5e35cd94c1
In v0.15, we disconnect nodes that send us version messages with unsupported service bits (1 << 5 and 1 << 7). This commit adds a test that bitcoind will disconnect those nodes before August 1st 2018, and won't disconnect those nodes after August 1st 2018.
165 lines
7.7 KiB
Python
Executable file
165 lines
7.7 KiB
Python
Executable file
#!/usr/bin/env python3
|
|
# Copyright (c) 2017 The Bitcoin Core developers
|
|
# Distributed under the MIT software license, see the accompanying
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
"""Test message sending before handshake completion.
|
|
|
|
A node should never send anything other than VERSION/VERACK/REJECT until it's
|
|
received a VERACK.
|
|
|
|
This test connects to a node and sends it a few messages, trying to intice it
|
|
into sending us something it shouldn't.
|
|
|
|
Also test that nodes that send unsupported service bits to bitcoind are disconnected
|
|
and don't receive a VERACK. Unsupported service bits are currently 1 << 5 and
|
|
1 << 7 (until August 1st 2018)."""
|
|
|
|
from test_framework.mininode import *
|
|
from test_framework.test_framework import BitcoinTestFramework
|
|
from test_framework.util import *
|
|
|
|
banscore = 10
|
|
|
|
class CLazyNode(NodeConnCB):
|
|
def __init__(self):
|
|
super().__init__()
|
|
self.unexpected_msg = False
|
|
self.ever_connected = False
|
|
|
|
def bad_message(self, message):
|
|
self.unexpected_msg = True
|
|
self.log.info("should not have received message: %s" % message.command)
|
|
|
|
def on_open(self, conn):
|
|
self.connected = True
|
|
self.ever_connected = True
|
|
|
|
def on_version(self, conn, message): self.bad_message(message)
|
|
def on_verack(self, conn, message): self.bad_message(message)
|
|
def on_reject(self, conn, message): self.bad_message(message)
|
|
def on_inv(self, conn, message): self.bad_message(message)
|
|
def on_addr(self, conn, message): self.bad_message(message)
|
|
def on_alert(self, conn, message): self.bad_message(message)
|
|
def on_getdata(self, conn, message): self.bad_message(message)
|
|
def on_getblocks(self, conn, message): self.bad_message(message)
|
|
def on_tx(self, conn, message): self.bad_message(message)
|
|
def on_block(self, conn, message): self.bad_message(message)
|
|
def on_getaddr(self, conn, message): self.bad_message(message)
|
|
def on_headers(self, conn, message): self.bad_message(message)
|
|
def on_getheaders(self, conn, message): self.bad_message(message)
|
|
def on_ping(self, conn, message): self.bad_message(message)
|
|
def on_mempool(self, conn): self.bad_message(message)
|
|
def on_pong(self, conn, message): self.bad_message(message)
|
|
def on_feefilter(self, conn, message): self.bad_message(message)
|
|
def on_sendheaders(self, conn, message): self.bad_message(message)
|
|
def on_sendcmpct(self, conn, message): self.bad_message(message)
|
|
def on_cmpctblock(self, conn, message): self.bad_message(message)
|
|
def on_getblocktxn(self, conn, message): self.bad_message(message)
|
|
def on_blocktxn(self, conn, message): self.bad_message(message)
|
|
|
|
# Node that never sends a version. We'll use this to send a bunch of messages
|
|
# anyway, and eventually get disconnected.
|
|
class CNodeNoVersionBan(CLazyNode):
|
|
# send a bunch of veracks without sending a message. This should get us disconnected.
|
|
# NOTE: implementation-specific check here. Remove if bitcoind ban behavior changes
|
|
def on_open(self, conn):
|
|
super().on_open(conn)
|
|
for i in range(banscore):
|
|
self.send_message(msg_verack())
|
|
|
|
def on_reject(self, conn, message): pass
|
|
|
|
# Node that never sends a version. This one just sits idle and hopes to receive
|
|
# any message (it shouldn't!)
|
|
class CNodeNoVersionIdle(CLazyNode):
|
|
def __init__(self):
|
|
super().__init__()
|
|
|
|
# Node that sends a version but not a verack.
|
|
class CNodeNoVerackIdle(CLazyNode):
|
|
def __init__(self):
|
|
self.version_received = False
|
|
super().__init__()
