mirror of
https://github.com/bitcoin/bitcoin.git
synced 2025-02-09 10:43:19 -05:00
Merge bitcoin/bitcoin#26859: fuzz: extend ConsumeNetAddr() to return I2P and CJDNS addresses
b851c5385d
fuzz: extend ConsumeNetAddr() to return I2P and CJDNS addresses (Vasil Dimov) Pull request description: In the process of doing so, refactor `ConsumeNetAddr()` to generate the addresses from IPv4, IPv6, Tor, I2P and CJDNS networks in the same way - by preparing some random stream and deserializing from it. Similar code was already found in `RandAddr()`. ACKs for top commit: achow101: ACKb851c5385d
mzumsande: ACKb851c5385d
brunoerg: utACKb851c5385d
Tree-SHA512: 9905acff0e996f30ddac0c14e5ee9e1db926c7751472c06d6441111304242b563f7c942b162b209d80e8fb65a97249792eef9ae0a96100419565bf7f59f59676
This commit is contained in:
commit
aa9231fafe
6 changed files with 100 additions and 61 deletions
|
@ -261,6 +261,18 @@ public:
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* BIP155 network ids recognized by this software.
|
||||||
|
*/
|
||||||
|
enum BIP155Network : uint8_t {
|
||||||
|
IPV4 = 1,
|
||||||
|
IPV6 = 2,
|
||||||
|
TORV2 = 3,
|
||||||
|
TORV3 = 4,
|
||||||
|
I2P = 5,
|
||||||
|
CJDNS = 6,
|
||||||
|
};
|
||||||
|
|
||||||
friend class CSubNet;
|
friend class CSubNet;
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
@ -282,18 +294,6 @@ private:
|
||||||
*/
|
*/
|
||||||
bool SetI2P(const std::string& addr);
|
bool SetI2P(const std::string& addr);
|
||||||
|
|
||||||
/**
|
|
||||||
* BIP155 network ids recognized by this software.
|
|
||||||
*/
|
|
||||||
enum BIP155Network : uint8_t {
|
|
||||||
IPV4 = 1,
|
|
||||||
IPV6 = 2,
|
|
||||||
TORV2 = 3,
|
|
||||||
TORV3 = 4,
|
|
||||||
I2P = 5,
|
|
||||||
CJDNS = 6,
|
|
||||||
};
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Size of CNetAddr when serialized as ADDRv1 (pre-BIP155) (in bytes).
|
* Size of CNetAddr when serialized as ADDRv1 (pre-BIP155) (in bytes).
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -64,26 +64,13 @@ FUZZ_TARGET(data_stream_addr_man, .init = initialize_addrman)
|
||||||
CNetAddr RandAddr(FuzzedDataProvider& fuzzed_data_provider, FastRandomContext& fast_random_context)
|
CNetAddr RandAddr(FuzzedDataProvider& fuzzed_data_provider, FastRandomContext& fast_random_context)
|
||||||
{
|
{
|
||||||
CNetAddr addr;
|
CNetAddr addr;
|
||||||
if (fuzzed_data_provider.remaining_bytes() > 1 && fuzzed_data_provider.ConsumeBool()) {
|
assert(!addr.IsValid());
|
||||||
addr = ConsumeNetAddr(fuzzed_data_provider);
|
for (size_t i = 0; i < 8 && !addr.IsValid(); ++i) {
|
||||||
} else {
|
if (fuzzed_data_provider.remaining_bytes() > 1 && fuzzed_data_provider.ConsumeBool()) {
|
||||||
// The networks [1..6] correspond to CNetAddr::BIP155Network (private).
|
addr = ConsumeNetAddr(fuzzed_data_provider);
|
||||||
static const std::map<uint8_t, uint8_t> net_len_map = {{1, ADDR_IPV4_SIZE},
|
} else {
|
||||||
{2, ADDR_IPV6_SIZE},
|
addr = ConsumeNetAddr(fuzzed_data_provider, &fast_random_context);
|
||||||
{4, ADDR_TORV3_SIZE},
|
|
||||||
{5, ADDR_I2P_SIZE},
|
|
||||||
{6, ADDR_CJDNS_SIZE}};
|
|
||||||
uint8_t net = fast_random_context.randrange(5) + 1; // [1..5]
|
|
||||||
if (net == 3) {
|
|
||||||
net = 6;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
DataStream s{};
|
|
||||||
|
|
||||||
s << net;
|
|
||||||
s << fast_random_context.randbytes(net_len_map.at(net));
|
|
||||||
|
|
||||||
s >> CAddress::V2_NETWORK(addr);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Return a dummy IPv4 5.5.5.5 if we generated an invalid address.
|
// Return a dummy IPv4 5.5.5.5 if we generated an invalid address.
|
||||||
|
|
|
@ -70,11 +70,13 @@ FUZZ_TARGET(banman, .init = initialize_banman)
|
||||||
fuzzed_data_provider,
|
fuzzed_data_provider,
|
||||||
[&] {
|
[&] {
|
||||||
CNetAddr net_addr{ConsumeNetAddr(fuzzed_data_provider)};
|
CNetAddr net_addr{ConsumeNetAddr(fuzzed_data_provider)};
|
||||||
const std::optional<CNetAddr>& addr{LookupHost(net_addr.ToStringAddr(), /*fAllowLookup=*/false)};
|
if (!net_addr.IsCJDNS() || !net_addr.IsValid()) {
|
||||||
if (addr.has_value() && addr->IsValid()) {
|
const std::optional<CNetAddr>& addr{LookupHost(net_addr.ToStringAddr(), /*fAllowLookup=*/false)};
|
||||||
net_addr = *addr;
|
if (addr.has_value() && addr->IsValid()) {
|
||||||
} else {
|
net_addr = *addr;
|
||||||
contains_invalid = true;
|
} else {
|
||||||
|
contains_invalid = true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
ban_man.Ban(net_addr, ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
|
ban_man.Ban(net_addr, ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
|
||||||
},
|
},
|
||||||
|
|
|
@ -26,6 +26,12 @@ FUZZ_TARGET(netaddress)
|
||||||
if (net_addr.GetNetwork() == Network::NET_ONION) {
|
if (net_addr.GetNetwork() == Network::NET_ONION) {
|
||||||
assert(net_addr.IsTor());
|
assert(net_addr.IsTor());
|
||||||
}
|
}
|
||||||
|
if (net_addr.GetNetwork() == Network::NET_I2P) {
|
||||||
|
assert(net_addr.IsI2P());
|
||||||
|
}
|
||||||
|
if (net_addr.GetNetwork() == Network::NET_CJDNS) {
|
||||||
|
assert(net_addr.IsCJDNS());
|
||||||
|
}
|
||||||
if (net_addr.GetNetwork() == Network::NET_INTERNAL) {
|
if (net_addr.GetNetwork() == Network::NET_INTERNAL) {
|
||||||
assert(net_addr.IsInternal());
|
assert(net_addr.IsInternal());
|
||||||
}
|
}
|
||||||
|
@ -69,6 +75,12 @@ FUZZ_TARGET(netaddress)
|
||||||
if (net_addr.IsTor()) {
|
if (net_addr.IsTor()) {
|
||||||
assert(net_addr.GetNetwork() == Network::NET_ONION);
|
assert(net_addr.GetNetwork() == Network::NET_ONION);
|
||||||
}
|
}
|
||||||
|
if (net_addr.IsI2P()) {
|
||||||
|
assert(net_addr.GetNetwork() == Network::NET_I2P);
|
||||||
|
}
|
||||||
|
if (net_addr.IsCJDNS()) {
|
||||||
|
assert(net_addr.GetNetwork() == Network::NET_CJDNS);
|
||||||
|
}
|
||||||
(void)net_addr.IsValid();
|
(void)net_addr.IsValid();
|
||||||
(void)net_addr.ToStringAddr();
|
(void)net_addr.ToStringAddr();
|
||||||
|
|
||||||
|
|
|
@ -25,33 +25,63 @@
|
||||||
|
|
||||||
class CNode;
|
class CNode;
|
||||||
|
|
||||||
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider, FastRandomContext* rand) noexcept
|
||||||
{
|
{
|
||||||
const Network network = fuzzed_data_provider.PickValueInArray({Network::NET_IPV4, Network::NET_IPV6, Network::NET_INTERNAL, Network::NET_ONION});
|
struct NetAux {
|
||||||
CNetAddr net_addr;
|
Network net;
|
||||||
if (network == Network::NET_IPV4) {
|
CNetAddr::BIP155Network bip155;
|
||||||
in_addr v4_addr = {};
|
size_t len;
|
||||||
v4_addr.s_addr = fuzzed_data_provider.ConsumeIntegral<uint32_t>();
|
};
|
||||||
net_addr = CNetAddr{v4_addr};
|
|
||||||
} else if (network == Network::NET_IPV6) {
|
static constexpr std::array<NetAux, 6> nets{
|
||||||
if (fuzzed_data_provider.remaining_bytes() >= 16) {
|
NetAux{.net = Network::NET_IPV4, .bip155 = CNetAddr::BIP155Network::IPV4, .len = ADDR_IPV4_SIZE},
|
||||||
in6_addr v6_addr = {};
|
NetAux{.net = Network::NET_IPV6, .bip155 = CNetAddr::BIP155Network::IPV6, .len = ADDR_IPV6_SIZE},
|
||||||
auto addr_bytes = fuzzed_data_provider.ConsumeBytes<uint8_t>(16);
|
NetAux{.net = Network::NET_ONION, .bip155 = CNetAddr::BIP155Network::TORV3, .len = ADDR_TORV3_SIZE},
|
||||||
if (addr_bytes[0] == CJDNS_PREFIX) { // Avoid generating IPv6 addresses that look like CJDNS.
|
NetAux{.net = Network::NET_I2P, .bip155 = CNetAddr::BIP155Network::I2P, .len = ADDR_I2P_SIZE},
|
||||||
addr_bytes[0] = 0x55; // Just an arbitrary number, anything != CJDNS_PREFIX would do.
|
NetAux{.net = Network::NET_CJDNS, .bip155 = CNetAddr::BIP155Network::CJDNS, .len = ADDR_CJDNS_SIZE},
|
||||||
}
|
NetAux{.net = Network::NET_INTERNAL, .bip155 = CNetAddr::BIP155Network{0}, .len = 0},
|
||||||
memcpy(v6_addr.s6_addr, addr_bytes.data(), 16);
|
};
|
||||||
net_addr = CNetAddr{v6_addr, fuzzed_data_provider.ConsumeIntegral<uint32_t>()};
|
|
||||||
|
const size_t nets_index{rand == nullptr
|
||||||
|
? fuzzed_data_provider.ConsumeIntegralInRange<size_t>(0, nets.size() - 1)
|
||||||
|
: static_cast<size_t>(rand->randrange(nets.size()))};
|
||||||
|
|
||||||
|
const auto& aux = nets[nets_index];
|
||||||
|
|
||||||
|
CNetAddr addr;
|
||||||
|
|
||||||
|
if (aux.net == Network::NET_INTERNAL) {
|
||||||
|
if (rand == nullptr) {
|
||||||
|
addr.SetInternal(fuzzed_data_provider.ConsumeBytesAsString(32));
|
||||||
|
} else {
|
||||||
|
const auto v = rand->randbytes(32);
|
||||||
|
addr.SetInternal(std::string{v.begin(), v.end()});
|
||||||
}
|
}
|
||||||
} else if (network == Network::NET_INTERNAL) {
|
return addr;
|
||||||
net_addr.SetInternal(fuzzed_data_provider.ConsumeBytesAsString(32));
|
|
||||||
} else if (network == Network::NET_ONION) {
|
|
||||||
auto pub_key{fuzzed_data_provider.ConsumeBytes<uint8_t>(ADDR_TORV3_SIZE)};
|
|
||||||
pub_key.resize(ADDR_TORV3_SIZE);
|
|
||||||
const bool ok{net_addr.SetSpecial(OnionToString(pub_key))};
|
|
||||||
assert(ok);
|
|
||||||
}
|
}
|
||||||
return net_addr;
|
|
||||||
|
DataStream s;
|
||||||
|
|
||||||
|
s << static_cast<uint8_t>(aux.bip155);
|
||||||
|
|
||||||
|
std::vector<uint8_t> addr_bytes;
|
||||||
|
if (rand == nullptr) {
|
||||||
|
addr_bytes = fuzzed_data_provider.ConsumeBytes<uint8_t>(aux.len);
|
||||||
|
addr_bytes.resize(aux.len);
|
||||||
|
} else {
|
||||||
|
addr_bytes = rand->randbytes(aux.len);
|
||||||
|
}
|
||||||
|
if (aux.net == NET_IPV6 && addr_bytes[0] == CJDNS_PREFIX) { // Avoid generating IPv6 addresses that look like CJDNS.
|
||||||
|
addr_bytes[0] = 0x55; // Just an arbitrary number, anything != CJDNS_PREFIX would do.
|
||||||
|
}
|
||||||
|
if (aux.net == NET_CJDNS) { // Avoid generating CJDNS addresses that don't start with CJDNS_PREFIX because those are !IsValid().
|
||||||
|
addr_bytes[0] = CJDNS_PREFIX;
|
||||||
|
}
|
||||||
|
s << addr_bytes;
|
||||||
|
|
||||||
|
s >> CAddress::V2_NETWORK(addr);
|
||||||
|
|
||||||
|
return addr;
|
||||||
}
|
}
|
||||||
|
|
||||||
CAddress ConsumeAddress(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
CAddress ConsumeAddress(FuzzedDataProvider& fuzzed_data_provider) noexcept
|
||||||
|
|
|
@ -24,7 +24,15 @@
|
||||||
#include <optional>
|
#include <optional>
|
||||||
#include <string>
|
#include <string>
|
||||||
|
|
||||||
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider) noexcept;
|
/**
|
||||||
|
* Create a CNetAddr. It may have `addr.IsValid() == false`.
|
||||||
|
* @param[in,out] fuzzed_data_provider Take data for the address from this, if `rand` is `nullptr`.
|
||||||
|
* @param[in,out] rand If not nullptr, take data from it instead of from `fuzzed_data_provider`.
|
||||||
|
* Prefer generating addresses using `fuzzed_data_provider` because it is not uniform. Only use
|
||||||
|
* `rand` if `fuzzed_data_provider` is exhausted or its data is needed for other things.
|
||||||
|
* @return a "random" network address.
|
||||||
|
*/
|
||||||
|
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider, FastRandomContext* rand = nullptr) noexcept;
|
||||||
|
|
||||||
class FuzzedSock : public Sock
|
class FuzzedSock : public Sock
|
||||||
{
|
{
|
||||||
|
|
Loading…
Add table
Reference in a new issue