// Copyright 2017-2018 DERO Project. All rights reserved. // Use of this source code in any form is governed by RESEARCH license. // license can be found in the LICENSE file. // GPG: 0F39 E425 8C65 3947 702A 8234 08B2 0360 A03A 9DE8 // // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY // EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL // THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS // INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, // STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF // THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. package blockchain //import "fmt" //import "time" /*import "bytes" import "encoding/binary" import "github.com/romana/rlog" */ //import "github.com/romana/rlog" import "runtime/debug" import log "github.com/sirupsen/logrus" import "github.com/deroproject/derosuite/block" import "github.com/deroproject/derosuite/crypto" import "github.com/deroproject/derosuite/globals" import "github.com/deroproject/derosuite/crypto/ringct" import "github.com/deroproject/derosuite/transaction" import "github.com/deroproject/derosuite/emission" /* This function verifies tx fully, means all checks, * if the transaction has passed the check it can be added to mempool, relayed or added to blockchain * the transaction has already been deserialized thats it * */ func (chain *Blockchain) Verify_Transaction(tx *transaction.Transaction) (result bool) { return false } /* Coinbase transactions need to verify the amount of coins * */ func (chain *Blockchain) Verify_Transaction_Coinbase(cbl *block.Complete_Block, minertx *transaction.Transaction) (result bool) { if !minertx.IsCoinbase() { // transaction is not coinbase, return failed return false } // coinbase transactions only have 1 vin, 1 vout if len(minertx.Vin) != 1 { return false } if len(minertx.Vout) != 1 { return false } // check whether the height mentioned in tx.Vin is equal to block height // this does NOT hold for genesis block so test it differently expected_height := chain.Load_Height_for_BL_ID(cbl.Bl.Prev_Hash) expected_height++ if cbl.Bl.GetHash() == globals.Config.Genesis_Block_Hash { expected_height = 0 } if minertx.Vin[0].(transaction.Txin_gen).Height != expected_height { logger.Warnf(" Rejected Height %d should be %d", minertx.Vin[0].(transaction.Txin_gen).Height, chain.Load_Height_for_BL_ID(cbl.Bl.Prev_Hash)) return false } // verify coins amount ( minied amount ) + the fees colllected which is sum of all tx included in this block // and whether it has been calculated correctly total_fees := uint64(0) for i := 0; i < len(cbl.Txs); i++ { total_fees += cbl.Txs[i].RctSignature.Get_TX_Fee() } total_reward := minertx.Vout[0].Amount base_reward := total_reward - total_fees // size of block = size of miner_tx + size of all non coinbase tx sizeofblock := uint64(0) sizeofblock += uint64(len(cbl.Bl.Miner_tx.Serialize())) // logger.Infof("size of block %d sizeof miner tx %d", sizeofblock, len(cbl.Bl.Miner_tx.Serialize())) for i := 0; i < len(cbl.Txs); i++ { sizeofblock += uint64(len(cbl.Txs[i].Serialize())) // logger.Infof("size of tx i %d tx size %d total size %d", i, uint64(len(cbl.Txs[i].Serialize())) ,sizeofblock) } median_block_size := chain.Get_Median_BlockSize_At_Block(cbl.Bl.Prev_Hash) already_generated_coins := chain.Load_Already_Generated_Coins_for_BL_ID(cbl.Bl.Prev_Hash) base_reward_calculated := emission.GetBlockReward(median_block_size, sizeofblock, already_generated_coins, 6, 0) if base_reward != base_reward_calculated { logger.Warnf("Base reward %d should be %d", base_reward, base_reward_calculated) logger.Warnf("median_block_size %d block_size %d already already_generated_coins %d", median_block_size, sizeofblock, already_generated_coins) return false } /* for i := sizeofblock-4000; i < (sizeofblock+4000);i++{ // now we need to verify whether base reward is okay //base_reward_calculated := emission.GetBlockReward(median_block_size,sizeofblock,already_generated_coins,6,0) base_reward_calculated := emission.GetBlockReward(median_block_size,i,already_generated_coins,6,0) if base_reward == base_reward_calculated { logger.Warnf("Base reward %d should be %d size %d", base_reward, base_reward_calculated,i) } } */ return true } // all non miner tx must be non-coinbase tx // each check is placed in a separate block of code, to avoid ambigous code or faulty checks // all check are placed and not within individual functions ( so as we cannot skip a check ) func (chain *Blockchain) Verify_Transaction_NonCoinbase(tx *transaction.Transaction) (result bool) { result = false var tx_hash crypto.Hash defer func() { // safety so if anything wrong happens, verification fails if r := recover(); r != nil { logger.WithFields(log.Fields{"txid": tx_hash}).Warnf("Recovered while Verifying transaction, failed verification, Stack trace below") logger.Warnf("Stack trace \n%s", debug.Stack()) result = false } }() tx_hash = tx.GetHash() if tx.Version != 2 { return false } // make sure atleast 1 vin and 1 vout are there if len(tx.Vin) < 1 || len(tx.Vout) < 1 { logger.WithFields(log.Fields{"txid": tx_hash}).Warnf("Incoming TX does NOT have atleast 1 vin and 1 vout") return false } // this means some other checks have failed somewhere else if tx.IsCoinbase() { // transaction coinbase must never come here logger.WithFields(log.Fields{"txid": tx_hash}).Warnf("Coinbase tx in non coinbase path, Please investigate") return false } // Vin can be only specific type rest all make the fail case for i := 0; i < len(tx.Vin); i++ { switch tx.Vin[i].