You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A node should verify all incoming SAF messages if they are legit by either, or:
Checking if they come from a nearby neighbor and request others
OR preferably only accepting incoming SAF messages if it requested such messages.
By not checking these messages, it allows a malicious actor to control what the node downloads by preemptively forwarding messages to it. If SAF message can be used to "break" the node, it allows an attacker to kill a node by simply sending a message to it.
The text was updated successfully, but these errors were encountered:
Description
---
- Keeps track of inflight SAF requests and only accepts responses for
requests that are inflight
- Checks that `stored_at` is in the past
- Fixes#3412, #3410
Motivation and Context
---
See #3412, #3410
How Has This Been Tested?
---
- New/existing unit/integration tests
- memorynet
- Manually
A node should verify all incoming SAF messages if they are legit by either, or:
By not checking these messages, it allows a malicious actor to control what the node downloads by preemptively forwarding messages to it. If SAF message can be used to "break" the node, it allows an attacker to kill a node by simply sending a message to it.
The text was updated successfully, but these errors were encountered: