/ test / functional / p2p_mutated_blocks.py
p2p_mutated_blocks.py
  1  #!/usr/bin/env python3
  2  # Copyright (c) The Bitcoin Core developers
  3  # Distributed under the MIT software license, see the accompanying
  4  # file COPYING or http://www.opensource.org/licenses/mit-license.php.
  5  
  6  """
  7  Test that an attacker can't degrade compact block relay by sending unsolicited
  8  mutated blocks to clear in-flight blocktxn requests from other honest peers.
  9  """
 10  
 11  from test_framework.p2p import P2PInterface
 12  from test_framework.messages import (
 13      BlockTransactions,
 14      msg_cmpctblock,
 15      msg_block,
 16      msg_blocktxn,
 17      HeaderAndShortIDs,
 18  )
 19  from test_framework.test_framework import BitcoinTestFramework
 20  from test_framework.blocktools import (
 21      COINBASE_MATURITY,
 22      create_block,
 23      add_witness_commitment,
 24      NORMAL_GBT_REQUEST_PARAMS,
 25  )
 26  from test_framework.util import assert_equal
 27  from test_framework.wallet import MiniWallet
 28  import copy
 29  
 30  class MutatedBlocksTest(BitcoinTestFramework):
 31      def set_test_params(self):
 32          self.setup_clean_chain = True
 33          self.num_nodes = 1
 34          self.extra_args = [
 35              [
 36                  "-testactivationheight=segwit@1", # causes unconnected headers/blocks to not have segwit considered deployed
 37              ],
 38          ]
 39  
 40      def run_test(self):
 41          self.wallet = MiniWallet(self.nodes[0])
 42          self.generate(self.wallet, COINBASE_MATURITY)
 43  
 44          honest_relayer = self.nodes[0].add_outbound_p2p_connection(P2PInterface(), p2p_idx=0, connection_type="outbound-full-relay")
 45          attacker = self.nodes[0].add_p2p_connection(P2PInterface())
 46  
 47          # Create new block with two transactions (coinbase + 1 self-transfer).
 48          # The self-transfer transaction is needed to trigger a compact block
 49          # `getblocktxn` roundtrip.
 50          tx = self.wallet.create_self_transfer()["tx"]
 51          block = create_block(tmpl=self.nodes[0].getblocktemplate(NORMAL_GBT_REQUEST_PARAMS), txlist=[tx])
 52          add_witness_commitment(block)
 53          block.solve()
 54  
 55          # Create mutated version of the block by changing the transaction
 56          # version on the self-transfer.
 57          mutated_block = copy.deepcopy(block)
 58          mutated_block.vtx[1].nVersion = 4
 59  
 60          # Announce the new block via a compact block through the honest relayer
 61          cmpctblock = HeaderAndShortIDs()
 62          cmpctblock.initialize_from_block(block, use_witness=True)
 63          honest_relayer.send_message(msg_cmpctblock(cmpctblock.to_p2p()))
 64  
 65          # Wait for a `getblocktxn` that attempts to fetch the self-transfer
 66          def self_transfer_requested():
 67              if not honest_relayer.last_message.get('getblocktxn'):
 68                  return False
 69  
 70              get_block_txn = honest_relayer.last_message['getblocktxn']
 71              return get_block_txn.block_txn_request.blockhash == block.sha256 and \
 72                     get_block_txn.block_txn_request.indexes == [1]
 73          honest_relayer.wait_until(self_transfer_requested, timeout=5)
 74  
 75          # Block at height 101 should be the only one in flight from peer 0
 76          peer_info_prior_to_attack = self.nodes[0].getpeerinfo()
 77          assert_equal(peer_info_prior_to_attack[0]['id'], 0)
 78          assert_equal([101], peer_info_prior_to_attack[0]["inflight"])
 79  
 80          # Attempt to clear the honest relayer's download request by sending the
 81          # mutated block (as the attacker).
 82          with self.nodes[0].assert_debug_log(expected_msgs=["Block mutated: bad-txnmrklroot, hashMerkleRoot mismatch"]):
 83              attacker.send_message(msg_block(mutated_block))
 84          # Attacker should get disconnected for sending a mutated block
 85          attacker.wait_for_disconnect(timeout=5)
 86  
 87          # Block at height 101 should *still* be the only block in-flight from
 88          # peer 0
 89          peer_info_after_attack = self.nodes[0].getpeerinfo()
 90          assert_equal(peer_info_after_attack[0]['id'], 0)
 91          assert_equal([101], peer_info_after_attack[0]["inflight"])
 92  
 93          # The honest relayer should be able to complete relaying the block by
 94          # sending the blocktxn that was requested.
 95          block_txn = msg_blocktxn()
 96          block_txn.block_transactions = BlockTransactions(blockhash=block.sha256, transactions=[tx])
 97          honest_relayer.send_and_ping(block_txn)
 98          assert_equal(self.nodes[0].getbestblockhash(), block.hash)
 99  
100          # Check that unexpected-witness mutation check doesn't trigger on a header that doesn't connect to anything
101          assert_equal(len(self.nodes[0].getpeerinfo()), 1)
102          attacker = self.nodes[0].add_p2p_connection(P2PInterface())
103          block_missing_prev = copy.deepcopy(block)
104          block_missing_prev.hashPrevBlock = 123
105          block_missing_prev.solve()
106  
107          # Attacker gets a DoS score of 10, not immediately disconnected, so we do it 10 times to get to 100
108          for _ in range(10):
109              assert_equal(len(self.nodes[0].getpeerinfo()), 2)
110              with self.nodes[0].assert_debug_log(expected_msgs=["AcceptBlock FAILED (prev-blk-not-found)"]):
111                  attacker.send_message(msg_block(block_missing_prev))
112          attacker.wait_for_disconnect(timeout=5)
113  
114  
115  if __name__ == '__main__':
116      MutatedBlocksTest().main()