-
Notifications
You must be signed in to change notification settings - Fork 128
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RLPx out of range crash triggered by message in auth handshake #766
Comments
Can confirm thal on my Goerli block collection test. Reproducible event: /home/jordan/nimbus-eth1/nimbus/nimbus.nim(264) nimbus with always the same index bat varying time until the error occurs (best run was to collect 500k blocks which was enough for my replay.) |
No, it's not the same issue. What you've reported there is a different, unrelated bug also in RLPx. Look at the exception: It's an These stacktrace may be confusing if you're not used to Chronos. It's good to ignore the It's a useful report though, thanks, so I've filed it as issue #767. |
Looks like a check is needed on the input versus that |
There is a decoding vulnerability to untrusted network data in the RLPx auth code.
While connected to Ropsten test network, Nimbus-eth1 raised this error in
rlpxAccess
/decodeAuthMessageEip8
and took down the process.It would be appropriate to go through and systematically check for similar length trust issues in all input in RLPx.
The Geth version shown is interesting. The hex part of
clientId
is not a valid commit in the Geth repo. Is it a branched old version of Geth, in which case perhaps it's correct protocol we are incorrectly decoding? Or is it a fake version, intentionally sending out adversarial messages?(Ignore the
eth/65
mention, this is running a small patch that doesn't touch any relevant code.The text was updated successfully, but these errors were encountered: