forked from paritytech/polkadot-sdk
-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Statement Distribution Per Peer Rate Limit (paritytech#3444)
- [x] Drop requests from a PeerID that is already being served by us. - [x] Don't sent requests to a PeerID if we already are requesting something from them at that moment (prioritise other requests or wait). - [x] Tests - [ ] ~~Add a small rep update for unsolicited requests (same peer request)~~ not included in original PR due to potential issues with nodes slowly updating - [x] Add a metric to track the amount of dropped requests due to peer rate limiting - [x] Add a metric to track how many time a node reaches the max parallel requests limit in v2+ Helps with but does not close yet: https://github.com/paritytech-secops/srlabs_findings/issues/303
- Loading branch information
1 parent
fb4ee18
commit 709f8ef
Showing
14 changed files
with
539 additions
and
48 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
155 changes: 155 additions & 0 deletions
155
polkadot/node/malus/src/variants/spam_statement_requests.rs
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,155 @@ | ||
// Copyright (C) Parity Technologies (UK) Ltd. | ||
// This file is part of Polkadot. | ||
|
||
// Polkadot is free software: you can redistribute it and/or modify | ||
// it under the terms of the GNU General Public License as published by | ||
// the Free Software Foundation, either version 3 of the License, or | ||
// (at your option) any later version. | ||
|
||
// Polkadot is distributed in the hope that it will be useful, | ||
// but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
// GNU General Public License for more details. | ||
|
||
// You should have received a copy of the GNU General Public License | ||
// along with Polkadot. If not, see <http://www.gnu.org/licenses/>. | ||
|
||
//! A malicious node variant that attempts spam statement requests. | ||
//! | ||
//! This malus variant behaves honestly in everything except when propagating statement distribution | ||
//! requests through the network bridge subsystem. Instead of sending a single request when it needs | ||
//! something it attempts to spam the peer with multiple requests. | ||
//! | ||
//! Attention: For usage with `zombienet` only! | ||
|
||
#![allow(missing_docs)] | ||
|
||
use polkadot_cli::{ | ||
service::{ | ||
AuxStore, Error, ExtendedOverseerGenArgs, Overseer, OverseerConnector, OverseerGen, | ||
OverseerGenArgs, OverseerHandle, | ||
}, | ||
validator_overseer_builder, Cli, | ||
}; | ||
use polkadot_node_network_protocol::request_response::{outgoing::Requests, OutgoingRequest}; | ||
use polkadot_node_subsystem::{messages::NetworkBridgeTxMessage, SpawnGlue}; | ||
use polkadot_node_subsystem_types::{ChainApiBackend, RuntimeApiSubsystemClient}; | ||
use sp_core::traits::SpawnNamed; | ||
|
||
// Filter wrapping related types. | ||
use crate::{interceptor::*, shared::MALUS}; | ||
|
||
use std::sync::Arc; | ||
|
||
/// Wraps around network bridge and replaces it. | ||
#[derive(Clone)] | ||
struct RequestSpammer { | ||
spam_factor: u32, // How many statement distribution requests to send. | ||
} | ||
|
||
impl<Sender> MessageInterceptor<Sender> for RequestSpammer | ||
where | ||
Sender: overseer::NetworkBridgeTxSenderTrait + Clone + Send + 'static, | ||
{ | ||
type Message = NetworkBridgeTxMessage; | ||
|
||
/// Intercept NetworkBridgeTxMessage::SendRequests with Requests::AttestedCandidateV2 inside and | ||
/// duplicate that request | ||
fn intercept_incoming( | ||
&self, | ||
_subsystem_sender: &mut Sender, | ||
msg: FromOrchestra<Self::Message>, | ||
) -> Option<FromOrchestra<Self::Message>> { | ||
match msg { | ||
FromOrchestra::Communication { | ||
msg: NetworkBridgeTxMessage::SendRequests(requests, if_disconnected), | ||
} => { | ||
let mut new_requests = Vec::new(); | ||
|
||
for request in requests { | ||
match request { | ||
Requests::AttestedCandidateV2(ref req) => { | ||
// Temporarily store peer and payload for duplication | ||
let peer_to_duplicate = req.peer.clone(); | ||
let payload_to_duplicate = req.payload.clone(); | ||
// Push the original request | ||
new_requests.push(request); | ||
|
||
// Duplicate for spam purposes | ||
gum::info!( | ||
target: MALUS, | ||
"😈 Duplicating AttestedCandidateV2 request extra {:?} times to peer: {:?}.", self.spam_factor, peer_to_duplicate, | ||
); | ||
new_requests.extend((0..self.spam_factor - 1).map(|_| { | ||
let (new_outgoing_request, _) = OutgoingRequest::new( | ||
peer_to_duplicate.clone(), | ||
payload_to_duplicate.clone(), | ||
); | ||
Requests::AttestedCandidateV2(new_outgoing_request) | ||
})); | ||
}, | ||
_ => { | ||
new_requests.push(request); | ||
}, | ||
} | ||
} | ||
|
||
// Passthrough the message with a potentially modified number of requests | ||
Some(FromOrchestra::Communication { | ||
msg: NetworkBridgeTxMessage::SendRequests(new_requests, if_disconnected), | ||
}) | ||
}, | ||
FromOrchestra::Communication { msg } => Some(FromOrchestra::Communication { msg }), | ||
FromOrchestra::Signal(signal) => Some(FromOrchestra::Signal(signal)), | ||
} | ||
} | ||
} | ||
|
||
//---------------------------------------------------------------------------------- | ||
|
||
#[derive(Debug, clap::Parser)] | ||
#[clap(rename_all = "kebab-case")] | ||
#[allow(missing_docs)] | ||
pub struct SpamStatementRequestsOptions { | ||
/// How many statement distribution requests to send. | ||
#[clap(long, ignore_case = true, default_value_t = 1000, value_parser = clap::value_parser!(u32).range(0..=10000000))] | ||
pub spam_factor: u32, | ||
|
||
#[clap(flatten)] | ||
pub cli: Cli, | ||
} | ||
|
||
/// SpamStatementRequests implementation wrapper which implements `OverseerGen` glue. | ||
pub(crate) struct SpamStatementRequests { | ||
/// How many statement distribution requests to send. | ||
pub spam_factor: u32, | ||
} | ||
|
||
impl OverseerGen for SpamStatementRequests { | ||
fn generate<Spawner, RuntimeClient>( | ||
&self, | ||
connector: OverseerConnector, | ||
args: OverseerGenArgs<'_, Spawner, RuntimeClient>, | ||
ext_args: Option<ExtendedOverseerGenArgs>, | ||
) -> Result<(Overseer<SpawnGlue<Spawner>, Arc<RuntimeClient>>, OverseerHandle), Error> | ||
where | ||
RuntimeClient: RuntimeApiSubsystemClient + ChainApiBackend + AuxStore + 'static, | ||
Spawner: 'static + SpawnNamed + Clone + Unpin, | ||
{ | ||
gum::info!( | ||
target: MALUS, | ||
"😈 Started Malus node that duplicates each statement distribution request spam_factor = {:?} times.", | ||
&self.spam_factor, | ||
); | ||
|
||
let request_spammer = RequestSpammer { spam_factor: self.spam_factor }; | ||
|
||
validator_overseer_builder( | ||
args, | ||
ext_args.expect("Extended arguments required to build validator overseer are provided"), | ||
)? | ||
.replace_network_bridge_tx(move |cb| InterceptedSubsystem::new(cb, request_spammer)) | ||
.build_with_connector(connector) | ||
.map_err(|e| e.into()) | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.