2020-04-14 19:55:58 +00:00
|
|
|
package pubsub
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"math/rand"
|
2020-04-14 23:07:22 +00:00
|
|
|
"strconv"
|
2020-04-20 10:03:17 +00:00
|
|
|
"sync"
|
2020-04-14 19:55:58 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
ggio "github.com/gogo/protobuf/io"
|
|
|
|
logging "github.com/ipfs/go-log"
|
|
|
|
"github.com/libp2p/go-libp2p-core/host"
|
|
|
|
"github.com/libp2p/go-libp2p-core/network"
|
2020-04-14 23:07:22 +00:00
|
|
|
"github.com/libp2p/go-libp2p-core/peer"
|
2020-04-14 19:55:58 +00:00
|
|
|
"github.com/libp2p/go-libp2p-core/protocol"
|
|
|
|
pb "github.com/libp2p/go-libp2p-pubsub/pb"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Test that when Gossipsub receives too many IWANT messages from a peer
|
|
|
|
// for the same message ID, it cuts off the peer
|
|
|
|
func TestGossipsubAttackSpamIWANT(t *testing.T) {
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Create legitimate and attacker hosts
|
|
|
|
hosts := getNetHosts(t, ctx, 2)
|
|
|
|
legit := hosts[0]
|
|
|
|
attacker := hosts[1]
|
|
|
|
|
|
|
|
// Set up gossipsub on the legit host
|
|
|
|
ps, err := NewGossipSub(ctx, legit)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Subscribe to mytopic on the legit host
|
|
|
|
mytopic := "mytopic"
|
|
|
|
_, err = ps.Subscribe(mytopic)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Used to publish a message with random data
|
|
|
|
publishMsg := func() {
|
|
|
|
data := make([]byte, 16)
|
|
|
|
rand.Read(data)
|
|
|
|
|
|
|
|
if err = ps.Publish(mytopic, data); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-22 15:53:31 +00:00
|
|
|
// Wait a bit after the last message before checking we got the
|
2020-04-14 19:55:58 +00:00
|
|
|
// right number of messages
|
2020-04-22 15:53:31 +00:00
|
|
|
msgWaitMax := time.Second
|
2020-04-14 19:55:58 +00:00
|
|
|
msgCount := 0
|
|
|
|
msgTimer := time.NewTimer(msgWaitMax)
|
|
|
|
|
|
|
|
// Checks we received the right number of messages
|
|
|
|
checkMsgCount := func() {
|
|
|
|
// After the original message from the legit host, we keep sending
|
|
|
|
// IWANT until it stops replying. So the number of messages is
|
|
|
|
// <original message> + GossipSubGossipRetransmission
|
|
|
|
exp := 1 + GossipSubGossipRetransmission
|
|
|
|
if msgCount != exp {
|
|
|
|
t.Fatalf("Expected %d messages, got %d", exp, msgCount)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for the timer to expire
|
|
|
|
go func() {
|
|
|
|
select {
|
|
|
|
case <-msgTimer.C:
|
|
|
|
checkMsgCount()
|
|
|
|
cancel()
|
|
|
|
return
|
|
|
|
case <-ctx.Done():
|
|
|
|
checkMsgCount()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
newMockGS(ctx, t, attacker, func(writeMsg func(*pb.RPC), irpc *pb.RPC) {
|
|
|
|
// When the legit host connects it will send us its subscriptions
|
|
|
|
for _, sub := range irpc.GetSubscriptions() {
|
|
|
|
if sub.GetSubscribe() {
|
|
|
|
// Reply by subcribing to the topic and grafting to the peer
|
|
|
|
writeMsg(&pb.RPC{
|
2020-04-14 23:07:22 +00:00
|
|
|
Subscriptions: []*pb.RPC_SubOpts{&pb.RPC_SubOpts{Subscribe: sub.Subscribe, Topicid: sub.Topicid}},
|
|
|
|
Control: &pb.ControlMessage{Graft: []*pb.ControlGraft{&pb.ControlGraft{TopicID: sub.Topicid}}},
|
2020-04-14 19:55:58 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
// Wait for a short interval to make sure the legit host
|
|
|
|
// received and processed the subscribe + graft
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
|
|
|
|
