/root/bitcoin/src/policy/policy.cpp
Line | Count | Source |
1 | | // Copyright (c) 2009-2010 Satoshi Nakamoto |
2 | | // Copyright (c) 2009-present The Bitcoin Core developers |
3 | | // Distributed under the MIT software license, see the accompanying |
4 | | // file COPYING or http://www.opensource.org/licenses/mit-license.php. |
5 | | |
6 | | // NOTE: This file is intended to be customised by the end user, and includes only local node policy logic |
7 | | |
8 | | #include <policy/policy.h> |
9 | | |
10 | | #include <coins.h> |
11 | | #include <consensus/amount.h> |
12 | | #include <consensus/consensus.h> |
13 | | #include <consensus/validation.h> |
14 | | #include <policy/feerate.h> |
15 | | #include <primitives/transaction.h> |
16 | | #include <script/interpreter.h> |
17 | | #include <script/script.h> |
18 | | #include <script/solver.h> |
19 | | #include <serialize.h> |
20 | | #include <span.h> |
21 | | #include <tinyformat.h> |
22 | | |
23 | | #include <algorithm> |
24 | | #include <cstddef> |
25 | | #include <vector> |
26 | | |
27 | | CAmount GetDustThreshold(const CTxOut& txout, const CFeeRate& dustRelayFeeIn) |
28 | 0 | { |
29 | | // "Dust" is defined in terms of dustRelayFee, |
30 | | // which has units satoshis-per-kilobyte. |
31 | | // If you'd pay more in fees than the value of the output |
32 | | // to spend something, then we consider it dust. |
33 | | // A typical spendable non-segwit txout is 34 bytes big, and will |
34 | | // need a CTxIn of at least 148 bytes to spend: |
35 | | // so dust is a spendable txout less than |
36 | | // 182*dustRelayFee/1000 (in satoshis). |
37 | | // 546 satoshis at the default rate of 3000 sat/kvB. |
38 | | // A typical spendable segwit P2WPKH txout is 31 bytes big, and will |
39 | | // need a CTxIn of at least 67 bytes to spend: |
40 | | // so dust is a spendable txout less than |
41 | | // 98*dustRelayFee/1000 (in satoshis). |
42 | | // 294 satoshis at the default rate of 3000 sat/kvB. |
43 | 0 | if (txout.scriptPubKey.IsUnspendable()) |
44 | 0 | return 0; |
45 | | |
46 | 0 | uint64_t nSize{GetSerializeSize(txout)}; |
47 | 0 | int witnessversion = 0; |
48 | 0 | std::vector<unsigned char> witnessprogram; |
49 | | |
50 | | // Note this computation is for spending a Segwit v0 P2WPKH output (a 33 bytes |
51 | | // public key + an ECDSA signature). For Segwit v1 Taproot outputs the minimum |
52 | | // satisfaction is lower (a single BIP340 signature) but this computation was |
53 | | // kept to not further reduce the dust level. |
54 | | // See discussion in https://github.com/bitcoin/bitcoin/pull/22779 for details. |
55 | 0 | if (txout.scriptPubKey.IsWitnessProgram(witnessversion, witnessprogram)) { |
56 | | // sum the sizes of the parts of a transaction input |
57 | | // with 75% segwit discount applied to the script size. |
58 | 0 | nSize += (32 + 4 + 1 + (107 / WITNESS_SCALE_FACTOR) + 4); |
59 | 0 | } else { |
60 | 0 | nSize += (32 + 4 + 1 + 107 + 4); // the 148 mentioned above |
61 | 0 | } |
62 | |
|
63 | 0 | return dustRelayFeeIn.GetFee(nSize); |
64 | 0 | } |
65 | | |
66 | | bool IsDust(const CTxOut& txout, const CFeeRate& dustRelayFeeIn) |
67 | 0 | { |
68 | 0 | return (txout.nValue < GetDustThreshold(txout, dustRelayFeeIn)); |
69 | 0 | } |
