Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
|
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
/* $Id$ */
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
#include "or.h"
|
|
|
|
|
|
|
|
/********* START VARIABLES **********/
|
|
|
|
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
extern or_options_t options; /* command-line and config-file options */
|
|
|
|
|
2003-07-05 09:10:34 +02:00
|
|
|
extern int global_read_bucket;
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
char *conn_type_to_string[] = {
|
2002-09-22 00:41:48 +02:00
|
|
|
"", /* 0 */
|
|
|
|
"OP listener", /* 1 */
|
|
|
|
"OP", /* 2 */
|
|
|
|
"OR listener", /* 3 */
|
|
|
|
"OR", /* 4 */
|
|
|
|
"Exit", /* 5 */
|
|
|
|
"App listener",/* 6 */
|
2002-09-26 14:09:10 +02:00
|
|
|
"App", /* 7 */
|
|
|
|
"Dir listener",/* 8 */
|
|
|
|
"Dir", /* 9 */
|
2003-08-21 01:05:22 +02:00
|
|
|
"DNS worker", /* 10 */
|
|
|
|
"CPU worker", /* 11 */
|
2002-06-27 00:45:49 +02:00
|
|
|
};
|
|
|
|
|
2002-09-26 14:09:10 +02:00
|
|
|
char *conn_state_to_string[][15] = {
|
2003-08-12 05:08:41 +02:00
|
|
|
{ NULL }, /* no type associated with 0 */
|
2002-06-27 00:45:49 +02:00
|
|
|
{ "ready" }, /* op listener, 0 */
|
|
|
|
{ "awaiting keys", /* op, 0 */
|
|
|
|
"open", /* 1 */
|
|
|
|
"close", /* 2 */
|
|
|
|
"close_wait" }, /* 3 */
|
|
|
|
{ "ready" }, /* or listener, 0 */
|
2003-09-12 08:50:21 +02:00
|
|
|
#ifdef USE_TLS
|
|
|
|
{ "connect()ing", /* 0 */
|
|
|
|
"handshaking", /* 1 */
|
|
|
|
"open" }, /* 2 */
|
|
|
|
#else
|
2002-09-22 00:41:48 +02:00
|
|
|
{ "connecting (as OP)", /* or, 0 */
|
|
|
|
"sending keys (as OP)", /* 1 */
|
|
|
|
"connecting (as client)", /* 2 */
|
|
|
|
"sending auth (as client)", /* 3 */
|
|
|
|
"waiting for auth (as client)", /* 4 */
|
|
|
|
"sending nonce (as client)", /* 5 */
|
|
|
|
"waiting for auth (as server)", /* 6 */
|
|
|
|
"sending auth (as server)", /* 7 */
|
|
|
|
"waiting for nonce (as server)",/* 8 */
|
|
|
|
"open" }, /* 9 */
|
2003-09-12 08:50:21 +02:00
|
|
|
#endif
|
2002-09-22 00:41:48 +02:00
|
|
|
{ "waiting for dest info", /* exit, 0 */
|
|
|
|
"connecting", /* 1 */
|
|
|
|
"open" }, /* 2 */
|
|
|
|
{ "ready" }, /* app listener, 0 */
|
2003-04-12 00:11:11 +02:00
|
|
|
{ "", /* 0 */
|
|
|
|
"", /* 1 */
|
|
|
|
"", /* 2 */
|
|
|
|
"awaiting dest info", /* app, 3 */
|
|
|
|
"waiting for OR connection", /* 4 */
|
|
|
|
"open" }, /* 5 */
|
2002-09-26 14:09:10 +02:00
|
|
|
{ "ready" }, /* dir listener, 0 */
|
|
|
|
{ "connecting", /* 0 */
|
|
|
|
"sending command", /* 1 */
|
|
|
|
"reading", /* 2 */
|
|
|
|
"awaiting command", /* 3 */
|
|
|
|
"writing" }, /* 4 */
|
2003-08-21 01:05:22 +02:00
|
|
|
{ "idle", /* dns worker, 0 */
|
|
|
|
"busy" }, /* 1 */
|
|
|
|
{ "idle", /* cpu worker, 0 */
|
|
|
|
"busy with onion", /* 1 */
|
|
|
|
"busy with handshake" }, /* 2 */
|
2002-06-27 00:45:49 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/********* END VARIABLES ************/
|
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
static int connection_init_accepted_conn(connection_t *conn);
|
2003-09-11 22:06:55 +02:00
|
|
|
static int connection_tls_continue_handshake(connection_t *conn);
|
|
|
|
static int connection_tls_finish_handshake(connection_t *conn);
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
|
|
|
|
/**************************************************************/
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
connection_t *connection_new(int type) {
|
|
|
|
connection_t *conn;
|
2002-10-02 01:37:31 +02:00
|
|
|
struct timeval now;
|
|
|
|
|
2003-04-16 19:04:58 +02:00
|
|
|
my_gettimeofday(&now);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-05-20 08:41:23 +02:00
|
|
|
conn = (connection_t *)tor_malloc(sizeof(connection_t));
|
2002-06-27 00:45:49 +02:00
|
|
|
memset(conn,0,sizeof(connection_t)); /* zero it out to start */
|
|
|
|
|
|
|
|
conn->type = type;
|
2002-06-30 09:37:49 +02:00
|
|
|
if(buf_new(&conn->inbuf, &conn->inbuflen, &conn->inbuf_datalen) < 0 ||
|
|
|
|
buf_new(&conn->outbuf, &conn->outbuflen, &conn->outbuf_datalen) < 0)
|
|
|
|
return NULL;
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-09-12 08:50:21 +02:00
|
|
|
conn->receiver_bucket = 50000; /* should be enough to do the handshake */
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
conn->bandwidth = conn->receiver_bucket / 10; /* give it a default */
|
2002-10-13 15:17:27 +02:00
|
|
|
|
2002-10-02 01:37:31 +02:00
|
|
|
conn->timestamp_created = now.tv_sec;
|
2002-10-13 15:17:27 +02:00
|
|
|
conn->timestamp_lastread = now.tv_sec;
|
|
|
|
conn->timestamp_lastwritten = now.tv_sec;
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
#ifndef USE_TLS
|
2002-08-22 09:30:03 +02:00
|
|
|
if (connection_speaks_cells(conn)) {
|
2003-07-30 21:12:03 +02:00
|
|
|
conn->f_crypto = crypto_new_cipher_env(CONNECTION_CIPHER);
|
2002-08-22 09:30:03 +02:00
|
|
|
if (!conn->f_crypto) {
|
|
|
|
free((void *)conn);
|
|
|
|
return NULL;
|
|
|
|
}
|
2003-07-30 21:12:03 +02:00
|
|
|
conn->b_crypto = crypto_new_cipher_env(CONNECTION_CIPHER);
|
2002-08-22 09:30:03 +02:00
|
|
|
if (!conn->b_crypto) {
|
|
|
|
crypto_free_cipher_env(conn->f_crypto);
|
|
|
|
free((void *)conn);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
2003-09-05 08:04:03 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
return conn;
|
|
|
|
}
|
|
|
|
|
|
|
|
void connection_free(connection_t *conn) {
|
|
|
|
assert(conn);
|
|
|
|
|
|
|
|
buf_free(conn->inbuf);
|
|
|
|
buf_free(conn->outbuf);
|
|
|
|
if(conn->address)
|
|
|
|
free(conn->address);
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
if(conn->dest_addr)
|
|
|
|
free(conn->dest_addr);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2002-07-18 08:37:58 +02:00
|
|
|
if(connection_speaks_cells(conn)) {
|
2003-09-05 08:04:03 +02:00
|
|
|
directory_set_dirty();
|
2003-09-07 12:24:40 +02:00
|
|
|
#ifdef USE_TLS
|
|
|
|
if (conn->tls)
|
|
|
|
tor_tls_free(conn->tls);
|
2003-09-05 08:04:03 +02:00
|
|
|
#else
|
2002-08-22 09:30:03 +02:00
|
|
|
if (conn->f_crypto)
|
|
|
|
crypto_free_cipher_env(conn->f_crypto);
|
|
|
|
if (conn->b_crypto)
|
|
|
|
crypto_free_cipher_env(conn->b_crypto);
|
2003-09-05 08:04:03 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2002-09-24 12:43:57 +02:00
|
|
|
if (conn->pkey)
|
|
|
|
crypto_free_pk_env(conn->pkey);
|
|
|
|
|
2002-09-03 20:36:40 +02:00
|
|
|
if(conn->s > 0) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_INFO,"closing fd %d.",conn->s);
|
2002-06-27 00:45:49 +02:00
|
|
|
close(conn->s);
|
2002-09-03 20:36:40 +02:00
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
free(conn);
|
|
|
|
}
|
|
|
|
|
2002-10-03 00:54:20 +02:00
|
|
|
int connection_create_listener(struct sockaddr_in *bindaddr, int type) {
|
2002-06-27 00:45:49 +02:00
|
|
|
connection_t *conn;
|
|
|
|
int s;
|
|
|
|
int one=1;
|
|
|
|
|
|
|
|
s = socket(PF_INET,SOCK_STREAM,IPPROTO_TCP);
|
|
|
|
if (s < 0)
|
|
|
|
{
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_ERR,"Socket creation failed.");
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2003-08-12 05:08:41 +02:00
|
|
|
setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void*)&one, sizeof(one));
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2002-10-03 00:54:20 +02:00
|
|
|
if(bind(s,(struct sockaddr *)bindaddr,sizeof(*bindaddr)) < 0) {
|
2002-06-27 00:45:49 +02:00
|
|
|
perror("bind ");
|
2002-10-03 00:54:20 +02:00
|
|
|
log(LOG_ERR,"Could not bind to port %u.",ntohs(bindaddr->sin_port));
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(listen(s,SOMAXCONN) < 0) {
|
2002-10-03 00:54:20 +02:00
|
|
|
log(LOG_ERR,"Could not listen on port %u.",ntohs(bindaddr->sin_port));
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2003-08-12 05:08:41 +02:00
|
|
|
set_socket_nonblocking(s);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
conn = connection_new(type);
|
2002-09-03 20:36:40 +02:00
|
|
|
if(!conn) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"connection_new failed. Giving up.");
|
2002-06-30 09:37:49 +02:00
|
|
|
return -1;
|
2002-09-03 20:36:40 +02:00
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
conn->s = s;
|
|
|
|
|
|
|
|
if(connection_add(conn) < 0) { /* no space, forget it */
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"connection_add failed. Giving up.");
|
2002-06-27 00:45:49 +02:00
|
|
|
connection_free(conn);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
log_fn(LOG_DEBUG,"%s listening on port %u.",conn_type_to_string[type], ntohs(bindaddr->sin_port));
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
conn->state = LISTENER_STATE_READY;
|
2002-07-18 08:37:58 +02:00
|
|
|
connection_start_reading(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
int connection_handle_listener_read(connection_t *conn, int new_type) {
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
int news; /* the new socket */
|
|
|
|
connection_t *newconn;
|
|
|
|
struct sockaddr_in remote; /* information about the remote peer when connecting to other routers */
|
|
|
|
int remotelen = sizeof(struct sockaddr_in); /* length of the remote address */
|
2003-08-14 19:13:52 +02:00
|
|
|
#ifdef MS_WINDOWS
|
|
|
|
int e;
|
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
news = accept(conn->s,(struct sockaddr *)&remote,&remotelen);
|
|
|
|
if (news == -1) { /* accept() error */
|
2003-08-14 19:13:52 +02:00
|
|
|
if(ERRNO_EAGAIN(errno)) {
|
|
|
|
#ifdef MS_WINDOWS
|
|
|
|
e = correct_socket_errno(conn->s);
|
|
|
|
if (ERRNO_EAGAIN(e))
|
|
|
|
return 0;
|
|
|
|
#else
|
2002-06-27 00:45:49 +02:00
|
|
|
return 0; /* he hung up before we could accept(). that's fine. */
|
2003-08-14 19:13:52 +02:00
|
|
|
#endif
|
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
/* else there was a real error. */
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_ERR,"accept() failed. Closing.");
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2002-09-03 20:36:40 +02:00
|
|
|
log(LOG_INFO,"Connection accepted on socket %d (child of fd %d).",news, conn->s);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-08-12 05:08:41 +02:00
|
|
|
set_socket_nonblocking(news);
|
2002-07-16 04:12:58 +02:00
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
newconn = connection_new(new_type);
|
|
|
|
newconn->s = news;
|
|
|
|
|
2002-07-18 08:37:58 +02:00
|
|
|
if(!connection_speaks_cells(newconn)) {
|
|
|
|
newconn->receiver_bucket = -1;
|
|
|
|
newconn->bandwidth = -1;
|
|
|
|
}
|
|
|
|
|
2002-08-27 21:28:35 +02:00
|
|
|
newconn->address = strdup(inet_ntoa(remote.sin_addr)); /* remember the remote address */
|
2002-10-13 15:17:27 +02:00
|
|
|
newconn->addr = ntohl(remote.sin_addr.s_addr);
|
|
|
|
newconn->port = ntohs(remote.sin_port);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
if(connection_add(newconn) < 0) { /* no space, forget it */
|
|
|
|
connection_free(newconn);
|
2002-09-03 20:36:40 +02:00
|
|
|
return 0; /* no need to tear down the parent */
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
if(connection_init_accepted_conn(newconn) < 0) {
|
|
|
|
connection_free(newconn);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int connection_init_accepted_conn(connection_t *conn) {
|
|
|
|
|
|
|
|
connection_start_reading(conn);
|
|
|
|
|
|
|
|
switch(conn->type) {
|
|
|
|
case CONN_TYPE_OR:
|
|
|
|
#ifdef USE_TLS
|
2003-09-12 08:50:21 +02:00
|
|
|
if(connection_tls_start_handshake(conn, 1) < 0)
|
2003-09-08 12:59:00 +02:00
|
|
|
return -1;
|
|
|
|
#else
|
|
|
|
conn->state = OR_CONN_STATE_SERVER_AUTH_WAIT;
|
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
case CONN_TYPE_AP:
|
|
|
|
conn->state = AP_CONN_STATE_SOCKS_WAIT;
|
|
|
|
break;
|
|
|
|
case CONN_TYPE_DIR:
|
|
|
|
conn->state = DIR_CONN_STATE_COMMAND_WAIT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef USE_TLS
|
2003-09-12 08:50:21 +02:00
|
|
|
int connection_tls_start_handshake(connection_t *conn, int receiving) {
|
2003-09-08 12:59:00 +02:00
|
|
|
conn->state = OR_CONN_STATE_HANDSHAKING;
|
2003-09-12 08:50:21 +02:00
|
|
|
conn->tls = tor_tls_new(conn->s, receiving);
|
2003-09-08 12:59:00 +02:00
|
|
|
if(!conn->tls) {
|
|
|
|
log_fn(LOG_ERR,"tor_tls_new failed. Closing.");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
connection_start_reading(conn);
|
2003-09-12 08:50:21 +02:00
|
|
|
log_fn(LOG_DEBUG,"starting the handshake");
|
2003-09-08 12:59:00 +02:00
|
|
|
if(connection_tls_continue_handshake(conn) < 0)
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-09-11 22:06:55 +02:00
|
|
|
static int connection_tls_continue_handshake(connection_t *conn) {
|
2003-09-08 12:59:00 +02:00
|
|
|
switch(tor_tls_handshake(conn->tls)) {
|
|
|
|
case TOR_TLS_ERROR:
|
|
|
|
case TOR_TLS_CLOSE:
|
|
|
|
log_fn(LOG_DEBUG,"tls error. breaking.");
|
|
|
|
return -1;
|
|
|
|
case TOR_TLS_DONE:
|
2003-09-11 22:06:55 +02:00
|
|
|
return connection_tls_finish_handshake(conn);
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTWRITE:
|
|
|
|
connection_start_writing(conn);
|
2003-09-12 08:50:21 +02:00
|
|
|
log_fn(LOG_DEBUG,"wanted write");
|
2003-09-08 12:59:00 +02:00
|
|
|
return 0;
|
|
|
|
case TOR_TLS_WANTREAD: /* handshaking conns are *always* reading */
|
2003-09-12 08:50:21 +02:00
|
|
|
log_fn(LOG_DEBUG,"wanted read");
|
2003-09-08 12:59:00 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2003-09-11 22:06:55 +02:00
|
|
|
|
|
|
|
static int connection_tls_finish_handshake(connection_t *conn) {
|
|
|
|
crypto_pk_env_t *pk;
|
|
|
|
routerinfo_t *router;
|
|
|
|
|
|
|
|
conn->state = OR_CONN_STATE_OPEN;
|
|
|
|
directory_set_dirty();
|
|
|
|
connection_watch_events(conn, POLLIN);
|
2003-09-12 08:20:36 +02:00
|
|
|
log_fn(LOG_DEBUG,"tls handshake done. verifying.");
|
2003-09-11 22:06:55 +02:00
|
|
|
if(options.OnionRouter) { /* I'm an OR */
|
|
|
|
if(tor_tls_peer_has_cert(conn->tls)) { /* it's another OR */
|
|
|
|
pk = tor_tls_verify(conn->tls);
|
|
|
|
if(!pk) {
|
|
|
|
log_fn(LOG_INFO,"Other side has a cert but it's bad. Closing.");
|
|
|
|
return -1;
|
|
|
|
}
|
2003-09-11 22:32:15 +02:00
|
|
|
router = router_get_by_pk(pk);
|
|
|
|
if (!router) {
|
|
|
|
log_fn(LOG_INFO,"Unrecognized public key from peer. Closing.");
|
|
|
|
crypto_free_pk_env(pk);
|
2003-09-12 00:19:48 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(conn->pkey) { /* I initiated this connection. */
|
|
|
|
if(crypto_pk_cmp_keys(conn->pkey, pk)) {
|
|
|
|
log_fn(LOG_INFO,"We connected to '%s' but he gave us a different key. Closing.", router->nickname);
|
|
|
|
crypto_free_pk_env(pk);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
log_fn(LOG_DEBUG,"The router's pk matches the one we meant to connect to. Good.");
|
|
|
|
crypto_free_pk_env(pk);
|
|
|
|
} else {
|
|
|
|
if(connection_exact_get_by_addr_port(router->addr,router->or_port)) {
|
|
|
|
log_fn(LOG_INFO,"That router is already connected. Dropping.");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
conn->pkey = pk;
|
|
|
|
conn->bandwidth = router->bandwidth;
|
|
|
|
conn->addr = router->addr, conn->port = router->or_port;
|
|
|
|
conn->address = strdup(router->address);
|
2003-09-11 22:32:15 +02:00
|
|
|
}
|
2003-09-11 22:06:55 +02:00
|
|
|
} else { /* it's an OP */
|
|
|
|
conn->bandwidth = DEFAULT_BANDWIDTH_OP;
|
|
|
|
}
|
|
|
|
} else { /* I'm a client */
|
2003-09-12 00:19:48 +02:00
|
|
|
if(!tor_tls_peer_has_cert(conn->tls)) { /* it's a client too?! */
|
|
|
|
log_fn(LOG_INFO,"Neither peer sent a cert! Closing.");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
pk = tor_tls_verify(conn->tls);
|
|
|
|
if(!pk) {
|
|
|
|
log_fn(LOG_INFO,"Other side has a cert but it's bad. Closing.");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
router = router_get_by_pk(pk);
|
|
|
|
if (!router) {
|
|
|
|
log_fn(LOG_INFO,"Unrecognized public key from peer. Closing.");
|
|
|
|
crypto_free_pk_env(pk);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(crypto_pk_cmp_keys(conn->pkey, pk)) {
|
|
|
|
log_fn(LOG_INFO,"We connected to '%s' but he gave us a different key. Closing.", router->nickname);
|
|
|
|
crypto_free_pk_env(pk);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
log_fn(LOG_DEBUG,"The router's pk matches the one we meant to connect to. Good.");
|
|
|
|
crypto_free_pk_env(pk);
|
2003-09-11 22:06:55 +02:00
|
|
|
conn->bandwidth = DEFAULT_BANDWIDTH_OP;
|
|
|
|
circuit_n_conn_open(conn); /* send the pending create */
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2003-09-08 12:59:00 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
/* start all connections that should be up but aren't */
|
2003-05-28 04:03:25 +02:00
|
|
|
int retry_all_connections(uint16_t or_listenport, uint16_t ap_listenport, uint16_t dir_listenport) {
|
2002-10-03 00:54:20 +02:00
|
|
|
struct sockaddr_in bindaddr; /* where to bind */
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
|
2003-03-18 02:49:55 +01:00
|
|
|
if(or_listenport) {
|
2002-10-03 00:54:20 +02:00
|
|
|
router_retry_connections();
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2002-10-03 00:54:20 +02:00
|
|
|
memset(&bindaddr,0,sizeof(struct sockaddr_in));
|
|
|
|
bindaddr.sin_family = AF_INET;
|
|
|
|
bindaddr.sin_addr.s_addr = htonl(INADDR_ANY); /* anyone can connect */
|
2002-10-02 03:03:00 +02:00
|
|
|
|
2003-03-18 02:49:55 +01:00
|
|
|
if(or_listenport) {
|
2002-10-03 00:54:20 +02:00
|
|
|
bindaddr.sin_port = htons(or_listenport);
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
if(!connection_get_by_type(CONN_TYPE_OR_LISTENER)) {
|
2003-09-08 12:59:00 +02:00
|
|
|
connection_create_listener(&bindaddr, CONN_TYPE_OR_LISTENER);
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
2002-10-02 22:12:44 +02:00
|
|
|
|
2003-03-18 02:49:55 +01:00
|
|
|
if(dir_listenport) {
|
2002-10-03 00:54:20 +02:00
|
|
|
bindaddr.sin_port = htons(dir_listenport);
