Skip to content

Commit aa9231f

Browse files
committed
Merge bitcoin#26859: fuzz: extend ConsumeNetAddr() to return I2P and CJDNS addresses
b851c53 fuzz: extend ConsumeNetAddr() to return I2P and CJDNS addresses (Vasil Dimov) Pull request description: In the process of doing so, refactor `ConsumeNetAddr()` to generate the addresses from IPv4, IPv6, Tor, I2P and CJDNS networks in the same way - by preparing some random stream and deserializing from it. Similar code was already found in `RandAddr()`. ACKs for top commit: achow101: ACK b851c53 mzumsande: ACK b851c53 brunoerg: utACK b851c53 Tree-SHA512: 9905acff0e996f30ddac0c14e5ee9e1db926c7751472c06d6441111304242b563f7c942b162b209d80e8fb65a97249792eef9ae0a96100419565bf7f59f59676
2 parents 4b66877 + b851c53 commit aa9231f

File tree

6 files changed

+100
-61
lines changed

6 files changed

+100
-61
lines changed

src/netaddress.h

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -261,6 +261,18 @@ class CNetAddr
261261
}
262262
}
263263

264+
/**
265+
* BIP155 network ids recognized by this software.
266+
*/
267+
enum BIP155Network : uint8_t {
268+
IPV4 = 1,
269+
IPV6 = 2,
270+
TORV2 = 3,
271+
TORV3 = 4,
272+
I2P = 5,
273+
CJDNS = 6,
274+
};
275+
264276
friend class CSubNet;
265277

266278
private:
@@ -282,18 +294,6 @@ class CNetAddr
282294
*/
283295
bool SetI2P(const std::string& addr);
284296

285-
/**
286-
* BIP155 network ids recognized by this software.
287-
*/
288-
enum BIP155Network : uint8_t {
289-
IPV4 = 1,
290-
IPV6 = 2,
291-
TORV2 = 3,
292-
TORV3 = 4,
293-
I2P = 5,
294-
CJDNS = 6,
295-
};
296-
297297
/**
298298
* Size of CNetAddr when serialized as ADDRv1 (pre-BIP155) (in bytes).
299299
*/

src/test/fuzz/addrman.cpp

Lines changed: 6 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -64,26 +64,13 @@ FUZZ_TARGET(data_stream_addr_man, .init = initialize_addrman)
6464
CNetAddr RandAddr(FuzzedDataProvider& fuzzed_data_provider, FastRandomContext& fast_random_context)
6565
{
6666
CNetAddr addr;
67-
if (fuzzed_data_provider.remaining_bytes() > 1 && fuzzed_data_provider.ConsumeBool()) {
68-
addr = ConsumeNetAddr(fuzzed_data_provider);
69-
} else {
70-
// The networks [1..6] correspond to CNetAddr::BIP155Network (private).
71-
static const std::map<uint8_t, uint8_t> net_len_map = {{1, ADDR_IPV4_SIZE},
72-
{2, ADDR_IPV6_SIZE},
73-
{4, ADDR_TORV3_SIZE},
74-
{5, ADDR_I2P_SIZE},
75-
{6, ADDR_CJDNS_SIZE}};
76-
uint8_t net = fast_random_context.randrange(5) + 1; // [1..5]
77-
if (net == 3) {
78-
net = 6;
67+
assert(!addr.IsValid());
68+
for (size_t i = 0; i < 8 && !addr.IsValid(); ++i) {
69+
if (fuzzed_data_provider.remaining_bytes() > 1 && fuzzed_data_provider.ConsumeBool()) {
70+
addr = ConsumeNetAddr(fuzzed_data_provider);
71+
} else {
72+
addr = ConsumeNetAddr(fuzzed_data_provider, &fast_random_context);
7973
}
80-
81-
DataStream s{};
82-
83-
s << net;
84-
s << fast_random_context.randbytes(net_len_map.at(net));
85-
86-
s >> CAddress::V2_NETWORK(addr);
8774
}
8875

8976
// Return a dummy IPv4 5.5.5.5 if we generated an invalid address.