70 | | |
71 | | std::vector<uint32_t> GetDust(const CTransaction& tx, CFeeRate dust_relay_rate) |
72 | 0 | { |
73 | 0 | std::vector<uint32_t> dust_outputs; |
74 | 0 | for (uint32_t i{0}; i < tx.vout.size(); ++i) { |
75 | 0 | if (IsDust(tx.vout[i], dust_relay_rate)) dust_outputs.push_back(i); |
76 | 0 | } |
77 | 0 | return dust_outputs; |
78 | 0 | } |
79 | | |
80 | | bool IsStandard(const CScript& scriptPubKey, TxoutType& whichType) |
81 | 0 | { |
82 | 0 | std::vector<std::vector<unsigned char> > vSolutions; |
83 | 0 | whichType = Solver(scriptPubKey, vSolutions); |
84 | |
|
85 | 0 | if (whichType == TxoutType::NONSTANDARD) { |
86 | 0 | return false; |
87 | 0 | } else if (whichType == TxoutType::MULTISIG) { |
88 | 0 | unsigned char m = vSolutions.front()[0]; |
89 | 0 | unsigned char n = vSolutions.back()[0]; |
90 | | // Support up to x-of-3 multisig txns as standard |
91 | 0 | if (n < 1 || n > 3) |
92 | 0 | return false; |
93 | 0 | if (m < 1 || m > n) |
94 | 0 | return false; |
95 | 0 | } |
96 | | |
97 | 0 | return true; |
98 | 0 | } |
99 | | |
100 | | bool IsStandardTx(const CTransaction& tx, const std::optional<unsigned>& max_datacarrier_bytes, bool permit_bare_multisig, const CFeeRate& dust_relay_fee, std::string& reason) |
101 | 0 | { |
102 | 0 | if (tx.version > TX_MAX_STANDARD_VERSION || tx.version < TX_MIN_STANDARD_VERSION) { |
103 | 0 | reason = "version"; |
104 | 0 | return false; |
105 | 0 | } |
106 | | |
107 | | // Extremely large transactions with lots of inputs can cost the network |
108 | | // almost as much to process as they cost the sender in fees, because |
109 | | // computing signature hashes is O(ninputs*txsize). Limiting transactions |
110 | | // to MAX_STANDARD_TX_WEIGHT mitigates CPU exhaustion attacks. |
111 | 0 | unsigned int sz = GetTransactionWeight(tx); |
112 | 0 | if (sz > MAX_STANDARD_TX_WEIGHT) { |
113 | 0 | reason = "tx-size"; |
114 | 0 | return false; |
115 | 0 | } |
116 | | |
117 | 0 | for (const CTxIn& txin : tx.vin) |
118 | 0 | { |
119 | | // Biggest 'standard' txin involving only keys is a 15-of-15 P2SH |
120 | | // multisig with compressed keys (remember the MAX_SCRIPT_ELEMENT_SIZE byte limit on |
121 | | // redeemScript size). That works out to a (15*(33+1))+3=513 byte |
122 | | // redeemScript, 513+1+15*(73+1)+3=1627 bytes of scriptSig, which |
123 | | // we round off to 1650(MAX_STANDARD_SCRIPTSIG_SIZE) bytes for |
124 | | // some minor future-proofing. That's also enough to spend a |
125 | | // 20-of-20 CHECKMULTISIG scriptPubKey, though such a scriptPubKey |
126 | | // is not considered standard. |
127 | 0 | if (txin.scriptSig.size() > MAX_STANDARD_SCRIPTSIG_SIZE) { |
128 | 0 | reason = "scriptsig-size"; |
129 | 0 | return false; |
130 | 0 | } |
131 | 0 | if (!txin.scriptSig.IsPushOnly()) { |
132 | 0 | reason = "scriptsig-not-pushonly"; |
133 | 0 | return false; |
134 | 0 | } |
135 | 0 | } |
136 | | |
137 | 0 | unsigned int datacarrier_bytes_left = max_datacarrier_bytes.value_or(0); |
138 | 0 | TxoutType whichType; |
139 | 0 | for (const CTxOut& txout : tx.vout) { |
140 | 0 | if (!::IsStandard(txout.scriptPubKey, whichType)) { |
141 | 0 | reason = "scriptpubkey"; |
142 | 0 | return false; |
143 | 0 | } |
144 | | |
145 | 0 | if (whichType == TxoutType::NULL_DATA) { |
146 | 0 | unsigned int size = txout.scriptPubKey.size(); |
147 | 0 | if (size > datacarrier_bytes_left) { |
148 | 0 | reason = "datacarrier"; |
149 | 0 | return false; |
150 | 0 | } |
151 | 0 | datacarrier_bytes_left -= size; |
152 | 0 | } else if ((whichType == TxoutType::MULTISIG) && (!permit_bare_multisig)) { |
153 | 0 | reason = "bare-multisig"; |
154 | 0 | return false; |
155 | 0 | } |
156 | 0 | } |
157 | | |
158 | | // Only MAX_DUST_OUTPUTS_PER_TX dust is permitted(on otherwise valid ephemeral dust) |
159 | 0 | if (GetDust(tx, dust_relay_fee).size() > MAX_DUST_OUTPUTS_PER_TX) { |
160 | 0 | reason = "dust"; |
161 | 0 | return false; |
162 | 0 | } |
163 | | |
164 | 0 | return true; |
165 | 0 | } |
166 | | |
167 | | /** |
168 | | * Check the total number of non-witness sigops across the whole transaction, as per BIP54. |
169 | | */ |
170 | | static bool CheckSigopsBIP54(const CTransaction& tx, const CCoinsViewCache& inputs) |
171 | 0 | { |
172 | 0 | Assert(!tx.IsCoinBase()); Line | Count | Source | 113 | 0 | #define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val) |
|
173 | |
|
174 | 0 | unsigned int sigops{0}; |
175 | 0 | for (const auto& txin: tx.vin) { |
176 | 0 | const auto& prev_txo{inputs.AccessCoin(txin.prevout).out}; |
177 | | |
178 | | // Unlike the existing block wide sigop limit which counts sigops present in the block |
179 | | // itself (including the scriptPubKey which is not executed until spending later), BIP54 |
180 | | // counts sigops in the block where they are potentially executed (only). |
181 | | // This means sigops in the spent scriptPubKey count toward the limit. |
182 | | // `fAccurate` means correctly accounting sigops for CHECKMULTISIGs(VERIFY) with 16 pubkeys |
183 | | // or fewer. This method of accounting was introduced by BIP16, and BIP54 reuses it. |
184 | | // The GetSigOpCount call on the previous scriptPubKey counts both bare and P2SH sigops. |
185 | 0 | sigops += txin.scriptSig.GetSigOpCount(/*fAccurate=*/true); |
186 | 0 | sigops += prev_txo.scriptPubKey.GetSigOpCount(txin.scriptSig); |
187 | |
|
188 | 0 | if (sigops > MAX_TX_LEGACY_SIGOPS) { |
189 | 0 | return false; |
190 | 0 | } |
191 | 0 | } |
192 | | |
193 | 0 | return true; |
194 | 0 | } |
195 | | |
196 | | /** |
197 | | * Check transaction inputs. |
198 | | * |
199 | | * This does three things: |
200 | | * * Prevents mempool acceptance of spends of future |
201 | | * segwit versions we don't know how to validate |
202 | | * * Mitigates a potential denial-of-service attack with |
203 | | * P2SH scripts with a crazy number of expensive |
204 | | * CHECKSIG/CHECKMULTISIG operations. |
205 | | * * Prevents spends of unknown/irregular scriptPubKeys, |
206 | | * which mitigates potential denial-of-service attacks |
207 | | * involving expensive scripts and helps reserve them |
208 | | * as potential new upgrade hooks. |
209 | | * |
210 | | * Note that only the non-witness portion of the transaction is checked here. |
211 | | * |
212 | | * We also check the total number of non-witness sigops across the whole transaction, as per BIP54. |
213 | | */ |
214 | | TxValidationState ValidateInputsStandardness(const CTransaction& tx, const CCoinsViewCache& mapInputs) |