|
2002-09-26 14:09:10 +02:00
|
|
|
if(!connection_get_by_type(CONN_TYPE_DIR_LISTENER)) {
|
2003-09-08 12:59:00 +02:00
|
|
|
connection_create_listener(&bindaddr, CONN_TYPE_DIR_LISTENER);
|
2002-09-26 14:09:10 +02:00
|
|
|
}
|
|
|
|
}
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-03-18 02:49:55 +01:00
|
|
|
if(ap_listenport) {
|
2002-10-03 00:54:20 +02:00
|
|
|
bindaddr.sin_port = htons(ap_listenport);
|
2003-06-13 11:25:55 +02:00
|
|
|
bindaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); /* the AP listens only on localhost! */
|
2002-10-02 03:03:00 +02:00
|
|
|
if(!connection_get_by_type(CONN_TYPE_AP_LISTENER)) {
|
2003-09-08 12:59:00 +02:00
|
|
|
connection_create_listener(&bindaddr, CONN_TYPE_AP_LISTENER);
|
2002-10-02 03:03:00 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-09-05 08:04:03 +02:00
|
|
|
int connection_handle_read(connection_t *conn) {
|
|
|
|
struct timeval now;
|
|
|
|
|
|
|
|
my_gettimeofday(&now);
|
|
|
|
conn->timestamp_lastread = now.tv_sec;
|
|
|
|
|
|
|
|
switch(conn->type) {
|
|
|
|
case CONN_TYPE_OR_LISTENER:
|
2003-09-08 12:59:00 +02:00
|
|
|
return connection_handle_listener_read(conn, CONN_TYPE_OR);
|
2003-09-05 08:04:03 +02:00
|
|
|
case CONN_TYPE_AP_LISTENER:
|
2003-09-08 12:59:00 +02:00
|
|
|
return connection_handle_listener_read(conn, CONN_TYPE_AP);
|
2003-09-05 08:04:03 +02:00
|
|
|
case CONN_TYPE_DIR_LISTENER:
|
2003-09-08 12:59:00 +02:00
|
|
|
return connection_handle_listener_read(conn, CONN_TYPE_DIR);
|
|
|
|
}
|
2003-09-05 08:04:03 +02:00
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
if(connection_read_to_buf(conn) < 0) {
|
|
|
|
if(conn->type == CONN_TYPE_DIR && conn->state == DIR_CONN_STATE_CONNECTING) {
|
|
|
|
/* it's a directory server and connecting failed: forget about this router */
|
|
|
|
/* XXX I suspect pollerr may make Windows not get to this point. :( */
|
|
|
|
router_forget_router(conn->addr,conn->port);
|
|
|
|
/* FIXME i don't think router_forget_router works. */
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(connection_process_inbuf(conn) < 0) {
|
|
|
|
//log_fn(LOG_DEBUG,"connection_process_inbuf returned %d.",retval);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(!connection_state_is_open(conn) && conn->receiver_bucket == 0) {
|
|
|
|
log_fn(LOG_DEBUG,"receiver bucket reached 0 before handshake finished. Closing.");
|
|
|
|
return -1;
|
|
|
|
}
|
2003-09-07 12:24:40 +02:00
|
|
|
return 0;
|
2003-09-05 08:04:03 +02:00
|
|
|
}
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
/* return -1 if we want to break conn, else return 0 */
|
2002-06-27 00:45:49 +02:00
|
|
|
int connection_read_to_buf(connection_t *conn) {
|
2003-09-07 12:24:40 +02:00
|
|
|
int result;
|
2003-09-05 13:25:24 +02:00
|
|
|
int at_most;
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
|
2003-09-05 13:25:24 +02:00
|
|
|
assert((connection_speaks_cells(conn) && conn->receiver_bucket >= 0) ||
|
|
|
|
(!connection_speaks_cells(conn) && conn->receiver_bucket < 0));
|
|
|
|
|
|
|
|
if(options.LinkPadding) {
|
|
|
|
at_most = global_read_bucket;
|
2003-09-05 08:04:03 +02:00
|
|
|
} else {
|
2003-09-05 13:25:24 +02:00
|
|
|
/* do a rudimentary round-robin so one connection can't hog a thickpipe */
|
|
|
|
if(connection_speaks_cells(conn)) {
|
|
|
|
at_most = 10*(CELL_NETWORK_SIZE);
|
|
|
|
} else {
|
|
|
|
at_most = 10*(CELL_PAYLOAD_SIZE - RELAY_HEADER_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(at_most > global_read_bucket)
|
|
|
|
at_most = global_read_bucket;
|
2002-07-18 08:37:58 +02:00
|
|
|
}
|
2002-10-02 01:37:31 +02:00
|
|
|
|
2003-07-05 09:10:34 +02:00
|
|
|
if(conn->receiver_bucket >= 0 && at_most > conn->receiver_bucket)
|
|
|
|
at_most = conn->receiver_bucket;
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
#ifdef USE_TLS
|
|
|
|
if(connection_speaks_cells(conn) && conn->state != OR_CONN_STATE_CONNECTING) {
|
2003-09-08 12:59:00 +02:00
|
|
|
if(conn->state == OR_CONN_STATE_HANDSHAKING)
|
|
|
|
return connection_tls_continue_handshake(conn);
|
|
|
|
|
|
|
|
/* else open, or closing */
|
|
|
|
result = read_to_buf_tls(conn->tls, at_most, &conn->inbuf,
|
|
|
|
&conn->inbuflen, &conn->inbuf_datalen);
|
2003-09-07 12:24:40 +02:00
|
|
|
|
|
|
|
switch(result) {
|
|
|
|
case TOR_TLS_ERROR:
|
|
|
|
case TOR_TLS_CLOSE:
|
|
|
|
log_fn(LOG_DEBUG,"tls error. breaking.");
|
|
|
|
return -1; /* XXX deal with close better */
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTWRITE:
|
2003-09-07 12:24:40 +02:00
|
|
|
connection_start_writing(conn);
|
|
|
|
return 0;
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTREAD: /* we're already reading */
|
2003-09-07 12:24:40 +02:00
|
|
|
case TOR_TLS_DONE: /* no data read, so nothing to process */
|
|
|
|
return 0;
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
}
|
2003-09-07 12:24:40 +02:00
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
result = read_to_buf(conn->s, at_most, &conn->inbuf, &conn->inbuflen,
|
|
|
|
&conn->inbuf_datalen, &conn->inbuf_reached_eof);
|
|
|
|
// log(LOG_DEBUG,"connection_read_to_buf(): read_to_buf returned %d.",read_result);
|
|
|
|
|
|
|
|
if(result < 0)
|
|
|
|
return -1;
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
}
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
global_read_bucket -= result; assert(global_read_bucket >= 0);
|
|
|
|
if(connection_speaks_cells(conn))
|
|
|
|
conn->receiver_bucket -= result;
|
|
|
|
if(conn->receiver_bucket == 0 || global_read_bucket == 0) {
|
|
|
|
log_fn(LOG_DEBUG,"buckets (%d, %d) exhausted. Pausing.", global_read_bucket, conn->receiver_bucket);
|
|
|
|
conn->wants_to_read = 1;
|
|
|
|
connection_stop_reading(conn);
|
|
|
|
}
|
|
|
|
return 0;
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int connection_fetch_from_buf(char *string, int len, connection_t *conn) {
|
|
|
|
return fetch_from_buf(string, len, &conn->inbuf, &conn->inbuflen, &conn->inbuf_datalen);
|
