Skip to content

libp2p nodes vulnerable to OOM attack #295

@scacaca

Description

@scacaca

Summary

This can occur because when a signed peer record is received, only the signature validity check is performed but the sender signature is not checked. Signed peer records from randomly generated peers can be sent by a malicious actor. A target node will accept the peer record as long as the signature is valid, and then stored in the peer store.

Expected behavior

reject peer on peer ID mismatch

Actual behavior

saved the mismatched peer

Relevant log output

Possible Solution

reject peer on peer ID mismatch

Version

No response

Would you like to work on fixing this bug ?

Yes

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions