Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fuzz process onion failure #3683

Merged

Conversation

joostjager
Copy link
Contributor

@joostjager joostjager commented Mar 25, 2025

Adds a fuzzer for process_onion_failure. The fuzzer found this regression: #3686

@ldk-reviews-bot
Copy link

ldk-reviews-bot commented Mar 25, 2025

👋 Thanks for assigning @arik-so as a reviewer!
I'll wait for their review and will help manage the review process.
Once they submit their review, I'll check if a second reviewer would be helpful.

@joostjager joostjager force-pushed the fuzz-process-onion-failure branch 2 times, most recently from 7bdde66 to fe4bcd7 Compare March 25, 2025 21:35
@@ -1129,7 +1142,7 @@ where
let mut hmac = HmacEngine::<Sha256>::new(&um);
hmac.input(&encrypted_packet.data[32..]);

if !fixed_time_eq(&Hmac::from_engine(hmac).to_byte_array(), &encrypted_packet.data[..32]) {
if &Hmac::from_engine(hmac).to_byte_array() != &encrypted_packet.data[..32] {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Required for fuzzer, and fixed_time_eq not needed here at the sender side.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd kinda rather do this upstream at rust-bitcoin/rust-bitcoin#4289 so we don't have to think about it (tho its also totally the case that our next-hop can probably identify whether we were the sender based on our timing already and there isn't much we can do to fix that, making this constant time is not gonna help lol).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see how using equal time here would help the next hop identify that we are the sender? When we get here, there is no further comm with the next hop anymore. Or you mean the time until the next attempt for this payment that may potentially flow through the same next hop? For that, I'd think there is so much else also happening such as pathfinding, that this really does not matter.

If equal time cmp isn't adding anything for multiple reasons, then I'd say let's do the faster normal cmp?

The upstream issue is of course still useful for fuzzing of other uses of fixed_time_eq that are timing sensitive.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So if making this constant time isn't gonna mitigate detection, what's the issue with just making it a regular comparison? And alternatively, if there's enough value to keep using fixed_time_eq, would it make sense to use one or the other based on a cfg flag so we use regular comparisons only in a fuzz context?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oops, missed this. I believe we decode inline when processing a message from a peer. Thus they can measure how long it takes us to process the message to figure out which parts of the code they hit. Given we're iterating the onion its vaguely reminiscent of Bleichenbacher's, but we already exit the loop early so its not like we're particularly robust here. Again, the right fix is to do things like this in a background task rather than in a message processing function.

@joostjager joostjager force-pushed the fuzz-process-onion-failure branch 2 times, most recently from dba48e0 to 52b665b Compare March 26, 2025 14:52
Copy link

codecov bot commented Mar 26, 2025

Codecov Report

Attention: Patch coverage is 44.44444% with 10 lines in your changes missing coverage. Please review.

Project coverage is 89.22%. Comparing base (030a784) to head (52b665b).

Files with missing lines Patch % Lines
lightning/src/ln/onion_utils.rs 44.44% 10 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main    #3683      +/-   ##
==========================================
- Coverage   89.25%   89.22%   -0.03%     
==========================================
  Files         155      155              
  Lines      119959   119951       -8     
  Branches   119959   119951       -8     
==========================================
- Hits       107069   107029      -40     
- Misses      10276    10298      +22     
- Partials     2614     2624      +10     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@joostjager joostjager force-pushed the fuzz-process-onion-failure branch from 52b665b to 1dd2d94 Compare March 26, 2025 15:55
pubkey: get_pubkey!(),
node_features: NodeFeatures::empty(),
short_channel_id: get_u64!(),
channel_features: ChannelFeatures::empty(),
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I didn't bother setting the features as they aren't used for the onion failure processing. Mainly because it seemed not straight-fwd to do it.

@joostjager joostjager force-pushed the fuzz-process-onion-failure branch 2 times, most recently from f37db7b to 4f9618a Compare March 26, 2025 16:04
Copy link
Collaborator

@TheBlueMatt TheBlueMatt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fuzzer looks good to me, basically. Left some nits where we could maybe tweak things but given enough CPU probably this fuzzer would do fine.

Comment on lines 86 to 94
let session_priv = match SecretKey::from_slice(get_slice!(32)) {
Ok(val) => val,
Err(_) => return,
};

let payment_id = match get_slice!(32).try_into() {
Ok(val) => PaymentId(val),
Err(_) => return,
};
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These we might just want to hard-code. It shouldn't be the case that we ever care about the value, and making them a part of the input just gives the fuzzer more stuff to twiddle that does nothing but invalidate the rest of the input.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hard-coded keys and things that aren't used in process_onion_failure.

};

let mut hops = Vec::<RouteHop>::new();
let hop_count = get_slice!(1)[0] as usize;
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I kinda wonder if we shouldn't make this less flexible - either always do 20 (21?) or have a flag that selects between 20 (21?) and 1 or so. Probably there are no bugs that are only reachable if we have 5/7/10/etc hops.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hm, but then there are also the trampoline hops and blinded path hops. I think I am ok with just %30 all of them

Comment on lines +150 to +121
let failure_len = get_u16!();
let encrypted_packet = OnionErrorPacket { data: get_slice!(failure_len).into() };
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we replace this with just reading the OnionErrorPacket using standard Readable from the remainder of the stream, rather than reading a length prefix?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think there is a standard readable defined for OnionErrorPacket?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, I guess we'd have to read an DecodedOnionErrorPacket?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Read that, and then write it out again to get a raw byte array. I'm not sure if it makes it better.

@joostjager joostjager force-pushed the fuzz-process-onion-failure branch 2 times, most recently from c10a9e5 to ebf4f89 Compare March 27, 2025 01:48
@joostjager joostjager requested a review from TheBlueMatt March 27, 2025 11:02
@joostjager joostjager marked this pull request as ready for review March 27, 2025 12:57
Copy link
Collaborator

@TheBlueMatt TheBlueMatt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Basically LGTM, needs commit message and squash.

@joostjager joostjager force-pushed the fuzz-process-onion-failure branch from ebf4f89 to 64cd40c Compare March 27, 2025 18:03
@joostjager joostjager requested a review from arik-so March 27, 2025 18:04
Preparatory commit that exposes types that are related to onion failure
processing to the fuzzing targets.
Because this method is used by the sender of the payment after the htlc
has been resolved, there is no information that can leak to downstream
nodes. Revert to a regular comparison for better performance and easier
fuzzing.
@joostjager joostjager force-pushed the fuzz-process-onion-failure branch from 64cd40c to fcbb658 Compare March 27, 2025 18:23
Adds a fuzz target that exercises the processing of a failure message
that is received by the sender of a payment. Fuzzing this is important
because the input data is coming directly off the wire.
@joostjager joostjager force-pushed the fuzz-process-onion-failure branch from fcbb658 to 17737be Compare March 27, 2025 19:05
@joostjager joostjager requested a review from arik-so March 27, 2025 19:06
Copy link
Contributor

@arik-so arik-so left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me!

@joostjager joostjager merged commit 0d95565 into lightningdevkit:main Mar 28, 2025
26 of 27 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants