-
Notifications
You must be signed in to change notification settings - Fork 2.2k
lnwire+tlv+route: enforce TLV length validation and add tests #10249
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
lnwire+tlv+route: enforce TLV length validation and add tests #10249
Conversation
Summary of ChangesHello @erickcestari, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request significantly enhances the robustness of the system's TLV (Type-Length-Value) decoding mechanisms. By introducing strict length validation across several critical components, including Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request strengthens TLV decoding by enforcing strict length validation across several components, which is a great improvement for the robustness and security of the P2P message parsing. The changes are logical and well-implemented. You've also added comprehensive tests to cover these new validation rules. My feedback is minor and focuses on improving the clarity and cleanliness of the new test code, such as removing a debug print statement and correcting some copy-pasted comments and variable names, to better align with the repository's style guide.
483e1b2 to
e528641
Compare
MPins
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good job 👍
In my opinion, having just one commit would be cleaner.
|
Thanks for the review @MPins, I'll address those suggestions soon! |
e528641 to
06a02f7
Compare
|
Ready for review again! |
|
@yyforyongyu: review reminder |
MPins
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 👍
Just add the release notes update.
06a02f7 to
a899cde
Compare
yyforyongyu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the PR! Now pending a rebase 💾
57eb251 to
6fcdbbb
Compare
da446ab to
53e5e98
Compare
Rebased! 🫡 |
706b22a to
95b84a8
Compare
53e5e98 to
1163811
Compare
yyforyongyu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM🦋
1163811 to
ec94c82
Compare
ec94c82 to
98942d4
Compare
This commit improves TLV decoding safety and consistency across multiple
packages by enforcing fixed-length requirements and adding unit tests to
prevent malformed TLV records from being accepted.
Changes include:
- lnwire:
* Enforce 8-byte length in Fee TLV decoder.
* Enforce PubNonceSize in Musig2Nonce TLV decoder.
* Enforce 8-byte length in ShortChannelID TLV decoder.
* Added roundtrip and invalid length tests for Fee, Musig2Nonce,
and ShortChannelID records.
- routing/route:
* Enforce Vertex TLV length (33 bytes).
* Added encode/decode and invalid length tests for Vertex.
- tlv:
* Enforce correct length in DBytes33 decoder (33 bytes).
* Added tests ensuring all fixed-size primitive decoders reject
incorrect TLV lengths.
By strictly validating TLV lengths, we prevent malformed or corrupted
TLV records from being silently accepted, improving protocol safety.
98942d4 to
1643663
Compare
I was doing differential fuzzing on lightning P2P messages and noticed that
LNDdoesn't verifyif the length of SCID TLV is correct or not causing it to parse messages with wrong TLV encoding.
This PR strengthens TLV decoding across multiple components by enforcing strict length checks
and adding corresponding tests.
lnwire
ShortChannelID: decoder now validatesl == 8.Fee: decoder now validatesl == 8.Musig2Nonce: decoder now validatesl == musig2.PubNonceSize.SCID,Fee, andMusig2NonceTLVs.tlv
DBytes33: now enforcesl == 33.routing/route
Vertex: decoder now validatesl == VertexSize.