invoices: always check htlc amt with invoice amount
Previously a check was made for accepted and settled invoices against the paid amount. This opens up a probe vector where an attacker can pay to an invoice with an amt that is higher than the invoice amount and find out if the invoice is already paid or not.
This commit is contained in:
parent
762609a169
commit
43bad4af9f
@ -437,10 +437,10 @@ func (i *InvoiceRegistry) checkHtlcParameters(invoice *channeldb.Invoice,
|
||||
return channeldb.ErrInvoiceAlreadyCanceled
|
||||
}
|
||||
|
||||
// If a payment has already been made, we only accept more payments if
|
||||
// the amount is the exact same. This prevents probing with small
|
||||
// amounts on settled invoices to find out the receiver node.
|
||||
if invoice.AmtPaid != 0 && amtPaid != invoice.AmtPaid {
|
||||
// If an invoice amount is specified, check that enough is paid. Also
|
||||
// check this for duplicate payments if the invoice is already settled
|
||||
// or accepted.
|
||||
if invoice.Terms.Value > 0 && amtPaid < invoice.Terms.Value {
|
||||
return ErrInvoiceAmountTooLow
|
||||
}
|
||||
|
||||
@ -468,11 +468,6 @@ func (i *InvoiceRegistry) checkHtlcParameters(invoice *channeldb.Invoice,
|
||||
return ErrInvoiceExpiryTooSoon
|
||||
}
|
||||
|
||||
// If an invoice amount is specified, check that enough is paid.
|
||||
if invoice.Terms.Value > 0 && amtPaid < invoice.Terms.Value {
|
||||
return ErrInvoiceAmountTooLow
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
|
@ -165,9 +165,9 @@ func TestSettleInvoice(t *testing.T) {
|
||||
t.Fatal("expected settle event")
|
||||
}
|
||||
|
||||
// Try to settle again with a higher amount. This should result in a
|
||||
// cancel event because after a restart the amount should still be the
|
||||
// same. New HTLCs with a different amount should be rejected.
|
||||
// Try to settle again with a higher amount. This payment should also be
|
||||
// accepted, to prevent any change in behaviour for a paid invoice that
|
||||
// may open up a probe vector.
|
||||
event, err = registry.NotifyExitHopHtlc(
|
||||
hash, amtPaid+600, testHtlcExpiry, testCurrentHeight,
|
||||
hodlChan, nil,
|
||||
@ -175,12 +175,12 @@ func TestSettleInvoice(t *testing.T) {
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected NotifyExitHopHtlc error: %v", err)
|
||||
}
|
||||
if event.Preimage != nil {
|
||||
t.Fatal("expected cancel event")
|
||||
if event.Preimage == nil {
|
||||
t.Fatal("expected settle event")
|
||||
}
|
||||
|
||||
// Try to settle again with a lower amount. This should show the same
|
||||
// behaviour as settling with a higher amount.
|
||||
// Try to settle again with a lower amount. This should fail just as it
|
||||
// would have failed if it were the first payment.
|
||||
event, err = registry.NotifyExitHopHtlc(
|
||||
hash, amtPaid-600, testHtlcExpiry, testCurrentHeight,
|
||||
hodlChan, nil,
|
||||
|
Loading…
Reference in New Issue
Block a user