Skip to content

Commit ce50a48

Browse files
committed
p2p: no longer allow received headers to only connect to a block in requested_blocks
1 parent 0620395 commit ce50a48

File tree

3 files changed

+41
-50
lines changed

3 files changed

+41
-50
lines changed

p2p/src/sync/peer_v1.rs

+15-23
Original file line numberDiff line numberDiff line change
@@ -611,43 +611,35 @@ where
611611
return Err(P2pError::ProtocolError(ProtocolError::DisconnectedHeaders));
612612
}
613613

614-
// The first header must be connected to a known block (it can be in
615-
// the chainstate or requested_blocks).
614+
// The first header must be connected to the chainstate.
616615
let first_header_prev_id = *headers
617616
.first()
618617
// This is OK because of the `headers.is_empty()` check above.
619618
.expect("Headers shouldn't be empty")
620619
.prev_block_id();
621620

622621
// Note: we require a peer to send headers starting from a block that we already have
623-
// in our chainstate or from one that we've already requested from the peer.
624-
// I.e. peers shouldn't track what block headers they've sent us already and use
625-
// the last header (best_sent_block_header) as a starting point for future HeaderList
626-
// updates.
627-
// This restriction is needed to prevent malicious peers from flooding the node with
628-
// headers, potentially exhausting the node's memory.
629-
// The downside of this is that the peer may have to send the same headers multiple times.
630-
// So, to avoid extra traffic, an honest peer should't send header updates when the node
631-
// is already downloading blocks. But still, the node shouldn't punish the peer for
632-
// doing so, because it's possible for it to do so on accident, e.g. a "new tip" event
633-
// may happen on the peer's side after it has sent us the last requested block but
634-
// before we've asked it for more.
622+
// in our chainstate. I.e. we don't allow:
623+
// 1) Basing new headers on a previously sent header, because this would give a malicious
624+
// peer an opportunity to flood the node with headers, potentially exhausting its memory.
625+
// The downside of this restriction is that the peer may have to send the same headers
626+
// multiple times. So, to avoid extra traffic, an honest peer should't send header updates
627+
// when the node is already downloading blocks. (But still, the node shouldn't punish
628+
// the peer for doing so, because it's possible for it to do so by accident, e.g.
629+
// a "new tip" event may happen on the peer's side after it has sent us the last requested
630+
// block but before we've asked it for more.)
631+
// 2) Basing new headers on a block that we've requested from them but that has not yet
632+
// been sent. This is a rather useless optimization (provided that peers don't send
633+
// header updates when we're downloading blocks from them, as mentioned above) that
634+
// would only complicate the logic.
635635

636636
let first_header_is_connected_to_chainstate = self
637637
.chainstate_handle
638638
.call(move |c| Ok(c.get_gen_block_index(&first_header_prev_id)?))
639639
.await?
640640
.is_some();
641641

642-
let first_header_is_connected_to_requested_blocks = first_header_prev_id
643-
.classify(&self.chain_config)
644-
.chain_block_id()
645-
.and_then(|id| self.incoming.requested_blocks.get(&id))
646-
.is_some();
647-
648-
if !(first_header_is_connected_to_chainstate
649-
|| first_header_is_connected_to_requested_blocks)
650-
{
642+
if !first_header_is_connected_to_chainstate {
651643
// Note: legacy nodes will send singular unconnected headers during block announcement,
652644
// so we have to handle this behavior here.
653645
if headers.len() == 1 {

p2p/src/sync/peer_v2.rs

+15-23
Original file line numberDiff line numberDiff line change
@@ -607,43 +607,35 @@ where
607607
let last_header = headers.last().expect("Headers shouldn't be empty");
608608
self.wait_for_clock_diff(last_header.timestamp()).await;
609609

610-
// The first header must be connected to a known block (it can be in
611-
// the chainstate or requested_blocks).
610+
// The first header must be connected to the chainstate.
612611
let first_header_prev_id = *headers
613612
.first()
614613
// This is OK because of the `headers.is_empty()` check above.
615614
.expect("Headers shouldn't be empty")
616615
.prev_block_id();
617616