// Publish a message from the legit host
|
|
|
|
publishMsg()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Each time the legit host sends a message
|
|
|
|
for _, msg := range irpc.GetPublish() {
|
|
|
|
// Increment the number of messages and reset the timer
|
|
|
|
msgCount++
|
|
|
|
msgTimer.Reset(msgWaitMax)
|
|
|
|
|
|
|
|
// Shouldn't get more than the expected number of messages
|
|
|
|
exp := 1 + GossipSubGossipRetransmission
|
|
|
|
if msgCount > exp {
|
|
|
|
cancel()
|
|
|
|
t.Fatal("Received too many responses")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send an IWANT with the message ID, causing the legit host
|
|
|
|
// to send another message (until it cuts off the attacker for
|
|
|
|
// being spammy)
|
|
|
|
iwantlst := []string{DefaultMsgIdFn(msg)}
|
|
|
|
iwant := []*pb.ControlIWant{&pb.ControlIWant{MessageIDs: iwantlst}}
|
|
|
|
orpc := rpcWithControl(nil, nil, iwant, nil, nil)
|
|
|
|
writeMsg(&orpc.RPC)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
connect(t, hosts[0], hosts[1])
|
|
|
|
|
|
|
|
<-ctx.Done()
|
|
|
|
}
|
|
|
|
|
2020-04-15 15:21:23 +00:00
|
|
|
// Test that Gossipsub only responds to IHAVE with IWANT once per heartbeat
|
|
|
|
func TestGossipsubAttackSpamIHAVE(t *testing.T) {
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Create legitimate and attacker hosts
|
|
|
|
hosts := getNetHosts(t, ctx, 2)
|
|
|
|
legit := hosts[0]
|
|
|
|
attacker := hosts[1]
|
|
|
|
|
|
|
|
// Set up gossipsub on the legit host
|
2020-05-08 07:26:52 +00:00
|
|
|
ps, err := NewGossipSub(ctx, legit,
|
|
|
|
WithPeerScore(
|
|
|
|
&PeerScoreParams{
|
|
|
|
AppSpecificScore: func(peer.ID) float64 { return 0 },
|
|
|
|
BehaviourPenaltyWeight: -1,
|
|
|
|
BehaviourPenaltyDecay: ScoreParameterDecay(time.Minute),
|
|
|
|
DecayInterval: DefaultDecayInterval,
|
|
|
|
DecayToZero: DefaultDecayToZero,
|
|
|
|
},
|
|
|
|
&PeerScoreThresholds{
|
|
|
|
GossipThreshold: -100,
|
|
|
|
PublishThreshold: -500,
|
|
|
|
GraylistThreshold: -1000,
|
|
|
|
}))
|
2020-04-15 15:21:23 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Subscribe to mytopic on the legit host
|
|
|
|
mytopic := "mytopic"
|
|
|
|
_, err = ps.Subscribe(mytopic)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
iWantCount := 0
|
2020-04-20 10:03:17 +00:00
|
|
|
iWantCountMx := sync.Mutex{}
|
|
|
|
getIWantCount := func() int {
|
|
|
|
iWantCountMx.Lock()
|
|
|
|
defer iWantCountMx.Unlock()
|
|
|
|
return iWantCount
|
|
|
|
}
|
|
|
|
addIWantCount := func(i int) {
|
|
|
|
iWantCountMx.Lock()
|
|
|
|
defer iWantCountMx.Unlock()
|
|
|
|
iWantCount += i
|
|
|
|
}
|
|
|
|
|
2020-04-15 15:21:23 +00:00
|
|
|
newMockGS(ctx, t, attacker, func(writeMsg func(*pb.RPC), irpc *pb.RPC) {
|
|
|
|
// When the legit host connects it will send us its subscriptions
|
|
|
|
for _, sub := range irpc.GetSubscriptions() {
|
|
|
|
if sub.GetSubscribe() {
|
|
|
|
// Reply by subcribing to the topic and grafting to the peer
|
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Subscriptions: []*pb.RPC_SubOpts{&pb.RPC_SubOpts{Subscribe: sub.Subscribe, Topicid: sub.Topicid}},
|
|
|
|
Control: &pb.ControlMessage{Graft: []*pb.ControlGraft{&pb.ControlGraft{TopicID: sub.Topicid}}},
|
|
|
|
})
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Wait for a short interval to make sure the legit host
|
|
|
|
// received and processed the subscribe + graft
|
|
|
|
time.Sleep(20 * time.Millisecond)
|
|
|
|
|
|
|
|
// Send a bunch of IHAVEs
|
2020-04-20 10:03:17 +00:00
|
|
|
for i := 0; i < 3*GossipSubMaxIHaveLength; i++ {
|
2020-04-15 15:21:23 +00:00
|
|
|
ihavelst := []string{"someid" + strconv.Itoa(i)}
|
|
|
|
ihave := []*pb.ControlIHave{&pb.ControlIHave{TopicID: sub.Topicid, MessageIDs: ihavelst}}
|
|
|
|
orpc := rpcWithControl(nil, ihave, nil, nil, nil)
|
|
|
|
writeMsg(&orpc.RPC)
|
|
|
|
}
|
|
|
|
|
2020-04-20 10:03:17 +00:00
|
|
|
time.Sleep(GossipSubHeartbeatInterval)
|
2020-04-15 15:21:23 +00:00
|
|
|
|
|
|
|
// Should have hit the maximum number of IWANTs per peer
|
|
|
|
// per heartbeat
|
2020-04-20 10:03:17 +00:00
|
|
|
iwc := getIWantCount()
|
|
|
|
if iwc > GossipSubMaxIHaveLength {
|
|
|
|
t.Fatalf("Expecting max %d IWANTs per heartbeat but received %d", GossipSubMaxIHaveLength, iwc)
|
2020-04-15 15:21:23 +00:00
|
|
|
}
|
2020-04-20 10:03:17 +00:00
|
|
|
firstBatchCount := iwc
|
2020-04-15 15:21:23 +00:00
|
|
|
|
2020-05-08 07:26:52 +00:00
|
|
|
// the score should still be 0 because we haven't broken any promises yet
|
|
|
|
score := ps.rt.(*GossipSubRouter).score.Score(attacker.ID())
|
|
|
|
if score != 0 {
|
|
|
|
t.Fatalf("Expected 0 score, but got %f", score)
|
|
|
|
}
|
|
|
|
|
2020-04-15 15:21:23 +00:00
|
|
|
// Wait for a hearbeat
|
2020-04-20 09:35:07 +00:00
|
|
|
time.Sleep(GossipSubHeartbeatInterval)
|
2020-04-15 15:21:23 +00:00
|
|
|
|
|
|
|
// Send a bunch of IHAVEs
|
2020-04-20 10:03:17 +00:00
|
|
|
for i := 0; i < 3*GossipSubMaxIHaveLength; i++ {
|
2020-04-15 15:21:23 +00:00
|
|
|
ihavelst := []string{"someid" + strconv.Itoa(i+100)}
|
|
|
|
ihave := []*pb.ControlIHave{&pb.ControlIHave{TopicID: sub.Topicid, MessageIDs: ihavelst}}
|
|
|
|
orpc := rpcWithControl(nil, ihave, nil, nil, nil)
|
|
|
|
writeMsg(&orpc.RPC)
|
|
|
|
}
|
|
|
|
|
2020-04-20 10:03:17 +00:00
|
|
|
time.Sleep(GossipSubHeartbeatInterval)
|
2020-04-15 15:21:23 +00:00
|
|
|
|
|
|
|
// Should have sent more IWANTs after the heartbeat
|
2020-04-20 10:03:17 +00:00
|
|
|
iwc = getIWantCount()
|
2020-04-20 12:02:58 +00:00
|
|
|
if iwc == firstBatchCount {
|
2020-04-15 15:21:23 +00:00
|
|
|
t.Fatal("Expecting to receive more IWANTs after heartbeat but did not")
|
|
|
|
}
|
|
|
|
// Should not be more than the maximum per heartbeat
|
2020-04-20 12:02:58 +00:00
|
|
|
if iwc-firstBatchCount > GossipSubMaxIHaveLength {
|
2020-04-20 10:03:17 +00:00
|
|
|
t.Fatalf("Expecting max %d IWANTs per heartbeat but received %d", GossipSubMaxIHaveLength, iwc-firstBatchCount)
|
2020-04-15 15:21:23 +00:00
|
|
|
}
|
2020-05-08 07:26:52 +00:00
|
|
|
|
|
|
|
// The score should now be negative because of broken promises
|
|
|
|
score = ps.rt.(*GossipSubRouter).score.Score(attacker.ID())
|
|
|
|
if score >= 0 {
|
|
|
|
t.Fatalf("Expected negative score, but got %f", score)
|
|
|
|
}
|
2020-04-15 15:21:23 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Record the count of received IWANT messages
|
|
|
|
if ctl := irpc.GetControl(); ctl != nil {
|
2020-04-20 10:03:17 +00:00
|
|
|
addIWantCount(len(ctl.GetIwant()))
|
2020-04-15 15:21:23 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
connect(t, hosts[0], hosts[1])
|
|
|
|
|
|
|
|
<-ctx.Done()
|
|
|
|
}
|
|
|
|
|
2020-04-14 19:55:58 +00:00
|
|
|
// Test that when Gossipsub receives GRAFT for an unknown topic, it ignores
|
|
|
|
// the request
|
|
|
|
func TestGossipsubAttackGRAFTNonExistentTopic(t *testing.T) {
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Create legitimate and attacker hosts
|
|
|
|
hosts := getNetHosts(t, ctx, 2)
|
|
|
|
legit := hosts[0]
|
|
|
|
attacker := hosts[1]
|
|
|
|
|
|
|
|
// Set up gossipsub on the legit host
|
|
|
|
ps, err := NewGossipSub(ctx, legit)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Subscribe to mytopic on the legit host
|
|
|
|
mytopic := "mytopic"
|
|
|
|
_, err = ps.Subscribe(mytopic)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Checks that we haven't received any PRUNE message
|
|
|
|
pruneCount := 0
|
|
|
|
checkForPrune := func() {
|
|
|
|
// We send a GRAFT for a non-existent topic so we shouldn't
|
|
|
|
// receive a PRUNE in response
|
|
|
|
if pruneCount != 0 {
|
|
|
|
t.Fatalf("Got %d unexpected PRUNE messages", pruneCount)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
newMockGS(ctx, t, attacker, func(writeMsg func(*pb.RPC), irpc *pb.RPC) {
|
|
|
|
// When the legit host connects it will send us its subscriptions
|
|
|
|
for _, sub := range irpc.GetSubscriptions() {
|
|
|
|
if sub.GetSubscribe() {
|
|
|
|
// Reply by subcribing to the topic and grafting to the peer
|
2020-04-14 23:07:22 +00:00
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Subscriptions: []*pb.RPC_SubOpts{&pb.RPC_SubOpts{Subscribe: sub.Subscribe, Topicid: sub.Topicid}},
|
|
|
|
Control: &pb.ControlMessage{Graft: []*pb.ControlGraft{&pb.ControlGraft{TopicID: sub.Topicid}}},
|
|
|
|
})
|
2020-04-14 19:55:58 +00:00
|
|
|
|
|
|
|
// Graft to the peer on a non-existent topic
|
|
|
|
nonExistentTopic := "non-existent"
|
|
|
|
writeMsg(&pb.RPC{
|
2020-04-14 23:07:22 +00:00
|
|
|
Control: &pb.ControlMessage{Graft: []*pb.ControlGraft{&pb.ControlGraft{TopicID: &nonExistentTopic}}},
|
2020-04-14 19:55:58 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
// Wait for a short interval to make sure the legit host
|
|
|
|
// received and processed the subscribe + graft
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
|
|
|
|
// We shouldn't get any prune messages becaue the topic
|
|
|
|
// doesn't exist
|
|
|
|
checkForPrune()
|
|
|
|
cancel()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Record the count of received PRUNE messages
|
|
|
|
if ctl := irpc.GetControl(); ctl != nil {
|
|
|
|
pruneCount += len(ctl.GetPrune())
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
connect(t, hosts[0], hosts[1])
|
|
|
|
|
|
|
|
<-ctx.Done()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that when Gossipsub receives GRAFT for a peer that has been PRUNED,
|
2020-05-06 17:26:20 +00:00
|
|
|
// it penalizes through P7 and eventually graylists and ignores the requests if the
|
|
|
|
// GRAFTs are coming too fast
|
2020-04-14 19:55:58 +00:00
|
|
|
func TestGossipsubAttackGRAFTDuringBackoff(t *testing.T) {
|
|
|
|
originalGossipSubPruneBackoff := GossipSubPruneBackoff
|
2020-04-20 09:46:20 +00:00
|
|
|
GossipSubPruneBackoff = 200 * time.Millisecond
|
|
|
|
originalGossipSubGraftFloodThreshold := GossipSubGraftFloodThreshold
|
|
|
|
GossipSubGraftFloodThreshold = 100 * time.Millisecond
|
2020-04-14 19:55:58 +00:00
|
|
|
defer func() {
|
|
|
|
GossipSubPruneBackoff = originalGossipSubPruneBackoff
|
2020-04-20 09:46:20 +00:00
|
|
|
GossipSubGraftFloodThreshold = originalGossipSubGraftFloodThreshold
|
2020-04-14 19:55:58 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Create legitimate and attacker hosts
|
|
|
|
hosts := getNetHosts(t, ctx, 2)
|
|
|
|
legit := hosts[0]
|
|
|
|
attacker := hosts[1]
|
|
|
|
|
|
|
|
// Set up gossipsub on the legit host
|
2020-05-06 17:26:20 +00:00
|
|
|
ps, err := NewGossipSub(ctx, legit,
|
|
|
|
WithPeerScore(
|
|
|
|
&PeerScoreParams{
|
|
|
|
AppSpecificScore: func(peer.ID) float64 { return 0 },
|
|
|
|
BehaviourPenaltyWeight: -100,
|
|
|
|
BehaviourPenaltyDecay: ScoreParameterDecay(time.Minute),
|
|
|
|
DecayInterval: DefaultDecayInterval,
|
|
|
|
DecayToZero: DefaultDecayToZero,
|
|
|
|
},
|
|
|
|
&PeerScoreThresholds{
|
|
|
|
GossipThreshold: -100,
|
|
|
|
PublishThreshold: -500,
|
|
|
|
GraylistThreshold: -1000,
|
|
|
|
}))
|
2020-04-14 19:55:58 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Subscribe to mytopic on the legit host
|
|
|
|
mytopic := "mytopic"
|
|
|
|
_, err = ps.Subscribe(mytopic)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
pruneCount := 0
|
2020-04-20 10:03:17 +00:00
|
|
|
pruneCountMx := sync.Mutex{}
|
|
|
|
getPruneCount := func() int {
|
|
|
|
pruneCountMx.Lock()
|
|
|
|
defer pruneCountMx.Unlock()
|
|
|
|
return pruneCount
|
|
|
|
}
|
|
|
|
addPruneCount := func(i int) {
|
|
|
|
pruneCountMx.Lock()
|
|
|
|
defer pruneCountMx.Unlock()
|
|
|
|
pruneCount += i
|
|
|
|
}
|
2020-04-14 19:55:58 +00:00
|
|
|
|
|
|
|
newMockGS(ctx, t, attacker, func(writeMsg func(*pb.RPC), irpc *pb.RPC) {
|
|
|
|
// When the legit host connects it will send us its subscriptions
|
|
|
|
for _, sub := range irpc.GetSubscriptions() {
|
|
|
|
if sub.GetSubscribe() {
|
|
|
|
// Reply by subcribing to the topic and grafting to the peer
|
2020-04-14 23:07:22 +00:00
|
|
|
graft := []*pb.ControlGraft{&pb.ControlGraft{TopicID: sub.Topicid}}
|
2020-04-14 19:55:58 +00:00
|
|
|
writeMsg(&pb.RPC{
|
2020-04-14 23:07:22 +00:00
|
|
|
Subscriptions: []*pb.RPC_SubOpts{&pb.RPC_SubOpts{Subscribe: sub.Subscribe, Topicid: sub.Topicid}},
|
2020-04-14 19:55:58 +00:00
|
|
|
Control: &pb.ControlMessage{Graft: graft},
|
|
|
|
})
|
|
|
|
|
|
|
|
go func() {
|
2020-04-20 09:46:20 +00:00
|
|
|
defer cancel()
|
|
|
|
|
2020-04-14 19:55:58 +00:00
|
|
|
// Wait for a short interval to make sure the legit host
|
|
|
|
// received and processed the subscribe + graft
|
|
|
|
time.Sleep(20 * time.Millisecond)
|
|
|
|
|
|
|
|
// No PRUNE should have been sent at this stage
|
2020-04-20 10:03:17 +00:00
|
|
|
pc := getPruneCount()
|
|
|
|
if pc != 0 {
|
|
|
|
t.Fatalf("Expected %d PRUNE messages but got %d", 0, pc)
|
2020-04-20 09:46:20 +00:00
|
|
|
}
|
2020-04-14 19:55:58 +00:00
|
|
|
|
|
|
|
// Send a PRUNE to remove the attacker node from the legit
|
|
|
|
// host's mesh
|
|
|
|
var prune []*pb.ControlPrune
|
|
|
|
prune = append(prune, &pb.ControlPrune{TopicID: sub.Topicid})
|
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Control: &pb.ControlMessage{Prune: prune},
|
|
|
|
})
|
|
|
|
|
|
|
|
time.Sleep(20 * time.Millisecond)
|
|
|
|
|
|
|
|
// No PRUNE should have been sent at this stage
|
2020-04-20 10:03:17 +00:00
|
|
|
pc = getPruneCount()
|
|
|
|
if pc != 0 {
|
|
|
|
t.Fatalf("Expected %d PRUNE messages but got %d", 0, pc)
|
2020-04-20 09:46:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// wait for the GossipSubGraftFloodThreshold to pass before attempting another graft
|
2020-05-06 17:26:20 +00:00
|
|
|
time.Sleep(GossipSubGraftFloodThreshold + time.Millisecond)
|
2020-04-14 19:55:58 +00:00
|
|
|
|
|
|
|
// Send a GRAFT to attempt to rejoin the mesh
|
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Control: &pb.ControlMessage{Graft: graft},
|
|
|
|
})
|
|
|
|
|
|
|
|
time.Sleep(20 * time.Millisecond)
|
|
|
|
|
2020-05-06 17:26:20 +00:00
|
|
|
// We should have been peanalized by the peer for sending before the backoff has expired
|
|
|
|
// but should still receive a PRUNE because we haven't dropped below GraylistThreshold
|
|
|
|
// yet.
