2018-07-26 18:36:45 -04:00
|
|
|
// Copyright (c) 2011-2018 The Bitcoin Core developers
|
2014-12-13 01:09:33 -03:00
|
|
|
// Distributed under the MIT software license, see the accompanying
|
2014-03-18 06:11:00 -03:00
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
|
2011-09-06 17:09:04 -03:00
|
|
|
// Unit tests for denial-of-service detection/prevention code
|
2013-04-13 02:13:08 -03:00
|
|
|
|
2017-11-09 21:57:53 -03:00
|
|
|
#include <chainparams.h>
|
|
|
|
#include <keystore.h>
|
|
|
|
#include <net.h>
|
|
|
|
#include <net_processing.h>
|
|
|
|
#include <pow.h>
|
|
|
|
#include <script/sign.h>
|
|
|
|
#include <serialize.h>
|
2018-10-22 19:51:11 -03:00
|
|
|
#include <util/system.h>
|
2017-11-09 21:57:53 -03:00
|
|
|
#include <validation.h>
|
|
|
|
|
|
|
|
#include <test/test_bitcoin.h>
|
2015-03-03 12:49:12 -03:00
|
|
|
|
2012-01-03 19:33:31 -03:00
|
|
|
#include <stdint.h>
|
|
|
|
|
2013-04-13 02:13:08 -03:00
|
|
|
#include <boost/test/unit_test.hpp>
|
|
|
|
|
2017-02-15 04:00:04 -03:00
|
|
|
// Tests these internal-to-net_processing.cpp methods:
|
2016-12-05 05:15:33 -03:00
|
|
|
extern bool AddOrphanTx(const CTransactionRef& tx, NodeId peer);
|
2014-08-28 13:23:24 -04:00
|
|
|
extern void EraseOrphansFor(NodeId peer);
|
2012-04-23 15:14:03 -03:00
|
|
|
extern unsigned int LimitOrphanTxSize(unsigned int nMaxOrphans);
|
2018-06-07 14:32:43 -04:00
|
|
|
extern void Misbehaving(NodeId nodeid, int howmuch, const std::string& message="");
|
|
|
|
|
2014-09-20 04:53:50 -03:00
|
|
|
struct COrphanTx {
|
2016-12-05 05:15:33 -03:00
|
|
|
CTransactionRef tx;
|
2014-09-20 04:53:50 -03:00
|
|
|
NodeId fromPeer;
|
2016-12-03 00:24:23 -03:00
|
|
|
int64_t nTimeExpire;
|
2014-09-20 04:53:50 -03:00
|
|
|
};
|
2018-08-30 11:33:02 -03:00
|
|
|
extern CCriticalSection g_cs_orphans;
|
|
|
|
extern std::map<uint256, COrphanTx> mapOrphanTransactions GUARDED_BY(g_cs_orphans);
|
2012-02-29 12:14:18 -03:00
|
|
|
|
2018-05-02 12:14:48 -03:00
|
|
|
static CService ip(uint32_t i)
|
2012-01-03 19:33:31 -03:00
|
|
|
{
|
|
|
|
struct in_addr s;
|
|
|
|
s.s_addr = i;
|
2013-05-07 09:16:25 -04:00
|
|
|
return CService(CNetAddr(s), Params().GetDefaultPort());
|
2012-01-03 19:33:31 -03:00
|
|
|
}
|
2011-09-06 17:09:04 -03:00
|
|
|
|
2016-04-17 21:20:34 -03:00
|
|
|
static NodeId id = 0;
|
|
|
|
|
2017-10-26 11:32:46 -03:00
|
|
|
void UpdateLastBlockAnnounceTime(NodeId node, int64_t time_in_seconds);
|
|
|
|
|
2018-05-23 08:14:58 -04:00
|
|
|
BOOST_FIXTURE_TEST_SUITE(denialofservice_tests, TestingSetup)
|
2011-09-06 17:09:04 -03:00
|
|
|
|
2017-10-19 12:42:47 -03:00
|
|
|
// Test eviction of an outbound peer whose chain never advances
|
|
|
|
// Mock a node connection, and use mocktime to simulate a peer
|
|
|
|
// which never sends any headers messages. PeerLogic should
|
|
|
|
// decide to evict that outbound peer, after the appropriate timeouts.
|
|
|
|
// Note that we protect 4 outbound nodes from being subject to
|
|
|
|
// this logic; this test takes advantage of that protection only
|
|
|
|
// being applied to nodes which send headers with sufficient
|
|
|
|
// work.
