Nolisten patch #11

pull ghost wants to merge 2 commits into bitcoin:master from changing 5 files +20 −9
  1. ghost commented at 1:15 PM on December 22, 2010: none

    With the current client it is impossible to start mulitple instances of bitcoin on one system, as they compete for the listen port. This patch adds a command line option to not accept bitcoin connection from outside.

    This can be useful in some cases:

    • Testing e-commerce software on the testnet with multiple clients on one machine (akin to paypal sandbox testing)
    • When multiple users on one shared server want to run the bitcoin client
    • As a primitive security measure

    Of course it would be even better to specify a port to listen on on the command line, but as I understood the current protocol has no support for alternative ports, so this would be useless.

  2. add -nolisten command line option 5f88e8887a
  3. gavinandresen commented at 2:25 PM on December 22, 2010: contributor

    Could you post a [PULL REQUEST] about this on the Dev&Tech forum: http://www.bitcoin.org/smf/index.php?board=6.0

    Until we figure out where we want to discuss pull requests (on the forum or maybe directly here), I figure it is best to do both.

  4. gavinandresen commented at 3:22 PM on December 23, 2010: contributor

    I'm a little worried that if this feature gets popular the IRC channel and the 'addr' messages flying across the network might be overwhelmed with the IP addresses of clients that aren't listening. New nodes joining might then spend a long time trying and failing to connect.

    I'd be more comfortable if the patch also taught the client NOT to advertise its own IP:port on the IRC channel or via 'addr' broadcasts.

  5. don't advertise on IRC if we don't allow external connections 72b9861635
  6. ghost commented at 9:25 AM on December 24, 2010: none

    I had originally made a forum post, with the patch attached, but the forum decided to eat it due to (invalid attachment type .patch). Then I found out about this feature :) But I'll make a new post and simply link here.

    Valid issue about the IRC channel. I had considered that, and was under the impression that this if clause in net.cpp handled it (as in case of proxy or -connect, also no IRC connection should be made):

    if (fUseProxy || mapArgs.count("-connect") || fNoListen)
    

    Seems I was wrong.

  7. ghost commented at 9:26 AM on December 24, 2010: none

    Ah, I see the new commit (don't connect to IRC on -nolisten) was automatically added here.

  8. cdecker commented at 10:34 PM on December 29, 2010: contributor

    Seems to me as trying to fix an intermediate problem, I'd much rather see a patch adding the ability to specify a listen port. But the patch to disable IRC bootstrapping seems nice.

  9. nelisky referenced this in commit 7cb6645e7f on Apr 4, 2013
  10. nelisky referenced this in commit 29dbd015c1 on Jul 29, 2013
  11. nelisky referenced this in commit 9747817b1a on Nov 8, 2013
  12. justmoon referenced this in commit 5bc9ac0437 on Apr 7, 2014
  13. kac- referenced this in commit 35f0a4e2e9 on Oct 8, 2014
  14. rdponticelli referenced this in commit 2ce0e50af3 on Nov 26, 2014
  15. braydonf referenced this in commit ca9da762b6 on May 20, 2016
  16. core-bitcoin referenced this in commit c11c37b0d6 on Jun 17, 2017
  17. AkioNak referenced this in commit a5610df128 on Jul 24, 2017
  18. laanwj referenced this in commit b13a68e129 on Aug 2, 2017
  19. fametrano referenced this in commit ecbd242045 on Aug 4, 2017
  20. JeremyRubin referenced this in commit 7f378349b2 on Aug 9, 2017
  21. HashUnlimited referenced this in commit fb8585691c on Mar 9, 2018
  22. KrzysiekJ referenced this in commit 58ae06661e on Mar 28, 2018
  23. sanch0panza referenced this in commit 72d50a648d on Apr 11, 2018
  24. effectsToCause referenced this in commit 78a5523c85 on Jun 22, 2018
  25. MarcoFalke referenced this in commit dc287c98f8 on Sep 7, 2018
  26. dooglus referenced this in commit 15b146b074 on Oct 21, 2018
  27. jfhk referenced this in commit c30a4aeea6 on Nov 14, 2018
  28. laanwj referenced this in commit b586bbd558 on Nov 6, 2019
  29. laanwj referenced this in commit 97b66d34eb on Nov 7, 2019
  30. laanwj referenced this in commit e9c85bb139 on Nov 7, 2019
  31. laanwj referenced this in commit c92f7af618 on Nov 7, 2019
  32. MarcoFalke referenced this in commit cf43f3f0a8 on Dec 5, 2019
  33. laanwj referenced this in commit 656712fe94 on Dec 9, 2019
  34. laanwj referenced this in commit 4abd92d5c4 on Dec 12, 2019
  35. laanwj referenced this in commit 89c8fe5189 on Jan 2, 2020
  36. laanwj referenced this in commit 66480821b3 on Jan 28, 2020
  37. Losangelosgenetics referenced this in commit 36fa31f2b8 on Mar 12, 2020
  38. KolbyML referenced this in commit 8e69d7a2ef on Aug 1, 2020
  39. KolbyML referenced this in commit 42c0c5c10e on Sep 4, 2020
  40. KolbyML referenced this in commit 47b121108f on Sep 4, 2020
  41. laanwj referenced this in commit 924a4ff7eb on Oct 29, 2020
  42. jonasschnelli referenced this in commit c33662a0ea on Dec 2, 2020
  43. KolbyML referenced this in commit 3d9f0283ff on Dec 5, 2020
  44. MarcoFalke referenced this in commit 590e49ccf2 on Apr 4, 2021
  45. MarcoFalke referenced this in commit bce09da122 on Apr 28, 2021
  46. fanquake referenced this in commit fa00bb2c5c on Apr 29, 2021
  47. MarcoFalke referenced this in commit eb9a1fe037 on May 7, 2021
  48. MarcoFalke referenced this in commit c857148636 on May 15, 2021
  49. DrahtBot locked this on Sep 8, 2021
Labels
Linked (view graph)
#672 bitcoin-qt crashes in db on startup#737 Deadlock during startup (Appears to be AddAddress / DNSSeed related)#982 Startup blocks on mutex at "Loading Addresses"#999 v0.6.0rc5 segfault on initial blockchain download when out of diskspace#1065 addrMan crash on CentOS#1098 segfault in qrcode message dialog#1156 Addrman crash#2416 Bitcoind aborts on startup: ./db/skiplist.h:152 Assertion `n >= 0' failed.#2472 System error: database corrupted: void boost::recursive_mutex::lock(): Assertion `!pthread_mutex_lock(&m)' failed#5698 Code vulnerable to segfault after a network fork#5795 Bizarre test_bitcoin crash, but passes in debugger#5910 Gitian 64-bit bitcoin-qt segfaults on Ubuntu 14.04#6332 Segmentation fault on bitcoind or bitcoin-qt startup (64bit Linux)#6540 scheduler_tests (currently disabled) occasionally deadlocks#8984 GUI hangs during sync#9348 Node crashed with assertion failure in network code#9684 bitcoind 'compacts' chainstate database almost every time I run it#9687 bitcoin-qt crashed in FinalizeNode()#9759 Setting -maxsigcachesize to zero causes segfault#9881 v0.14.0rc2 crash on shutdown#9883 [Qt] Segfault on startup#9997 Running out of disk space during GUI init results in hang and non-drawing windows#10209 Stalled shutdown#10210 Frozen (for 15 minutes) on shutdown [dnsseed thread]#10293 SEGV in segwit fundrawtransaction#10861 Segfault on shutdown after pressing 'q' to postpone utxo db upgrade#11355 LevelDB read failure: Corruption: block checksum mismatch#11763 deadlock on shutdown#12038 deadlock on database