2006-02-09 06:46:49 +01:00
|
|
|
/* Copyright (c) 2001 Matej Pfajfar.
|
|
|
|
* Copyright (c) 2001-2004, Roger Dingledine.
|
2007-12-12 22:09:01 +01:00
|
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
2017-03-15 21:13:17 +01:00
|
|
|
* Copyright (c) 2007-2017, The Tor Project, Inc. */
|
2004-05-13 09:24:49 +02:00
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* \file circuituse.c
|
2016-10-26 19:30:23 +02:00
|
|
|
* \brief Launch the right sort of circuits and attach the right streams to
|
|
|
|
* them.
|
|
|
|
*
|
|
|
|
* As distinct from circuitlist.c, which manages lookups to find circuits, and
|
|
|
|
* circuitbuild.c, which handles the logistics of circuit construction, this
|
|
|
|
* module keeps track of which streams can be attached to which circuits (in
|
|
|
|
* circuit_get_best()), and attaches streams to circuits (with
|
|
|
|
* circuit_try_attaching_streams(), connection_ap_handshake_attach_circuit(),
|
2016-10-27 18:03:52 +02:00
|
|
|
* and connection_ap_handshake_attach_chosen_circuit() ).
|
2016-10-26 19:30:23 +02:00
|
|
|
*
|
|
|
|
* This module also makes sure that we are building circuits for all of the
|
|
|
|
* predicted ports, using circuit_remove_handled_ports(),
|
|
|
|
* circuit_stream_is_being_handled(), and circuit_build_needed_cirs(). It
|
|
|
|
* handles launching circuits for specific targets using
|
|
|
|
* circuit_launch_by_extend_info().
|
|
|
|
*
|
|
|
|
* This is also where we handle expiring circuits that have been around for
|
|
|
|
* too long without actually completing, along with the circuit_build_timeout
|
|
|
|
* logic in circuitstats.c.
|
2004-05-13 09:24:49 +02:00
|
|
|
**/
|
|
|
|
|
|
|
|
#include "or.h"
|
2012-10-28 21:13:58 +01:00
|
|
|
#include "addressmap.h"
|
2016-11-15 13:49:06 +01:00
|
|
|
#include "bridges.h"
|
2012-08-08 15:02:47 +02:00
|
|
|
#include "channel.h"
|
2013-10-31 19:33:34 +01:00
|
|
|
#include "circpathbias.h"
|
2010-07-22 01:21:00 +02:00
|
|
|
#include "circuitbuild.h"
|
2010-07-22 09:46:23 +02:00
|
|
|
#include "circuitlist.h"
|
2012-10-15 20:48:34 +02:00
|
|
|
#include "circuitstats.h"
|
2010-07-22 10:03:40 +02:00
|
|
|
#include "circuituse.h"
|
2010-07-22 10:22:51 +02:00
|
|
|
#include "config.h"
|
2010-07-22 10:32:52 +02:00
|
|
|
#include "connection.h"
|
2010-07-22 10:43:02 +02:00
|
|
|
#include "connection_edge.h"
|
2010-07-22 11:35:09 +02:00
|
|
|
#include "control.h"
|
2012-10-15 20:48:34 +02:00
|
|
|
#include "entrynodes.h"
|
2016-05-31 20:51:30 +02:00
|
|
|
#include "hs_common.h"
|
2017-05-02 15:22:00 +02:00
|
|
|
#include "hs_client.h"
|
2017-05-30 22:11:59 +02:00
|
|
|
#include "hs_circuit.h"
|
2017-05-02 15:20:26 +02:00
|
|
|
#include "hs_ident.h"
|
2018-01-23 11:31:06 +01:00
|
|
|
#include "hs_stats.h"
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
#include "nodelist.h"
|
2011-07-20 16:38:00 +02:00
|
|
|
#include "networkstatus.h"
|
2010-07-23 20:51:25 +02:00
|
|
|
#include "policies.h"
|
2010-07-22 00:13:51 +02:00
|
|
|
#include "rendclient.h"
|
2010-07-21 17:52:54 +02:00
|
|
|
#include "rendcommon.h"
|
2010-07-22 00:30:17 +02:00
|
|
|
#include "rendservice.h"
|
2010-07-23 22:57:20 +02:00
|
|
|
#include "rephist.h"
|
2010-07-21 16:17:10 +02:00
|
|
|
#include "router.h"
|
2010-07-21 17:08:11 +02:00
|
|
|
#include "routerlist.h"
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2011-03-26 06:34:42 +01:00
|
|
|
static void circuit_expire_old_circuits_clientside(void);
|
2004-05-13 09:24:49 +02:00
|
|
|
static void circuit_increment_failure_count(void);
|
|
|
|
|
2017-05-02 15:20:26 +02:00
|
|
|
/** Check whether the hidden service destination of the stream at
|
|
|
|
* <b>edge_conn</b> is the same as the destination of the circuit at
|
|
|
|
* <b>origin_circ</b>. */
|
|
|
|
static int
|
|
|
|
circuit_matches_with_rend_stream(const edge_connection_t *edge_conn,
|
|
|
|
const origin_circuit_t *origin_circ)
|
|
|
|
{
|
|
|
|
/* Check if this is a v2 rendezvous circ/stream */
|
|
|
|
if ((edge_conn->rend_data && !origin_circ->rend_data) ||
|
|
|
|
(!edge_conn->rend_data && origin_circ->rend_data) ||
|
|
|
|
(edge_conn->rend_data && origin_circ->rend_data &&
|
|
|
|
rend_cmp_service_ids(rend_data_get_address(edge_conn->rend_data),
|
|
|
|
rend_data_get_address(origin_circ->rend_data)))) {
|
|
|
|
/* this circ is not for this conn */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if this is a v3 rendezvous circ/stream */
|
|
|
|
if ((edge_conn->hs_ident && !origin_circ->hs_ident) ||
|
|
|
|
(!edge_conn->hs_ident && origin_circ->hs_ident) ||
|
|
|
|
(edge_conn->hs_ident && origin_circ->hs_ident &&
|
|
|
|
!ed25519_pubkey_eq(&edge_conn->hs_ident->identity_pk,
|
|
|
|
&origin_circ->hs_ident->identity_pk))) {
|
|
|
|
/* this circ is not for this conn */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2007-02-02 21:06:43 +01:00
|
|
|
/** Return 1 if <b>circ</b> could be returned by circuit_get_best().
|
2004-05-13 09:24:49 +02:00
|
|
|
* Else return 0.
|
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
static int
|
2011-07-06 22:30:02 +02:00
|
|
|
circuit_is_acceptable(const origin_circuit_t *origin_circ,
|
2011-07-20 18:55:42 +02:00
|
|
|
const entry_connection_t *conn,
|
2005-11-25 09:08:56 +01:00
|
|
|
int must_be_open, uint8_t purpose,
|
|
|
|
int need_uptime, int need_internal,
|
2005-06-11 20:52:12 +02:00
|
|
|
time_t now)
|
2004-05-13 09:24:49 +02:00
|
|
|
{
|
2011-07-06 22:30:02 +02:00
|
|
|
const circuit_t *circ = TO_CIRCUIT(origin_circ);
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
const node_t *exitnode;
|
2006-07-23 09:37:35 +02:00
|
|
|
cpath_build_state_t *build_state;
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
tor_assert(circ);
|
|
|
|
tor_assert(conn);
|
|
|
|
tor_assert(conn->socks_request);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2012-08-08 15:02:47 +02:00
|
|
|
if (must_be_open && (circ->state != CIRCUIT_STATE_OPEN || !circ->n_chan))
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0; /* ignore non-open circs */
|
|
|
|
if (circ->marked_for_close)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* if this circ isn't our purpose, skip. */
|
2004-11-28 10:05:49 +01:00
|
|
|
if (purpose == CIRCUIT_PURPOSE_C_REND_JOINED && !must_be_open) {
|
|
|
|
if (circ->purpose != CIRCUIT_PURPOSE_C_ESTABLISH_REND &&
|
2005-01-19 18:13:11 +01:00
|
|
|
circ->purpose != CIRCUIT_PURPOSE_C_REND_READY &&
|
|
|
|
circ->purpose != CIRCUIT_PURPOSE_C_REND_READY_INTRO_ACKED &&
|
|
|
|
circ->purpose != CIRCUIT_PURPOSE_C_REND_JOINED)
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0;
|
2005-12-14 21:40:40 +01:00
|
|
|
} else if (purpose == CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT &&
|
|
|
|
!must_be_open) {
|
2004-05-13 09:24:49 +02:00
|
|
|
if (circ->purpose != CIRCUIT_PURPOSE_C_INTRODUCING &&
|
|
|
|
circ->purpose != CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT)
|
|
|
|
return 0;
|
|
|
|
} else {
|
2004-11-28 10:05:49 +01:00
|
|
|
if (purpose != circ->purpose)
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-12-23 14:25:17 +01:00
|
|
|
/* If this is a timed-out hidden service circuit, skip it. */
|
|
|
|
if (origin_circ->hs_circ_has_timed_out) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-06-10 04:56:40 +02:00
|
|
|
if (purpose == CIRCUIT_PURPOSE_C_GENERAL ||
|
2018-01-20 04:16:24 +01:00
|
|
|
purpose == CIRCUIT_PURPOSE_C_HSDIR_GET ||
|
|
|
|
purpose == CIRCUIT_PURPOSE_S_HSDIR_POST ||
|
2017-12-22 07:35:29 +01:00
|
|
|
purpose == CIRCUIT_PURPOSE_HS_VANGUARDS ||
|
2013-02-20 00:29:17 +01:00
|
|
|
purpose == CIRCUIT_PURPOSE_C_REND_JOINED) {
|
2004-11-28 10:05:49 +01:00
|
|
|
if (circ->timestamp_dirty &&
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
circ->timestamp_dirty+get_options()->MaxCircuitDirtiness <= now)
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0;
|
2013-02-20 00:29:17 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (origin_circ->unusable_for_new_conns)
|
|
|
|
return 0;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
/* decide if this circ is suitable for this conn */
|
2004-05-13 09:24:49 +02:00
|
|
|
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
/* for rend circs, circ->cpath->prev is not the last router in the
|
2016-01-26 03:48:31 +01:00
|
|
|
* circuit, it's the magical extra service hop. so just check the nickname
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
* of the one we meant to finish at.
|
|
|
|
*/
|
2011-07-06 22:30:02 +02:00
|
|
|
build_state = origin_circ->build_state;
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
exitnode = build_state_get_exit_node(build_state);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2006-07-23 09:37:35 +02:00
|
|
|
if (need_uptime && !build_state->need_uptime)
|
2005-11-25 09:08:56 +01:00
|
|
|
return 0;
|
2006-07-23 09:37:35 +02:00
|
|
|
if (need_internal != build_state->is_internal)
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
return 0;
|
2005-01-12 05:58:23 +01:00
|
|
|
|
2017-12-02 03:28:16 +01:00
|
|
|
if (purpose == CIRCUIT_PURPOSE_C_GENERAL ||
|
|
|
|
purpose == CIRCUIT_PURPOSE_S_HSDIR_POST ||
|
|
|
|
purpose == CIRCUIT_PURPOSE_C_HSDIR_GET) {
|
2013-03-12 04:37:47 +01:00
|
|
|
tor_addr_t addr;
|
|
|
|
const int family = tor_addr_parse(&addr, conn->socks_request->address);
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
if (!exitnode && !build_state->onehop_tunnel) {
|
2008-04-16 02:12:44 +02:00
|
|
|
log_debug(LD_CIRC,"Not considering circuit with unknown router.");
|
2005-06-29 23:46:55 +02:00
|
|
|
return 0; /* this circuit is screwed and doesn't know it yet,
|
|
|
|
* or is a rendezvous circuit. */
|
|
|
|
}
|
2006-12-13 03:49:45 +01:00
|
|
|
if (build_state->onehop_tunnel) {
|
2007-10-28 09:16:19 +01:00
|
|
|
if (!conn->want_onehop) {
|
2006-12-13 03:49:45 +01:00
|
|
|
log_debug(LD_CIRC,"Skipping one-hop circuit.");
|
|
|
|
return 0;
|
|
|
|
}
|
2007-04-27 12:26:09 +02:00
|
|
|
tor_assert(conn->chosen_exit_name);
|
|
|
|
if (build_state->chosen_exit) {
|
|
|
|
char digest[DIGEST_LEN];
|
2008-06-20 05:13:16 +02:00
|
|
|
if (hexdigest_to_digest(conn->chosen_exit_name, digest) < 0)
|
|
|
|
return 0; /* broken digest, we don't want it */
|
2011-05-10 22:58:38 +02:00
|
|
|
if (tor_memneq(digest, build_state->chosen_exit->identity_digest,
|
2008-06-20 05:13:16 +02:00
|
|
|
DIGEST_LEN))
|
2007-04-27 12:26:09 +02:00
|
|
|
return 0; /* this is a circuit to somewhere else */
|
2008-06-20 05:13:16 +02:00
|
|
|
if (tor_digest_is_zero(digest)) {
|
|
|
|
/* we don't know the digest; have to compare addr:port */
|
2013-03-12 04:37:47 +01:00
|
|
|
if (family < 0 ||
|
2008-08-05 22:08:19 +02:00
|
|
|
!tor_addr_eq(&build_state->chosen_exit->addr, &addr) ||
|
2008-06-20 05:13:16 +02:00
|
|
|
build_state->chosen_exit->port != conn->socks_request->port)
|
|
|
|
return 0;
|
|
|
|
}
|
2007-04-27 12:26:09 +02:00
|
|
|
}
|
2006-12-13 03:49:45 +01:00
|
|
|
} else {
|
2007-10-28 09:16:19 +01:00
|
|
|
if (conn->want_onehop) {
|
2006-12-13 03:49:45 +01:00
|
|
|
/* don't use three-hop circuits -- that could hurt our anonymity. */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2013-03-12 04:37:47 +01:00
|
|
|
if (origin_circ->prepend_policy && family != -1) {
|
|
|
|
int r = compare_tor_addr_to_addr_policy(&addr,
|
|
|
|
conn->socks_request->port,
|
|
|
|
origin_circ->prepend_policy);
|
|
|
|
if (r == ADDR_POLICY_REJECTED)
|
|
|
|
return 0;
|
|
|
|
}
|
2011-04-27 20:36:30 +02:00
|
|
|
if (exitnode && !connection_ap_can_use_exit(conn, exitnode)) {
|
2005-02-02 07:26:52 +01:00
|
|
|
/* can't exit from this router */
|
|
|
|
return 0;
|
|
|
|
}
|
2017-05-02 15:20:26 +02:00
|
|
|
} else { /* not general: this might be a rend circuit */
|
2011-07-20 18:55:42 +02:00
|
|
|
const edge_connection_t *edge_conn = ENTRY_TO_EDGE_CONN(conn);
|
2017-05-02 15:20:26 +02:00
|
|
|
if (!circuit_matches_with_rend_stream(edge_conn, origin_circ)) {
|
2005-02-02 07:26:52 +01:00
|
|
|
return 0;
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
}
|
2011-07-06 23:08:24 +02:00
|
|
|
|
|
|
|
if (!connection_edge_compatible_with_circuit(conn, origin_circ)) {
|
|
|
|
/* conn needs to be isolated from other conns that have already used
|
|
|
|
* origin_circ */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2007-02-02 21:06:43 +01:00
|
|
|
/** Return 1 if circuit <b>a</b> is better than circuit <b>b</b> for
|
2011-07-06 23:08:24 +02:00
|
|
|
* <b>conn</b>, and return 0 otherwise. Used by circuit_get_best.
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
static int
|
2011-07-06 22:30:02 +02:00
|
|
|
circuit_is_better(const origin_circuit_t *oa, const origin_circuit_t *ob,
|
2011-07-20 18:55:42 +02:00
|
|
|
const entry_connection_t *conn)
|
2004-05-13 09:24:49 +02:00
|
|
|
{
|
2011-07-06 22:30:02 +02:00
|
|
|
const circuit_t *a = TO_CIRCUIT(oa);
|
|
|
|
const circuit_t *b = TO_CIRCUIT(ob);
|
2011-07-20 18:55:42 +02:00
|
|
|
const uint8_t purpose = ENTRY_TO_CONN(conn)->purpose;
|
2011-07-06 23:08:24 +02:00
|
|
|
int a_bits, b_bits;
|
2011-07-06 22:30:02 +02:00
|
|
|
|
2012-10-26 02:43:10 +02:00
|
|
|
/* If one of the circuits was allowed to live due to relaxing its timeout,
|
|
|
|
* it is definitely worse (it's probably a much slower path). */
|
|
|
|
if (oa->relaxed_timeout && !ob->relaxed_timeout)
|
|
|
|
return 0; /* ob is better. It's not relaxed. */
|
|
|
|
if (!oa->relaxed_timeout && ob->relaxed_timeout)
|
|
|
|
return 1; /* oa is better. It's not relaxed. */
|
|
|
|
|
2004-11-28 10:05:49 +01:00
|
|
|
switch (purpose) {
|
2017-12-02 03:28:16 +01:00
|
|
|
case CIRCUIT_PURPOSE_S_HSDIR_POST:
|
|
|
|
case CIRCUIT_PURPOSE_C_HSDIR_GET:
|
2004-05-13 09:24:49 +02:00
|
|
|
case CIRCUIT_PURPOSE_C_GENERAL:
|
|
|
|
/* if it's used but less dirty it's best;
|
|
|
|
* else if it's more recently created it's best
|
|
|
|
*/
|
2004-11-28 10:05:49 +01:00
|
|
|
if (b->timestamp_dirty) {
|
|
|
|
if (a->timestamp_dirty &&
|
2004-11-28 12:39:53 +01:00
|
|
|
a->timestamp_dirty > b->timestamp_dirty)
|
2004-05-13 09:24:49 +02:00
|
|
|
return 1;
|
|
|
|
} else {
|
2004-11-28 10:05:49 +01:00
|
|
|
if (a->timestamp_dirty ||
|
2014-11-12 19:28:07 +01:00
|
|
|
timercmp(&a->timestamp_began, &b->timestamp_began, OP_GT))
|
2004-05-13 09:24:49 +02:00
|
|
|
return 1;
|
2011-07-06 22:30:02 +02:00
|
|
|
if (ob->build_state->is_internal)
|
2016-05-30 22:18:16 +02:00
|
|
|
/* XXXX++ what the heck is this internal thing doing here. I
|
2011-04-27 01:55:34 +02:00
|
|
|
* think we can get rid of it. circuit_is_acceptable() already
|
|
|
|
* makes sure that is_internal is exactly what we need it to
|
|
|
|
* be. -RD */
|
2006-07-23 09:37:35 +02:00
|
|
|
return 1;
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT:
|
|
|
|
/* the closer it is to ack_wait the better it is */
|
2004-11-28 10:05:49 +01:00
|
|
|
if (a->purpose > b->purpose)
|
2004-05-13 09:24:49 +02:00
|
|
|
return 1;
|
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_C_REND_JOINED:
|
|
|
|
/* the closer it is to rend_joined the better it is */
|
2004-11-28 10:05:49 +01:00
|
|
|
if (a->purpose > b->purpose)
|
2004-05-13 09:24:49 +02:00
|
|
|
return 1;
|
|
|
|
break;
|
|
|
|
}
|
2011-07-06 23:08:24 +02:00
|
|
|
|
2016-05-30 22:18:16 +02:00
|
|
|
/* XXXX Maybe this check should get a higher priority to avoid
|
2011-07-06 23:08:24 +02:00
|
|
|
* using up circuits too rapidly. */
|
|
|
|
|
|
|
|
a_bits = connection_edge_update_circuit_isolation(conn,
|
|
|
|
(origin_circuit_t*)oa, 1);
|
|
|
|
b_bits = connection_edge_update_circuit_isolation(conn,
|
|
|
|
(origin_circuit_t*)ob, 1);
|
|
|
|
/* if x_bits < 0, then we have not used x for anything; better not to dirty
|
|
|
|
* a connection if we can help it. */
|
|
|
|
if (a_bits < 0) {
|
|
|
|
return 0;
|
|
|
|
} else if (b_bits < 0) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
a_bits &= ~ oa->isolation_flags_mixed;
|
|
|
|
a_bits &= ~ ob->isolation_flags_mixed;
|
|
|
|
if (n_bits_set_u8(a_bits) < n_bits_set_u8(b_bits)) {
|
|
|
|
/* The fewer new restrictions we need to make on a circuit for stream
|
|
|
|
* isolation, the better. */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Find the best circ that conn can use, preferably one which is
|
|
|
|
* dirty. Circ must not be too old.
|
|
|
|
*
|
|
|
|
* Conn must be defined.
|
|
|
|
*
|
|
|
|
* If must_be_open, ignore circs not in CIRCUIT_STATE_OPEN.
|
|
|
|
*
|
|
|
|
* circ_purpose specifies what sort of circuit we must have.
|
|
|
|
* It can be C_GENERAL, C_INTRODUCE_ACK_WAIT, or C_REND_JOINED.
|
|
|
|
*
|
|
|
|
* If it's REND_JOINED and must_be_open==0, then return the closest
|
|
|
|
* rendezvous-purposed circuit that you can find.
|
|
|
|
*
|
|
|
|
* If it's INTRODUCE_ACK_WAIT and must_be_open==0, then return the
|
|
|
|
* closest introduce-purposed circuit that you can find.
|
|
|
|
*/
|
2006-07-23 09:37:35 +02:00
|
|
|
static origin_circuit_t *
|
2011-07-20 18:55:42 +02:00
|
|
|
circuit_get_best(const entry_connection_t *conn,
|
2011-07-06 22:30:02 +02:00
|
|
|
int must_be_open, uint8_t purpose,
|
2005-11-25 09:08:56 +01:00
|
|
|
int need_uptime, int need_internal)
|
2004-05-13 09:24:49 +02:00
|
|
|
{
|
2011-07-06 22:30:02 +02:00
|
|
|
origin_circuit_t *best=NULL;
|
2011-03-26 06:39:11 +01:00
|
|
|
struct timeval now;
|
2008-10-15 20:52:06 +02:00
|
|
|
int intro_going_on_but_too_old = 0;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
|
|
|
tor_assert(conn);
|
|
|
|
|
|
|
|
tor_assert(purpose == CIRCUIT_PURPOSE_C_GENERAL ||
|
2017-12-22 07:35:29 +01:00
|
|
|
purpose == CIRCUIT_PURPOSE_HS_VANGUARDS ||
|
2017-12-02 03:28:16 +01:00
|
|
|
purpose == CIRCUIT_PURPOSE_C_HSDIR_GET ||
|
|
|
|
purpose == CIRCUIT_PURPOSE_S_HSDIR_POST ||
|
2004-05-13 09:24:49 +02:00
|
|
|
purpose == CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT ||
|
|
|
|
purpose == CIRCUIT_PURPOSE_C_REND_JOINED);
|
|
|
|
|
2011-03-26 06:39:11 +01:00
|
|
|
tor_gettimeofday(&now);
|
|
|
|
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *, circ) {
|
2011-07-06 22:30:02 +02:00
|
|
|
origin_circuit_t *origin_circ;
|
|
|
|
if (!CIRCUIT_IS_ORIGIN(circ))
|
|
|
|
continue;
|
|
|
|
origin_circ = TO_ORIGIN_CIRCUIT(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2012-12-08 03:57:51 +01:00
|
|
|
/* Log an info message if we're going to launch a new intro circ in
|
|
|
|
* parallel */
|
2008-10-15 20:52:06 +02:00
|
|
|
if (purpose == CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT &&
|
2017-08-24 15:00:18 +02:00
|
|
|
!must_be_open && origin_circ->hs_circ_has_timed_out &&
|
|
|
|
!circ->marked_for_close) {
|
2012-12-08 03:57:51 +01:00
|
|
|
intro_going_on_but_too_old = 1;
|
|
|
|
continue;
|
2008-10-15 20:52:06 +02:00
|
|
|
}
|
|
|
|
|
2012-12-08 03:57:51 +01:00
|
|
|
if (!circuit_is_acceptable(origin_circ,conn,must_be_open,purpose,
|
2014-05-12 01:16:06 +02:00
|
|
|
need_uptime,need_internal, (time_t)now.tv_sec))
|
2012-12-08 03:57:51 +01:00
|
|
|
continue;
|
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
/* now this is an acceptable circ to hand back. but that doesn't
|
|
|
|
* mean it's the *best* circ to hand back. try to decide.
|
|
|
|
*/
|
2011-07-06 23:08:24 +02:00
|
|
|
if (!best || circuit_is_better(origin_circ,best,conn))
|
2011-07-06 22:30:02 +02:00
|
|
|
best = origin_circ;
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_END(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2008-10-15 20:52:06 +02:00
|
|
|
if (!best && intro_going_on_but_too_old)
|
|
|
|
log_info(LD_REND|LD_CIRC, "There is an intro circuit being created "
|
|
|
|
"right now, but it has already taken quite a while. Starting "
|
|
|
|
"one in parallel.");
|
|
|
|
|
2011-07-06 22:30:02 +02:00
|
|
|
return best;
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2011-07-07 20:54:54 +02:00
|
|
|
/** Return the number of not-yet-open general-purpose origin circuits. */
|
|
|
|
static int
|
|
|
|
count_pending_general_client_circuits(void)
|
|
|
|
{
|
|
|
|
int count = 0;
|
|
|
|
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *, circ) {
|
2011-07-07 20:54:54 +02:00
|
|
|
if (circ->marked_for_close ||
|
|
|
|
circ->state == CIRCUIT_STATE_OPEN ||
|
2018-01-24 01:03:24 +01:00
|
|
|
!CIRCUIT_PURPOSE_COUNTS_TOWARDS_MAXPENDING(circ->purpose) ||
|
2011-07-07 20:54:54 +02:00
|
|
|
!CIRCUIT_IS_ORIGIN(circ))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
++count;
|
|
|
|
}
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_END(circ);
|
2011-07-07 20:54:54 +02:00
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
2011-03-11 09:22:53 +01:00
|
|
|
#if 0
|
2008-09-16 00:29:47 +02:00
|
|
|
/** Check whether, according to the policies in <b>options</b>, the
|
2008-12-22 15:56:16 +01:00
|
|
|
* circuit <b>circ</b> makes sense. */
|
2011-03-11 09:22:53 +01:00
|
|
|
/* XXXX currently only checks Exclude{Exit}Nodes; it should check more.
|
|
|
|
* Also, it doesn't have the right definition of an exit circuit. Also,
|
|
|
|
* it's never called. */
|
2008-09-16 00:29:47 +02:00
|
|
|
int
|
|
|
|
circuit_conforms_to_options(const origin_circuit_t *circ,
|
|
|
|
const or_options_t *options)
|
|
|
|
{
|
|
|
|
const crypt_path_t *cpath, *cpath_next = NULL;
|
|
|
|
|
2011-03-11 09:22:53 +01:00
|
|
|
/* first check if it includes any excluded nodes */
|
|
|
|
for (cpath = circ->cpath; cpath_next != circ->cpath; cpath = cpath_next) {
|
2008-09-16 00:29:47 +02:00
|
|
|
cpath_next = cpath->next;
|
|
|
|
if (routerset_contains_extendinfo(options->ExcludeNodes,
|
|
|
|
cpath->extend_info))
|
|
|
|
return 0;
|
2011-03-11 09:22:53 +01:00
|
|
|
}
|
2008-09-16 00:29:47 +02:00
|
|
|
|
2011-03-11 09:22:53 +01:00
|
|
|
/* then consider the final hop */
|
|
|
|
if (routerset_contains_extendinfo(options->ExcludeExitNodes,
|
|
|
|
circ->cpath->prev->extend_info))
|
|
|
|
return 0;
|
2008-09-16 00:29:47 +02:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
2017-09-15 22:24:44 +02:00
|
|
|
#endif /* 0 */
|
2008-09-16 00:29:47 +02:00
|
|
|
|
2017-12-07 01:04:09 +01:00
|
|
|
/**
|
|
|
|
* Close all circuits that start at us, aren't open, and were born
|
2006-03-22 01:52:37 +01:00
|
|
|
* at least CircuitBuildTimeout seconds ago.
|
2017-12-07 01:04:09 +01:00
|
|
|
*
|
|
|
|
* TODO: This function is now partially redundant to
|
|
|
|
* circuit_build_times_handle_completed_hop(), but that function only
|
|
|
|
* covers circuits up to and including 3 hops that are still actually
|
|
|
|
* completing hops. However, circuit_expire_building() also handles longer
|
|
|
|
* circuits, as well as circuits that are completely stalled.
|
|
|
|
* In the future (after prop247/other path selection revamping), we probably
|
|
|
|
* want to eliminate this rats nest in favor of a simpler approach.
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
void
|
2011-03-26 06:34:42 +01:00
|
|
|
circuit_expire_building(void)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2010-09-30 00:01:22 +02:00
|
|
|
/* circ_times.timeout_ms and circ_times.close_ms are from
|
|
|
|
* circuit_build_times_get_initial_timeout() if we haven't computed
|
|
|
|
* custom timeouts yet */
|
2011-03-26 06:34:42 +01:00
|
|
|
struct timeval general_cutoff, begindir_cutoff, fourhop_cutoff,
|
2012-12-08 03:57:51 +01:00
|
|
|
close_cutoff, extremely_old_cutoff, hs_extremely_old_cutoff,
|
|
|
|
cannibalized_cutoff, c_intro_cutoff, s_intro_cutoff, stream_cutoff;
|
2011-12-23 14:25:17 +01:00
|
|
|
const or_options_t *options = get_options();
|
2011-03-26 06:34:42 +01:00
|
|
|
struct timeval now;
|
2008-03-24 04:50:21 +01:00
|
|
|
cpath_build_state_t *build_state;
|
2012-10-26 02:43:10 +02:00
|
|
|
int any_opened_circs = 0;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2011-03-26 06:34:42 +01:00
|
|
|
tor_gettimeofday(&now);
|
2012-10-26 02:43:10 +02:00
|
|
|
|
|
|
|
/* Check to see if we have any opened circuits. If we don't,
|
|
|
|
* we want to be more lenient with timeouts, in case the
|
|
|
|
* user has relocated and/or changed network connections.
|
|
|
|
* See bug #3443. */
|
2017-12-07 01:04:09 +01:00
|
|
|
any_opened_circs = circuit_any_opened_circuits();
|
2012-10-26 02:43:10 +02:00
|
|
|
|
2011-03-26 06:34:42 +01:00
|
|
|
#define SET_CUTOFF(target, msec) do { \
|
|
|
|
long ms = tor_lround(msec); \
|
|
|
|
struct timeval diff; \
|
|
|
|
diff.tv_sec = ms / 1000; \
|
2011-04-07 05:30:49 +02:00
|
|
|
diff.tv_usec = (int)((ms % 1000) * 1000); \
|
2011-03-26 06:34:42 +01:00
|
|
|
timersub(&now, &diff, &target); \
|
|
|
|
} while (0)
|
|
|
|
|
2012-12-08 03:57:51 +01:00
|
|
|
/**
|
2013-01-09 02:19:15 +01:00
|
|
|
* Because circuit build timeout is calculated only based on 3 hop
|
|
|
|
* general purpose circuit construction, we need to scale the timeout
|
|
|
|
* to make it properly apply to longer circuits, and circuits of
|
|
|
|
* certain usage types. The following diagram illustrates how we
|
|
|
|
* derive the scaling below. In short, we calculate the number
|
|
|
|
* of times our telescoping-based circuit construction causes cells
|
|
|
|
* to traverse each link for the circuit purpose types in question,
|
|
|
|
* and then assume each link is equivalent.
|
|
|
|
*
|
2012-12-08 03:57:51 +01:00
|
|
|
* OP --a--> A --b--> B --c--> C
|
|
|
|
* OP --a--> A --b--> B --c--> C --d--> D
|
|
|
|
*
|
|
|
|
* Let h = a = b = c = d
|
|
|
|
*
|
|
|
|
* Three hops (general_cutoff)
|
|
|
|
* RTTs = 3a + 2b + c
|
|
|
|
* RTTs = 6h
|
|
|
|
* Cannibalized:
|
|
|
|
* RTTs = a+b+c+d
|
|
|
|
* RTTs = 4h
|
|
|
|
* Four hops:
|
|
|
|
* RTTs = 4a + 3b + 2c + d
|
|
|
|
* RTTs = 10h
|
|
|
|
* Client INTRODUCE1+ACK: // XXX: correct?
|
|
|
|
* RTTs = 5a + 4b + 3c + 2d
|
|
|
|
* RTTs = 14h
|
|
|
|
* Server intro:
|
|
|
|
* RTTs = 4a + 3b + 2c
|
|
|
|
* RTTs = 9h
|
|
|
|
*/
|
2013-08-21 17:59:19 +02:00
|
|
|
SET_CUTOFF(general_cutoff, get_circuit_build_timeout_ms());
|
|
|
|
SET_CUTOFF(begindir_cutoff, get_circuit_build_timeout_ms());
|
2012-12-08 03:57:51 +01:00
|
|
|
|
2017-12-07 01:04:09 +01:00
|
|
|
// TODO: We should probably use route_len_for_purpose() here instead,
|
|
|
|
// except that does not count the extra round trip for things like server
|
|
|
|
// intros and rends.
|
|
|
|
|
2012-12-08 03:57:51 +01:00
|
|
|
/* > 3hop circs seem to have a 1.0 second delay on their cannibalized
|
|
|
|
* 4th hop. */
|
2013-08-21 17:59:19 +02:00
|
|
|
SET_CUTOFF(fourhop_cutoff, get_circuit_build_timeout_ms() * (10/6.0) + 1000);
|
2012-12-08 03:57:51 +01:00
|
|
|
|
|
|
|
/* CIRCUIT_PURPOSE_C_ESTABLISH_REND behaves more like a RELAY cell.
|
|
|
|
* Use the stream cutoff (more or less). */
|
|
|
|
SET_CUTOFF(stream_cutoff, MAX(options->CircuitStreamTimeout,15)*1000 + 1000);
|
|
|
|
|
|
|
|
/* Be lenient with cannibalized circs. They already survived the official
|
2013-01-15 21:40:17 +01:00
|
|
|
* CBT, and they're usually not performance-critical. */
|
2012-12-08 03:57:51 +01:00
|
|
|
SET_CUTOFF(cannibalized_cutoff,
|
2013-08-21 17:59:19 +02:00
|
|
|
MAX(get_circuit_build_close_time_ms()*(4/6.0),
|
2012-12-08 03:57:51 +01:00
|
|
|
options->CircuitStreamTimeout * 1000) + 1000);
|
|
|
|
|
2013-01-15 21:40:17 +01:00
|
|
|
/* Intro circs have an extra round trip (and are also 4 hops long) */
|
2013-08-21 17:59:19 +02:00
|
|
|
SET_CUTOFF(c_intro_cutoff, get_circuit_build_timeout_ms() * (14/6.0) + 1000);
|
2012-12-08 03:57:51 +01:00
|
|
|
|
2013-01-15 21:40:17 +01:00
|
|
|
/* Server intro circs have an extra round trip */
|
2013-08-21 17:59:19 +02:00
|
|
|
SET_CUTOFF(s_intro_cutoff, get_circuit_build_timeout_ms() * (9/6.0) + 1000);
|
2012-12-08 03:57:51 +01:00
|
|
|
|
2013-08-21 17:59:19 +02:00
|
|
|
SET_CUTOFF(close_cutoff, get_circuit_build_close_time_ms());
|
|
|
|
SET_CUTOFF(extremely_old_cutoff, get_circuit_build_close_time_ms()*2 + 1000);
|
2011-03-26 06:34:42 +01:00
|
|
|
|
2011-12-23 14:25:17 +01:00
|
|
|
SET_CUTOFF(hs_extremely_old_cutoff,
|
2013-08-21 17:59:19 +02:00
|
|
|
MAX(get_circuit_build_close_time_ms()*2 + 1000,
|
2011-12-23 14:25:17 +01:00
|
|
|
options->SocksTimeout * 1000));
|
|
|
|
|
2014-08-15 22:32:32 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *,victim) {
|
2011-03-26 06:34:42 +01:00
|
|
|
struct timeval cutoff;
|
2005-12-03 06:29:05 +01:00
|
|
|
if (!CIRCUIT_IS_ORIGIN(victim) || /* didn't originate here */
|
2012-10-26 02:43:10 +02:00
|
|
|
victim->marked_for_close) /* don't mess with marked circs */
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* If we haven't yet started the first hop, it means we don't have
|
|
|
|
* any orconns available, and thus have not started counting time yet
|
|
|
|
* for this circuit. See circuit_deliver_create_cell() and uses of
|
|
|
|
* timestamp_began.