|
|
|
}
|
|
|
|
|
2002-09-28 07:53:00 +02:00
|
|
|
int connection_find_on_inbuf(char *string, int len, connection_t *conn) {
|
|
|
|
return find_on_inbuf(string, len, conn->inbuf, conn->inbuf_datalen);
|
|
|
|
}
|
|
|
|
|
2002-07-18 08:37:58 +02:00
|
|
|
int connection_wants_to_flush(connection_t *conn) {
|
|
|
|
return conn->outbuf_flushlen;
|
|
|
|
}
|
|
|
|
|
|
|
|
int connection_outbuf_too_full(connection_t *conn) {
|
|
|
|
return (conn->outbuf_flushlen > 10*CELL_PAYLOAD_SIZE);
|
|
|
|
}
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
int connection_flush_buf(connection_t *conn) {
|
2003-09-05 08:04:03 +02:00
|
|
|
return flush_buf(conn->s, &conn->outbuf, &conn->outbuflen,
|
|
|
|
&conn->outbuf_flushlen, &conn->outbuf_datalen);
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
/* return -1 if you want to break the conn, else return 0 */
|
2003-09-05 08:04:03 +02:00
|
|
|
int connection_handle_write(connection_t *conn) {
|
2002-10-02 01:37:31 +02:00
|
|
|
struct timeval now;
|
2003-09-05 08:04:03 +02:00
|
|
|
|
|
|
|
if(connection_is_listener(conn)) {
|
|
|
|
log_fn(LOG_DEBUG,"Got a listener socket. Can't happen!");
|
|
|
|
return -1;
|
|
|
|
}
|
2002-10-02 01:37:31 +02:00
|
|
|
|
2003-04-16 19:04:58 +02:00
|
|
|
my_gettimeofday(&now);
|
2003-09-05 08:04:03 +02:00
|
|
|
conn->timestamp_lastwritten = now.tv_sec;
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
#ifdef USE_TLS
|
|
|
|
if(connection_speaks_cells(conn) && conn->state != OR_CONN_STATE_CONNECTING) {
|
2003-09-11 22:06:55 +02:00
|
|
|
if(conn->state == OR_CONN_STATE_HANDSHAKING) {
|
|
|
|
connection_stop_writing(conn);
|
2003-09-08 12:59:00 +02:00
|
|
|
return connection_tls_continue_handshake(conn);
|
2003-09-11 22:06:55 +02:00
|
|
|
}
|
2003-09-05 08:04:03 +02:00
|
|
|
|
2003-09-08 12:59:00 +02:00
|
|
|
/* else open, or closing */
|
|
|
|
switch(flush_buf_tls(conn->tls, &conn->outbuf, &conn->outbuflen,
|
|
|
|
&conn->outbuf_flushlen, &conn->outbuf_datalen)) {
|
2003-09-07 12:24:40 +02:00
|
|
|
case TOR_TLS_ERROR:
|
|
|
|
case TOR_TLS_CLOSE:
|
|
|
|
log_fn(LOG_DEBUG,"tls error. breaking.");
|
|
|
|
return -1; /* XXX deal with close better */
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTWRITE:
|
2003-09-07 12:24:40 +02:00
|
|
|
/* we're already writing */
|
|
|
|
return 0;
|
2003-09-08 12:59:00 +02:00
|
|
|
case TOR_TLS_WANTREAD:
|
2003-09-07 12:24:40 +02:00
|
|
|
/* Make sure to avoid a loop if the receive buckets are empty. */
|
|
|
|
if(!connection_is_reading(conn)) {
|
|
|
|
connection_stop_writing(conn);
|
|
|
|
conn->wants_to_write = 1;
|
|
|
|
/* we'll start reading again when the next second arrives,
|
|
|
|
* and then also start writing again.
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
/* else no problem, we're already reading */
|
|
|
|
return 0;
|
|
|
|
case TOR_TLS_DONE:
|
|
|
|
/* for TOR_TLS_DONE, fall through to check if the flushlen
|
|
|
|
* is empty, so we can stop writing.
|
|
|
|
*/
|
|
|
|
}
|
2003-09-05 08:04:03 +02:00
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
{
|
2003-09-07 12:24:40 +02:00
|
|
|
if(flush_buf(conn->s, &conn->outbuf, &conn->outbuflen,
|
|
|
|
&conn->outbuf_flushlen, &conn->outbuf_datalen) < 0)
|
|
|
|
return -1;
|
|
|
|
/* conns in CONNECTING state will fall through... */
|
2003-09-05 08:04:03 +02:00
|
|
|
}
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
if(!connection_wants_to_flush(conn)) /* it's done flushing */
|
|
|
|
if(connection_finished_flushing(conn) < 0) /* ...and get handled here. */
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return 0;
|
2003-09-05 08:04:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int connection_write_to_buf(char *string, int len, connection_t *conn) {
|
2002-10-02 01:37:31 +02:00
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
if(!len)
|
|
|
|
return 0;
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
if(conn->marked_for_close)
|
|
|
|
return 0;
|
|
|
|
|
2002-09-04 08:29:28 +02:00
|
|
|
if( (!connection_speaks_cells(conn)) ||
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
(!connection_state_is_open(conn)) ||
|
|
|
|
(options.LinkPadding == 0) ) {
|
2003-09-05 08:04:03 +02:00
|
|
|
/* connection types other than or, or or not in 'open' state, should flush immediately */
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
/* also flush immediately if we're not doing LinkPadding, since otherwise it will never flush */
|
2002-07-18 08:37:58 +02:00
|
|
|
connection_start_writing(conn);
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
conn->outbuf_flushlen += len;
|
|
|
|
}
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
return write_to_buf(string, len, &conn->outbuf, &conn->outbuflen, &conn->outbuf_datalen);
|
|
|
|
}
|
|
|
|
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
int connection_receiver_bucket_should_increase(connection_t *conn) {
|
|
|
|
assert(conn);
|
|
|
|
|
2002-07-18 08:37:58 +02:00
|
|
|
if(!connection_speaks_cells(conn))
|
|
|
|
return 0; /* edge connections don't use receiver_buckets */
|
|
|
|
|
2003-07-05 09:10:34 +02:00
|
|
|
if(conn->receiver_bucket > 9*conn->bandwidth)
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2002-09-22 00:41:48 +02:00
|
|
|
int connection_is_listener(connection_t *conn) {
|
2003-05-28 04:03:25 +02:00
|
|
|
if(conn->type == CONN_TYPE_OR_LISTENER ||
|
2002-09-26 14:09:10 +02:00
|
|
|
conn->type == CONN_TYPE_AP_LISTENER ||
|
|
|
|
conn->type == CONN_TYPE_DIR_LISTENER)
|
2002-09-22 00:41:48 +02:00
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
int connection_state_is_open(connection_t *conn) {
|
|
|
|
assert(conn);
|
|
|
|
|
|
|
|
if((conn->type == CONN_TYPE_OR && conn->state == OR_CONN_STATE_OPEN) ||
|
|
|
|
(conn->type == CONN_TYPE_AP && conn->state == AP_CONN_STATE_OPEN) ||
|
|
|
|
(conn->type == CONN_TYPE_EXIT && conn->state == EXIT_CONN_STATE_OPEN))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
int connection_send_destroy(aci_t aci, connection_t *conn) {
|
|
|
|
cell_t cell;
|
|
|
|
|
2002-06-30 09:37:49 +02:00
|
|
|
assert(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2002-07-18 08:37:58 +02:00
|
|
|
if(!connection_speaks_cells(conn)) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_INFO,"Aci %d: At an edge. Marking connection for close.", aci);
|
2002-06-27 00:45:49 +02:00
|
|
|
conn->marked_for_close = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-03-11 22:38:38 +01:00
|
|
|
memset(&cell, 0, sizeof(cell_t));
|
2002-06-27 00:45:49 +02:00
|
|
|
cell.aci = aci;
|
|
|
|
cell.command = CELL_DESTROY;
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_INFO,"Sending destroy (aci %d).",aci);
|
2002-06-27 00:45:49 +02:00
|
|
|
return connection_write_cell_to_buf(&cell, conn);
|
2002-09-17 10:14:37 +02:00
|
|
|
}
|
|
|
|
|
2003-02-18 02:35:55 +01:00
|
|
|
int connection_write_cell_to_buf(const cell_t *cellp, connection_t *conn) {
|
2002-10-02 22:12:44 +02:00
|
|
|
char networkcell[CELL_NETWORK_SIZE];
|
|
|
|
char *n = networkcell;
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-04-16 19:44:33 +02:00
|
|
|
cell_pack(n, cellp);
|
2002-10-02 22:12:44 +02:00
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
#ifndef USE_TLS
|
2002-10-02 22:12:44 +02:00
|
|
|
if(connection_encrypt_cell(n,conn)<0) {
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2003-09-07 12:24:40 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2002-10-02 22:12:44 +02:00
|
|
|
return connection_write_to_buf(n, CELL_NETWORK_SIZE, conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
#ifndef USE_TLS
|
2002-10-02 22:12:44 +02:00
|
|
|
int connection_encrypt_cell(char *cellp, connection_t *conn) {
|
|
|
|
char cryptcell[CELL_NETWORK_SIZE];
|
2002-07-18 08:37:58 +02:00
|
|
|
#if 0
|
2002-06-27 00:45:49 +02:00
|
|
|
int x;
|
|
|
|
char *px;
|
|
|
|
|
|
|
|
printf("Sending: Cell header plaintext: ");
|
|
|
|
px = (char *)cellp;
|
|
|
|
for(x=0;x<8;x++) {
|
|
|
|
printf("%u ",px[x]);
|
|
|
|
}
|
|
|
|
printf("\n");
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-05-06 01:24:46 +02:00
|
|
|
assert(conn);
|
|
|
|
|
2002-10-02 22:12:44 +02:00
|
|
|
if(crypto_cipher_encrypt(conn->f_crypto, cellp, CELL_NETWORK_SIZE, cryptcell)) {
|
2002-08-24 10:24:30 +02:00
|
|
|
log(LOG_ERR,"Could not encrypt cell for connection %s:%u.",conn->address,conn->port);
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
#if 0
|
2002-06-27 00:45:49 +02:00
|
|
|
printf("Sending: Cell header crypttext: ");
|
2002-09-04 08:29:28 +02:00
|
|
|
px = (char *)&newcell;
|
2002-06-27 00:45:49 +02:00
|
|
|
for(x=0;x<8;x++) {
|
2002-09-04 08:29:28 +02:00
|
|
|
printf("%u ",px[x]);
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
|
|
|
printf("\n");
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2002-10-02 22:12:44 +02:00
|
|
|
memcpy(cellp,cryptcell,CELL_NETWORK_SIZE);
|
2002-06-27 00:45:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2003-09-07 12:24:40 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
int connection_process_inbuf(connection_t *conn) {
|
|
|
|
|
|
|
|
assert(conn);
|
|
|
|
|
|
|
|
switch(conn->type) {
|
|
|
|
case CONN_TYPE_OR:
|
|
|
|
return connection_or_process_inbuf(conn);
|
2002-06-30 09:37:49 +02:00
|
|
|
case CONN_TYPE_EXIT:
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
case CONN_TYPE_AP:
|
2003-04-12 00:11:11 +02:00
|
|
|
return connection_edge_process_inbuf(conn);
|
2002-09-26 14:09:10 +02:00
|
|
|
case CONN_TYPE_DIR:
|
|
|
|
return connection_dir_process_inbuf(conn);
|
2003-06-17 16:31:05 +02:00
|
|
|
case CONN_TYPE_DNSWORKER:
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
return connection_dns_process_inbuf(conn);
|
2003-08-21 01:05:22 +02:00
|
|
|
case CONN_TYPE_CPUWORKER:
|
|
|
|
return connection_cpu_process_inbuf(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
default:
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"got unexpected conn->type.");
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
int connection_package_raw_inbuf(connection_t *conn) {
|
2003-06-13 12:23:42 +02:00
|
|
|
int amount_to_process;
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
cell_t cell;
|
|
|
|
circuit_t *circ;
|
|
|
|
|
|
|
|
assert(conn);
|
2002-07-18 08:37:58 +02:00
|
|
|
assert(!connection_speaks_cells(conn));
|
2003-07-03 05:40:47 +02:00
|
|
|
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
repeat_connection_package_raw_inbuf:
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
|
2003-07-03 05:40:47 +02:00
|
|
|
circ = circuit_get_by_conn(conn);
|
|
|
|
if(!circ) {
|
|
|
|
log_fn(LOG_DEBUG,"conn has no circuits!");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(circuit_consider_stop_edge_reading(circ, conn->type, conn->cpath_layer))
|
|
|
|
return 0;
|
|
|
|
|
2003-08-25 23:43:51 +02:00
|
|
|
if(conn->package_window <= 0) {
|
|
|
|
log_fn(LOG_ERR,"called with package_window 0. Tell Roger.");
|
|
|
|
connection_stop_reading(conn);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
amount_to_process = conn->inbuf_datalen;
|
2003-07-03 05:40:47 +02:00
|
|
|
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
if(!amount_to_process)
|
|
|
|
return 0;
|
|
|
|
|
2003-03-11 22:38:38 +01:00
|
|
|
/* Initialize the cell with 0's */
|
|
|
|
memset(&cell, 0, sizeof(cell_t));
|
|
|
|
|
2003-05-01 08:42:29 +02:00
|
|
|
if(amount_to_process > CELL_PAYLOAD_SIZE - RELAY_HEADER_SIZE) {
|
|
|
|
cell.length = CELL_PAYLOAD_SIZE - RELAY_HEADER_SIZE;
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
} else {
|
|
|
|
cell.length = amount_to_process;
|
|
|
|
}
|
|
|
|
|
2003-06-25 02:31:41 +02:00
|
|
|
connection_fetch_from_buf(cell.payload+RELAY_HEADER_SIZE, cell.length, conn);
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"(%d) Packaging %d bytes (%d waiting).",conn->s,cell.length, conn->inbuf_datalen);
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