|
|
|
|
BOOST_AUTO_TEST_CASE(outbound_slow_chain_eviction)
|
|
|
|
{
|
|
|
|
|
|
|
|
// Mock an outbound peer
|
|
|
|
CAddress addr1(ip(0xa0b0c001), NODE_NONE);
|
|
|
|
CNode dummyNode1(id++, ServiceFlags(NODE_NETWORK|NODE_WITNESS), 0, INVALID_SOCKET, addr1, 0, 0, CAddress(), "", /*fInboundIn=*/ false);
|
|
|
|
dummyNode1.SetSendVersion(PROTOCOL_VERSION);
|
|
|
|
|
|
|
|
peerLogic->InitializeNode(&dummyNode1);
|
|
|
|
dummyNode1.nVersion = 1;
|
|
|
|
dummyNode1.fSuccessfullyConnected = true;
|
|
|
|
|
|
|
|
// This test requires that we have a chain with non-zero work.
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
BOOST_CHECK(chainActive.Tip() != nullptr);
|
|
|
|
BOOST_CHECK(chainActive.Tip()->nChainWork > 0);
|
|
|
|
}
|
2017-10-19 12:42:47 -03:00
|
|
|
|
|
|
|
// Test starts here
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode1); // should result in getheaders
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_vSend);
|
|
|
|
BOOST_CHECK(dummyNode1.vSendMsg.size() > 0);
|
|
|
|
dummyNode1.vSendMsg.clear();
|
|
|
|
}
|
2017-10-19 12:42:47 -03:00
|
|
|
|
|
|
|
int64_t nStartTime = GetTime();
|
|
|
|
// Wait 21 minutes
|
|
|
|
SetMockTime(nStartTime+21*60);
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode1); // should result in getheaders
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_vSend);
|
|
|
|
BOOST_CHECK(dummyNode1.vSendMsg.size() > 0);
|
|
|
|
}
|
2017-10-19 12:42:47 -03:00
|
|
|
// Wait 3 more minutes
|
|
|
|
SetMockTime(nStartTime+24*60);
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode1); // should result in disconnect
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
2017-10-19 12:42:47 -03:00
|
|
|
BOOST_CHECK(dummyNode1.fDisconnect == true);
|
|
|
|
SetMockTime(0);
|
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
peerLogic->FinalizeNode(dummyNode1.GetId(), dummy);
|
|
|
|
}
|
|
|
|
|
2018-05-02 12:14:48 -03:00
|
|
|
static void AddRandomOutboundPeer(std::vector<CNode *> &vNodes, PeerLogicValidation &peerLogic)
|
2017-10-26 11:32:46 -03:00
|
|
|
{
|
2018-10-31 19:51:41 -03:00
|
|
|
CAddress addr(ip(insecure_rand_ctx.randbits(32)), NODE_NONE);
|
2017-10-26 11:32:46 -03:00
|
|
|
vNodes.emplace_back(new CNode(id++, ServiceFlags(NODE_NETWORK|NODE_WITNESS), 0, INVALID_SOCKET, addr, 0, 0, CAddress(), "", /*fInboundIn=*/ false));
|
|
|
|
CNode &node = *vNodes.back();
|
|
|
|
node.SetSendVersion(PROTOCOL_VERSION);
|
|
|
|
|
|
|
|
peerLogic.InitializeNode(&node);
|
|
|
|
node.nVersion = 1;
|
|
|
|
node.fSuccessfullyConnected = true;
|
|
|
|
|
|
|
|
CConnmanTest::AddNode(node);
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOST_AUTO_TEST_CASE(stale_tip_peer_management)
|
|
|
|
{
|
|
|
|
const Consensus::Params& consensusParams = Params().GetConsensus();
|
|
|
|
constexpr int nMaxOutbound = 8;
|
|
|
|
CConnman::Options options;
|
|
|
|
options.nMaxConnections = 125;
|
|
|
|
options.nMaxOutbound = nMaxOutbound;
|
|
|
|
options.nMaxFeeler = 1;
|
|
|
|
|
|
|
|
connman->Init(options);
|
|
|
|
std::vector<CNode *> vNodes;
|
|
|
|
|
|
|
|
// Mock some outbound peers
|
|
|
|
for (int i=0; i<nMaxOutbound; ++i) {
|
|
|
|
AddRandomOutboundPeer(vNodes, *peerLogic);
|
|
|
|
}
|
|
|
|
|
|
|
|
peerLogic->CheckForStaleTipAndEvictPeers(consensusParams);
|
|
|
|
|
|
|
|
// No nodes should be marked for disconnection while we have no extra peers
|
|
|
|
for (const CNode *node : vNodes) {
|
|
|
|
BOOST_CHECK(node->fDisconnect == false);
|
|
|
|
}
|
|
|
|
|
|
|
|
SetMockTime(GetTime() + 3*consensusParams.nPowTargetSpacing + 1);
|
|
|
|
|
|
|
|
// Now tip should definitely be stale, and we should look for an extra
|
|
|
|
// outbound peer
|
|
|
|
peerLogic->CheckForStaleTipAndEvictPeers(consensusParams);
|
|
|
|
BOOST_CHECK(connman->GetTryNewOutboundPeer());
|
|
|
|
|
|
|
|
// Still no peers should be marked for disconnection
|
|
|
|
for (const CNode *node : vNodes) {
|
|
|
|
BOOST_CHECK(node->fDisconnect == false);
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we add one more peer, something should get marked for eviction
|
|
|
|
// on the next check (since we're mocking the time to be in the future, the
|
|
|
|
// required time connected check should be satisfied).
