forked from bitcoin/bitcoin
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge bitcoin#29431: test/BIP324: disconnection scenarios during v2 h…
…andshake c9dacd9 test: Check that non empty version packet is ignored and no disconnection happens (stratospher) 997cc00 test: Check that disconnection happens when AAD isn't filled (stratospher) b5e6238 test: Check that disconnection happens when garbage sent/received are different (stratospher) ad1482d test: Check that disconnection happens when wrong garbage terminator is sent (stratospher) e351576 test: Check that disconnection happens when >4095 garbage bytes is sent (stratospher) e075fd1 test: Introduce test types and modify v2 handshake function accordingly (stratospher) 7d07daa log: Add V2 handshake timeout (stratospher) d4a1da8 test: Make global TRANSPORT_VERSION variable an instance variable (stratospher) c642b08 test: Log when the garbage is actually sent to transport layer (stratospher) 86cca2c test: Support disconnect waiting for add_p2p_connection (stratospher) bf9669a test: Rename early key response test and move random_bitflip to util (stratospher) Pull request description: Add tests for the following v2 handshake scenarios: 1. Disconnection happens when > `MAX_GARBAGE_LEN` bytes garbage is sent 2. Disconnection happens when incorrect garbage terminator is sent 3. Disconnection happens when garbage bytes are tampered with 4. Disconnection happens when AAD of first encrypted packet after the garbage terminator is not filled 5. bitcoind ignores non-empty version packet and no disconnection happens All these tests require a modified v2 P2P class (different from `EncryptedP2PState` used in `v2_p2p.py`) to implement our custom handshake behaviour based on different scenarios and have been kept in a single test file (`test/functional/p2p_v2_misbehaving.py`). Shifted the test in `test/functional/p2p_v2_earlykeyresponse.py` which is of the same pattern to this file too. ACKs for top commit: achow101: ACK c9dacd9 mzumsande: ACK c9dacd9 theStack: Code-review ACK c9dacd9 Tree-SHA512: 90df81f0c7f4ecf0a47762d290a618ded92cde9f83d3ef3cc70e1b005ecb16125ec39a9d80ce95f99e695d29abd63443240cb5490aa57c5bc8fa2e52149a0672
- Loading branch information
Showing
9 changed files
with
200 additions
and
105 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,176 @@ | ||
#!/usr/bin/env python3 | ||
# Copyright (c) 2022 The Bitcoin Core developers | ||
# Distributed under the MIT software license, see the accompanying | ||
# file COPYING or http://www.opensource.org/licenses/mit-license.php. | ||
|
||
import random | ||
from enum import Enum | ||
|
||
from test_framework.messages import MAGIC_BYTES | ||
from test_framework.p2p import P2PInterface | ||
from test_framework.test_framework import BitcoinTestFramework | ||
from test_framework.util import random_bitflip | ||
from test_framework.v2_p2p import ( | ||
EncryptedP2PState, | ||
MAX_GARBAGE_LEN, | ||
) | ||
|
||
|
||
class TestType(Enum): | ||
""" Scenarios to be tested: | ||
1. EARLY_KEY_RESPONSE - The responder needs to wait until one byte is received which does not match the 16 bytes | ||
consisting of network magic followed by "version\x00\x00\x00\x00\x00" before sending out its ellswift + garbage bytes | ||
2. EXCESS_GARBAGE - Disconnection happens when > MAX_GARBAGE_LEN bytes garbage is sent | ||
3. WRONG_GARBAGE_TERMINATOR - Disconnection happens when incorrect garbage terminator is sent | ||
4. WRONG_GARBAGE - Disconnection happens when garbage bytes that is sent is different from what the peer receives | ||
5. SEND_NO_AAD - Disconnection happens when AAD of first encrypted packet after the garbage terminator is not filled | ||
