From bfc848e89254d9b511dc6d9b516a2c24c9f43082 Mon Sep 17 00:00:00 2001 From: Wilmer Paulino Date: Mon, 21 Nov 2022 12:49:05 -0800 Subject: [PATCH] Re-derive signers upon deserializing OnchainTxHandler Similar to the previous commit, we introduce a new serialization version that doesn't store a monitor's signer. Since the monitor already knows of a channel's `channel_keys_id`, there's no need to store any new data to re-derive all private key material for said channel. --- lightning/src/chain/channelmonitor.rs | 4 +++- lightning/src/chain/onchaintx.rs | 24 +++++++++++++++++------- 2 files changed, 20 insertions(+), 8 deletions(-) diff --git a/lightning/src/chain/channelmonitor.rs b/lightning/src/chain/channelmonitor.rs index 92f1a8df..df429639 100644 --- a/lightning/src/chain/channelmonitor.rs +++ b/lightning/src/chain/channelmonitor.rs @@ -3789,7 +3789,9 @@ impl<'a, K: KeysInterface> ReadableArgs<&'a K> return Err(DecodeError::InvalidValue); } } - let onchain_tx_handler: OnchainTxHandler = ReadableArgs::read(reader, keys_manager)?; + let onchain_tx_handler: OnchainTxHandler = ReadableArgs::read( + reader, (keys_manager, channel_value_satoshis, channel_keys_id) + )?; let lockdown_from_offchain = Readable::read(reader)?; let holder_tx_signed = Readable::read(reader)?; diff --git a/lightning/src/chain/onchaintx.rs b/lightning/src/chain/onchaintx.rs index 2ce2ed41..abbd047d 100644 --- a/lightning/src/chain/onchaintx.rs +++ b/lightning/src/chain/onchaintx.rs @@ -21,6 +21,7 @@ use bitcoin::hash_types::{Txid, BlockHash}; use bitcoin::secp256k1::{Secp256k1, ecdsa::Signature}; use bitcoin::secp256k1; +use crate::chain::keysinterface::BaseSign; use crate::ln::msgs::DecodeError; use crate::ln::PaymentPreimage; #[cfg(anchors)] @@ -303,8 +304,12 @@ impl OnchainTxHandler { } } -impl<'a, K: KeysInterface> ReadableArgs<&'a K> for OnchainTxHandler { - fn read(reader: &mut R, keys_manager: &'a K) -> Result { +impl<'a, K: KeysInterface> ReadableArgs<(&'a K, u64, [u8; 32])> for OnchainTxHandler { + fn read(reader: &mut R, args: (&'a K, u64, [u8; 32])) -> Result { + let keys_manager = args.0; + let channel_value_satoshis = args.1; + let channel_keys_id = args.2; + let _ver = read_ver_prefix!(reader, SERIALIZATION_VERSION); let destination_script = Readable::read(reader)?; @@ -316,16 +321,21 @@ impl<'a, K: KeysInterface> ReadableArgs<&'a K> for OnchainTxHandler { let channel_parameters = Readable::read(reader)?; + // Read the serialized signer bytes, but don't deserialize them, as we'll obtain our signer + // by re-deriving the private key material. let keys_len: u32 = Readable::read(reader)?; - let mut keys_data = Vec::with_capacity(cmp::min(keys_len as usize, MAX_ALLOC_SIZE)); - while keys_data.len() != keys_len as usize { + let mut bytes_read = 0; + while bytes_read != keys_len as usize { // Read 1KB at a time to avoid accidentally allocating 4GB on corrupted channel keys let mut data = [0; 1024]; - let read_slice = &mut data[0..cmp::min(1024, keys_len as usize - keys_data.len())]; + let bytes_to_read = cmp::min(1024, keys_len as usize - bytes_read); + let read_slice = &mut data[0..bytes_to_read]; reader.read_exact(read_slice)?; - keys_data.extend_from_slice(read_slice); + bytes_read += bytes_to_read; } - let signer = keys_manager.read_chan_signer(&keys_data)?; + + let mut signer = keys_manager.derive_channel_signer(channel_value_satoshis, channel_keys_id); + signer.provide_channel_parameters(&channel_parameters); let pending_claim_requests_len: u64 = Readable::read(reader)?; let mut pending_claim_requests = HashMap::with_capacity(cmp::min(pending_claim_requests_len as usize, MAX_ALLOC_SIZE / 128)); -- 2.30.2