mirror of
https://github.com/bitcoin/bitcoin.git
synced 2025-03-05 14:06:27 -05:00
net: Remove forcerelay of rejected txs
This commit is contained in:
parent
ab7915f804
commit
facb71576c
4 changed files with 20 additions and 28 deletions
|
@ -450,7 +450,7 @@ void SetupServerArgs()
|
||||||
gArgs.AddArg("-whitebind=<[permissions@]addr>", "Bind to given address and whitelist peers connecting to it. "
|
gArgs.AddArg("-whitebind=<[permissions@]addr>", "Bind to given address and whitelist peers connecting to it. "
|
||||||
"Use [host]:port notation for IPv6. Allowed permissions are bloomfilter (allow requesting BIP37 filtered blocks and transactions), "
|
"Use [host]:port notation for IPv6. Allowed permissions are bloomfilter (allow requesting BIP37 filtered blocks and transactions), "
|
||||||
"noban (do not ban for misbehavior), "
|
"noban (do not ban for misbehavior), "
|
||||||
"forcerelay (relay even non-standard transactions), "
|
"forcerelay (relay transactions that are already in the mempool; implies relay), "
|
||||||
"relay (relay even in -blocksonly mode), "
|
"relay (relay even in -blocksonly mode), "
|
||||||
"and mempool (allow requesting BIP35 mempool contents). "
|
"and mempool (allow requesting BIP35 mempool contents). "
|
||||||
"Specify multiple permissions separated by commas (default: noban,mempool,relay). Can be specified multiple times.", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
|
"Specify multiple permissions separated by commas (default: noban,mempool,relay). Can be specified multiple times.", ArgsManager::ALLOW_ANY, OptionsCategory::CONNECTION);
|
||||||
|
@ -527,7 +527,7 @@ void SetupServerArgs()
|
||||||
gArgs.AddArg("-datacarriersize", strprintf("Maximum size of data in data carrier transactions we relay and mine (default: %u)", MAX_OP_RETURN_RELAY), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
|
gArgs.AddArg("-datacarriersize", strprintf("Maximum size of data in data carrier transactions we relay and mine (default: %u)", MAX_OP_RETURN_RELAY), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
|
||||||
gArgs.AddArg("-minrelaytxfee=<amt>", strprintf("Fees (in %s/kB) smaller than this are considered zero fee for relaying, mining and transaction creation (default: %s)",
|
gArgs.AddArg("-minrelaytxfee=<amt>", strprintf("Fees (in %s/kB) smaller than this are considered zero fee for relaying, mining and transaction creation (default: %s)",
|
||||||
CURRENCY_UNIT, FormatMoney(DEFAULT_MIN_RELAY_TX_FEE)), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
|
CURRENCY_UNIT, FormatMoney(DEFAULT_MIN_RELAY_TX_FEE)), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
|
||||||
gArgs.AddArg("-whitelistforcerelay", strprintf("Add 'forcerelay' permission to whitelisted inbound peers with default permissions. This will relay transactions even if the transactions were already in the mempool or violate local relay policy. (default: %d)", DEFAULT_WHITELISTFORCERELAY), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
|
gArgs.AddArg("-whitelistforcerelay", strprintf("Add 'forcerelay' permission to whitelisted inbound peers with default permissions. This will relay transactions even if the transactions were already in the mempool. (default: %d)", DEFAULT_WHITELISTFORCERELAY), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
|
||||||
gArgs.AddArg("-whitelistrelay", strprintf("Add 'relay' permission to whitelisted inbound peers with default permissions. This will accept relayed transactions even when not relaying transactions (default: %d)", DEFAULT_WHITELISTRELAY), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
|
gArgs.AddArg("-whitelistrelay", strprintf("Add 'relay' permission to whitelisted inbound peers with default permissions. This will accept relayed transactions even when not relaying transactions (default: %d)", DEFAULT_WHITELISTRELAY), ArgsManager::ALLOW_ANY, OptionsCategory::NODE_RELAY);
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -15,7 +15,7 @@ enum NetPermissionFlags
|
||||||
PF_BLOOMFILTER = (1U << 1),
|
PF_BLOOMFILTER = (1U << 1),
|
||||||
// Relay and accept transactions from this peer, even if -blocksonly is true
|
// Relay and accept transactions from this peer, even if -blocksonly is true
|
||||||
PF_RELAY = (1U << 3),
|
PF_RELAY = (1U << 3),
|
||||||
// Always relay transactions from this peer, even if already in mempool or rejected from policy
|
// Always relay transactions from this peer, even if already in mempool
|
||||||
// Keep parameter interaction: forcerelay implies relay
|
// Keep parameter interaction: forcerelay implies relay
|
||||||
PF_FORCERELAY = (1U << 2) | PF_RELAY,
|
PF_FORCERELAY = (1U << 2) | PF_RELAY,
|
||||||
// Can't be banned for misbehavior
|
// Can't be banned for misbehavior
|
||||||
|
|
|
@ -986,15 +986,6 @@ void Misbehaving(NodeId pnode, int howmuch, const std::string& message) EXCLUSIV
|
||||||
LogPrint(BCLog::NET, "%s: %s peer=%d (%d -> %d)%s\n", __func__, state->name, pnode, state->nMisbehavior-howmuch, state->nMisbehavior, message_prefixed);
|
LogPrint(BCLog::NET, "%s: %s peer=%d (%d -> %d)%s\n", __func__, state->name, pnode, state->nMisbehavior-howmuch, state->nMisbehavior, message_prefixed);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns true if the given validation state result may result in a peer
|
|
||||||
* banning/disconnecting us. We use this to determine which unaccepted
|
|
||||||
* transactions from a whitelisted peer that we can safely relay.