6. SEND_NON_EMPTY_VERSION_PACKET - non-empty version packet is simply ignored | ||
""" | ||
EARLY_KEY_RESPONSE = 0 | ||
EXCESS_GARBAGE = 1 | ||
WRONG_GARBAGE_TERMINATOR = 2 | ||
WRONG_GARBAGE = 3 | ||
SEND_NO_AAD = 4 | ||
SEND_NON_EMPTY_VERSION_PACKET = 5 | ||
|
||
|
||
class EarlyKeyResponseState(EncryptedP2PState): | ||
""" Modify v2 P2P protocol functions for testing EARLY_KEY_RESPONSE scenario""" | ||
def __init__(self, initiating, net): | ||
super().__init__(initiating=initiating, net=net) | ||
self.can_data_be_received = False # variable used to assert if data is received on recvbuf. | ||
|
||
def initiate_v2_handshake(self): | ||
"""Send ellswift and garbage bytes in 2 parts when TestType = (EARLY_KEY_RESPONSE)""" | ||
self.generate_keypair_and_garbage() | ||
return b"" | ||
|
||
|
||
class ExcessGarbageState(EncryptedP2PState): | ||
"""Generate > MAX_GARBAGE_LEN garbage bytes""" | ||
def generate_keypair_and_garbage(self): | ||
garbage_len = MAX_GARBAGE_LEN + random.randrange(1, MAX_GARBAGE_LEN + 1) | ||
return super().generate_keypair_and_garbage(garbage_len) | ||
|
||
|
||
class WrongGarbageTerminatorState(EncryptedP2PState): | ||
"""Add option for sending wrong garbage terminator""" | ||
def generate_keypair_and_garbage(self): | ||
garbage_len = random.randrange(MAX_GARBAGE_LEN//2) | ||
return super().generate_keypair_and_garbage(garbage_len) | ||
|
||
def complete_handshake(self, response): | ||
length, handshake_bytes = super().complete_handshake(response) | ||
# first 16 bytes returned by complete_handshake() is the garbage terminator | ||
wrong_garbage_terminator = random_bitflip(handshake_bytes[:16]) | ||
return length, wrong_garbage_terminator + handshake_bytes[16:] | ||
|
||
|
||
class WrongGarbageState(EncryptedP2PState): | ||
"""Generate tampered garbage bytes""" | ||
def generate_keypair_and_garbage(self): | ||
garbage_len = random.randrange(1, MAX_GARBAGE_LEN) | ||
ellswift_garbage_bytes = super().generate_keypair_and_garbage(garbage_len) | ||
# assume that garbage bytes sent to TestNode were tampered with | ||
return ellswift_garbage_bytes[:64] + random_bitflip(ellswift_garbage_bytes[64:]) | ||
|
||
|
||
class NoAADState(EncryptedP2PState): | ||
"""Add option for not filling first encrypted packet after garbage terminator with AAD""" | ||
def generate_keypair_and_garbage(self): | ||
garbage_len = random.randrange(1, MAX_GARBAGE_LEN) | ||
return super().generate_keypair_and_garbage(garbage_len) | ||
|
||
def complete_handshake(self, response): | ||
self.sent_garbage = b'' # do not authenticate the garbage which is sent | ||
return super().complete_handshake(response) | ||
|
||
|
||
class NonEmptyVersionPacketState(EncryptedP2PState): | ||
""""Add option for sending non-empty transport version packet.""" | ||
def complete_handshake(self, response): | ||
self.transport_version = random.randbytes(5) | ||
return super().complete_handshake(response) | ||
|
||
|
||
class MisbehavingV2Peer(P2PInterface): | ||
"""Custom implementation of P2PInterface which uses modified v2 P2P protocol functions for testing purposes.""" | ||
def __init__(self, test_type): | ||
super().__init__() | ||
self.test_type = test_type | ||
|
||
def connection_made(self, transport): | ||
if self.test_type == TestType.EARLY_KEY_RESPONSE: | ||
self.v2_state = EarlyKeyResponseState(initiating=True, net='regtest') | ||
elif self.test_type == TestType.EXCESS_GARBAGE: | ||
self.v2_state = ExcessGarbageState(initiating=True, net='regtest') | ||
elif self.test_type == TestType.WRONG_GARBAGE_TERMINATOR: | ||
self.v2_state = WrongGarbageTerminatorState(initiating=True, net='regtest') | ||
elif self.test_type == TestType.WRONG_GARBAGE: | ||
self.v2_state = WrongGarbageState(initiating=True, net='regtest') | ||
elif self.test_type == TestType.SEND_NO_AAD: | ||
self.v2_state = NoAADState(initiating=True, net='regtest') | ||
elif TestType.SEND_NON_EMPTY_VERSION_PACKET: | ||
self.v2_state = NonEmptyVersionPacketState(initiating=True, net='regtest') | ||
super().connection_made(transport) | ||
|
||
def data_received(self, t): | ||
if self.test_type == TestType.EARLY_KEY_RESPONSE: | ||
# check that data can be received on recvbuf only when mismatch from V1_PREFIX happens | ||
assert self.v2_state.can_data_be_received | ||
else: | ||
super().data_received(t) | ||
|
||
|
||
class EncryptedP2PMisbehaving(BitcoinTestFramework): | ||
def set_test_params(self): | ||
self.num_nodes = 1 | ||
self.extra_args = [["-v2transport=1", "-peertimeout=3"]] | ||
|
||
def run_test(self): | ||
self.test_earlykeyresponse() | ||
self.test_v2disconnection() | ||
|
||
def test_earlykeyresponse(self): | ||
self.log.info('Sending ellswift bytes in parts to ensure that response from responder is received only when') | ||
self.log.info('ellswift bytes have a mismatch from the 16 bytes(network magic followed by "version\\x00\\x00\\x00\\x00\\x00")') | ||
node0 = self.nodes[0] | ||
self.log.info('Sending first 4 bytes of ellswift which match network magic') | ||
self.log.info('If a response is received, assertion failure would happen in our custom data_received() function') | ||
peer1 = node0.add_p2p_connection(MisbehavingV2Peer(TestType.EARLY_KEY_RESPONSE), wait_for_verack=False, send_version=False, supports_v2_p2p=True, wait_for_v2_handshake=False) | ||
peer1.send_raw_message(MAGIC_BYTES['regtest']) | ||
self.log.info('Sending remaining ellswift and garbage which are different from V1_PREFIX. Since a response is') | ||
self.log.info('expected now, our custom data_received() function wouldn\'t result in assertion failure') | ||
peer1.v2_state.can_data_be_received = True | ||
peer1.send_raw_message(peer1.v2_state.ellswift_ours[4:] + peer1.v2_state.sent_garbage) | ||
with node0.assert_debug_log(['V2 handshake timeout peer=0']): | ||
peer1.wait_for_disconnect(timeout=5) | ||
self.log.info('successful disconnection since modified ellswift was sent as response') | ||
|
||
def test_v2disconnection(self): | ||
# test v2 disconnection scenarios | ||
node0 = self.nodes[0] | ||
expected_debug_message = [ | ||
[], # EARLY_KEY_RESPONSE | ||
["V2 transport error: missing garbage terminator, peer=1"], # EXCESS_GARBAGE | ||
["V2 handshake timeout peer=2"], # WRONG_GARBAGE_TERMINATOR | ||
["V2 transport error: packet decryption failure"], # WRONG_GARBAGE | ||
["V2 transport error: packet decryption failure"], # SEND_NO_AAD | ||
[], # SEND_NON_EMPTY_VERSION_PACKET | ||
] | ||
for test_type in TestType: | ||
if test_type == TestType.EARLY_KEY_RESPONSE: | ||
continue | ||
elif test_type == TestType.SEND_NON_EMPTY_VERSION_PACKET: | ||
node0.add_p2p_connection(MisbehavingV2Peer(test_type), wait_for_verack=True, send_version=True, supports_v2_p2p=True) | ||
self.log.info(f"No disconnection for {test_type.name}") | ||
else: | ||
with node0.assert_debug_log(expected_debug_message[test_type.value], timeout=5): | ||
peer = node0.add_p2p_connection(MisbehavingV2Peer(test_type), wait_for_verack=False, send_version=False, supports_v2_p2p=True, expect_success=False) | ||
peer.wait_for_disconnect() | ||
self.log.info(f"Expected disconnection for {test_type.name}") | ||
|
||
|
||
if __name__ == '__main__': | ||
EncryptedP2PMisbehaving().main() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.