|
|
|
|
AddRandomOutboundPeer(vNodes, *peerLogic);
|
|
|
|
|
|
|
|
peerLogic->CheckForStaleTipAndEvictPeers(consensusParams);
|
|
|
|
for (int i=0; i<nMaxOutbound; ++i) {
|
|
|
|
BOOST_CHECK(vNodes[i]->fDisconnect == false);
|
|
|
|
}
|
|
|
|
// Last added node should get marked for eviction
|
|
|
|
BOOST_CHECK(vNodes.back()->fDisconnect == true);
|
|
|
|
|
|
|
|
vNodes.back()->fDisconnect = false;
|
|
|
|
|
|
|
|
// Update the last announced block time for the last
|
|
|
|
// peer, and check that the next newest node gets evicted.
|
|
|
|
UpdateLastBlockAnnounceTime(vNodes.back()->GetId(), GetTime());
|
|
|
|
|
|
|
|
peerLogic->CheckForStaleTipAndEvictPeers(consensusParams);
|
|
|
|
for (int i=0; i<nMaxOutbound-1; ++i) {
|
|
|
|
BOOST_CHECK(vNodes[i]->fDisconnect == false);
|
|
|
|
}
|
|
|
|
BOOST_CHECK(vNodes[nMaxOutbound-1]->fDisconnect == true);
|
|
|
|
BOOST_CHECK(vNodes.back()->fDisconnect == false);
|
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
for (const CNode *node : vNodes) {
|
|
|
|
peerLogic->FinalizeNode(node->GetId(), dummy);
|
|
|
|
}
|
|
|
|
|
|
|
|
CConnmanTest::ClearNodes();
|
|
|
|
}
|
|
|
|
|
2011-09-06 17:09:04 -03:00
|
|
|
BOOST_AUTO_TEST_CASE(DoS_banning)
|
|
|
|
{
|
2016-12-27 19:13:04 -03:00
|
|
|
|
2016-04-16 18:43:11 -03:00
|
|
|
connman->ClearBanned();
|
2016-06-08 13:12:22 -04:00
|
|
|
CAddress addr1(ip(0xa0b0c001), NODE_NONE);
|
2017-05-30 05:59:42 -04:00
|
|
|
CNode dummyNode1(id++, NODE_NETWORK, 0, INVALID_SOCKET, addr1, 0, 0, CAddress(), "", true);
|
2016-09-12 21:00:33 -03:00
|
|
|
dummyNode1.SetSendVersion(PROTOCOL_VERSION);
|
2017-07-06 14:08:23 -04:00
|
|
|
peerLogic->InitializeNode(&dummyNode1);
|
2013-11-17 21:25:17 -03:00
|
|
|
dummyNode1.nVersion = 1;
|
2017-01-26 14:35:49 -03:00
|
|
|
dummyNode1.fSuccessfullyConnected = true;
|
2017-11-06 19:08:55 -03:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode1.GetId(), 100); // Should get banned
|
|
|
|
}
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode1);
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr1));
|
|
|
|
BOOST_CHECK(!connman->IsBanned(ip(0xa0b0c001|0x0000ff00))); // Different IP, not banned
|
2011-09-06 17:09:04 -03:00
|
|
|
|
2016-06-08 13:12:22 -04:00
|
|
|
CAddress addr2(ip(0xa0b0c002), NODE_NONE);
|
2017-05-30 05:59:42 -04:00
|
|
|
CNode dummyNode2(id++, NODE_NETWORK, 0, INVALID_SOCKET, addr2, 1, 1, CAddress(), "", true);
|
2016-09-12 21:00:33 -03:00
|
|
|
dummyNode2.SetSendVersion(PROTOCOL_VERSION);
|
2017-07-06 14:08:23 -04:00
|
|
|
peerLogic->InitializeNode(&dummyNode2);
|
2013-11-17 21:25:17 -03:00
|
|
|
dummyNode2.nVersion = 1;
|
2017-01-26 14:35:49 -03:00
|
|
|
dummyNode2.fSuccessfullyConnected = true;
|
2017-11-06 19:08:55 -03:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode2.GetId(), 50);
|
|
|
|
}
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode2.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode2);
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(!connman->IsBanned(addr2)); // 2 not banned yet...