|
2003-04-16 19:44:33 +02:00
|
|
|
|
2003-05-01 08:42:29 +02:00
|
|
|
cell.command = CELL_RELAY;
|
|
|
|
SET_CELL_RELAY_COMMAND(cell, RELAY_COMMAND_DATA);
|
|
|
|
SET_CELL_STREAM_ID(cell, conn->stream_id);
|
|
|
|
cell.length += RELAY_HEADER_SIZE;
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
|
2003-02-06 09:00:49 +01:00
|
|
|
if(conn->type == CONN_TYPE_EXIT) {
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
cell.aci = circ->p_aci;
|
2003-06-12 12:16:33 +02:00
|
|
|
if(circuit_deliver_relay_cell(&cell, circ, CELL_DIRECTION_IN, NULL) < 0) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"circuit_deliver_relay_cell (backward) failed. Closing.");
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
circuit_close(circ);
|
|
|
|
return 0;
|
|
|
|
}
|
2003-05-20 08:41:23 +02:00
|
|
|
assert(circ->package_window > 0);
|
|
|
|
circ->package_window--;
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
} else { /* send it forward. we're an AP */
|
2003-02-06 09:00:49 +01:00
|
|
|
assert(conn->type == CONN_TYPE_AP);
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
cell.aci = circ->n_aci;
|
2003-06-12 12:16:33 +02:00
|
|
|
if(circuit_deliver_relay_cell(&cell, circ, CELL_DIRECTION_OUT, conn->cpath_layer) < 0) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"circuit_deliver_relay_cell (forward) failed. Closing.");
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
circuit_close(circ);
|
|
|
|
return 0;
|
|
|
|
}
|
2003-05-20 08:41:23 +02:00
|
|
|
assert(conn->cpath_layer->package_window > 0);
|
|
|
|
conn->cpath_layer->package_window--;
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
}
|
2003-05-20 08:41:23 +02:00
|
|
|
|
|
|
|
assert(conn->package_window > 0);
|
2003-08-25 22:57:23 +02:00
|
|
|
if(--conn->package_window <= 0) { /* is it 0 after decrement? */
|
|
|
|
connection_stop_reading(conn);
|
|
|
|
log_fn(LOG_DEBUG,"conn->package_window reached 0.");
|
|
|
|
circuit_consider_stop_edge_reading(circ, conn->type, conn->cpath_layer);
|
|
|
|
return 0; /* don't process the inbuf any more */
|
|
|
|
}
|
2003-08-23 12:06:46 +02:00
|
|
|
log_fn(LOG_DEBUG,"conn->package_window is now %d",conn->package_window);
|
2003-05-20 08:41:23 +02:00
|
|
|
|
2003-03-19 23:27:01 +01:00
|
|
|
/* handle more if there's more, or return 0 if there isn't */
|
|
|
|
goto repeat_connection_package_raw_inbuf;
|
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
2002-07-02 11:36:58 +02:00
|
|
|
}
|
|
|
|
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
int connection_consider_sending_sendme(connection_t *conn, int edge_type) {
|
2002-07-18 08:37:58 +02:00
|
|
|
circuit_t *circ;
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
cell_t cell;
|
2002-07-18 08:37:58 +02:00
|
|
|
|
|
|
|
if(connection_outbuf_too_full(conn))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
circ = circuit_get_by_conn(conn);
|
|
|
|
if(!circ) {
|
2002-09-09 06:06:59 +02:00
|
|
|
/* this can legitimately happen if the destroy has already arrived and torn down the circuit */
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"No circuit associated with conn. Skipping.");
|
2002-09-09 06:06:59 +02:00
|
|
|
return 0;
|
2002-07-18 08:37:58 +02:00
|
|
|
}
|
|
|
|
|
2003-03-11 22:38:38 +01:00
|
|
|
memset(&cell, 0, sizeof(cell_t));
|
2003-05-01 08:42:29 +02:00
|
|
|
cell.command = CELL_RELAY;
|
|
|
|
SET_CELL_RELAY_COMMAND(cell, RELAY_COMMAND_SENDME);
|
|
|
|
SET_CELL_STREAM_ID(cell, conn->stream_id);
|
|
|
|
cell.length += RELAY_HEADER_SIZE;
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
|
2003-05-20 08:41:23 +02:00
|
|
|
if(edge_type == EDGE_EXIT)
|
|
|
|
cell.aci = circ->p_aci;
|
|
|
|
else
|
|
|
|
cell.aci = circ->n_aci;
|
|
|
|
|
|
|
|
while(conn->deliver_window < STREAMWINDOW_START - STREAMWINDOW_INCREMENT) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"Outbuf %d, Queueing stream sendme.", conn->outbuf_flushlen);
|
2003-05-20 08:41:23 +02:00
|
|
|
conn->deliver_window += STREAMWINDOW_INCREMENT;
|
2003-06-12 12:16:33 +02:00
|
|
|
if(circuit_deliver_relay_cell(&cell, circ, CELL_DIRECTION(edge_type), conn->cpath_layer) < 0) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"circuit_deliver_relay_cell failed. Closing.");
|
2003-05-20 08:41:23 +02:00
|
|
|
circuit_close(circ);
|
|
|
|
return 0;
|
2002-07-18 08:37:58 +02:00
|
|
|
}
|
|
|
|
}
|
2003-05-20 08:41:23 +02:00
|
|
|
|
2002-07-18 08:37:58 +02:00
|
|
|
return 0;
|
2003-05-20 08:41:23 +02:00
|
|
|
}
|
2002-07-18 08:37:58 +02:00
|
|
|
|
2002-06-27 00:45:49 +02:00
|
|
|
int connection_finished_flushing(connection_t *conn) {
|
|
|
|
|
|
|
|
assert(conn);
|
|
|
|
|
2003-06-18 00:18:26 +02:00
|
|
|
// log_fn(LOG_DEBUG,"entered. Socket %u.", conn->s);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
switch(conn->type) {
|
|
|
|
case CONN_TYPE_OR:
|
|
|
|
return connection_or_finished_flushing(conn);
|
2003-04-12 00:11:11 +02:00
|
|
|
case CONN_TYPE_AP:
|
2002-06-30 09:37:49 +02:00
|
|
|
case CONN_TYPE_EXIT:
|
2003-04-12 00:11:11 +02:00
|
|
|
return connection_edge_finished_flushing(conn);
|
2002-09-26 14:09:10 +02:00
|
|
|
case CONN_TYPE_DIR:
|
|
|
|
return connection_dir_finished_flushing(conn);
|
2003-06-17 16:31:05 +02:00
|
|
|
case CONN_TYPE_DNSWORKER:
|
major overhaul: dns slave subsystem, topics
on startup, it forks off a master dns handler, which forks off dns
slaves (like the apache model). slaves as spawned as load increases,
and then reused. excess slaves are not ever killed, currently.
implemented topics. each topic has a receive window in each direction
at each edge of the circuit, and sends sendme's at the data level, as
per before. each circuit also has receive windows in each direction at
each hop; an edge sends a circuit-level sendme as soon as enough data
cells have arrived (regardless of whether the data cells were flushed
to the exit conns). removed the 'connected' cell type, since it's now
a topic command within data cells.
at the edge of the circuit, there can be multiple connections associated
with a single circuit. you find them via the linked list conn->next_topic.
currently each new ap connection starts its own circuit, so we ought
to see comparable performance to what we had before. but that's only
because i haven't written the code to reattach to old circuits. please
try to break it as-is, and then i'll make it reuse the same circuit and
we'll try to break that.
svn:r152
2003-01-26 10:02:24 +01:00
|
|
|
return connection_dns_finished_flushing(conn);
|
2003-08-21 01:05:22 +02:00
|
|
|
case CONN_TYPE_CPUWORKER:
|
|
|
|
return connection_cpu_finished_flushing(conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
default:
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_DEBUG,"got unexpected conn->type.");
|
2002-06-27 00:45:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int connection_process_cell_from_inbuf(connection_t *conn) {
|
|
|
|
/* check if there's a whole cell there.
|
2003-09-07 12:24:40 +02:00
|
|
|
* if yes, pull it off, decrypt it if we're not doing TLS, and process it.
|
2002-06-27 00:45:49 +02:00
|
|
|
*/
|
2003-09-08 12:59:00 +02:00
|
|
|
#ifndef USE_TLS
|
2003-09-07 12:24:40 +02:00
|
|
|
char networkcell[CELL_NETWORK_SIZE];
|
2003-09-08 12:59:00 +02:00
|
|
|
#endif
|
2003-09-07 12:24:40 +02:00
|
|
|
char buf[CELL_NETWORK_SIZE];
|
2002-07-18 08:37:58 +02:00
|
|
|
// int x;
|
2002-10-02 22:12:44 +02:00
|
|
|
cell_t cell;
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2002-10-02 22:12:44 +02:00
|
|
|
if(conn->inbuf_datalen < CELL_NETWORK_SIZE) /* entire response available? */
|
2002-06-27 00:45:49 +02:00
|
|
|
return 0; /* not yet */
|
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
#ifdef USE_TLS
|
|
|
|
connection_fetch_from_buf(buf, CELL_NETWORK_SIZE, conn);
|
|
|
|
#else
|
|
|
|
connection_fetch_from_buf(networkcell, CELL_NETWORK_SIZE, conn);
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
#if 0
|
2002-06-27 00:45:49 +02:00
|
|
|
printf("Cell header crypttext: ");
|
|
|
|
for(x=0;x<8;x++) {
|
|
|
|
printf("%u ",crypted[x]);
|
|
|
|
}
|
|
|
|
printf("\n");
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
/* decrypt */
|
2003-09-07 12:24:40 +02:00
|
|
|
if(crypto_cipher_decrypt(conn->b_crypto, networkcell, CELL_NETWORK_SIZE, buf)) {
|
2003-06-18 00:18:26 +02:00
|
|
|
log_fn(LOG_ERR,"Decryption failed, dropping.");
|
2002-06-27 00:45:49 +02:00
|
|
|
return connection_process_inbuf(conn); /* process the remainder of the buffer */
|
|
|
|
}
|
2003-06-18 00:18:26 +02:00
|
|
|
// log_fn(LOG_DEBUG,"Cell decrypted (%d bytes).",outlen);
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
#if 0
|
2002-06-27 00:45:49 +02:00
|
|
|
printf("Cell header plaintext: ");
|
|
|
|
for(x=0;x<8;x++) {
|
|
|
|
printf("%u ",outbuf[x]);
|
|
|
|
}
|
|
|
|
printf("\n");
|
2003-09-07 12:24:40 +02:00
|
|
|
#endif
|
Implemented link padding and receiver token buckets
Each socket reads at most 'bandwidth' bytes per second sustained, but
can handle bursts of up to 10*bandwidth bytes.
Cells are now sent out at evenly-spaced intervals, with padding sent
out otherwise. Set Linkpadding=0 in the rc file to send cells as soon
as they're available (and to never send padding cells).
Added license/copyrights statements at the top of most files.
router->min and router->max have been merged into a single 'bandwidth'
value. We should make the routerinfo_t reflect this (want to do that,
Mat?)
As the bandwidth increases, and we want to stop sleeping more and more
frequently to send a single cell, cpu usage goes up. At 128kB/s we're
pretty much calling poll with a timeout of 1ms or even 0ms. The current
code takes a timeout of 0-9ms and makes it 10ms. prepare_for_poll()
handles everything that should have happened in the past, so as long as
our buffers don't get too full in that 10ms, we're ok.
Speaking of too full, if you run three servers at 100kB/s with -l debug,
it spends too much time printing debugging messages to be able to keep
up with the cells. The outbuf ultimately fills up and it kills that
connection. If you run with -l err, it works fine up through 500kB/s and
probably beyond. Down the road we'll want to teach it to recognize when
an outbuf is getting full, and back off.
svn:r50
2002-07-16 03:12:15 +02:00
|
|
|
#endif
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2003-09-07 12:24:40 +02:00
|
|
|
/* retrieve cell info from buf (create the host-order struct from the network-order string) */
|
|
|
|
cell_unpack(&cell, buf);
|
2002-10-02 22:12:44 +02:00
|
|
|
|
2003-06-18 00:18:26 +02:00
|
|
|
// log_fn(LOG_DEBUG,"Decrypted cell is of type %u (ACI %u).",cellp->command,cellp->aci);
|
2002-10-02 22:12:44 +02:00
|
|
|
command_process_cell(&cell, conn);
|
2002-06-27 00:45:49 +02:00
|
|
|
|
|
|
|
return connection_process_inbuf(conn); /* process the remainder of the buffer */
|
|
|
|
}
|
|
|
|
|
2003-04-16 19:44:33 +02:00
|
|
|
void
|
|
|
|
cell_pack(char *dest, const cell_t *src)
|
|
|
|
{
|
|
|
|
*(uint16_t*)dest = htons(src->aci);
|
|
|
|
*(uint8_t*)(dest+2) = src->command;
|
|
|
|
*(uint8_t*)(dest+3) = src->length;
|
|
|
|
*(uint32_t*)(dest+4) = 0; /* Reserved */
|
2003-04-17 19:10:41 +02:00
|
|
|
memcpy(dest+8, src->payload, CELL_PAYLOAD_SIZE);
|
2003-04-16 19:44:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
cell_unpack(cell_t *dest, const char *src)
|
|
|
|
{
|
|
|
|
dest->aci = ntohs(*(uint16_t*)(src));
|
|
|
|
dest->command = *(uint8_t*)(src+2);
|
|
|
|
dest->length = *(uint8_t*)(src+3);
|
|
|
|
dest->seq = ntohl(*(uint32_t*)(src+4));
|
2003-04-17 19:10:41 +02:00
|
|
|
memcpy(dest->payload, src+8, CELL_PAYLOAD_SIZE);
|
2003-04-16 19:44:33 +02:00
|
|
|
}
|
|
|
|
|
2003-04-07 04:12:02 +02:00
|
|
|
/*
|
|
|
|
Local Variables:
|
|
|
|
mode:c
|
|
|
|
indent-tabs-mode:nil
|
|
|
|
c-basic-offset:2
|
|
|
|
End:
|
|
|
|
*/
|