electrum

Electrum Bitcoin wallet
git clone https://git.parazyd.org/electrum
Log | Files | Refs | Submodules

commit 944e4f0ba0b6bbfb64c802a2b80515b27ded6713
parent fdf8d8609b632b6a3bf4202656e528bcf375ad2c
Author: SomberNight <somber.night@protonmail.com>
Date:   Fri,  2 Aug 2019 18:04:13 +0200

implement data_loss_protect

so that we can spend their_ctx_to_remote even when we lost our state
but have an old backup

Diffstat:
Melectrum/lnchannel.py | 13+++++++++----
Melectrum/lnpeer.py | 38+++++++++++++++++++++++++++++++++-----
Melectrum/lnsweep.py | 5++++-
3 files changed, 46 insertions(+), 10 deletions(-)

diff --git a/electrum/lnchannel.py b/electrum/lnchannel.py @@ -65,6 +65,8 @@ class ChannelJsonEncoder(json.JSONEncoder): RevokeAndAck = namedtuple("RevokeAndAck", ["per_commitment_secret", "next_per_commitment_point"]) +class RemoteCtnTooFarInFuture(Exception): pass + def decodeAll(d, local): for k, v in d.items(): @@ -85,10 +87,10 @@ def htlcsum(htlcs): # following two functions are used because json # doesn't store int keys and byte string values -def str_bytes_dict_from_save(x): +def str_bytes_dict_from_save(x) -> Dict[int, bytes]: return {int(k): bfh(v) for k,v in x.items()} -def str_bytes_dict_to_save(x): +def str_bytes_dict_to_save(x) -> Dict[str, str]: return {str(k): bh2u(v) for k, v in x.items()} @@ -132,6 +134,7 @@ class Channel(Logger): self.short_channel_id_predicted = self.short_channel_id self.onion_keys = str_bytes_dict_from_save(state.get('onion_keys', {})) self.force_closed = state.get('force_closed') + self.data_loss_protect_remote_pcp = str_bytes_dict_from_save(state.get('data_loss_protect_remote_pcp', {})) log = state.get('log') self.hm = HTLCManager(local_ctn=self.config[LOCAL].ctn, @@ -507,11 +510,12 @@ class Channel(Logger): fee_for_htlc = lambda htlc: htlc.amount_msat // 1000 - (weight * feerate // 1000) return list(filter(lambda htlc: fee_for_htlc(htlc) >= conf.dust_limit_sat, htlcs)) - def get_secret_and_point(self, subject, ctn): + def get_secret_and_point(self, subject, ctn) -> Tuple[Optional[bytes], bytes]: assert type(subject) is HTLCOwner offset = ctn - self.get_current_ctn(subject) if subject == REMOTE: - assert offset <= 1, offset + if offset > 1: + raise RemoteCtnTooFarInFuture(f"offset: {offset}") conf = self.config[REMOTE] if offset == 1: secret = None @@ -621,6 +625,7 @@ class Channel(Logger): "log": self.hm.to_save(), "onion_keys": str_bytes_dict_to_save(self.onion_keys), "force_closed": self.force_closed, + "data_loss_protect_remote_pcp": str_bytes_dict_to_save(self.data_loss_protect_remote_pcp), } return to_save diff --git a/electrum/lnpeer.py b/electrum/lnpeer.py @@ -30,7 +30,7 @@ from .logging import Logger from .lnonion import (new_onion_packet, decode_onion_error, OnionFailureCode, calc_hops_data_for_payment, process_onion_packet, OnionPacket, construct_onion_error, OnionRoutingFailureMessage, ProcessedOnionPacket) -from .lnchannel import Channel, RevokeAndAck, htlcsum +from .lnchannel import Channel, RevokeAndAck, htlcsum, RemoteCtnTooFarInFuture from .lnutil import (Outpoint, LocalConfig, RECEIVED, UpdateAddHtlc, RemoteConfig, OnlyPubkeyKeypair, ChannelConstraints, RevocationStore, funding_output_script, get_per_commitment_secret_from_seed, @@ -720,7 +720,8 @@ class Peer(Logger): latest_remote_ctn = chan.hm.ctn_latest(REMOTE) next_remote_ctn = latest_remote_ctn + 1 # send message - if self.localfeatures & LnLocalFeatures.OPTION_DATA_LOSS_PROTECT_OPT: + dlp_enabled = self.localfeatures & LnLocalFeatures.OPTION_DATA_LOSS_PROTECT_OPT + if dlp_enabled: if oldest_unrevoked_remote_ctn == 0: last_rev_secret = 0 else: @@ -746,6 +747,8 @@ class Peer(Logger): chan.set_state('OPENING') their_next_local_ctn = int.from_bytes(channel_reestablish_msg["next_local_commitment_number"], 'big') their_oldest_unrevoked_remote_ctn = int.from_bytes(channel_reestablish_msg["next_remote_revocation_number"], 'big') + their_local_pcp = channel_reestablish_msg.get("my_current_per_commitment_point") + their_claim_of_our_last_per_commitment_secret = channel_reestablish_msg.get("your_last_per_commitment_secret") should_close_we_are_ahead = False should_close_they_are_ahead = False @@ -786,9 +789,34 @@ class Peer(Logger): should_close_we_are_ahead = True else: should_close_they_are_ahead = True - - # TODO option_data_loss_protect - + # option_data_loss_protect + def are_datalossprotect_fields_valid() -> bool: + if their_local_pcp is None or their_claim_of_our_last_per_commitment_secret is None: + # if DLP was enabled, absence of fields is not OK + return not dlp_enabled + our_pcs, __ = chan.get_secret_and_point(LOCAL, their_oldest_unrevoked_remote_ctn - 1) + if our_pcs != their_claim_of_our_last_per_commitment_secret: + self.logger.error(f"channel_reestablish: (DLP) local PCS mismatch: {bh2u(our_pcs)} != {bh2u(their_claim_of_our_last_per_commitment_secret)}") + return False + try: + __, our_remote_pcp = chan.get_secret_and_point(REMOTE, their_next_local_ctn - 1) + except RemoteCtnTooFarInFuture: + pass + else: + if our_remote_pcp != their_local_pcp: + self.logger.error(f"channel_reestablish: (DLP) remote PCP mismatch: {bh2u(our_remote_pcp)} != {bh2u(their_local_pcp)}") + return False + return True + + if not are_datalossprotect_fields_valid(): + self.logger.error(f"channel_reestablish: data loss protect fields invalid.") + # TODO should we force-close? + return + else: + if dlp_enabled and should_close_they_are_ahead: + self.logger.warning(f"channel_reestablish: remote is ahead of us! luckily DLP is enabled. remote PCP: {bh2u(their_local_pcp)}") + chan.data_loss_protect_remote_pcp[their_next_local_ctn - 1] = their_local_pcp + self.lnworker.save_channel(chan) if should_close_they_are_ahead: self.logger.warning(f"channel_reestablish: remote is ahead of us! trying to get them to force-close.") self.try_to_get_remote_to_force_close_with_their_latest(chan_id) diff --git a/electrum/lnsweep.py b/electrum/lnsweep.py @@ -245,7 +245,7 @@ def create_sweeptxs_for_our_ctx(chan: 'Channel', ctx: Transaction, ctn: int, create_txns_for_htlc(htlc, is_received_htlc=True) return txs -def analyze_ctx(chan, ctx): +def analyze_ctx(chan: 'Channel', ctx: Transaction): # note: the remote sometimes has two valid non-revoked commitment transactions, # either of which could be broadcast (their_conf.ctn, their_conf.ctn+1) our_conf, their_conf = get_ordered_channel_configs(chan=chan, for_us=True) @@ -265,6 +265,9 @@ def analyze_ctx(chan, ctx): their_pcp = ecc.ECPrivkey(per_commitment_secret).get_public_key_bytes(compressed=True) is_revocation = True #_logger.info(f'tx for revoked: {list(txs.keys())}') + elif ctn in chan.data_loss_protect_remote_pcp: + their_pcp = chan.data_loss_protect_remote_pcp[ctn] + is_revocation = False else: return return ctn, their_pcp, is_revocation, per_commitment_secret