|
2020-04-20 10:03:17 +00:00
|
|
|
pc = getPruneCount()
|
|
|
|
if pc != 1 {
|
|
|
|
t.Fatalf("Expected %d PRUNE messages but got %d", 1, pc)
|
2020-04-20 09:46:20 +00:00
|
|
|
}
|
2020-04-14 19:55:58 +00:00
|
|
|
|
2020-05-06 17:26:20 +00:00
|
|
|
score1 := ps.rt.(*GossipSubRouter).score.Score(attacker.ID())
|
|
|
|
if score1 >= 0 {
|
|
|
|
t.Fatalf("Expected negative score, but got %f", score1)
|
|
|
|
}
|
2020-04-14 19:55:58 +00:00
|
|
|
|
|
|
|
// Send a GRAFT again to attempt to rejoin the mesh
|
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Control: &pb.ControlMessage{Graft: graft},
|
|
|
|
})
|
|
|
|
|
|
|
|
time.Sleep(20 * time.Millisecond)
|
|
|
|
|
2020-05-06 17:26:20 +00:00
|
|
|
// we are before the flood threshold so we should be penalized twice, but still get
|
|
|
|
// a PRUNE because we are before the flood threshold
|
2020-04-20 10:03:17 +00:00
|
|
|
pc = getPruneCount()
|
2020-05-06 17:26:20 +00:00
|
|
|
if pc != 2 {
|
|
|
|
t.Fatalf("Expected %d PRUNE messages but got %d", 2, pc)
|
|
|
|
}
|
|
|
|
|
|
|
|
score2 := ps.rt.(*GossipSubRouter).score.Score(attacker.ID())
|
|
|
|
if score2 >= score1 {
|
|
|
|
t.Fatalf("Expected score below %f, but got %f", score1, score2)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send another GRAFT; this should get us a PRUNE, but penalize us below the graylist threshold
|
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Control: &pb.ControlMessage{Graft: graft},
|
|
|
|
})
|
|
|
|
|
|
|
|
time.Sleep(20 * time.Millisecond)
|
|
|
|
|
|
|
|
pc = getPruneCount()
|
|
|
|
if pc != 3 {
|
|
|
|
t.Fatalf("Expected %d PRUNE messages but got %d", 3, pc)
|
|
|
|
}
|
|
|
|
|
|
|
|
score3 := ps.rt.(*GossipSubRouter).score.Score(attacker.ID())
|
|
|
|
if score3 >= score2 {
|
|
|
|
t.Fatalf("Expected score below %f, but got %f", score2, score3)
|
|
|
|
}
|
|
|
|
if score3 >= -1000 {
|
|
|
|
t.Fatalf("Expected score below %f, but got %f", -1000.0, score3)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for the PRUNE backoff to expire and try again; this time we should fail
|
|
|
|
// because we are below the graylist threshold, so our RPC should be ignored and
|
|
|
|
// we should get no PRUNE back
|
|
|
|
time.Sleep(GossipSubPruneBackoff + time.Millisecond)
|
|
|
|
|
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Control: &pb.ControlMessage{Graft: graft},
|
|
|
|
})
|
|
|
|
|
|
|
|
time.Sleep(20 * time.Millisecond)
|
|
|
|
|
|
|
|
pc = getPruneCount()
|
|
|
|
if pc != 3 {
|
|
|
|
t.Fatalf("Expected %d PRUNE messages but got %d", 3, pc)
|
2020-04-20 09:46:20 +00:00
|
|
|
}
|
2020-04-20 13:03:44 +00:00
|
|
|
|
2020-05-06 17:26:20 +00:00
|
|
|
// make sure we are _not_ in the mesh
|
2020-04-20 13:03:44 +00:00
|
|
|
res := make(chan bool)
|
|
|
|
ps.eval <- func() {
|
|
|
|
mesh := ps.rt.(*GossipSubRouter).mesh[mytopic]
|
|
|
|
_, inMesh := mesh[attacker.ID()]
|
|
|
|
res <- inMesh
|
|
|
|
}
|
|
|
|
|
|
|
|
inMesh := <-res
|
2020-05-06 17:26:20 +00:00
|
|
|
if inMesh {
|
|
|
|
t.Fatal("Expected to not be in the mesh of the legitimate host")
|
2020-04-20 13:03:44 +00:00
|
|
|
}
|
2020-04-14 19:55:58 +00:00
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ctl := irpc.GetControl(); ctl != nil {
|
2020-04-20 10:03:17 +00:00
|
|
|
addPruneCount(len(ctl.GetPrune()))
|
2020-04-14 19:55:58 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
connect(t, hosts[0], hosts[1])
|
|
|
|
|
|
|
|
<-ctx.Done()
|
|
|
|
}
|
|
|
|
|
2020-04-14 23:07:22 +00:00
|
|
|
type gsAttackInvalidMsgTracer struct {
