework
|
|
|
|
from test_framework.util import *
|
|
|
|
|
|
|
|
banscore = 10
|
|
|
|
|
|
|
|
class CLazyNode(NodeConnCB):
|
|
|
|
def __init__(self):
|
|
|
|
super().__init__()
|
|
|
|
self.unexpected_msg = False
|
|
|
|
self.ever_connected = False
|
|
|
|
|
|
|
|
def bad_message(self, message):
|
|
|
|
self.unexpected_msg = True
|
|
|
|
self.log.info("should not have received message: %s" % message.command)
|
|
|
|
|
|
|
|
def on_open(self, conn):
|
|
|
|
self.connected = True
|
|
|
|
self.ever_connected = True
|
|
|
|
|
|
|
|
def on_version(self, conn, message): self.bad_message(message)
|
|
|
|
def on_verack(self, conn, message): self.bad_message(message)
|
|
|
|
def on_reject(self, conn, message): self.bad_message(message)
|
|
|
|
def on_inv(self, conn, message): self.bad_message(message)
|
|
|
|
def on_addr(self, conn, message): self.bad_message(message)
|
|
|
|
def on_alert(self, conn, message): self.bad_message(message)
|
|
|
|
def on_getdata(self, conn, message): self.bad_message(message)
|
|
|
|
def on_getblocks(self, conn, message): self.bad_message(message)
|
|
|
|
def on_tx(self, conn, message): self.bad_message(message)
|
|
|
|
def on_block(self, conn, message): self.bad_message(message)
|
|
|
|
def on_getaddr(self, conn, message): self.bad_message(message)
|
|
|
|
def on_headers(self, conn, message): self.bad_message(message)
|
|
|
|
def on_getheaders(self, conn, message): self.bad_message(message)
|
|
|
|
def on_ping(self, conn, message): self.bad_message(message)
|
|
|
|
def on_mempool(self, conn): self.bad_message(message)
|
|
|
|
def on_pong(self, conn, message): self.bad_message(message)
|
|
|
|
def on_feefilter(self, conn, message): self.bad_message(message)
|
|
|
|
def on_sendheaders(self, conn, message): self.bad_message(message)
|
|
|
|
def on_sendcmpct(self, conn, message): self.bad_message(message)
|
|
|
|
def on_cmpctblock(self, conn, message): self.bad_message(message)
|
|
|
|
def on_getblocktxn(self, conn, message): self.bad_message(message)
|
|
|
|
def on_blocktxn(self, conn, message): self.bad_message(message)
|
|
|
|
|
|
|
|
# Node that never sends a version. We'll use this to send a bunch of messages
|
|
|
|
# anyway, and eventually get disconnected.
|
|
|
|
class CNodeNoVersionBan(CLazyNode):
|
|
|
|
# send a bunch of veracks without sending a message. This should get us disconnected.
|
|
|
|
# NOTE: implementation-specific check here. Remove if bitcoind ban behavior changes
|
|
|
|
def on_open(self, conn):
|
|
|
|
super().on_open(conn)
|
|
|
|
for i in range(banscore):
|
|
|
|
self.send_message(msg_verack())
|
|
|
|
|
|
|
|
def on_reject(self, conn, message): pass
|
|
|
|
|
|
|
|
# Node that never sends a version. This one just sits idle and hopes to receive
|
|
|
|
# any message (it shouldn't!)
|
|
|
|
class CNodeNoVersionIdle(CLazyNode):
|
|
|
|
def __init__(self):
|
|
|
|
super().__init__()
|
|
|
|
|
|
|
|
# Node that sends a version but not a verack.
|
|
|
|
class CNodeNoVerackIdle(CLazyNode):
|
|
|
|
def __init__(self):
|
|
|
|
self.version_received = False
|
|
|
|
super().__init__()
|
|
|
|
|
|
|
|
def on_reject(self, conn, message): pass
|
|
|
|
def on_verack(self, conn, message): pass
|
|
|
|
# When version is received, don't reply with a verack. Instead, see if the
|
|
|
|
# node will give us a message that it shouldn't. This is not an exhaustive
|
|
|
|
# list!
|
|
|
|
def on_version(self, conn, message):
|
|
|
|
self.version_received = True
|
|
|
|
conn.send_message(msg_ping())
|
|
|
|
conn.send_message(msg_getaddr())
|
|
|
|
|
|
|
|
class P2PLeakTest(BitcoinTestFramework):
|
|
|
|
def set_test_params(self):
|
|
|
|
self.num_nodes = 1
|
|
|
|
self.extra_args = [['-banscore='+str(banscore)]]
|
|
|
|
|
|
|
|
def run_test(self):
|
|
|
|
no_version_bannode = CNodeNoVersionBan()
|
|
|
|
no_version_idlenode = CNodeNoVersionIdle()
|
|
|
|
no_verack_idlenode = CNodeNoVerackIdle()
|
|
|
|
unsupported_service_bit5_node = CLazyNode()
|
|
|
|
unsupported_service_bit7_node = CLazyNode()
|
|
|
|
|
|
|
|
self.nodes[0].setmocktime(1501545600) # August 1st 2017
|
|
|
|
connections = []
|
|
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], no_version_bannode, send_version=False))
|
|
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], no_version_idlenode, send_version=False))
|
|
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], no_verack_idlenode))
|
|
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], unsupported_service_bit5_node, services=NODE_NETWORK|NODE_UNSUPPORTED_SERVICE_BIT_5))
|
|
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], unsupported_service_bit7_node, services=NODE_NETWORK|NODE_UNSUPPORTED_SERVICE_BIT_7))
|
|
|
|
no_version_bannode.add_connection(connections[0])
|
|
|
|
no_version_idlenode.add_connection(connections[1])
|
|
|
|
no_verack_idlenode.add_connection(connections[2])
|
|
|
|
unsupported_service_bit5_node.add_connection(connections[3])
|
|
|
|
unsupported_service_bit7_node.add_connection(connections[4])
|
|
|
|
|
|
|
|
NetworkThread().start() # Start up network handling in another thread
|
|
|
|
|
|
|
|
wait_until(lambda: no_version_bannode.ever_connected, timeout=10, lock=mininode_lock)
|
|
|
|
wait_until(lambda: no_version_idlenode.ever_connected, timeout=10, lock=mininode_lock)
|
|
|
|
wait_until(lambda: no_verack_idlenode.version_received, timeout=10, lock=mininode_lock)
|
|
|
|
wait_until(lambda: unsupported_service_bit5_node.ever_connected, timeout=10, lock=mininode_lock)
|
|
|
|
wait_until(lambda: unsupported_service_bit7_node.ever_connected, timeout=10, lock=mininode_lock)
|
|
|
|
|
|
|
|
# Mine a block and make sure that it's not sent to the connected nodes
|
|
|
|
self.nodes[0].generate(1)
|
|
|
|
|
|
|
|
#Give the node enough time to possibly leak out a message
|
|
|
|
time.sleep(5)
|
|
|
|
|
|
|
|
#This node should have been banned
|
|
|
|
assert not no_version_bannode.connected
|
|
|
|
|
|
|
|
# These nodes should have been disconnected
|
|
|
|
assert not unsupported_service_bit5_node.connected
|
|
|
|
assert not unsupported_service_bit7_node.connected
|
|
|
|
|
|
|
|
[conn.disconnect_node() for conn in connections]
|
|
|
|
|
|
|
|
# Make sure no unexpected messages came in
|
|
|
|
assert(no_version_bannode.unexpected_msg == False)
|
|
|
|
assert(no_version_idlenode.unexpected_msg == False)
|
|
|
|
assert(no_verack_idlenode.unexpected_msg == False)
|
|
|
|
assert not unsupported_service_bit5_node.unexpected_msg
|
|
|
|
assert not unsupported_service_bit7_node.unexpected_msg
|
|
|
|
|
|
|
|
self.log.info("Service bits 5 and 7 are allowed after August 1st 2018")
|
|
|
|
self.nodes[0].setmocktime(1533168000) # August 2nd 2018
|
|
|
|
|
|
|
|
allowed_service_bit5_node = NodeConnCB()
|
|
|
|
allowed_service_bit7_node = NodeConnCB()
|
|
|
|
|
|
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], allowed_service_bit5_node, services=NODE_NETWORK|NODE_UNSUPPORTED_SERVICE_BIT_5))
|
|
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], allowed_service_bit7_node, services=NODE_NETWORK|NODE_UNSUPPORTED_SERVICE_BIT_7))
|
|
|
|
allowed_service_bit5_node.add_connection(connections[5])
|
|
|
|
allowed_service_bit7_node.add_connection(connections[6])
|
|
|
|
|
|
|
|
wait_until(lambda: allowed_service_bit5_node.message_count["verack"], timeout=10, lock=mininode_lock)
|
|
|
|
wait_until(lambda: allowed_service_bit7_node.message_count["verack"], timeout=10, lock=mininode_lock)
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
P2PLeakTest().main()
|