src/test/fuzz/banman.cpp

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -70,11 +70,13 @@ FUZZ_TARGET(banman, .init = initialize_banman)
7070
fuzzed_data_provider,
7171
[&] {
7272
CNetAddr net_addr{ConsumeNetAddr(fuzzed_data_provider)};
73-
const std::optional<CNetAddr>& addr{LookupHost(net_addr.ToStringAddr(), /*fAllowLookup=*/false)};
74-
if (addr.has_value() && addr->IsValid()) {
75-
net_addr = *addr;
76-
} else {
77-
contains_invalid = true;
73+
if (!net_addr.IsCJDNS() || !net_addr.IsValid()) {
74+
const std::optional<CNetAddr>& addr{LookupHost(net_addr.ToStringAddr(), /*fAllowLookup=*/false)};
75+
if (addr.has_value() && addr->IsValid()) {
76+
net_addr = *addr;
77+
} else {
78+
contains_invalid = true;
79+
}
7880
}
7981
ban_man.Ban(net_addr, ConsumeBanTimeOffset(fuzzed_data_provider), fuzzed_data_provider.ConsumeBool());
8082
},

src/test/fuzz/netaddress.cpp

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,12 @@ FUZZ_TARGET(netaddress)
2626
if (net_addr.GetNetwork() == Network::NET_ONION) {
2727
assert(net_addr.IsTor());
2828
}
29+
if (net_addr.GetNetwork() == Network::NET_I2P) {
30+
assert(net_addr.IsI2P());
31+
}
32+
if (net_addr.GetNetwork() == Network::NET_CJDNS) {
33+
assert(net_addr.IsCJDNS());
34+
}
2935
if (net_addr.GetNetwork() == Network::NET_INTERNAL) {
3036
assert(net_addr.IsInternal());
3137
}
@@ -69,6 +75,12 @@ FUZZ_TARGET(netaddress)
6975
if (net_addr.IsTor()) {
7076
assert(net_addr.GetNetwork() == Network::NET_ONION);
7177
}
78+
if (net_addr.IsI2P()) {
79+
assert(net_addr.GetNetwork() == Network::NET_I2P);
80+
}
81+
if (net_addr.IsCJDNS()) {
82+
assert(net_addr.GetNetwork() == Network::NET_CJDNS);
83+
}
7284
(void)net_addr.IsValid();
7385
(void)net_addr.ToStringAddr();
7486

src/test/fuzz/util/net.cpp

Lines changed: 54 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -25,33 +25,63 @@
2525