|
|
|
|
*
|
|
|
|
* Continue to wait in this case. The ORConn should timeout
|
|
|
|
* independently and kill us then.
|
|
|
|
*/
|
|
|
|
if (TO_ORIGIN_CIRCUIT(victim)->cpath->state == CPATH_STATE_CLOSED) {
|
2005-12-03 06:29:05 +01:00
|
|
|
continue;
|
2012-10-26 02:43:10 +02:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2008-03-24 04:50:21 +01:00
|
|
|
build_state = TO_ORIGIN_CIRCUIT(victim)->build_state;
|
2008-10-15 02:36:09 +02:00
|
|
|
if (build_state && build_state->onehop_tunnel)
|
|
|
|
cutoff = begindir_cutoff;
|
2010-06-08 10:01:47 +02:00
|
|
|
else if (victim->purpose == CIRCUIT_PURPOSE_C_MEASURE_TIMEOUT)
|
|
|
|
cutoff = close_cutoff;
|
2017-11-14 15:01:21 +01:00
|
|
|
else if (victim->purpose == CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT)
|
2012-12-08 03:57:51 +01:00
|
|
|
cutoff = c_intro_cutoff;
|
|
|
|
else if (victim->purpose == CIRCUIT_PURPOSE_S_ESTABLISH_INTRO)
|
|
|
|
cutoff = s_intro_cutoff;
|
|
|
|
else if (victim->purpose == CIRCUIT_PURPOSE_C_ESTABLISH_REND)
|
|
|
|
cutoff = stream_cutoff;
|
2012-12-12 20:53:18 +01:00
|
|
|
else if (victim->purpose == CIRCUIT_PURPOSE_PATH_BIAS_TESTING)
|
|
|
|
cutoff = close_cutoff;
|
2012-12-08 03:57:51 +01:00
|
|
|
else if (TO_ORIGIN_CIRCUIT(victim)->has_opened &&
|
|
|
|
victim->state != CIRCUIT_STATE_OPEN)
|
|
|
|
cutoff = cannibalized_cutoff;
|
|
|
|
else if (build_state && build_state->desired_path_len >= 4)
|
|
|
|
cutoff = fourhop_cutoff;
|
2008-10-15 02:36:09 +02:00
|
|
|
else
|
|
|
|
cutoff = general_cutoff;
|
2010-06-08 10:01:47 +02:00
|
|
|
|
2011-12-23 14:25:17 +01:00
|
|
|
if (TO_ORIGIN_CIRCUIT(victim)->hs_circ_has_timed_out)
|
|
|
|
cutoff = hs_extremely_old_cutoff;
|
|
|
|
|
2014-11-12 19:28:07 +01:00
|
|
|
if (timercmp(&victim->timestamp_began, &cutoff, OP_GT))
|
2008-03-24 04:50:21 +01:00
|
|
|
continue; /* it's still young, leave it alone */
|
|
|
|
|
2013-03-28 01:43:27 +01:00
|
|
|
/* We need to double-check the opened state here because
|
|
|
|
* we don't want to consider opened 1-hop dircon circuits for
|
|
|
|
* deciding when to relax the timeout, but we *do* want to relax
|
|
|
|
* those circuits too if nothing else is opened *and* they still
|
|
|
|
* aren't either. */
|
|
|
|
if (!any_opened_circs && victim->state != CIRCUIT_STATE_OPEN) {
|
2012-10-26 02:43:10 +02:00
|
|
|
/* It's still young enough that we wouldn't close it, right? */
|
2014-11-12 19:28:07 +01:00
|
|
|
if (timercmp(&victim->timestamp_began, &close_cutoff, OP_GT)) {
|
2012-10-26 02:43:10 +02:00
|
|
|
if (!TO_ORIGIN_CIRCUIT(victim)->relaxed_timeout) {
|
|
|
|
int first_hop_succeeded = TO_ORIGIN_CIRCUIT(victim)->cpath->state
|
|
|
|
== CPATH_STATE_OPEN;
|
|
|
|
log_info(LD_CIRC,
|
2013-03-27 23:34:54 +01:00
|
|
|
"No circuits are opened. Relaxing timeout for circuit %d "
|
2016-12-07 18:36:13 +01:00
|
|
|
"(a %s %d-hop circuit in state %s with channel state %s).",
|
2013-03-27 23:34:54 +01:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->global_identifier,
|
|
|
|
circuit_purpose_to_string(victim->purpose),
|
2014-04-19 02:40:34 +02:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state ?
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state->desired_path_len :
|
|
|
|
-1,
|
2013-03-27 23:34:54 +01:00
|
|
|
circuit_state_to_string(victim->state),
|
2017-09-20 22:24:59 +02:00
|
|
|
victim->n_chan ?
|
|
|
|
channel_state_to_string(victim->n_chan->state) : "none");
|
2012-10-26 02:43:10 +02:00
|
|
|
|
|
|
|
/* We count the timeout here for CBT, because technically this
|
|
|
|
* was a timeout, and the timeout value needs to reset if we
|
|
|
|
* see enough of them. Note this means we also need to avoid
|
|
|
|
* double-counting below, too. */
|
2013-08-21 18:10:05 +02:00
|
|
|
circuit_build_times_count_timeout(get_circuit_build_times_mutable(),
|
2013-08-21 17:44:28 +02:00
|
|
|
first_hop_succeeded);
|
2012-10-26 02:43:10 +02:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->relaxed_timeout = 1;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
} else {
|
2012-12-26 16:05:45 +01:00
|
|
|
static ratelim_t relax_timeout_limit = RATELIM_INIT(3600);
|
2013-08-21 17:59:19 +02:00
|
|
|
const double build_close_ms = get_circuit_build_close_time_ms();
|
2012-12-26 17:07:15 +01:00
|
|
|
log_fn_ratelim(&relax_timeout_limit, LOG_NOTICE, LD_CIRC,
|
2013-03-27 23:34:54 +01:00
|
|
|
"No circuits are opened. Relaxed timeout for circuit %d "
|
|
|
|
"(a %s %d-hop circuit in state %s with channel state %s) to "
|
|
|
|
"%ldms. However, it appears the circuit has timed out "
|
2016-12-07 18:36:13 +01:00
|
|
|
"anyway.",
|
2013-03-27 23:34:54 +01:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->global_identifier,
|
|
|
|
circuit_purpose_to_string(victim->purpose),
|
2014-04-19 02:40:34 +02:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state ?
