mirror of
https://github.com/dashpay/dash.git
synced 2024-12-27 04:52:59 +01:00
Do not invoke anti-DoS system for invalid BIP16 transactions
Doing so would allow an attack on old nodes, which would relay a standard transaction spending a BIP16 output in an invalid way, until reaching a new node, which will disconnect their peer. Reported by makomk on IRC.
This commit is contained in:
parent
1168d30b0a
commit
db9f2e0117
@ -1138,7 +1138,14 @@ bool CTransaction::ConnectInputs(MapPrevTx inputs,
|
|||||||
{
|
{
|
||||||
// Verify signature
|
// Verify signature
|
||||||
if (!VerifySignature(txPrev, *this, i, fStrictPayToScriptHash, 0))
|
if (!VerifySignature(txPrev, *this, i, fStrictPayToScriptHash, 0))
|
||||||
|
{
|
||||||
|
// only during transition phase for P2SH: do not invoke anti-DoS code for
|
||||||
|
// potentially old clients relaying bad P2SH transactions
|
||||||
|
if (fStrictPayToScriptHash && VerifySignature(txPrev, *this, i, false, 0))
|
||||||
|
return error("ConnectInputs() : %s P2SH VerifySignature failed", GetHash().ToString().substr(0,10).c_str());
|
||||||
|
|
||||||
return DoS(100,error("ConnectInputs() : %s VerifySignature failed", GetHash().ToString().substr(0,10).c_str()));
|
return DoS(100,error("ConnectInputs() : %s VerifySignature failed", GetHash().ToString().substr(0,10).c_str()));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Mark outpoints as spent
|
// Mark outpoints as spent
|
||||||
|
Loading…
Reference in New Issue
Block a user