corruption#12229 Shutdown deadlock in SyncWithValidationInterfaceQueue#12279 shutdown took 8 minutes in v0.15.0.1#12690 LevelDB "corrupted compressed block contents" errors#13316 make check fails for configure option --with-incompatible-bdb and Berkeley DB 5.3#14330 [tests] segfault during`DEBUG=1` run of existing_data_no_obfuscate locally#14349 mac: make check failure on macOS 10.14#14359 bitcoin-qt hangs in futex() / __cxa_guard_acquire()#14923 segmentation fault on gui startup#15227 bitcoind terminated with uncaught exception if configure --debug-enabled#15310 gui: crash if encrypt / change passphrase window is open and wallet is unloaded#15379 bitcoind crashes after exception in scheduler thread#16307 scheduler: crash after releasing wallet#16815 wallet: CPU use proportional to wallet transaction count when idle#16875 gui: Avoid calling processEvents#16904 Bus error (core dumped) after "Using obfuscation key for" log line#17540 ci build fails in ./qt/test/test_bitcoin-qt on aarch64 native tsan#17620 MemorySanitizer complains about unitialized variable in RPC method names#17627 Suppress false positive warning about uninitialized entropy buffers#17674 tests: Add initialization order fiasco detection in Travis#17729 Fuzzing Bug undefined-behavior pubkey.cpp:210:38#18046 Some fuzzing crashes when running under ASan and/or UBSan#18090 gui: Crash if shutdown during processNewTransaction#18362 gui: segfault unloading and immediately reloading wallet with gui#18372 sanitizer: heap-use-after-free in checkinputs_test#18706 crash briefly after launching binaries compiled using --without-gui and --with-incompatible-bdb#18762 fuzz: AddressSanitizer: SEGV on unknown address in /strprintf#18763 fuzz: AddressSanitizer: container-overflow in /script fuzzer#18913 ci: fuzz/process_message fails#18924 QT Crash when using open wallet dialog#18948 qt: Call setParent() in the parent's context#19024 UB: double lock of mutex in init.cpp#19049 test: Potential deadlock in wallet_tests/CreateWalletFromFile#19211 feature_reindex.py triggers data race#19417 Intermittent CI failure: ThreadSanitizer failure (data race) when running wallet_multiwallet.py --usecli#19448 qa: Data race detected when running `mempool_expiry.py`#19678 UBSan warning when fuzzing with -fsanitize=integer#19715 ThreadSanitizer: data race in feature_reindex.py#19789 fuzz: ASAN complaint on macOS with -fsanitize=fuzzer,address,undefined#19955 test: Potential deadlock in wallet_tests#20163 TSAN race after merge of #20090#20242 fuzz: Properly initialize PrecomputedTransactionData#20334 ci: fuzz/decode_tx fails#20542 Unexpected test fail: wallet/wallet.cpp:3113:51: runtime error: division by zero#20618 Data race in interface_zmq.py#21466 Avoid use of "socket" syscall when formatting IP addresses in CNetAddr::ToString#21479 fuzz: UndefinedBehaviorSanitizer warnings in netbase.cpp#21538 fuzz: Add fuzzing syscall sandbox: detect use of unexpected syscalls when fuzzing ("syscall sanitizer")#21586 test: Add missing suppression for signed-integer-overflow:txmempool.cpp#21632 MemorySanitizer: use-of-uninitialized-value in sqlite3BtreeOpen#21773 fuzz: Ensure prevout is consensus-valid#21802 refactor: Avoid UB in util/asmap (advance a dereferenceable iterator outside its valid range)#21948 test: Fix off-by-one in mockscheduler test RPC#22233 fuzz: UndefinedBehaviorSanitizer warnings in consensus/tx_verify.cpp#22537 UndefinedBehaviorSanitizer: implicit-integer-sign-change consensus/tx_verify#22548 CheckQueue_Correct_Random data race#22588 Cirrus CI showed error in netaddress.cpp file when checking PR#22592 LeakSanitizer detects memory leak if CDBWrapper ctor fails#23160 test_bitcoin-qt error: "Unable to init server: Could not connect: Connection refused"#23248 Bitcoin Core crashes under clang-13 libc++ with "Bad system call (core dumped)"#23321 bitcoind segfault's while loading tr descriptor on regtest v22.0#24290 segfault when compiled with depends DEBUG=1 and libc++#24426 test: Fix intermittent Tsan issue#24819 data race in SimpleRoundTripTest logging for macOS#25077 Fix chain tip data race and corrupt rest response#25146 Starting with an unsupported wallet configured leads to a segfault (master only?)#25323 miniscript fuzzer failing after qa-assets update#25365 ThreadSanitizer: data race on vptr (ctor/dtor vs virtual call) in BaseIndex#25632 SUMMARY: ThreadSanitizer: SEGV src/index/base.cpp:388:9 in BaseIndex::SetBestBlockIndex(CBlockIndex const*)::$_1::operator()() const#25692 psbt.h:896:51: runtime error: unsigned integer overflow: 0 - 1 cannot be represented in type 'unsigned long'#25824 UndefinedBehaviorSanitizer: stack-overflow in miniscript (descriptor_parse)#25857 IBD core dumped during recursive call to CCoinsViewCache::FetchCoin (while connecting best chain tip)#26068 Segmentation fault in the scheduler thread when an index fails to commit to the db#26274 bitcoind dumps core when deriveaddresses is called with index 2147483647 (2^31-1)#26477 validation: fix broken maxtipage comparison#27222 test: use-of-uninitialized-value in sqlite3Strlen30#27354 wallet: Data race in GetOrCreateLegacyScriptPubKeyMan vs IsMine#27355 index: ThreadSanitizer: data race on vptr #27360 ci: use LLVM/clang-16 in native_asan job#27582 TSAN: lock-order-inversion (potential deadlock) in ZapSelectTx test#27922 ci: fix llvm-symbolizer in MSAN jobs#27924 fuzz: banman, Assertion `banmap == banmap_read' failed#28510 migratewallet crashes on an freshly created datadir ( wallet/wallet.h:959: int wallet::CWallet::GetLastBlockHeight() const: Assertion `m_last_block_processed_height >= 0' failed.)#28665 'std::out_of_range' crash in I2P fuzz test#28917 fuzz, parse_iso8601: attempt to dereference an end-of-stream istreambuf_iterator#28918 fuzz, coinselection: Assertion 'result_bnb->GetChange(coin_params.m_cost_of_change, CAmount{0}) == 0' failed#28966 test: Add missing CBlockPolicyEstimator::processBlockTx suppression#28969 fuzz: Avoid signed-integer-overflow in wallet_notifications fuzz target#29153 new crash in v26.0#29178 ubsan: misaligned-pointer-use in crc32c/src/crc32c_arm64.cc#29767 ThreadSanitizer: data race src/flatfile.cpp:47:13 in FlatFileSeq::Open(FlatFilePos const&, bool)#29908 test: SegFault in `ismine_tests` on SunOS / illumos#30284 Mini miner `AncestorFeerateComparator` Signed Integer Overflow#30402 Illegal Instruction in `CoinStatsIndex::CustomAppend`#31203 fuzz: fix `implicit-integer-sign-change` in wallet_create_transaction#31234 fuzz: connman target: terminate called after throwing an instance of 'std::bad_alloc'#32089 Failure to run Fuzz tests when running with corpus#32173 validation: `CheckBlockIndex` crashes during block reconsideration#32780 lsan: add more Qt suppressions#32957 SegFault in QSortFilterProxyModelPrivate::build_source_to_proxy_mapping#33063 util: Revert "common: Close non-std fds before exec in RunCommandJSON"#33097 fuzz: `txgraph`: Assertion `cmp == 0' failed#33150 intermittent TSAN failure in lockmanager_tests::blockmanager_readblock_hash_mismatch#33277 intermittent Segmentation fault in mptest IPC path (callFnAsyncParams)#33640 ci: short read: expected xxxxxxxxx bytes but got xxxxxxxxx: unexpected EOF#33949 ubsan: add another suppression for InsecureRandomContext#33964 Startup crash on macOS with GCC 15.2: `std::source_location::file_name()` is `nullptr`#34014 mptest hangs, when run in a loop#34109 refactor: Use uint64_t over size_t for serialize corruption check in fees.dat#34110 scriptpubkeyman fuzz target creates Base58 too large; Fails on 32-bit (armhf, ...)#34645 oss-fuzz: coins_view_overlay: ASSERT: m_dirty_count == 0#34655 fuzz: keep `coins_view` fuzzers within caller contracts#34711 src/ipc/libmultiprocess/src/mp/proxy.cpp:416:44: runtime error: member access within null pointer of type 'mp::Waiter'#34732 i386 segv in #0 0xf7a49ce0 in kj::operator*(kj::_::Stringifier, kj::Exception const&) (/lib/i386-linux-gnu/libkj-1.1.0.so+0x38ce0)#34734 test: Fix shutdown vptr race in BlockFilterIndexSync bench#34756 ipc: AddressSanitizer: SEGV nptl/pthread_mutex_lock.c:80:23 in __pthread_mutex_lock#34777 ipc: AddressSanitizer: heap-use-after-free in `capnp::CallContext<ipc::capnp::messages::BlockTemplate::GetBlockParams, ipc::capnp::messages::BlockTemplate::GetBlockResults>::getParams()`#34782 mptest: mp::CancelMonitor: AddressSanitizer: stack-use-after-return

github-metadata-mirror

This is a metadata mirror of the GitHub repository bitcoin/bitcoin. This site is not affiliated with GitHub. Content is generated from a GitHub metadata backup.
generated: 2026-04-20 00:16 UTC

This site is hosted by @0xB10C
More mirrored repositories can be found on mirror.b10c.me