2626
class CNode;
2727

28-
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider) noexcept
28+
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider, FastRandomContext* rand) noexcept
2929
{
30-
const Network network = fuzzed_data_provider.PickValueInArray({Network::NET_IPV4, Network::NET_IPV6, Network::NET_INTERNAL, Network::NET_ONION});
31-
CNetAddr net_addr;
32-
if (network == Network::NET_IPV4) {
33-
in_addr v4_addr = {};
34-
v4_addr.s_addr = fuzzed_data_provider.ConsumeIntegral<uint32_t>();
35-
net_addr = CNetAddr{v4_addr};
36-
} else if (network == Network::NET_IPV6) {
37-
if (fuzzed_data_provider.remaining_bytes() >= 16) {
38-
in6_addr v6_addr = {};
39-
auto addr_bytes = fuzzed_data_provider.ConsumeBytes<uint8_t>(16);
40-
if (addr_bytes[0] == CJDNS_PREFIX) { // Avoid generating IPv6 addresses that look like CJDNS.
41-
addr_bytes[0] = 0x55; // Just an arbitrary number, anything != CJDNS_PREFIX would do.
42-
}
43-
memcpy(v6_addr.s6_addr, addr_bytes.data(), 16);
44-
net_addr = CNetAddr{v6_addr, fuzzed_data_provider.ConsumeIntegral<uint32_t>()};
30+
struct NetAux {
31+
Network net;
32+
CNetAddr::BIP155Network bip155;
33+
size_t len;
34+
};
35+
36+
static constexpr std::array<NetAux, 6> nets{
37+
NetAux{.net = Network::NET_IPV4, .bip155 = CNetAddr::BIP155Network::IPV4, .len = ADDR_IPV4_SIZE},
38+
NetAux{.net = Network::NET_IPV6, .bip155 = CNetAddr::BIP155Network::IPV6, .len = ADDR_IPV6_SIZE},
39+
NetAux{.net = Network::NET_ONION, .bip155 = CNetAddr::BIP155Network::TORV3, .len = ADDR_TORV3_SIZE},
40+
NetAux{.net = Network::NET_I2P, .bip155 = CNetAddr::BIP155Network::I2P, .len = ADDR_I2P_SIZE},
41+
NetAux{.net = Network::NET_CJDNS, .bip155 = CNetAddr::BIP155Network::CJDNS, .len = ADDR_CJDNS_SIZE},
42+
NetAux{.net = Network::NET_INTERNAL, .bip155 = CNetAddr::BIP155Network{0}, .len = 0},
43+
};
44+
45+
const size_t nets_index{rand == nullptr
46+
? fuzzed_data_provider.ConsumeIntegralInRange<size_t>(0, nets.size() - 1)
47+
: static_cast<size_t>(rand->randrange(nets.size()))};
48+
49+
const auto& aux = nets[nets_index];
50+
51+
CNetAddr addr;
52+
53+
if (aux.net == Network::NET_INTERNAL) {
54+
if (rand == nullptr) {
55+
addr.SetInternal(fuzzed_data_provider.ConsumeBytesAsString(32));
56+
} else {
57+
const auto v = rand->randbytes(32);
58+
addr.SetInternal(std::string{v.begin(), v.end()});
4559
}
46-
} else if (network == Network::NET_INTERNAL) {
47-
net_addr.SetInternal(fuzzed_data_provider.ConsumeBytesAsString(32));
48-
} else if (network == Network::NET_ONION) {
49-
auto pub_key{fuzzed_data_provider.ConsumeBytes<uint8_t>(ADDR_TORV3_SIZE)};
50-
pub_key.resize(ADDR_TORV3_SIZE);
51-
const bool ok{net_addr.SetSpecial(OnionToString(pub_key))};
52-
assert(ok);
60+
return addr;
61+
}
62+
63+
DataStream s;
64+
65+
s << static_cast<uint8_t>(aux.bip155);
66+
67+
std::vector<uint8_t> addr_bytes;
68+
if (rand == nullptr) {
69+
addr_bytes = fuzzed_data_provider.ConsumeBytes<uint8_t>(aux.len);
70+
addr_bytes.resize(aux.len);
71+
} else {
72+
addr_bytes = rand->randbytes(aux.len);
5373
}
54-
return net_addr;
74+
if (aux.net == NET_IPV6 && addr_bytes[0] == CJDNS_PREFIX) { // Avoid generating IPv6 addresses that look like CJDNS.
75+
addr_bytes[0] = 0x55; // Just an arbitrary number, anything != CJDNS_PREFIX would do.
76+
}
77+
if (aux.net == NET_CJDNS) { // Avoid generating CJDNS addresses that don't start with CJDNS_PREFIX because those are !IsValid().
78+
addr_bytes[0] = CJDNS_PREFIX;
79+
}
80+
s << addr_bytes;
81+
82+
s >> CAddress::V2_NETWORK(addr);
83+
84+
return addr;
5585
}
5686

5787
CAddress ConsumeAddress(FuzzedDataProvider& fuzzed_data_provider) noexcept

src/test/fuzz/util/net.h

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,15 @@
2424
#include <optional>
2525
#include <string>
2626

27-
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider) noexcept;
27+
/**
28+
* Create a CNetAddr. It may have `addr.IsValid() == false`.
29+
* @param[in,out] fuzzed_data_provider Take data for the address from this, if `rand` is `nullptr`.
30+
* @param[in,out] rand If not nullptr, take data from it instead of from `fuzzed_data_provider`.
31+
* Prefer generating addresses using `fuzzed_data_provider` because it is not uniform. Only use
32+
* `rand` if `fuzzed_data_provider` is exhausted or its data is needed for other things.
33+
* @return a "random" network address.
34+
*/
35+
CNetAddr ConsumeNetAddr(FuzzedDataProvider& fuzzed_data_provider, FastRandomContext* rand = nullptr) noexcept;
2836

2937
class FuzzedSock : public Sock
3038
{

0 commit comments

Comments
 (0)