(type) { case transaction.Txin_gen: return false // this is for coinbase so fail it case transaction.Txin_to_key: // pass default: return false } } // Vout can be only specific type rest all make th fail case for i := 0; i < len(tx.Vout); i++ { switch tx.Vout[i].Target.(type) { case transaction.Txout_to_key: // pass default: return false } } // Vout should have amount 0 for i := 0; i < len(tx.Vout); i++ { if tx.Vout[i].Amount != 0 { logger.WithFields(log.Fields{"txid": tx_hash, "Amount": tx.Vout[i].Amount}).Warnf("Amount must be zero in ringCT world") return false } } // just some extra logs for testing purposes if len(tx.Vin) >= 3 { logger.WithFields(log.Fields{"txid": tx_hash}).Warnf("tx has more than 3 inputs") } if len(tx.Vout) >= 3 { logger.WithFields(log.Fields{"txid": tx_hash}).Warnf("tx has more than 3 outputs") } // check the mixin , it should be atleast 4 and should be same through out the tx ( all other inputs) // someone did send a mixin of 3 in 12006 block height mixin := len(tx.Vin[0].(transaction.Txin_to_key).Key_offsets) if mixin < 3 { logger.WithFields(log.Fields{"txid": tx_hash, "Mixin": mixin}).Warnf("Mixin must be atleast 3 in ringCT world") return false } for i := 0; i < len(tx.Vin); i++ { if mixin != len(tx.Vin[i].(transaction.Txin_to_key).Key_offsets) { logger.WithFields(log.Fields{"txid": tx_hash, "Mixin": mixin}).Warnf("Mixin must be same for entire TX in ringCT world") return false } } // duplicate ringmembers are not allowed, check them here // just in case protect ourselves as much as we can for i := 0; i < len(tx.Vin); i++ { ring_members := map[uint64]bool{} // create a separate map for each input ring_member := uint64(0) for j := 0; j < len(tx.Vin[i].(transaction.Txin_to_key).Key_offsets); j++ { ring_member += tx.Vin[i].(transaction.Txin_to_key).Key_offsets[j] if _, ok := ring_members[ring_member]; ok { logger.WithFields(log.Fields{"txid": tx_hash, "input_index": i}).Warnf("Duplicate ring member within the TX") return false } ring_members[ring_member] = true // add member to ring member } } // check whether the key image is duplicate within the inputs // NOTE: a block wide key_image duplication is done during block testing but we are still keeping it { kimages := map[crypto.Hash]bool{} for i := 0; i < len(tx.Vin); i++ { if _, ok := kimages[tx.Vin[i].(transaction.Txin_to_key).K_image]; ok { logger.WithFields(log.Fields{ "txid": tx_hash, "kimage": tx.Vin[i].(transaction.Txin_to_key).K_image, }).Warnf("TX using duplicate inputs within the TX") return false } kimages[tx.Vin[i].(transaction.Txin_to_key).K_image] = true // add element to map for next check } } // check whether the key image is low order attack, if yes reject it right now for i := 0; i < len(tx.Vin); i++ { k_image := ringct.Key(tx.Vin[i].(transaction.Txin_to_key).K_image) curve_order := ringct.CurveOrder() mult_result := ringct.ScalarMultKey(&k_image, &curve_order) if *mult_result != ringct.Identity { logger.WithFields(log.Fields{ "txid": tx_hash, "kimage": tx.Vin[i].(transaction.Txin_to_key).K_image, "curve_order": curve_order, "mult_result": *mult_result, "identity": ringct.Identity, }).Warnf("TX contains a low order key image attack, but we are already safeguarded") return false } } // a similiar block level check is done for double spending attacks within the block itself // check whether the key image is already used or spent earlier ( in blockchain ) /* for i := 0; i < len(tx.Vin); i++ { k_image := ringct.Key(tx.Vin[i].(transaction.Txin_to_key).K_image) if chain.Read_KeyImage_Status(crypto.Hash(k_image)) { logger.WithFields(log.Fields{ "txid": tx_hash, "kimage": k_image, }).Warnf("Key image is already spent, attempt to double spend ") return false } } */ // check whether the TX contains a signature or NOT switch tx.RctSignature.Get_Sig_Type() { case ringct.RCTTypeSimple, ringct.RCTTypeFull: // default case, pass through default: logger.WithFields(log.Fields{"txid": tx_hash}).Warnf("TX does NOT contain a ringct signature. It is NOT possible") return false } // expand the signature first // whether the inputs are mature and can be used at time is verified while expanding the inputs if !chain.Expand_Transaction_v2(tx) { logger.WithFields(log.Fields{"txid": tx_hash}).Warnf("TX inputs could not be expanded or inputs are NOT mature") return false } // check the ring signature if !tx.RctSignature.Verify() { logger.WithFields(log.Fields{"txid": tx_hash}).Warnf("TX RCT Signature failed") return false } logger.WithFields(log.Fields{"txid": tx_hash}).Debugf("TX successfully verified") return true }