|
|
|
|
BOOST_CHECK(connman->IsBanned(addr1)); // ... but 1 still should be
|
2017-11-06 19:08:55 -03:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode2.GetId(), 50);
|
|
|
|
}
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode2.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode2);
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr2));
|
2017-10-19 12:42:47 -03:00
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
peerLogic->FinalizeNode(dummyNode1.GetId(), dummy);
|
|
|
|
peerLogic->FinalizeNode(dummyNode2.GetId(), dummy);
|
2012-10-05 14:22:21 -03:00
|
|
|
}
|
2011-09-06 17:09:04 -03:00
|
|
|
|
|
|
|
BOOST_AUTO_TEST_CASE(DoS_banscore)
|
|
|
|
{
|
2016-12-27 19:13:04 -03:00
|
|
|
|
2016-04-16 18:43:11 -03:00
|
|
|
connman->ClearBanned();
|
2017-08-01 15:17:40 -04:00
|
|
|
gArgs.ForceSetArg("-banscore", "111"); // because 11 is my favorite number
|
2016-06-08 13:12:22 -04:00
|
|
|
CAddress addr1(ip(0xa0b0c001), NODE_NONE);
|
2017-05-30 05:59:42 -04:00
|
|
|
CNode dummyNode1(id++, NODE_NETWORK, 0, INVALID_SOCKET, addr1, 3, 1, CAddress(), "", true);
|
2016-09-12 21:00:33 -03:00
|
|
|
dummyNode1.SetSendVersion(PROTOCOL_VERSION);
|
2017-07-06 14:08:23 -04:00
|
|
|
peerLogic->InitializeNode(&dummyNode1);
|
2013-11-17 21:25:17 -03:00
|
|
|
dummyNode1.nVersion = 1;
|
2017-01-26 14:35:49 -03:00
|
|
|
dummyNode1.fSuccessfullyConnected = true;
|
2017-11-06 19:08:55 -03:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode1.GetId(), 100);
|
|
|
|
}
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode1);
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(!connman->IsBanned(addr1));
|
2017-11-06 19:08:55 -03:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode1.GetId(), 10);
|
|
|
|
}
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode1);
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(!connman->IsBanned(addr1));
|
2017-11-06 19:08:55 -03:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode1.GetId(), 1);
|
|
|
|
}
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode1.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode1);
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr1));
|
2017-08-01 15:17:40 -04:00
|
|
|
gArgs.ForceSetArg("-banscore", std::to_string(DEFAULT_BANSCORE_THRESHOLD));
|
2017-10-19 12:42:47 -03:00
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
peerLogic->FinalizeNode(dummyNode1.GetId(), dummy);
|
2011-09-06 17:09:04 -03:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOST_AUTO_TEST_CASE(DoS_bantime)
|
|
|
|
{
|
2016-12-27 19:13:04 -03:00
|
|
|
|
2016-04-16 18:43:11 -03:00
|
|
|
connman->ClearBanned();
|
2013-04-13 02:13:08 -03:00
|
|
|
int64_t nStartTime = GetTime();
|
2011-09-06 17:09:04 -03:00
|
|
|
SetMockTime(nStartTime); // Overrides future calls to GetTime()
|
|
|
|
|
2016-06-08 13:12:22 -04:00
|
|
|
CAddress addr(ip(0xa0b0c001), NODE_NONE);
|