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state->desired_path_len :
|
|
|
|
-1,
|
2013-03-27 23:34:54 +01:00
|
|
|
circuit_state_to_string(victim->state),
|
2017-09-20 22:24:59 +02:00
|
|
|
victim->n_chan ?
|
|
|
|
channel_state_to_string(victim->n_chan->state) : "none",
|
2016-12-07 18:36:13 +01:00
|
|
|
(long)build_close_ms);
|
2012-10-26 02:43:10 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-01-17 19:49:13 +01:00
|
|
|
#if 0
|
2004-05-13 09:24:49 +02:00
|
|
|
/* some debug logs, to help track bugs */
|
2004-11-28 10:05:49 +01:00
|
|
|
if (victim->purpose >= CIRCUIT_PURPOSE_C_INTRODUCING &&
|
2004-11-28 12:39:53 +01:00
|
|
|
victim->purpose <= CIRCUIT_PURPOSE_C_REND_READY_INTRO_ACKED) {
|
2004-11-28 10:05:49 +01:00
|
|
|
if (!victim->timestamp_dirty)
|
2009-05-27 23:55:51 +02:00
|
|
|
log_fn(LOG_DEBUG,"Considering %sopen purpose %d to %s (circid %d)."
|
2005-12-14 21:40:40 +01:00
|
|
|
"(clean).",
|
2004-05-13 09:24:49 +02:00
|
|
|
victim->state == CIRCUIT_STATE_OPEN ? "" : "non",
|
2004-07-03 01:40:03 +02:00
|
|
|
victim->purpose, victim->build_state->chosen_exit_name,
|
2004-05-13 09:24:49 +02:00
|
|
|
victim->n_circ_id);
|
|
|
|
else
|
2009-05-27 23:55:51 +02:00
|
|
|
log_fn(LOG_DEBUG,"Considering %sopen purpose %d to %s (circid %d). "
|
2005-12-14 21:40:40 +01:00
|
|
|
"%d secs since dirty.",
|
2004-05-13 09:24:49 +02:00
|
|
|
victim->state == CIRCUIT_STATE_OPEN ? "" : "non",
|
2004-07-03 01:40:03 +02:00
|
|
|
victim->purpose, victim->build_state->chosen_exit_name,
|
2004-05-13 09:24:49 +02:00
|
|
|
victim->n_circ_id,
|
|
|
|
(int)(now - victim->timestamp_dirty));
|
|
|
|
}
|
2017-09-15 22:24:44 +02:00
|
|
|
#endif /* 0 */
|
2004-05-13 09:24:49 +02:00
|
|
|
|
|
|
|
/* if circ is !open, or if it's open but purpose is a non-finished
|
|
|
|
* intro or rend, then mark it for close */
|
2005-12-03 06:29:05 +01:00
|
|
|
if (victim->state == CIRCUIT_STATE_OPEN) {
|
|
|
|
switch (victim->purpose) {
|
2005-12-04 23:19:04 +01:00
|
|
|
default: /* most open circuits can be left alone. */
|
2005-12-03 17:32:29 +01:00
|
|
|
continue; /* yes, continue inside a switch refers to the nearest
|
|
|
|
* enclosing loop. C is smart. */
|
2005-12-03 06:29:05 +01:00
|
|
|
case CIRCUIT_PURPOSE_S_ESTABLISH_INTRO:
|
2005-12-04 23:19:04 +01:00
|
|
|
break; /* too old, need to die */
|
2005-12-03 06:29:05 +01:00
|
|
|
case CIRCUIT_PURPOSE_C_REND_READY:
|
|
|
|
/* it's a rend_ready circ -- has it already picked a query? */
|
2005-12-04 22:51:50 +01:00
|
|
|
/* c_rend_ready circs measure age since timestamp_dirty,
|
|
|
|
* because that's set when they switch purposes
|
|
|
|
*/
|
2008-09-24 16:44:29 +02:00
|
|
|
if (TO_ORIGIN_CIRCUIT(victim)->rend_data ||
|
2017-08-24 15:31:30 +02:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->hs_ident ||
|
2011-03-26 06:34:42 +01:00
|
|
|
victim->timestamp_dirty > cutoff.tv_sec)
|
2005-12-03 06:29:05 +01:00
|
|
|
continue;
|
|
|
|
break;
|
2012-12-12 20:53:18 +01:00
|
|
|
case CIRCUIT_PURPOSE_PATH_BIAS_TESTING:
|
|
|
|
/* Open path bias testing circuits are given a long
|
|
|
|
* time to complete the test, but not forever */
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->path_state = PATH_STATE_USE_FAILED;
|
|
|
|
break;
|
2012-12-08 03:57:51 +01:00
|
|
|
case CIRCUIT_PURPOSE_C_INTRODUCING:
|
2017-11-14 15:01:21 +01:00
|
|
|
/* That purpose means that the intro point circuit has been opened
|
2018-01-24 09:55:15 +01:00
|
|
|
* successfully but the INTRODUCE1 cell hasn't been sent yet because
|
2017-11-14 15:01:21 +01:00
|
|
|
* the client is waiting for the rendezvous point circuit to open.
|
|
|
|
* Keep this circuit open while waiting for the rendezvous circuit.
|
|
|
|
* We let the circuit idle timeout take care of cleaning this
|
|
|
|
* circuit if it never used. */
|
|
|
|
continue;
|
2012-12-08 03:57:51 +01:00
|
|
|
case CIRCUIT_PURPOSE_C_ESTABLISH_REND:
|
2005-12-03 06:29:05 +01:00
|
|
|
case CIRCUIT_PURPOSE_C_REND_READY_INTRO_ACKED:
|
|
|
|
case CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT:
|
|
|
|
/* rend and intro circs become dirty each time they
|
|
|
|
* make an introduction attempt. so timestamp_dirty
|
|
|
|
* will reflect the time since the last attempt.
|
|
|
|
*/
|
2011-03-26 06:34:42 +01:00
|
|
|
if (victim->timestamp_dirty > cutoff.tv_sec)
|
2005-12-03 06:29:05 +01:00
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
}
|
2009-09-21 01:50:44 +02:00
|
|
|
} else { /* circuit not open, consider recording failure as timeout */
|
|
|
|
int first_hop_succeeded = TO_ORIGIN_CIRCUIT(victim)->cpath &&
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->cpath->state == CPATH_STATE_OPEN;
|
2010-06-08 10:01:47 +02:00
|
|
|
|
|
|
|
if (TO_ORIGIN_CIRCUIT(victim)->p_streams != NULL) {
|
2011-04-08 19:27:25 +02:00
|
|
|
log_warn(LD_BUG, "Circuit %d (purpose %d, %s) has timed out, "
|
2010-06-08 10:01:47 +02:00
|
|
|
"yet has attached streams!",
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->global_identifier,
|
2011-04-08 19:27:25 +02:00
|
|
|
victim->purpose,
|
|
|
|
circuit_purpose_to_string(victim->purpose));
|
2010-06-08 10:01:47 +02:00
|
|
|
tor_fragile_assert();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2010-09-30 00:05:10 +02:00
|
|
|
if (circuit_timeout_want_to_count_circ(TO_ORIGIN_CIRCUIT(victim)) &&
|
2013-08-21 17:44:28 +02:00
|
|
|
circuit_build_times_enough_to_compute(get_circuit_build_times())) {
|
2017-12-07 01:04:09 +01:00
|
|
|
|
|
|
|
log_info(LD_CIRC,
|
|
|
|
"Deciding to count the timeout for circuit "U64_FORMAT"\n",
|
|
|
|
U64_PRINTF_ARG(
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->global_identifier));
|
|
|
|
|
2010-09-29 20:41:27 +02:00
|
|
|
/* Circuits are allowed to last longer for measurement.
|
|
|
|
* Switch their purpose and wait. */
|
|
|
|
if (victim->purpose != CIRCUIT_PURPOSE_C_MEASURE_TIMEOUT) {
|
2017-12-07 01:04:09 +01:00
|
|
|
circuit_build_times_mark_circ_as_measurement_only(TO_ORIGIN_CIRCUIT(
|
|
|
|
victim));
|
2010-09-29 20:41:27 +02:00
|
|
|
continue;
|
|
|
|
}
|
2010-06-08 10:01:47 +02:00
|
|
|
|
2010-09-29 20:41:27 +02:00
|
|
|
/*
|
|
|
|
* If the circuit build time is much greater than we would have cut
|
|
|
|
* it off at, we probably had a suspend event along this codepath,
|
|
|
|
* and we should discard the value.