|
|
||||||
*/
|
|
||||||
static bool TxRelayMayResultInDisconnect(const TxValidationState& state) {
|
|
||||||
return state.GetResult() == TxValidationResult::TX_CONSENSUS;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Potentially ban a node based on the contents of a BlockValidationState object
|
* Potentially ban a node based on the contents of a BlockValidationState object
|
||||||
*
|
*
|
||||||
|
@ -1064,10 +1055,9 @@ static bool MaybePunishNodeForBlock(NodeId nodeid, const BlockValidationState& s
|
||||||
* Potentially ban a node based on the contents of a TxValidationState object
|
* Potentially ban a node based on the contents of a TxValidationState object
|
||||||
*
|
*
|
||||||
* @return Returns true if the peer was punished (probably disconnected)
|
* @return Returns true if the peer was punished (probably disconnected)
|
||||||
*
|
|
||||||
* Changes here may need to be reflected in TxRelayMayResultInDisconnect().
|
|
||||||
*/
|
*/
|
||||||
static bool MaybePunishNodeForTx(NodeId nodeid, const TxValidationState& state, const std::string& message = "") {
|
static bool MaybePunishNodeForTx(NodeId nodeid, const TxValidationState& state, const std::string& message = "")
|
||||||
|
{
|
||||||
switch (state.GetResult()) {
|
switch (state.GetResult()) {
|
||||||
case TxValidationResult::TX_RESULT_UNSET:
|
case TxValidationResult::TX_RESULT_UNSET:
|
||||||
break;
|
break;
|
||||||
|
@ -1095,11 +1085,6 @@ static bool MaybePunishNodeForTx(NodeId nodeid, const TxValidationState& state,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
//////////////////////////////////////////////////////////////////////////////
|
//////////////////////////////////////////////////////////////////////////////
|
||||||
//
|
//
|
||||||
// blockchain -> download logic notification
|
// blockchain -> download logic notification
|
||||||
|
@ -2615,14 +2600,11 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
||||||
|
|
||||||
if (pfrom->HasPermission(PF_FORCERELAY)) {
|
if (pfrom->HasPermission(PF_FORCERELAY)) {
|
||||||
// Always relay transactions received from whitelisted peers, even
|
// Always relay transactions received from whitelisted peers, even
|
||||||
// if they were already in the mempool or rejected from it due
|
// if they were already in the mempool,
|
||||||
// to policy, allowing the node to function as a gateway for
|
// allowing the node to function as a gateway for
|
||||||
// nodes hidden behind it.
|
// nodes hidden behind it.
|
||||||
//
|
if (!mempool.exists(tx.GetHash())) {
|
||||||
// Never relay transactions that might result in being
|
LogPrintf("Not relaying non-mempool transaction %s from whitelisted peer=%d\n", tx.GetHash().ToString(), pfrom->GetId());
|
||||||
// disconnected (or banned).
|
|
||||||
if (state.IsInvalid() && TxRelayMayResultInDisconnect(state)) {
|
|
||||||
LogPrintf("Not relaying invalid transaction %s from whitelisted peer=%d (%s)\n", tx.GetHash().ToString(), pfrom->GetId(), FormatStateMessage(state));
|
|
||||||
} else {
|
} else {
|
||||||
LogPrintf("Force relaying tx %s from whitelisted peer=%d\n", tx.GetHash().ToString(), pfrom->GetId());
|
LogPrintf("Force relaying tx %s from whitelisted peer=%d\n", tx.GetHash().ToString(), pfrom->GetId());
|
||||||
RelayTransaction(tx.GetHash(), *connman);
|
RelayTransaction(tx.GetHash(), *connman);
|
||||||
|
|
|
@ -132,6 +132,16 @@ class P2PPermissionsTests(BitcoinTestFramework):
|
||||||
p2p_rebroadcast_wallet.send_txs_and_test([tx], self.nodes[1])
|
p2p_rebroadcast_wallet.send_txs_and_test([tx], self.nodes[1])
|
||||||
wait_until(lambda: txid in self.nodes[0].getrawmempool())
|
wait_until(lambda: txid in self.nodes[0].getrawmempool())
|
||||||
|
|
||||||
|
self.log.debug("Check that node[1] will not send an invalid tx to node[0]")
|
||||||
|
tx.vout[0].nValue += 1
|
||||||
|
txid = tx.rehash()
|
||||||
|
p2p_rebroadcast_wallet.send_txs_and_test(
|
||||||
|
[tx],
|
||||||
|
self.nodes[1],
|
||||||
|
success=False,
|
||||||
|
reject_reason='Not relaying non-mempool transaction {} from whitelisted peer=0'.format(txid),
|
||||||
|
)
|
||||||
|
|
||||||
def checkpermission(self, args, expectedPermissions, whitelisted):
|
def checkpermission(self, args, expectedPermissions, whitelisted):
|
||||||
self.restart_node(1, args)
|
self.restart_node(1, args)
|
||||||
connect_nodes(self.nodes[0], 1)
|
connect_nodes(self.nodes[0], 1)
|
||||||
|
|
Loading…
Add table
Reference in a new issue