-
Notifications
You must be signed in to change notification settings - Fork 136
Fix hop payload bounds #74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Fix hop payload bounds #74
Conversation
Summary of ChangesHello @erickcestari, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request introduces a critical fix to how onion packet payloads are processed, specifically preventing Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request addresses a potential vulnerability in unwrapPacket where a malformed packet could cause the decoder to read beyond the intended routing information boundary. The fix correctly restricts the data passed to DecodeHopPayload by slicing the buffer to the appropriate length. This is a solid and important correction. The addition of a specific test case, TestUnwrapPacketBeyondRoutingInfoBoundary, is excellent as it directly verifies the fix against the described vulnerability. I've also noted the correction of typos in other test function names. My review includes a couple of minor suggestions for the new test code to align with the repository's style guide concerning line length.
unwrapPacket passes the full 2600-byte hopInfo buffer to DecodeHopPayload, but only the first 1300 bytes contain routing info. The remaining 1300 bytes are zero-padding used for XOR decryption. A malformed packet with a large payload size field can cause the decoder to read beyond the routing info into the padding area. This creates parsing inconsistencies with other implementations that correctly enforce the 1300-byte boundary.
Rename TestSphinxNodeRelpay* to TestSphinxNodeReplay*.
a8eb498 to
3fad506
Compare
|
Maybe we should also change |
unwrapPacketpasses the full 2600-bytehopInfobuffer toDecodeHopPayload, but only the first 1300 bytes contain routing info. The remaining 1300 bytes are zero-padding used for XOR decryption.A malformed packet with a large payload size field can cause the decoder to read beyond the routing info into the padding area. This creates parsing inconsistencies with other implementations that enforce the 1300-byte boundary.
Found through differential fuzzing (bitcoinfuzz) where Core Lightning and rust-lightning rejected the malformed onion packet.