// Copyright 2019-2020 Parity Technologies (UK) Ltd. // This file is part of Substrate. // Substrate is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // Substrate is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with Substrate. If not, see . //! Verification for BABE headers. use sp_runtime::{traits::Header, traits::DigestItemFor}; use sp_core::{Pair, Public}; use sp_consensus_babe::{make_transcript, AuthoritySignature, SlotNumber, AuthorityPair, AuthorityId}; use sp_consensus_babe::digests::{ PreDigest, PrimaryPreDigest, SecondaryPlainPreDigest, SecondaryVRFPreDigest, CompatibleDigestItem }; use sc_consensus_slots::CheckedHeader; use log::{debug, trace}; use super::{find_pre_digest, babe_err, Epoch, BlockT, Error}; use super::authorship::{calculate_primary_threshold, check_primary_threshold, secondary_slot_author}; /// BABE verification parameters pub(super) struct VerificationParams<'a, B: 'a + BlockT> { /// The header being verified. pub(super) header: B::Header, /// The pre-digest of the header being verified. this is optional - if prior /// verification code had to read it, it can be included here to avoid duplicate /// work. pub(super) pre_digest: Option, /// The slot number of the current time. pub(super) slot_now: SlotNumber, /// Epoch descriptor of the epoch this block _should_ be under, if it's valid. pub(super) epoch: &'a Epoch, } /// Check a header has been signed by the right key. If the slot is too far in /// the future, an error will be returned. If successful, returns the pre-header /// and the digest item containing the seal. /// /// The seal must be the last digest. Otherwise, the whole header is considered /// unsigned. This is required for security and must not be changed. /// /// This digest item will always return `Some` when used with `as_babe_pre_digest`. /// /// The given header can either be from a primary or secondary slot assignment, /// with each having different validation logic. pub(super) fn check_header( params: VerificationParams, ) -> Result>, Error> where DigestItemFor: CompatibleDigestItem, { let VerificationParams { mut header, pre_digest, slot_now, epoch, } = params; let authorities = &epoch.authorities; let pre_digest = pre_digest.map(Ok).unwrap_or_else(|| find_pre_digest::(&header))?; trace!(target: "babe", "Checking header"); let seal = match header.digest_mut().pop() { Some(x) => x, None => return Err(babe_err(Error::HeaderUnsealed(header.hash()))), }; let sig = seal.as_babe_seal().ok_or_else(|| { babe_err(Error::HeaderBadSeal(header.hash())) })?; // the pre-hash of the header doesn't include the seal // and that's what we sign let pre_hash = header.hash(); if pre_digest.slot_number() > slot_now { header.digest_mut().push(seal); return Ok(CheckedHeader::Deferred(header, pre_digest.slot_number())); } let author = match authorities.get(pre_digest.authority_index() as usize) { Some(author) => author.0.clone(), None => return Err(babe_err(Error::SlotAuthorNotFound)), }; match &pre_digest { PreDigest::Primary(primary) => { debug!(target: "babe", "Verifying Primary block"); check_primary_header::( pre_hash, primary, sig, &epoch, epoch.config.c, )?; }, PreDigest::SecondaryPlain(secondary) if epoch.config.allowed_slots.is_secondary_plain_slots_allowed() => { debug!(target: "babe", "Verifying Secondary plain block"); check_secondary_plain_header::( pre_hash, secondary, sig, &epoch, )?; }, PreDigest::SecondaryVRF(secondary) if epoch.config.allowed_slots.is_secondary_vrf_slots_allowed() => { debug!(target: "babe", "Verifying Secondary VRF block"); check_secondary_vrf_header::( pre_hash, secondary, sig, &epoch, )?; }, _ => { return Err(babe_err(Error::SecondarySlotAssignmentsDisabled)); } } let info = VerifiedHeaderInfo { pre_digest: CompatibleDigestItem::babe_pre_digest(pre_digest), seal, author, }; Ok(CheckedHeader::Checked(header, info)) } pub(super) struct VerifiedHeaderInfo { pub(super) pre_digest: DigestItemFor, pub(super) seal: DigestItemFor, pub(super) author: AuthorityId, } /// Check a primary slot proposal header. We validate that the given header is /// properly signed by the expected authority, and that the contained VRF proof /// is valid. Additionally, the weight of this block must increase compared to /// its parent since it is a primary block. fn check_primary_header( pre_hash: B::Hash, pre_digest: &PrimaryPreDigest, signature: AuthoritySignature, epoch: &Epoch, c: (u64, u64), ) -> Result<(), Error> { let author = &epoch.authorities[pre_digest.authority_index as usize].0; if AuthorityPair::verify(&signature, pre_hash, &author) { let (inout, _) = { let transcript = make_transcript( &epoch.randomness, pre_digest.slot_number, epoch.epoch_index, ); schnorrkel::PublicKey::from_bytes(author.as_slice()).and_then(|p| { p.vrf_verify(transcript, &pre_digest.vrf_output, &pre_digest.vrf_proof) }).map_err(|s| { babe_err(Error::VRFVerificationFailed(s)) })? }; let threshold = calculate_primary_threshold( c, &epoch.authorities, pre_digest.authority_index as usize, ); if !check_primary_threshold(&inout, threshold) { return Err(babe_err(Error::VRFVerificationOfBlockFailed(author.clone(), threshold))); } Ok(()) } else { Err(babe_err(Error::BadSignature(pre_hash))) } } /// Check a secondary slot proposal header. We validate that the given header is /// properly signed by the expected authority, which we have a deterministic way /// of computing. Additionally, the weight of this block must stay the same /// compared to its parent since it is a secondary block. fn check_secondary_plain_header( pre_hash: B::Hash, pre_digest: &SecondaryPlainPreDigest, signature: AuthoritySignature, epoch: &Epoch, ) -> Result<(), Error> { // check the signature is valid under the expected authority and // chain state. let expected_author = secondary_slot_author( pre_digest.slot_number, &epoch.authorities, epoch.randomness, ).ok_or_else(|| Error::NoSecondaryAuthorExpected)?; let author = &epoch.authorities[pre_digest.authority_index as usize].0; if expected_author != author { return Err(Error::InvalidAuthor(expected_author.clone(), author.clone())); } if AuthorityPair::verify(&signature, pre_hash.as_ref(), author) { Ok(()) } else { Err(Error::BadSignature(pre_hash)) } } /// Check a secondary VRF slot proposal header. fn check_secondary_vrf_header( pre_hash: B::Hash, pre_digest: &SecondaryVRFPreDigest, signature: AuthoritySignature, epoch: &Epoch, ) -> Result<(), Error> { // check the signature is valid under the expected authority and // chain state. let expected_author = secondary_slot_author( pre_digest.slot_number, &epoch.authorities, epoch.randomness, ).ok_or_else(|| Error::NoSecondaryAuthorExpected)?; let author = &epoch.authorities[pre_digest.authority_index as usize].0; if expected_author != author { return Err(Error::InvalidAuthor(expected_author.clone(), author.clone())); } if AuthorityPair::verify(&signature, pre_hash.as_ref(), author) { let transcript = make_transcript( &epoch.randomness, pre_digest.slot_number, epoch.epoch_index, ); schnorrkel::PublicKey::from_bytes(author.as_slice()).and_then(|p| { p.vrf_verify(transcript, &pre_digest.vrf_output, &pre_digest.vrf_proof) }).map_err(|s| { babe_err(Error::VRFVerificationFailed(s)) })?; Ok(()) } else { Err(Error::BadSignature(pre_hash)) } }