Deprecated Messages
New site!
All content has been migrated to docs.dash.org. You will be automatically redirected momentarily.
Deprecated Messages
The following network messages have been deprecated and should no longer be used.
Alert
Deprecated since 0.15.0
Added in protocol version 311.
Removed by Bitcoin in protocol version 70013, but retained by Dash until 0.15.0.
The alert
message warns nodes of problems that may affect them or the rest of the network. Each alert
message is signed using a key controlled by respected community members, mostly Dash Core developers.
To ensure all nodes can validate and forward alert
messages, encapsulation is used. Developers create an alert using the data structure appropriate for the versions of the software they want to notify; then they serialize that data and sign it. The serialized data and its signature make up the outer alert
message---allowing nodes which don't understand the data structure to validate the signature and relay the alert to nodes which do understand it. The nodes which actually need the message can decode the serialized data to access the inner alert
message.
The outer alert
message has four fields:
Bytes | Name | Data Type | Description |
---|---|---|---|
Variable | alert bytes | compactSize uint | The number of bytes in following alert field. |
Variable | alert | uchar | The serialized alert. See below for a description of the current alert format. |
Variable | signature bytes | compactSize uint | The number of bytes in the following signature field. |
Variable | signature | uchar | A DER-encoded ECDSA (secp256k1) signature of the alert signed with the developer's alert key. |
Although designed to be easily upgraded, the format of the inner serialized alert has not changed since the alert
message was first introduced in protocol version 311.
Bytes | Name | Data Type | Description |
---|---|---|---|
4 | version | int32_t | Alert format version. Version 1 from protocol version 311 through at least protocol version 70002. |
8 | relayUntil | int64_t | The time beyond which nodes should stop relaying this alert. Unix epoch time format. |
8 | expiration | int64_t | The time beyond which this alert is no longer in effect and should be ignored. Unix epoch time format. |
4 | ID | int32_t | A unique ID number for this alert. |
4 | cancel | int32_t | All alerts with an ID number less than or equal to this number should be canceled: deleted and not accepted in the future. |
Varies | setCancel count | compactSize uint | The number of IDs in the following setCancel field. May be zero. |
Varies | setCancel | int32_t | Alert IDs which should be canceled. Each alert ID is a separate int32_t number. |
4 | minVer | int32_t | This alert only applies to protocol versions greater than or equal to this version. Nodes running other protocol versions should still relay it. |
4 | maxVer | int32_t | This alert only applies to protocol versions less than or equal to this version. Nodes running other protocol versions should still relay it. |
Varies | user_agent count | compactSize uint | The number of user agent strings in the following setUser_agent field. May be zero. |
Varies | setUser_agent | compactSize uint + string | If this field is empty, it has no effect on the alert. If there is at least one entry is this field, this alert only applies to programs with a user agent that exactly matches one of the strings in this field. Each entry in this field is a compactSize uint followed by a string---the uint indicates how many bytes are in the following string. This field was originally called setSubVer; since BIP14, it applies to user agent strings as defined in the version message. |
4 | priority | int32_t | Relative priority compared to other alerts. |
Varies | comment bytes | compactSize uint | The number of bytes in the following comment field. May be zero. |
Varies | comment | string | A comment on the alert that is not displayed. |
Varies | statusBar bytes | compactSize uint | The number of bytes in the following statusBar field. May be zero. |
Varies | statusBar | string | The alert message that is displayed to the user. |
Varies | reserved bytes | compactSize uint | The number of bytes in the following reserved field. May be zero. |
Varies | reserved | string | Reserved for future use. Originally called RPC Error. |
The annotated hexdump below shows an alert
message. (The message header has been omitted.)
73 ................................. Bytes in encapsulated alert: 115
01000000 ........................... Version: 1
3766404f00000000 ................... RelayUntil: 1329620535
b305434f00000000 ................... Expiration: 1330917376
f2030000 ........................... ID: 1010
f1030000 ........................... Cancel: 1009
00 ................................. setCancel count: 0
10270000 ........................... MinVer: 10000
48ee0000 ........................... MaxVer: 61000
00 ................................. setUser_agent bytes: 0
64000000 ........................... Priority: 100
00 ................................. Bytes In Comment String: 0
46 ................................. Bytes in StatusBar String: 70
53656520626974636f696e2e6f72672f
666562323020696620796f7520686176
652074726f75626c6520636f6e6e6563
74696e67206166746572203230204665
627275617279 ....................... Status Bar String: "See [...]"
00 ................................. Bytes In Reserved String: 0
47 ................................. Bytes in signature: 71
30450221008389df45f0703f39ec8c1c
c42c13810ffcae14995bb648340219e3
53b63b53eb022009ec65e1c1aaeec1fd
334c6b684bde2b3f573060d5b70c3a46
723326e4e8a4f1 ..................... Signature
Alert key compromise: Dash Core's source code defines a particular set of alert parameters that can be used to notify users that the alert signing key has been compromised and that they should upgrade to get a new alert public key. Once a signed alert containing those parameters has been received, no other alerts can cancel or override it.
ix
Deprecated since 0.15.0
The ix
message (transaction lock request) has the same structure as the tx
message. The masternode network responds with txlvote
messages if the transaction inputs can be locked.
reject
Removed in 19.0.0
Added in protocol version 70002 as described by BIP61.
The reject
message informs the receiving node that one of its previous messages has been rejected.
Bytes | Name | Data Type | Description |
---|---|---|---|
Varies | message bytes | compactSize uint | The number of bytes in the following message field. |
Varies | message | string | The type of message rejected as ASCII text without null padding. For example: "tx", "block", or "version". |
1 | code | char | The reject message code. See the table below. |
Varies | reason bytes | compactSize uint | The number of bytes in the following reason field. May be 0x00 if a text reason isn't provided. |
Varies | reason | string | The reason for the rejection in ASCII text. This should not be displayed to the user; it is only for debugging purposes. |
Varies | extra data | varies | Optional additional data provided with the rejection. For example, most rejections of tx messages or block messages include the hash of the rejected transaction or block header. See the code table below. |
The following table lists message reject codes. Codes are tied to the type of message they reply to; for example there is a 0x10 reject code for transactions and a 0x10 reject code for blocks.
Code | In Reply To | Extra Bytes | Extra Type | Description |
---|---|---|---|---|
0x01 | any message | 0 | N/A | Message could not be decoded. Be careful of reject message feedback loops where two peers each don't understand each other's reject messages and so keep sending them back and forth forever. |
0x10 | block message | 32 | char[32] | Block is invalid for some reason (invalid proof-of-work, invalid signature, etc). Extra data may include the rejected block's header hash. |
0x10 | tx message | 32 | char[32] | Transaction is invalid for some reason (invalid signature, output value greater than input, etc.). Extra data may include the rejected transaction's TXID. |
0x10 | ix message | 32 | char[32] | InstantSend transaction is invalid for some reason (invalid tx lock request, conflicting tx lock request, etc.). Extra data may include the rejected transaction's TXID. |
0x11 | block message | 32 | char[32] | The block uses a version that is no longer supported. Extra data may include the rejected block's header hash. |
0x11 | version message | 0 | N/A | Connecting node is using a protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | dsa message | 0 | N/A | Connecting node is using a CoinJoin protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | dsi message | 0 | N/A | Connecting node is using a CoinJoin protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | dsc message | 0 | N/A | Connecting node is using a CoinJoin protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | dsf message | 0 | N/A | Connecting node is using a CoinJoin protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | dsq message | 0 | N/A | Connecting node is using a CoinJoin protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | dssu message | 0 | N/A | Connecting node is using a CoinJoin protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | govsync message | 0 | N/A | Connecting node is using a governance protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | govobj message | 0 | N/A | Connecting node is using a governance protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | govobjvote message | 0 | N/A | Connecting node is using a governance protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | mnget message | 0 | N/A | Connecting node is using a masternode payment protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | mnw message | 0 | N/A | Connecting node is using a masternode payment protocol version that the rejecting node considers obsolete and unsupported. |
0x11 | txlvote message | 0 | N/A | Connecting node is using an InstantSend protocol version that the rejecting node considers obsolete and unsupported. |
0x12 | tx message | 32 | char[32] | Duplicate input spend (double spend): the rejected transaction spends the same input as a previously-received transaction. Extra data may include the rejected transaction's TXID. |
0x12 | version message | 0 | N/A | More than one version message received in this connection. |
0x40 | tx message | 32 | char[32] | The transaction will not be mined or relayed because the rejecting node considers it non-standard---a transaction type or version unknown by the server. Extra data may include the rejected transaction's TXID. |
0x41 | tx message | 32 | char[32] | One or more output amounts are below the dust threshold. Extra data may include the rejected transaction's TXID. |
0x42 | tx message | char[32] | The transaction did not have a large enough fee or priority to be relayed or mined. Extra data may include the rejected transaction's TXID. | |
0x43 | block message | 32 | char[32] | The block belongs to a block chain which is not the same block chain as provided by a compiled-in checkpoint. Extra data may include the rejected block's header hash. |
Reject Codes
Code | Description |
---|---|
0x01 | Malformed |
0x10 | Invalid |
0x11 | Obsolete |
0x12 | Duplicate |
0x40 | Non-standard |
0x41 | Dust |
0x42 | Insufficient fee |
0x43 | Checkpoint |
The annotated hexdump below shows a reject
message. (The message header has been omitted.)
02 ................................. Number of bytes in message: 2
7478 ............................... Type of message rejected: tx
12 ................................. Reject code: 0x12 (duplicate)
15 ................................. Number of bytes in reason: 21
6261642d74786e732d696e707574732d
7370656e74 ......................... Reason: bad-txns-inputs-spent
394715fcab51093be7bfca5a31005972
947baf86a31017939575fb2354222821 ... TXID
txlvote
Deprecated since 0.15.0
The txlvote
message (transaction lock vote) is sent by masternodes to indicate approval of a transaction lock request ix
message.
Bytes | Name | Data type | Required | Description |
---|---|---|---|---|
32 | txHash | uint256 | Required | TXID of the transaction to lock |
36 | outPoint | outpoint | Required | The unspent outpoint to lock in this transaction |
36 | outpointMasternode | outpoint | Required | The outpoint of the masternode which is signing the vote |
32 | quorumModifierHash | uint256 | Required | Added in protocol version 70213. Only present when Spork 15 is active. |
32 | masternodeProTxHash | uint256 | Required | Added in protocol version 70213. Only present when Spork 15 is active. The proTxHash of the DIP3 masternode which is signing the vote |
96 | vchMasternodeSignature | char[] | Required | Masternode BLS signature |
The following annotated hexdump shows a txlvote
message. (The message header has been omitted.)
84a27bb879f316482598fe65b0b51544
e85490d85fc36af1c293e186da373c02 ..... TXID
Outpoint to lock
| 4c1e6318bab4f9284d3bc0e49ec7fe76
| 1e9c914b8ea0bcac4563005daa451221 ... Outpoint TXID
| 00000000 ........................... Outpoint index number: 0
Masternode Outpoint
| 5d02f07c7318411e41fdd4be9f1e5ece
| 16d680cfe318306087edc8fb205e507b ... Outpoint TXID
| 01000000 ........................... Outpoint index number: 1
b62cb5007704d2db8595d5b31cfb7cb0
8d7e530c16a7597e1db4430a00000000 ..... Quorum Modifier hash
569abbea4ab45f36dd059c44f1dc0804
f3f13071379c2f418d3637fb548c4159 ..... Masternode ProRegTx hash
60 ................................... Signature length: 96
0b0b97ec14fbc1f12566c3a90ed113e4
e9c5ee6cdcf2fe2171e4b5f387286146
a0632a250d64ea507ce5e1d1f1983aae
0b70e568ad2856a0cc13008001c6d0f3
5bdeb380f6aba0c54663a3b5e2d86d44
305c2e5d855c72588ffb0e8e2a36482c ..... Masternode BLS Signature
Updated over 1 year ago