618617
// Note: we require a peer to send headers starting from a block that we already have
619-
// in our chainstate or from one that we've already requested from the peer.
620-
// I.e. peers shouldn't track what block headers they've sent us already and use
621-
// the last header (best_sent_block_header) as a starting point for future HeaderList
622-
// updates.
623-
// This restriction is needed to prevent malicious peers from flooding the node with
624-
// headers, potentially exhausting the node's memory.
625-
// The downside of this is that the peer may have to send the same headers multiple times.
626-
// So, to avoid extra traffic, an honest peer should't send header updates when the node
627-
// is already downloading blocks. But still, the node shouldn't punish the peer for
628-
// doing so, because it's possible for it to do so on accident, e.g. a "new tip" event
629-
// may happen on the peer's side after it has sent us the last requested block but
630-
// before we've asked it for more.
618+
// in our chainstate. I.e. we don't allow:
619+
// 1) Basing new headers on a previously sent header, because this would give a malicious
620+
// peer an opportunity to flood the node with headers, potentially exhausting its memory.
621+
// The downside of this restriction is that the peer may have to send the same headers
622+
// multiple times. So, to avoid extra traffic, an honest peer should't send header updates
623+
// when the node is already downloading blocks. (But still, the node shouldn't punish
624+
// the peer for doing so, because it's possible for it to do so by accident, e.g.
625+
// a "new tip" event may happen on the peer's side after it has sent us the last requested
626+
// block but before we've asked it for more.)
627+
// 2) Basing new headers on a block that we've requested from them but that has not yet
628+
// been sent. This is a rather useless optimization (provided that peers don't send
629+
// header updates when we're downloading blocks from them, as mentioned above) that
630+
// would only complicate the logic.
631631

632632
let first_header_is_connected_to_chainstate = self
633633
.chainstate_handle
634634
.call(move |c| Ok(c.get_gen_block_index(&first_header_prev_id)?))
635635
.await?
636636
.is_some();
637637

638-
let first_header_is_connected_to_requested_blocks = first_header_prev_id
639-
.classify(&self.chain_config)
640-
.chain_block_id()
641-
.and_then(|id| self.incoming.requested_blocks.get(&id))
642-
.is_some();
643-
644-
if !(first_header_is_connected_to_chainstate
645-
|| first_header_is_connected_to_requested_blocks)
646-
{
638+
if !first_header_is_connected_to_chainstate {
647639
return Err(P2pError::ProtocolError(ProtocolError::DisconnectedHeaders));
648640
}
649641

p2p/src/sync/tests/block_announcement.rs

+11-4
Original file line numberDiff line numberDiff line change
@@ -780,7 +780,9 @@ async fn send_headers_connected_to_previously_sent_headers(#[case] seed: Seed) {
780780

781781
// This is similar to send_headers_connected_to_previously_sent_headers, but here the second
782782
// header list is connected to a block which the node is trying to download. The headers
783-
// should not be considered disconnected in this case.
783+
// should also be considered disconnected in this case.
784+
// Note that this behavior was allowed at some point in V1. But the implementation never used
785+
// this fact when sending headers, so we could disallow it without breaking the compatibility.
784786
#[tracing::instrument(skip(seed))]
785787
#[rstest::rstest]
786788
#[trace]
@@ -860,11 +862,16 @@ async fn send_headers_connected_to_block_which_is_being_downloaded(#[case] seed:
860862
);
861863
node.assert_no_peer_manager_event().await;
862864

863-
// Announce blocks 1, 2, 3 to the node - since block 1 is connected to block 0, which
864-
// the node has already requested, the header list should not be considered disconnected.
865+
// Announce blocks 1, 2, 3 to the node - block 1 is connected to block 0, which
866+
// the node has already requested, but which it hasn't received yet.
865867
log::debug!("Sending headers 1, 2, 3");
866868
peer.send_headers(peers_block_headers[1..4].to_owned()).await;
867-
node.assert_no_peer_manager_event().await;
869+
870+
node.assert_peer_score_adjustment(
871+
peer.get_id(),
872+
P2pError::ProtocolError(ProtocolError::DisconnectedHeaders).ban_score(),
873+
)
874+
.await;
868875

869876
node.assert_no_event().await;
870877
node.join_subsystem_manager().await;

0 commit comments

Comments
 (0)