|
|
|
|
@@ -408,7 +408,7 @@ static void UpdatePreferredDownload(CNode* node, CNodeState* state) EXCLUSIVE_LO
|
|
|
|
|
nPreferredDownload -= state->fPreferredDownload;
|
|
|
|
|
|
|
|
|
|
// Whether this node should be marked as a preferred download node.
|
|
|
|
|
state->fPreferredDownload = (!node->fInbound || node->fWhitelisted) && !node->fOneShot && !node->fClient;
|
|
|
|
|
state->fPreferredDownload = (!node->fInbound || node->HasPermission(PF_NOBAN)) && !node->fOneShot && !node->fClient;
|
|
|
|
|
|
|
|
|
|
nPreferredDownload += state->fPreferredDownload;
|
|
|
|
|
}
|
|
|
|
|
@@ -1398,7 +1398,7 @@ void static ProcessGetBlockData(CNode* pfrom, const CChainParams& chainparams, c
|
|
|
|
|
const CNetMsgMaker msgMaker(pfrom->GetSendVersion());
|
|
|
|
|
// disconnect node in case we have reached the outbound limit for serving historical blocks
|
|
|
|
|
// never disconnect whitelisted nodes
|
|
|
|
|
if (send && connman->OutboundTargetReached(true) && ( ((pindexBestHeader != nullptr) && (pindexBestHeader->GetBlockTime() - pindex->GetBlockTime() > HISTORICAL_BLOCK_AGE)) || inv.type == MSG_FILTERED_BLOCK) && !pfrom->fWhitelisted)
|
|
|
|
|
if (send && connman->OutboundTargetReached(true) && ( ((pindexBestHeader != nullptr) && (pindexBestHeader->GetBlockTime() - pindex->GetBlockTime() > HISTORICAL_BLOCK_AGE)) || inv.type == MSG_FILTERED_BLOCK) && !pfrom->HasPermission(PF_NOBAN))
|
|
|
|
|
{
|
|
|
|
|
LogPrint(BCLog::NET, "historical block serving limit reached, disconnect peer=%d\n", pfrom->GetId());
|
|
|
|
|
|
|
|
|
|
@@ -1407,7 +1407,7 @@ void static ProcessGetBlockData(CNode* pfrom, const CChainParams& chainparams, c
|
|
|
|
|
send = false;
|
|
|
|
|
}
|
|
|
|
|
// Avoid leaking prune-height by never sending blocks below the NODE_NETWORK_LIMITED threshold
|
|
|
|
|
if (send && !pfrom->fWhitelisted && (
|
|
|
|
|
if (send && !pfrom->HasPermission(PF_NOBAN) && (
|
|
|
|
|
(((pfrom->GetLocalServices() & NODE_NETWORK_LIMITED) == NODE_NETWORK_LIMITED) && ((pfrom->GetLocalServices() & NODE_NETWORK) != NODE_NETWORK) && (::ChainActive().Tip()->nHeight - pindex->nHeight > (int)NODE_NETWORK_LIMITED_MIN_BLOCKS + 2 /* add two blocks buffer extension for possible races */) )
|
|
|
|
|
)) {
|
|
|
|
|
LogPrint(BCLog::NET, "Ignore block request below NODE_NETWORK_LIMITED threshold from peer=%d\n", pfrom->GetId());
|
|
|
|
|
@@ -2217,7 +2217,7 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
|
|
|
|
bool fBlocksOnly = !g_relay_txes;
|
|
|
|
|
|
|
|
|
|
// Allow whitelisted peers to send data other than blocks in blocks only mode if whitelistrelay is true
|
|
|
|
|
if (pfrom->fWhitelisted && gArgs.GetBoolArg("-whitelistrelay", DEFAULT_WHITELISTRELAY))
|
|
|
|
|
if (pfrom->HasPermission(PF_RELAY))
|
|
|
|
|
fBlocksOnly = false;
|
|
|
|
|
|
|
|
|
|
LOCK(cs_main);
|
|
|
|
|
@@ -2412,7 +2412,7 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
LOCK(cs_main);
|
|
|
|
|
if (::ChainstateActive().IsInitialBlockDownload() && !pfrom->fWhitelisted) {
|
|
|
|
|
if (::ChainstateActive().IsInitialBlockDownload() && !pfrom->HasPermission(PF_NOBAN)) {
|
|
|
|
|
LogPrint(BCLog::NET, "Ignoring getheaders from peer=%d because node is in initial block download\n", pfrom->GetId());
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
@@ -2470,7 +2470,7 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
|
|
|
|
if (strCommand == NetMsgType::TX) {
|
|
|
|
|
// Stop processing the transaction early if
|
|
|
|
|
// We are in blocks only mode and peer is either not whitelisted or whitelistrelay is off
|
|
|
|
|
if (!g_relay_txes && (!pfrom->fWhitelisted || !gArgs.GetBoolArg("-whitelistrelay", DEFAULT_WHITELISTRELAY)))
|
|
|
|
|
if (!g_relay_txes && !pfrom->HasPermission(PF_RELAY))
|
|
|
|
|
{
|
|
|
|
|
LogPrint(BCLog::NET, "transaction sent in violation of protocol peer=%d\n", pfrom->GetId());
|
|
|
|
|
return true;
|
|
|
|
|
@@ -2565,7 +2565,7 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
|
|
|
|
AddToCompactExtraTransactions(ptx);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (pfrom->fWhitelisted && gArgs.GetBoolArg("-whitelistforcerelay", DEFAULT_WHITELISTFORCERELAY)) {
|
|
|
|
|
if (pfrom->HasPermission(PF_FORCERELAY)) {
|
|
|
|
|
// Always relay transactions received from whitelisted peers, even
|
|
|
|
|
// if they were already in the mempool or rejected from it due
|
|
|
|
|
// to policy, allowing the node to function as a gateway for
|
|
|
|
|
@@ -3010,7 +3010,7 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (strCommand == NetMsgType::MEMPOOL) {
|
|
|
|
|
if (!(pfrom->GetLocalServices() & NODE_BLOOM) && !pfrom->fWhitelisted)
|
|
|
|
|
if (!(pfrom->GetLocalServices() & NODE_BLOOM) && !pfrom->HasPermission(PF_MEMPOOL))
|
|
|
|
|
{
|
|
|
|
|
if (!pfrom->HasPermission(PF_NOBAN))
|
|
|
|
|
{
|
|
|
|
|
@@ -3020,7 +3020,7 @@ bool static ProcessMessage(CNode* pfrom, const std::string& strCommand, CDataStr
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (connman->OutboundTargetReached(false) && !pfrom->fWhitelisted)
|
|
|
|
|
if (connman->OutboundTargetReached(false) && !pfrom->HasPermission(PF_MEMPOOL))
|
|
|
|
|
{
|
|
|
|
|
if (!pfrom->HasPermission(PF_NOBAN))
|
|
|
|
|
{
|
|
|
|
|
@@ -3222,7 +3222,7 @@ bool PeerLogicValidation::SendRejectsAndCheckIfBanned(CNode* pnode, bool enable_
|
|
|
|
|
|
|
|
|
|
if (state.fShouldBan) {
|
|
|
|
|
state.fShouldBan = false;
|
|
|
|
|
if (pnode->fWhitelisted)
|
|
|
|
|
if (pnode->HasPermission(PF_NOBAN))
|
|
|
|
|
LogPrintf("Warning: not punishing whitelisted peer %s!\n", pnode->addr.ToString());
|
|
|
|
|
else if (pnode->m_manual_connection)
|
|
|
|
|
LogPrintf("Warning: not punishing manually-connected peer %s!\n", pnode->addr.ToString());
|
|
|
|
|
@@ -3792,7 +3792,7 @@ bool PeerLogicValidation::SendMessages(CNode* pto)
|
|
|
|
|
pto->vInventoryBlockToSend.clear();
|
|
|
|
|
|
|
|
|
|
// Check whether periodic sends should happen
|
|
|
|
|
bool fSendTrickle = pto->fWhitelisted;
|
|
|
|
|
bool fSendTrickle = pto->HasPermission(PF_NOBAN);
|
|
|
|
|
if (pto->nNextInvSend < nNow) {
|
|
|
|
|
fSendTrickle = true;
|
|
|
|
|
if (pto->fInbound) {
|
|
|
|
|
@@ -3948,7 +3948,7 @@ bool PeerLogicValidation::SendMessages(CNode* pto)
|
|
|
|
|
// Note: If all our peers are inbound, then we won't
|
|
|
|
|
// disconnect our sync peer for stalling; we have bigger
|
|
|
|
|
// problems if we can't get any outbound peers.
|
|
|
|
|
if (!pto->fWhitelisted) {
|
|
|
|
|
if (!pto->HasPermission(PF_NOBAN)) {
|
|
|
|
|
LogPrintf("Timeout downloading headers from peer=%d, disconnecting\n", pto->GetId());
|
|
|
|
|
pto->fDisconnect = true;
|
|
|
|
|
return true;
|
|
|
|
|
@@ -4066,7 +4066,7 @@ bool PeerLogicValidation::SendMessages(CNode* pto)
|
|
|
|
|
//
|
|
|
|
|
// We don't want white listed peers to filter txs to us if we have -whitelistforcerelay
|
|
|
|
|
if (pto->nVersion >= FEEFILTER_VERSION && gArgs.GetBoolArg("-feefilter", DEFAULT_FEEFILTER) &&
|
|
|
|
|
!(pto->fWhitelisted && gArgs.GetBoolArg("-whitelistforcerelay", DEFAULT_WHITELISTFORCERELAY))) {
|
|
|
|
|
!pto->HasPermission(PF_FORCERELAY)) {
|
|
|
|
|
CAmount currentFilter = mempool.GetMinFee(gArgs.GetArg("-maxmempool", DEFAULT_MAX_MEMPOOL_SIZE) * 1000000).GetFeePerK();
|
|
|
|
|
int64_t timeNow = GetTimeMicros();
|
|
|
|
|
if (timeNow > pto->nextSendTimeFeeFilter) {
|
|
|
|
|
|