215 | 0 | { |
216 | 0 | TxValidationState state; |
217 | 0 | if (tx.IsCoinBase()) { |
218 | 0 | return state; // Coinbases don't use vin normally |
219 | 0 | } |
220 | | |
221 | 0 | if (!CheckSigopsBIP54(tx, mapInputs)) { |
222 | 0 | state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", "non-witness sigops exceed bip54 limit"); |
223 | 0 | return state; |
224 | 0 | } |
225 | | |
226 | 0 | for (unsigned int i = 0; i < tx.vin.size(); i++) { |
227 | 0 | const CTxOut& prev = mapInputs.AccessCoin(tx.vin[i].prevout).out; |
228 | |
|
229 | 0 | std::vector<std::vector<unsigned char> > vSolutions; |
230 | 0 | TxoutType whichType = Solver(prev.scriptPubKey, vSolutions); |
231 | 0 | if (whichType == TxoutType::NONSTANDARD) { |
232 | 0 | state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("input %u script unknown", i));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
233 | 0 | return state; |
234 | 0 | } else if (whichType == TxoutType::WITNESS_UNKNOWN) { |
235 | | // WITNESS_UNKNOWN failures are typically also caught with a policy |
236 | | // flag in the script interpreter, but it can be helpful to catch |
237 | | // this type of NONSTANDARD transaction earlier in transaction |
238 | | // validation. |
239 | 0 | state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("input %u witness program is undefined", i));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
240 | 0 | return state; |
241 | 0 | } else if (whichType == TxoutType::SCRIPTHASH) { |
242 | 0 | std::vector<std::vector<unsigned char> > stack; |
243 | 0 | ScriptError serror; |
244 | | // convert the scriptSig into a stack, so we can inspect the redeemScript |
245 | 0 | if (!EvalScript(stack, tx.vin[i].scriptSig, SCRIPT_VERIFY_NONE, BaseSignatureChecker(), SigVersion::BASE, &serror)) { |
246 | 0 | state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("p2sh scriptsig malformed (input %u: %s)", i, ScriptErrorString(serror)));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
247 | 0 | return state; |
248 | 0 | } |
249 | 0 | if (stack.empty()) { |
250 | 0 | state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("input %u P2SH redeemscript missing", i));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
251 | 0 | return state; |
252 | 0 | } |
253 | 0 | CScript subscript(stack.back().begin(), stack.back().end()); |
254 | 0 | unsigned int sigop_count = subscript.GetSigOpCount(true); |
255 | 0 | if (sigop_count > MAX_P2SH_SIGOPS) { |
256 | 0 | state.Invalid(TxValidationResult::TX_INPUTS_NOT_STANDARD, "bad-txns-nonstandard-inputs", strprintf("p2sh redeemscript sigops exceed limit (input %u: %u > %u)", i, sigop_count, MAX_P2SH_SIGOPS));Line | Count | Source | 1172 | 0 | #define strprintf tfm::format |
|
257 | 0 | return state; |
258 | 0 | } |
259 | 0 | } |
260 | 0 | } |
261 | | |
262 | 0 | return state; |
263 | 0 | } |
264 | | |
265 | | bool IsWitnessStandard(const CTransaction& tx, const CCoinsViewCache& mapInputs) |
266 | 0 | { |
267 | 0 | if (tx.IsCoinBase()) |
268 | 0 | return true; // Coinbases are skipped |
269 | | |
270 | 0 | for (unsigned int i = 0; i < tx.vin.size(); i++) |
271 | 0 | { |
272 | | // We don't care if witness for this input is empty, since it must not be bloated. |
273 | | // If the script is invalid without witness, it would be caught sooner or later during validation. |
274 | 0 | if (tx.vin[i].scriptWitness.IsNull()) |
275 | 0 | continue; |
276 | | |
277 | 0 | const CTxOut &prev = mapInputs.AccessCoin(tx.vin[i].prevout).out; |
278 | | |
279 | | // get the scriptPubKey corresponding to this input: |
280 | 0 | CScript prevScript = prev.scriptPubKey; |
281 | | |
282 | | // witness stuffing detected |
283 | 0 | if (prevScript.IsPayToAnchor()) { |
284 | 0 | return false; |
285 | 0 | } |
286 | | |
287 | 0 | bool p2sh = false; |
288 | 0 | if (prevScript.IsPayToScriptHash()) { |
289 | 0 | std::vector <std::vector<unsigned char> > stack; |
290 | | // If the scriptPubKey is P2SH, we try to extract the redeemScript casually by converting the scriptSig |
291 | | // into a stack. We do not check IsPushOnly nor compare the hash as these will be done later anyway. |
292 | | // If the check fails at this stage, we know that this txid must be a bad one. |
293 | 0 | if (!EvalScript(stack, tx.vin[i].scriptSig, SCRIPT_VERIFY_NONE, BaseSignatureChecker(), SigVersion::BASE)) |
294 | 0 | return false; |
295 | 0 | if (stack.empty()) |
296 | 0 | return false; |
297 | 0 | prevScript = CScript(stack.back().begin(), stack.back().end()); |
298 | 0 | p2sh = true; |
299 | 0 | } |
300 | | |
301 | 0 | int witnessversion = 0; |
302 | 0 | std::vector<unsigned char> witnessprogram; |
303 | | |
304 | | // Non-witness program must not be associated with any witness |
305 | 0 | if (!prevScript.IsWitnessProgram(witnessversion, witnessprogram)) |
306 | 0 | return false; |
307 | | |
308 | | // Check P2WSH standard limits |
309 | 0 | if (witnessversion == 0 && witnessprogram.size() == WITNESS_V0_SCRIPTHASH_SIZE) { |
310 | 0 | if (tx.vin[i].scriptWitness.stack.back().size() > MAX_STANDARD_P2WSH_SCRIPT_SIZE) |
311 | 0 | return false; |
312 | 0 | size_t sizeWitnessStack = tx.vin[i].scriptWitness.stack.size() - 1; |
313 | 0 | if (sizeWitnessStack > MAX_STANDARD_P2WSH_STACK_ITEMS) |
314 | 0 | return false; |
315 | 0 | for (unsigned int j = 0; j < sizeWitnessStack; j++) { |
316 | 0 | if (tx.vin[i].scriptWitness.stack[j].size() > MAX_STANDARD_P2WSH_STACK_ITEM_SIZE) |
317 | 0 | return false; |
318 | 0 | } |
319 | 0 | } |
320 | | |
321 | | // Check policy limits for Taproot spends: |
322 | | // - MAX_STANDARD_TAPSCRIPT_STACK_ITEM_SIZE limit for stack item size |
323 | | // - No annexes |
324 | 0 | if (witnessversion == 1 && witnessprogram.size() == WITNESS_V1_TAPROOT_SIZE && !p2sh) { |
325 | | // Taproot spend (non-P2SH-wrapped, version 1, witness program size 32; see BIP 341) |
326 | 0 | std::span stack{tx.vin[i].scriptWitness.stack}; |
327 | 0 | if (stack.size() >= 2 && !stack.back().empty() && stack.back()[0] == ANNEX_TAG) { |
328 | | // Annexes are nonstandard as long as no semantics are defined for them. |
329 | 0 | return false; |
330 | 0 | } |
331 | 0 | if (stack.size() >= 2) { |
332 | | // Script path spend (2 or more stack elements after removing optional annex) |
333 | 0 | const auto& control_block = SpanPopBack(stack); |
334 | 0 | SpanPopBack(stack); // Ignore script |
335 | 0 | if (control_block.empty()) return false; // Empty control block is invalid |
336 | 0 | if ((control_block[0] & TAPROOT_LEAF_MASK) == TAPROOT_LEAF_TAPSCRIPT) { |