|
|
|
|
rejectCount int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *gsAttackInvalidMsgTracer) Trace(evt *pb.TraceEvent) {
|
|
|
|
// fmt.Printf(" %s %s\n", evt.Type, evt)
|
|
|
|
if evt.GetType() == pb.TraceEvent_REJECT_MESSAGE {
|
|
|
|
t.rejectCount++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that when Gossipsub receives a lot of invalid messages from
|
|
|
|
// a peer it should graylist the peer
|
|
|
|
func TestGossipsubAttackInvalidMessageSpam(t *testing.T) {
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Create legitimate and attacker hosts
|
|
|
|
hosts := getNetHosts(t, ctx, 2)
|
|
|
|
legit := hosts[0]
|
|
|
|
attacker := hosts[1]
|
|
|
|
|
|
|
|
mytopic := "mytopic"
|
|
|
|
|
|
|
|
// Create parameters with reasonable default values
|
|
|
|
params := &PeerScoreParams{
|
|
|
|
AppSpecificScore: func(peer.ID) float64 { return 0 },
|
|
|
|
IPColocationFactorWeight: 0,
|
|
|
|
IPColocationFactorThreshold: 1,
|
|
|
|
DecayInterval: 5 * time.Second,
|
|
|
|
DecayToZero: 0.01,
|
|
|
|
RetainScore: 10 * time.Second,
|
|
|
|
Topics: make(map[string]*TopicScoreParams),
|
|
|
|
}
|
|
|
|
params.Topics[mytopic] = &TopicScoreParams{
|
|
|
|
TopicWeight: 0.25,
|
|
|
|
TimeInMeshWeight: 0.0027,
|
|
|
|
TimeInMeshQuantum: time.Second,
|
|
|
|
TimeInMeshCap: 3600,
|
|
|
|
FirstMessageDeliveriesWeight: 0.664,
|
|
|
|
FirstMessageDeliveriesDecay: 0.9916,
|
|
|
|
FirstMessageDeliveriesCap: 1500,
|
|
|
|
MeshMessageDeliveriesWeight: -0.25,
|
|
|
|
MeshMessageDeliveriesDecay: 0.97,
|
|
|
|
MeshMessageDeliveriesCap: 400,
|
|
|
|
MeshMessageDeliveriesThreshold: 100,
|
|
|
|
MeshMessageDeliveriesActivation: 30 * time.Second,
|
|
|
|
MeshMessageDeliveriesWindow: 5 * time.Minute,
|
|
|
|
MeshFailurePenaltyWeight: -0.25,
|
|
|
|
MeshFailurePenaltyDecay: 0.997,
|
|
|
|
InvalidMessageDeliveriesWeight: -99,
|
|
|
|
InvalidMessageDeliveriesDecay: 0.9994,
|
|
|
|
}
|
|
|
|
thresholds := &PeerScoreThresholds{
|
|
|
|
GossipThreshold: -100,
|
|
|
|
PublishThreshold: -200,
|
|
|
|
GraylistThreshold: -300,
|
|
|
|
AcceptPXThreshold: 0,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set up gossipsub on the legit host
|
|
|
|
tracer := &gsAttackInvalidMsgTracer{}
|
|
|
|
ps, err := NewGossipSub(ctx, legit,
|
|
|
|
WithEventTracer(tracer),
|
|
|
|
WithPeerScore(params, thresholds),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
attackerScore := func() float64 {
|
|
|
|
return ps.rt.(*GossipSubRouter).score.Score(attacker.ID())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Subscribe to mytopic on the legit host
|
|
|
|
_, err = ps.Subscribe(mytopic)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
pruneCount := 0
|
2020-04-20 10:03:17 +00:00
|
|
|
pruneCountMx := sync.Mutex{}
|
|
|
|
getPruneCount := func() int {
|
|
|
|
pruneCountMx.Lock()
|
|
|
|
defer pruneCountMx.Unlock()
|
|
|
|
return pruneCount
|
|
|
|
}
|
|
|
|
addPruneCount := func(i int) {
|
|
|
|
pruneCountMx.Lock()
|
|
|
|
defer pruneCountMx.Unlock()
|
|
|
|
pruneCount += i
|
|
|
|
}
|
|
|
|
|
2020-04-14 23:07:22 +00:00
|
|
|
newMockGS(ctx, t, attacker, func(writeMsg func(*pb.RPC), irpc *pb.RPC) {
|
|
|
|
// When the legit host connects it will send us its subscriptions
|
|
|
|
for _, sub := range irpc.GetSubscriptions() {
|
|
|
|
if sub.GetSubscribe() {
|
|
|
|
// Reply by subcribing to the topic and grafting to the peer
|
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Subscriptions: []*pb.RPC_SubOpts{&pb.RPC_SubOpts{Subscribe: sub.Subscribe, Topicid: sub.Topicid}},
|
|
|
|
Control: &pb.ControlMessage{Graft: []*pb.ControlGraft{&pb.ControlGraft{TopicID: sub.Topicid}}},
|
|
|
|
})
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// Attacker score should start at zero
|
|
|
|
if attackerScore() != 0 {
|
|
|
|
t.Fatalf("Expected attacker score to be zero but it's %f", attackerScore())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Send a bunch of messages with no signature (these will
|
|
|
|
// fail validation and reduce the attacker's score)
|
|
|
|
for i := 0; i < 100; i++ {
|
|
|
|
msg := &pb.Message{
|
|
|
|
Data: []byte("some data" + strconv.Itoa(i)),
|
|
|
|
TopicIDs: []string{mytopic},
|
|
|
|
From: []byte(attacker.ID()),
|
|
|
|
Seqno: []byte{byte(i + 1)},
|
|
|
|
}
|
|
|
|
writeMsg(&pb.RPC{
|
|
|
|
Publish: []*pb.Message{msg},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for the initial heartbeat, plus a bit of padding
|
|
|
|
time.Sleep(100*time.Millisecond + GossipSubHeartbeatInitialDelay)
|
|
|
|
|
|
|
|
// The attackers score should now have fallen below zero
|
2020-05-08 17:07:05 +00:00
|
|
|
if attackerScore() >= 0 {
|
2020-04-14 23:07:22 +00:00
|
|
|
t.Fatalf("Expected attacker score to be less than zero but it's %f", attackerScore())
|
|
|
|
}
|
|
|
|
// There should be several rejected messages (because the signature was invalid)
|
|
|
|
if tracer.rejectCount == 0 {
|
|
|
|
t.Fatal("Expected message rejection but got none")
|
|
|
|
}
|
|
|
|
// The legit node should have sent a PRUNE message
|
2020-04-20 10:03:17 +00:00
|
|
|
pc := getPruneCount()
|
|
|
|
if pc == 0 {
|
2020-04-14 23:07:22 +00:00
|
|
|
t.Fatal("Expected attacker node to be PRUNED when score drops low enough")
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ctl := irpc.GetControl(); ctl != nil {
|
2020-04-20 10:03:17 +00:00
|
|
|
addPruneCount(len(ctl.GetPrune()))
|
2020-04-14 23:07:22 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
connect(t, hosts[0], hosts[1])
|
|
|
|
|
|
|
|
<-ctx.Done()
|
|
|
|
}
|
|
|
|
|
2020-04-14 19:55:58 +00:00
|
|
|
func turnOnPubsubDebug() {
|
|
|
|
logging.SetLogLevel("pubsub", "debug")
|
|
|
|
}
|
|
|
|
|
|
|
|
type mockGSOnRead func(writeMsg func(*pb.RPC), irpc *pb.RPC)
|
|
|
|
|
|
|
|
func newMockGS(ctx context.Context, t *testing.T, attacker host.Host, onReadMsg mockGSOnRead) {
|
|
|
|
// Listen on the gossipsub protocol
|
|
|
|
const gossipSubID = protocol.ID("/meshsub/1.0.0")
|
|
|
|
const maxMessageSize = 1024 * 1024
|
|
|
|
attacker.SetStreamHandler(gossipSubID, func(stream network.Stream) {
|
|
|
|
// When an incoming stream is opened, set up an outgoing stream
|
|
|
|
p := stream.Conn().RemotePeer()
|
|
|
|
ostream, err := attacker.NewStream(ctx, p, gossipSubID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
r := ggio.NewDelimitedReader(stream, maxMessageSize)
|
|
|
|
w := ggio.NewDelimitedWriter(ostream)
|
|
|
|
|
|
|
|
var irpc pb.RPC
|
|
|
|
|
|
|
|
writeMsg := func(rpc *pb.RPC) {
|
|
|
|
if err = w.WriteMsg(rpc); err != nil {
|
|
|
|
t.Fatalf("error writing RPC: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Keep reading messages and responding
|
|
|
|
for {
|
|
|
|
// Bail out when the test finishes
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
irpc.Reset()
|
|
|
|
|
|
|
|
err := r.ReadMsg(&irpc)
|
|
|
|
|
|
|
|
// Bail out when the test finishes
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
onReadMsg(writeMsg, &irpc)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|