Commit graph

1143 commits

Author SHA1 Message Date
Antoine Riard
e938e592b2 Document our handling of announcement_sigs
We may have in the future to rebroadcast announcement_sigs at
peer reconnection if this a burning issue as spec lacks
a acknowledgement mechanism.
2019-11-19 17:48:22 -05:00
Matt Corallo
126b514168
Merge pull request #379 from rrybarczyk/use-workspaces
Use workspaces to separate crates
2019-11-19 01:52:13 +00:00
RJ Rybarczyk
06091cee0f Merge branch 'master' of github.com:rust-bitcoin/rust-lightning into use-workspaces 2019-11-18 23:51:21 +00:00
RJ Rybarczyk
404081a755 Update travis file to accommodate workspaces 2019-11-18 23:50:15 +00:00
Matt Corallo
63c1fa6db5
Merge pull request #395 from ariard/2019-11-expected-amt-claim-funds
Avoid probing attacks with same hash lower amounts
2019-11-18 23:08:33 +00:00
Antoine Riard
5e047cc55e Add test_check_htlc_underpaying 2019-11-18 17:25:36 -05:00
Antoine Riard
6493efe329 Check expected amount in claim_funds
Require to specify expected amount so that we can claim only
payment for thhe correct amount, and reject payments for incorrect
amounts (which are probably middle nodes probing to break our privacy).

Send back incorrect_or_unknown_payments_details (PERM|15) to avoid
the probe node learning that final node is waiting a payment with
the routed hash.
2019-11-18 17:25:34 -05:00
RJ Rybarczyk
5305223495 Merge branch 'master' of github.com:rust-bitcoin/rust-lightning into use-workspaces 2019-11-18 19:44:55 +00:00
Matt Corallo
ae0ad19db5
Merge pull request #394 from TheBlueMatt/2019-11-broken-build
Fix broken build
2019-11-15 22:47:34 +00:00
Matt Corallo
f08383edce Drop needless mut 2019-11-15 17:20:03 -05:00
Matt Corallo
2118feb090 Fix build broken by silent merge conflicts 2019-11-15 17:20:03 -05:00
Matt Corallo
148c79719e
Merge pull request #393 from ariard/2019-11-send-cmt-error-handling
Fulfill error handling for send_commitment in processing htlcs forward
2019-11-15 21:58:37 +00:00
Matt Corallo
2e1b7ab86a
Merge pull request #390 from ariard/2019-11-consistent-errors
Make field error of ErrorPacket (former HandleError) mandatory
2019-11-15 21:57:36 +00:00
Matt Corallo
b9274328de
Merge pull request #392 from ariard/2019-11-manager-init-height
Add init height in ChannelManager constructor
2019-11-15 21:38:04 +00:00
Antoine Riard
ddbe53f836 Make field error of LightingError mandatory
We also fulfilled last empty ErrorAction:
- Router secp fail : IgnoreError
- processing error in Router : IgnoreError
- get_channel_update too early : IgnoreError
2019-11-15 16:24:42 -05:00
Antoine Riard
9a015236d0 Add init height in ChannelManager constructor 2019-11-15 16:11:47 -05:00
Matt Corallo
a30946b292
Merge pull request #391 from ariard/2019-11-fix-preimage-collision-onchain
Avoid claiming remote received HTLCs with side-learned preimage
2019-11-15 19:20:43 +00:00
RJ Rybarczyk
88fef649b1 Use workspaces to separate crates 2019-11-15 02:44:30 +00:00
Antoine Riard
6de175575b Fulfill error handling for send_commitment in processing htlcs forward 2019-11-14 18:27:47 -05:00
Antoine Riard
945c399a35 Add test_duplicate_htlc_different_direction_onchain 2019-11-12 19:33:27 -05:00
Antoine Riard
543b0983f6 Avoid claiming remote received HTLCs with preimage
In case of duplicate HTLCs with same hash going in opposite
directions we may learn preimage of offered one, but we shouldn't
claim received one to avoid invalidation of combined claim.
The received HTLC is going to be claimed by a timeout tx at
timelock expiration.

Fix #337
2019-11-12 19:27:55 -05:00
Antoine Riard
7608483b0f Rename HandleError to LightningError to stress already-processed error 2019-11-12 17:29:20 -05:00
Matt Corallo
2afd53148f
Merge pull request #386 from TheBlueMatt/2019-10-useless-lints
Disable some useless lints
2019-10-28 21:36:39 +00:00
Matt Corallo
58351200b6 Disable some useless lints 2019-10-28 15:21:57 -04:00
Matt Corallo
2cb5133aeb
Merge pull request #384 from ariard/2019-10-clean-warnings
Remove useless test framework warnings
2019-10-26 20:59:55 +00:00
Antoine Riard
230b0e1fb6 Remove useless test framework warnings 2019-10-25 20:20:41 -04:00
Matt Corallo
39b562e009
Merge pull request #377 from elichai/2019-08-update-deps
Updating dependencies
2019-08-24 23:06:26 +00:00
Elichai Turkel
20302064a8
Update the fuzz and net-tokio crates 2019-08-24 11:05:38 -04:00
Elichai Turkel
5bb7ba5b7d
Cast weights to u64 to support the new rust-bitcoin api 2019-08-24 11:04:41 -04:00
Elichai Turkel
f4e8974c16
Updated bitcoin, bitcoin_hashes and secp256k1 dependencies 2019-08-24 11:04:29 -04:00
Matt Corallo
ab8f5a8620
Merge pull request #374 from dongcarl/2019-08-channel-open-sanity
tests: Add sanity tests for ChannelOpens
2019-08-09 16:53:33 +00:00
Carl Dong
00410bfeab tests: Add sanity tests for ChannelOpens 2019-08-09 10:17:32 -04:00
Matt Corallo
56f16eaa4d
Merge pull request #349 from ariard/2019-07-data_loss
Implement option_data_loss_protect on both sides
2019-08-06 21:12:57 +00:00
Antoine Riard
41def659c0 Add test_data_loss_protect 2019-08-05 16:19:49 -04:00
Antoine Riard
254af05c43 Cache to_remote_script if we are fallen-behind
Also, restrict commitment transaction filters in ChannelMonitor::
block_connected
2019-08-05 16:19:44 -04:00
Antoine Riard
2322c2365c Make get_latest_local_commitment_txn public
You may use it to get a broadcastable local toxic tx in case of fallen-behind,
i.e when receiving a channel_reestablish with a proof that our remote side
knows a higher revocation secret than the local commitment number we are aware
of. Broadcasting these transactions are UNSAFE, as they allow remote side to punish
you. Nevertheless you may want to broadcast them if remote don't close channel with his
higher commitment transaction after a substantial amount of time (a month or even a year)
to get back funds. Best may be to contact out-of-band the other node operator to coordinate
with him if option is available to you. In any-case, choice is up to the user.

Also, log toxic commitment tx id in channel_reestablish sending back
ChannelError::CloseDelayBroadcast
2019-08-05 15:47:37 -04:00
Antoine Riard
c3991602a5 Enforce option_data_loss_protect user-side
If we remote peer provide us a revocation secret which doesn't
match with next_remote_revocation_number we close the channel
If we learn that we are fallen-behind, we send back a CloseDelayBroadcast
error, special take care will be take to log error and channel should
stale, i.e we expect our honest peer to unilateral close to claim
on it our balance

Add ChannelError::CloseDelayBroadcast to signal that you need to close
the channel but not to broadcast it while however update ChannelMonitor
with remote per_commitment_point thanks to our peer being a gentleman
2019-08-05 15:47:36 -04:00
Matt Corallo
127ce296a7
Merge pull request #310 from ariard/2019-02-clarify-send-htlc-policy
Clarify policy applied in send htlc error msgs
2019-08-02 19:30:41 +00:00
Antoine Riard
1d6c09a94a Clarify policy applied in send htlc error msgs
max_htlc_value_in_flight_msat is applied
per-direction
2019-08-02 01:01:23 -04:00
Matt Corallo
e65e03f120
Merge pull request #370 from TheBlueMatt/2019-07-369-fix-spaces
2019 07 369 fix spaces
2019-07-31 15:58:00 +00:00
RJ Rybarczyk
263b2fa138 Add net-tokio/target to gitignore 2019-07-31 11:23:05 -04:00
RJ Rybarczyk
d32015377e Make SocketDescriptor::send_data take slice instead of vec and offset 2019-07-31 11:22:59 -04:00
Matt Corallo
0d162968d6
Merge pull request #367 from TheBlueMatt/2019-07-fst-unique-channels
Make temporary channel ids unique in full_stack_target
2019-07-30 18:26:57 +00:00
Matt Corallo
487452fa97
Merge pull request #368 from TheBlueMatt/2019-07-travis-fix
Fix travis failure if previous travis run on branch failed to build
2019-07-30 18:26:11 +00:00
Matt Corallo
347f5bfc4c Fix travis failure if previous travis run on branch failed to build 2019-07-30 13:41:12 -04:00
Antoine Riard
2869e50d67 Support option_data_loss_protect for remote peer
In case of sending channel_reestablish message, we join
our current per_commitment_point and their highest revocation
secret we know about

We set data_loss_protect by default and adjust encoding_init
test in consequence
2019-07-30 00:38:20 -04:00
Matt Corallo
283d40f2e4
Merge pull request #364 from TheBlueMatt/2019-07-no-unimpl
Implement the last three (relevant) unimplemented()s in ChannelManager
2019-07-29 19:20:35 +00:00
Matt Corallo
20bd2b142d
Merge pull request #366 from TheBlueMatt/2019-07-useless-todo-removal
Drop some useless TODO messages to clean things up pre-0.1
2019-07-29 17:48:42 +00:00
Matt Corallo
8ba3529522 Handle monitor update failure during funding on the fundee side
This carries a surprising amount of complexity despite only being
possible in the case where monitor updating failed during the
processing of funding_generated. Specifically, this requires
handling rebroadcasting funding_locked once we successfully persist
our monitor again.

As an alternative we could never send funding_signed when the
monitor failed to persist, but this approach avoids needless
delays during funding.
2019-07-29 13:45:35 -04:00
Matt Corallo
b27f788e91 Allow a counterparty to resend their funding_locked before ours 2019-07-29 13:44:47 -04:00