337 | | // Leaf version 0xc0 (aka Tapscript, see BIP 342) |
338 | 0 | for (const auto& item : stack) { |
339 | 0 | if (item.size() > MAX_STANDARD_TAPSCRIPT_STACK_ITEM_SIZE) return false; |
340 | 0 | } |
341 | 0 | } |
342 | 0 | } else if (stack.size() == 1) { |
343 | | // Key path spend (1 stack element after removing optional annex) |
344 | | // (no policy rules apply) |
345 | 0 | } else { |
346 | | // 0 stack elements; this is already invalid by consensus rules |
347 | 0 | return false; |
348 | 0 | } |
349 | 0 | } |
350 | 0 | } |
351 | 0 | return true; |
352 | 0 | } |
353 | | |
354 | | bool SpendsNonAnchorWitnessProg(const CTransaction& tx, const CCoinsViewCache& prevouts) |
355 | 0 | { |
356 | 0 | if (tx.IsCoinBase()) { |
357 | 0 | return false; |
358 | 0 | } |
359 | | |
360 | 0 | int version; |
361 | 0 | std::vector<uint8_t> program; |
362 | 0 | for (const auto& txin: tx.vin) { |
363 | 0 | const auto& prev_spk{prevouts.AccessCoin(txin.prevout).out.scriptPubKey}; |
364 | | |
365 | | // Note this includes not-yet-defined witness programs. |
366 | 0 | if (prev_spk.IsWitnessProgram(version, program) && !prev_spk.IsPayToAnchor(version, program)) { |
367 | 0 | return true; |
368 | 0 | } |
369 | | |
370 | | // For P2SH extract the redeem script and check if it spends a non-Taproot witness program. Note |
371 | | // this is fine to call EvalScript (as done in ValidateInputsStandardness/IsWitnessStandard) because this |
372 | | // function is only ever called after IsStandardTx, which checks the scriptsig is pushonly. |
373 | 0 | if (prev_spk.IsPayToScriptHash()) { |
374 | | // If EvalScript fails or results in an empty stack, the transaction is invalid by consensus. |
375 | 0 | std::vector <std::vector<uint8_t>> stack; |
376 | 0 | if (!EvalScript(stack, txin.scriptSig, SCRIPT_VERIFY_NONE, BaseSignatureChecker{}, SigVersion::BASE) |
377 | 0 | || stack.empty()) { |
378 | 0 | continue; |
379 | 0 | } |
380 | 0 | const CScript redeem_script{stack.back().begin(), stack.back().end()}; |
381 | 0 | if (redeem_script.IsWitnessProgram(version, program)) { |
382 | 0 | return true; |
383 | 0 | } |
384 | 0 | } |
385 | 0 | } |
386 | | |
387 | 0 | return false; |
388 | 0 | } |
389 | | |
390 | | int64_t GetSigOpsAdjustedWeight(int64_t weight, int64_t sigop_cost, unsigned int bytes_per_sigop) |
391 | 0 | { |
392 | 0 | return std::max(weight, sigop_cost * bytes_per_sigop); |
393 | 0 | } |
394 | | |
395 | | int64_t GetVirtualTransactionSize(int64_t nWeight, int64_t nSigOpCost, unsigned int bytes_per_sigop) |
396 | 0 | { |
397 | 0 | return (GetSigOpsAdjustedWeight(nWeight, nSigOpCost, bytes_per_sigop) + WITNESS_SCALE_FACTOR - 1) / WITNESS_SCALE_FACTOR; |
398 | 0 | } |
399 | | |
400 | | int64_t GetVirtualTransactionSize(const CTransaction& tx, int64_t nSigOpCost, unsigned int bytes_per_sigop) |
401 | 0 | { |
402 | 0 | return GetVirtualTransactionSize(GetTransactionWeight(tx), nSigOpCost, bytes_per_sigop); |
403 | 0 | } |
404 | | |
405 | | int64_t GetVirtualTransactionInputSize(const CTxIn& txin, int64_t nSigOpCost, unsigned int bytes_per_sigop) |
406 | 0 | { |
407 | 0 | return GetVirtualTransactionSize(GetTransactionInputWeight(txin), nSigOpCost, bytes_per_sigop); |
408 | 0 | } |