|
|
|
|
def on_reject(self, conn, message): pass
|
|
def on_verack(self, conn, message): pass
|
|
# When version is received, don't reply with a verack. Instead, see if the
|
|
# node will give us a message that it shouldn't. This is not an exhaustive
|
|
# list!
|
|
def on_version(self, conn, message):
|
|
self.version_received = True
|
|
conn.send_message(msg_ping())
|
|
conn.send_message(msg_getaddr())
|
|
|
|
class P2PLeakTest(BitcoinTestFramework):
|
|
def __init__(self):
|
|
super().__init__()
|
|
self.num_nodes = 1
|
|
self.extra_args = [['-banscore='+str(banscore)]]
|
|
|
|
def run_test(self):
|
|
no_version_bannode = CNodeNoVersionBan()
|
|
no_version_idlenode = CNodeNoVersionIdle()
|
|
no_verack_idlenode = CNodeNoVerackIdle()
|
|
unsupported_service_bit5_node = CLazyNode()
|
|
unsupported_service_bit7_node = CLazyNode()
|
|
|
|
self.nodes[0].setmocktime(1501545600) # August 1st 2017
|
|
connections = []
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], no_version_bannode, send_version=False))
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], no_version_idlenode, send_version=False))
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], no_verack_idlenode))
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], unsupported_service_bit5_node, services=NODE_NETWORK|NODE_UNSUPPORTED_SERVICE_BIT_5))
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], unsupported_service_bit7_node, services=NODE_NETWORK|NODE_UNSUPPORTED_SERVICE_BIT_7))
|
|
no_version_bannode.add_connection(connections[0])
|
|
no_version_idlenode.add_connection(connections[1])
|
|
no_verack_idlenode.add_connection(connections[2])
|
|
unsupported_service_bit5_node.add_connection(connections[3])
|
|
unsupported_service_bit7_node.add_connection(connections[4])
|
|
|
|
NetworkThread().start() # Start up network handling in another thread
|
|
|
|
assert wait_until(lambda: no_version_bannode.ever_connected, timeout=10)
|
|
assert wait_until(lambda: no_version_idlenode.ever_connected, timeout=10)
|
|
assert wait_until(lambda: no_verack_idlenode.version_received, timeout=10)
|
|
assert wait_until(lambda: unsupported_service_bit5_node.ever_connected, timeout=10)
|
|
assert wait_until(lambda: unsupported_service_bit7_node.ever_connected, timeout=10)
|
|
|
|
# Mine a block and make sure that it's not sent to the connected nodes
|
|
self.nodes[0].generate(1)
|
|
|
|
#Give the node enough time to possibly leak out a message
|
|
time.sleep(5)
|
|
|
|
#This node should have been banned
|
|
assert not no_version_bannode.connected
|
|
|
|
# These nodes should have been disconnected
|
|
assert not unsupported_service_bit5_node.connected
|
|
assert not unsupported_service_bit7_node.connected
|
|
|
|
[conn.disconnect_node() for conn in connections]
|
|
|
|
# Make sure no unexpected messages came in
|
|
assert(no_version_bannode.unexpected_msg == False)
|
|
assert(no_version_idlenode.unexpected_msg == False)
|
|
assert(no_verack_idlenode.unexpected_msg == False)
|
|
assert not unsupported_service_bit5_node.unexpected_msg
|
|
assert not unsupported_service_bit7_node.unexpected_msg
|
|
|
|
self.log.info("Service bits 5 and 7 are allowed after August 1st 2018")
|
|
self.nodes[0].setmocktime(1533168000) # August 2nd 2018
|
|
|
|
allowed_service_bit5_node = NodeConnCB()
|
|
allowed_service_bit7_node = NodeConnCB()
|
|
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], allowed_service_bit5_node, services=NODE_NETWORK|NODE_UNSUPPORTED_SERVICE_BIT_5))
|
|
connections.append(NodeConn('127.0.0.1', p2p_port(0), self.nodes[0], allowed_service_bit7_node, services=NODE_NETWORK|NODE_UNSUPPORTED_SERVICE_BIT_7))
|
|
allowed_service_bit5_node.add_connection(connections[5])
|
|
allowed_service_bit7_node.add_connection(connections[6])
|
|
|
|
assert wait_until(lambda: allowed_service_bit5_node.message_count["verack"], timeout=10)
|
|
assert wait_until(lambda: allowed_service_bit7_node.message_count["verack"], timeout=10)
|
|
|
|
if __name__ == '__main__':
|
|
P2PLeakTest().main()
|