2017-05-30 05:59:42 -04:00
|
|
|
CNode dummyNode(id++, NODE_NETWORK, 0, INVALID_SOCKET, addr, 4, 4, CAddress(), "", true);
|
2016-09-12 21:00:33 -03:00
|
|
|
dummyNode.SetSendVersion(PROTOCOL_VERSION);
|
2017-07-06 14:08:23 -04:00
|
|
|
peerLogic->InitializeNode(&dummyNode);
|
2013-11-17 21:25:17 -03:00
|
|
|
dummyNode.nVersion = 1;
|
2017-01-26 14:35:49 -03:00
|
|
|
dummyNode.fSuccessfullyConnected = true;
|
2011-09-06 17:09:04 -03:00
|
|
|
|
2017-11-06 19:08:55 -03:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode.GetId(), 100);
|
|
|
|
}
|
2018-04-04 09:04:10 -03:00
|
|
|
{
|
|
|
|
LOCK2(cs_main, dummyNode.cs_sendProcessing);
|
2018-07-01 22:26:47 -04:00
|
|
|
peerLogic->SendMessages(&dummyNode);
|
2018-04-04 09:04:10 -03:00
|
|
|
}
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr));
|
2011-09-06 17:09:04 -03:00
|
|
|
|
|
|
|
SetMockTime(nStartTime+60*60);
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr));
|
2011-09-06 17:09:04 -03:00
|
|
|
|
|
|
|
SetMockTime(nStartTime+60*60*24+1);
|
2016-04-16 18:43:11 -03:00
|
|
|
BOOST_CHECK(!connman->IsBanned(addr));
|
2017-10-19 12:42:47 -03:00
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
peerLogic->FinalizeNode(dummyNode.GetId(), dummy);
|
2012-01-03 19:33:31 -03:00
|
|
|
}
|
2011-09-06 17:09:04 -03:00
|
|
|
|
2018-05-02 12:14:48 -03:00
|
|
|
static CTransactionRef RandomOrphan()
|
2012-02-29 12:14:18 -03:00
|
|
|
{
|
2014-09-20 04:53:50 -03:00
|
|
|
std::map<uint256, COrphanTx>::iterator it;
|
2018-08-30 11:33:02 -03:00
|
|
|
LOCK2(cs_main, g_cs_orphans);
|
2017-06-07 15:03:17 -04:00
|
|
|
it = mapOrphanTransactions.lower_bound(InsecureRand256());
|
2012-02-29 12:14:18 -03:00
|
|
|
if (it == mapOrphanTransactions.end())
|
|
|
|
it = mapOrphanTransactions.begin();
|
2014-09-20 04:53:50 -03:00
|
|
|
return it->second.tx;
|
2012-02-29 12:14:18 -03:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOST_AUTO_TEST_CASE(DoS_mapOrphans)
|
|
|
|
{
|
|
|
|
CKey key;
|
|
|
|
key.MakeNewKey(true);
|
|
|
|
CBasicKeyStore keystore;
|
|
|
|
keystore.AddKey(key);
|
|
|
|
|
|
|
|
// 50 orphan transactions:
|
|
|
|
for (int i = 0; i < 50; i++)
|
|
|
|
{
|
2014-06-07 07:53:27 -04:00
|
|
|
CMutableTransaction tx;
|
2012-02-29 12:14:18 -03:00
|
|
|
tx.vin.resize(1);
|
|
|
|
tx.vin[0].prevout.n = 0;
|
2017-06-07 15:03:17 -04:00
|
|
|
tx.vin[0].prevout.hash = InsecureRand256();
|
2012-02-29 12:14:18 -03:00
|
|
|
tx.vin[0].scriptSig << OP_1;
|
|
|
|
tx.vout.resize(1);
|
|
|
|
tx.vout[0].nValue = 1*CENT;
|
2014-09-11 14:15:29 -03:00
|
|
|
tx.vout[0].scriptPubKey = GetScriptForDestination(key.GetPubKey().GetID());
|
2012-02-29 12:14:18 -03:00
|
|
|
|
2016-12-05 05:15:33 -03:00
|
|
|
AddOrphanTx(MakeTransactionRef(tx), i);
|
2012-02-29 12:14:18 -03:00
|
|
|
}
|
|
|
|
|
|
|
|
// ... and 50 that depend on other orphans:
|
|
|
|
for (int i = 0; i < 50; i++)
|
|
|
|
{
|
2016-12-05 05:15:33 -03:00
|
|
|
CTransactionRef txPrev = RandomOrphan();
|
2012-02-29 12:14:18 -03:00
|
|
|
|
2014-06-07 07:53:27 -04:00
|
|
|
CMutableTransaction tx;
|
2012-02-29 12:14:18 -03:00
|
|
|
tx.vin.resize(1);
|
|
|
|
tx.vin[0].prevout.n = 0;
|
2016-12-05 05:15:33 -03:00
|
|
|
tx.vin[0].prevout.hash = txPrev->GetHash();
|
2012-02-29 12:14:18 -03:00
|
|
|
tx.vout.resize(1);
|
|
|
|
tx.vout[0].nValue = 1*CENT;
|
2014-09-11 14:15:29 -03:00
|
|
|
tx.vout[0].scriptPubKey = GetScriptForDestination(key.GetPubKey().GetID());
|
2016-12-05 05:15:33 -03:00
|
|
|
SignSignature(keystore, *txPrev, tx, 0, SIGHASH_ALL);
|
2012-02-29 12:14:18 -03:00
|
|
|
|
2016-12-05 05:15:33 -03:00
|
|
|
AddOrphanTx(MakeTransactionRef(tx), i);
|
2012-02-29 12:14:18 -03:00
|
|
|
}
|
|
|
|
|
2012-05-15 15:53:30 -04:00
|
|
|
// This really-big orphan should be ignored:
|
|
|
|
for (int i = 0; i < 10; i++)
|
|
|
|
{
|
2016-12-05 05:15:33 -03:00
|
|
|
CTransactionRef txPrev = RandomOrphan();
|
2012-05-15 15:53:30 -04:00
|
|
|
|
2014-06-07 07:53:27 -04:00
|
|
|
CMutableTransaction tx;
|
2012-05-15 15:53:30 -04:00
|
|
|
tx.vout.resize(1);
|
|
|
|
tx.vout[0].nValue = 1*CENT;
|
2014-09-11 14:15:29 -03:00
|
|
|
tx.vout[0].scriptPubKey = GetScriptForDestination(key.GetPubKey().GetID());
|
2016-06-10 20:28:48 -04:00
|
|
|
tx.vin.resize(2777);
|
2012-05-24 12:18:50 -04:00
|
|
|
for (unsigned int j = 0; j < tx.vin.size(); j++)
|
2012-05-15 15:53:30 -04:00
|
|
|
{
|
|
|
|
tx.vin[j].prevout.n = j;
|
2016-12-05 05:15:33 -03:00
|
|
|
tx.vin[j].prevout.hash = txPrev->GetHash();
|
2012-05-15 15:53:30 -04:00
|
|
|
}
|
2016-12-05 05:15:33 -03:00
|
|
|
SignSignature(keystore, *txPrev, tx, 0, SIGHASH_ALL);
|
2012-05-15 15:53:30 -04:00
|
|
|
// Re-use same signature for other inputs
|
|
|
|
// (they don't have to be valid for this test)
|
2012-05-24 12:18:50 -04:00
|
|
|
for (unsigned int j = 1; j < tx.vin.size(); j++)
|
2012-05-15 15:53:30 -04:00
|
|
|
tx.vin[j].scriptSig = tx.vin[0].scriptSig;
|
|
|
|
|
2016-12-05 05:15:33 -03:00
|
|
|
BOOST_CHECK(!AddOrphanTx(MakeTransactionRef(tx), i));
|
2014-08-28 13:23:24 -04:00
|
|
|
}
|
|
|
|
|
2018-08-30 11:33:02 -03:00
|
|
|
LOCK2(cs_main, g_cs_orphans);
|
2014-08-28 13:23:24 -04:00
|
|
|
// Test EraseOrphansFor:
|
|
|
|
for (NodeId i = 0; i < 3; i++)
|
|
|
|
{
|
|
|
|
size_t sizeBefore = mapOrphanTransactions.size();
|
|
|
|
EraseOrphansFor(i);
|
|
|
|
BOOST_CHECK(mapOrphanTransactions.size() < sizeBefore);
|
2012-05-15 15:53:30 -04:00
|
|
|
}
|
|
|
|
|
2012-02-29 12:14:18 -03:00
|
|
|
// Test LimitOrphanTxSize() function:
|
|
|
|
LimitOrphanTxSize(40);
|
|
|
|
BOOST_CHECK(mapOrphanTransactions.size() <= 40);
|
|
|
|
LimitOrphanTxSize(10);
|
|
|
|
BOOST_CHECK(mapOrphanTransactions.size() <= 10);
|
|
|
|
LimitOrphanTxSize(0);
|
|
|
|
BOOST_CHECK(mapOrphanTransactions.empty());
|
|
|
|
}
|
|
|
|
|
2011-09-06 17:09:04 -03:00
|
|
|
BOOST_AUTO_TEST_SUITE_END()
|