|
|
|
|
*/
|
2014-11-12 19:28:07 +01:00
|
|
|
if (timercmp(&victim->timestamp_began, &extremely_old_cutoff, OP_LT)) {
|
2010-09-29 20:41:27 +02:00
|
|
|
log_notice(LD_CIRC,
|
|
|
|
"Extremely large value for circuit build timeout: %lds. "
|
2011-04-08 19:27:25 +02:00
|
|
|
"Assuming clock jump. Purpose %d (%s)",
|
2012-10-26 02:43:10 +02:00
|
|
|
(long)(now.tv_sec - victim->timestamp_began.tv_sec),
|
2011-04-27 21:18:34 +02:00
|
|
|
victim->purpose,
|
2011-04-08 19:27:25 +02:00
|
|
|
circuit_purpose_to_string(victim->purpose));
|
2013-08-21 18:10:05 +02:00
|
|
|
} else if (circuit_build_times_count_close(
|
2014-05-12 01:16:06 +02:00
|
|
|
get_circuit_build_times_mutable(),
|
|
|
|
first_hop_succeeded,
|
|
|
|
(time_t)victim->timestamp_created.tv_sec)) {
|
2013-08-21 18:10:05 +02:00
|
|
|
circuit_build_times_set_timeout(get_circuit_build_times_mutable());
|
2010-09-29 20:41:27 +02:00
|
|
|
}
|
2010-05-08 00:42:57 +02:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
2005-12-03 06:29:05 +01:00
|
|
|
|
2017-04-25 20:03:52 +02:00
|
|
|
/* If this is a hidden service client circuit which is far enough along in
|
|
|
|
* connecting to its destination, and we haven't already flagged it as
|
|
|
|
* 'timed out', flag it so we'll launch another intro or rend circ, but
|
|
|
|
* don't mark it for close yet.
|
2011-12-23 14:25:17 +01:00
|
|
|
*
|
|
|
|
* (Circs flagged as 'timed out' are given a much longer timeout
|
|
|
|
* period above, so we won't close them in the next call to
|
|
|
|
* circuit_expire_building.) */
|
2017-04-25 20:03:52 +02:00
|
|
|
if (!(TO_ORIGIN_CIRCUIT(victim)->hs_circ_has_timed_out)) {
|
2011-12-23 14:25:17 +01:00
|
|
|
switch (victim->purpose) {
|
|
|
|
case CIRCUIT_PURPOSE_C_REND_READY:
|
|
|
|
/* We only want to spare a rend circ if it has been specified in
|
|
|
|
* an INTRODUCE1 cell sent to a hidden service. A circ's
|
|
|
|
* pending_final_cpath field is non-NULL iff it is a rend circ
|
|
|
|
* and we have tried to send an INTRODUCE1 cell specifying it.
|
|
|
|
* Thus, if the pending_final_cpath field *is* NULL, then we
|
|
|
|
* want to not spare it. */
|
2014-04-19 02:40:34 +02:00
|
|
|
if (TO_ORIGIN_CIRCUIT(victim)->build_state &&
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state->pending_final_cpath ==
|
2011-12-23 14:25:17 +01:00
|
|
|
NULL)
|
|
|
|
break;
|
2012-12-08 03:57:51 +01:00
|
|
|
/* fallthrough! */
|
2011-12-23 14:25:17 +01:00
|
|
|
case CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT:
|
|
|
|
case CIRCUIT_PURPOSE_C_REND_READY_INTRO_ACKED:
|
|
|
|
/* If we have reached this line, we want to spare the circ for now. */
|
2013-03-10 13:32:58 +01:00
|
|
|
log_info(LD_CIRC,"Marking circ %u (state %d:%s, purpose %d) "
|
2011-12-23 14:25:17 +01:00
|
|
|
"as timed-out HS circ",
|
2013-03-10 13:32:58 +01:00
|
|
|
(unsigned)victim->n_circ_id,
|
2011-12-23 14:25:17 +01:00
|
|
|
victim->state, circuit_state_to_string(victim->state),
|
|
|
|
victim->purpose);
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->hs_circ_has_timed_out = 1;
|
|
|
|
continue;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-24 13:47:30 +01:00
|
|
|
/* If this is a service-side rendezvous circuit which is far
|
|
|
|
* enough along in connecting to its destination, consider sparing
|
|
|
|
* it. */
|
2017-04-25 20:06:19 +02:00
|
|
|
if (!(TO_ORIGIN_CIRCUIT(victim)->hs_circ_has_timed_out) &&
|
2011-12-24 13:47:30 +01:00
|
|
|
victim->purpose == CIRCUIT_PURPOSE_S_CONNECT_REND) {
|
2013-03-10 13:32:58 +01:00
|
|
|
log_info(LD_CIRC,"Marking circ %u (state %d:%s, purpose %d) "
|
2011-12-24 13:47:30 +01:00
|
|
|
"as timed-out HS circ; relaunching rendezvous attempt.",
|
2013-03-10 13:32:58 +01:00
|
|
|
(unsigned)victim->n_circ_id,
|
2011-12-24 13:47:30 +01:00
|
|
|
victim->state, circuit_state_to_string(victim->state),
|
|
|
|
victim->purpose);
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->hs_circ_has_timed_out = 1;
|
2017-05-30 22:11:59 +02:00
|
|
|
hs_circ_retry_service_rendezvous_point(TO_ORIGIN_CIRCUIT(victim));
|
2011-12-24 13:47:30 +01:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2012-08-08 15:02:47 +02:00
|
|
|
if (victim->n_chan)
|
2012-12-08 03:57:51 +01:00
|
|
|
log_info(LD_CIRC,
|
2013-09-29 12:13:59 +02:00
|
|
|
"Abandoning circ %u %s:%u (state %d,%d:%s, purpose %d, "
|
2012-12-08 03:57:51 +01:00
|
|
|
"len %d)", TO_ORIGIN_CIRCUIT(victim)->global_identifier,
|
2012-08-08 15:02:47 +02:00
|
|
|
channel_get_canonical_remote_descr(victim->n_chan),
|
2013-03-10 13:32:58 +01:00
|
|
|
(unsigned)victim->n_circ_id,
|
2012-12-08 03:57:51 +01:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->has_opened,
|
2006-02-13 09:28:42 +01:00
|
|
|
victim->state, circuit_state_to_string(victim->state),
|
2012-12-08 03:57:51 +01:00
|
|
|
victim->purpose,
|
2014-04-19 02:40:34 +02:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state ?
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state->desired_path_len :
|
|
|
|
-1);
|
2005-12-03 06:29:05 +01:00
|
|
|
else
|
2012-12-08 03:57:51 +01:00
|
|
|
log_info(LD_CIRC,
|
2013-09-29 12:13:59 +02:00
|
|
|
"Abandoning circ %u %u (state %d,%d:%s, purpose %d, len %d)",
|
2012-12-08 03:57:51 +01:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->global_identifier,
|
2013-03-10 13:32:58 +01:00
|
|
|
(unsigned)victim->n_circ_id,
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->has_opened,
|
2012-12-08 03:57:51 +01:00
|
|
|
victim->state,
|
|
|
|
circuit_state_to_string(victim->state), victim->purpose,
|
2014-04-19 02:40:34 +02:00
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state ?
|
|
|
|
TO_ORIGIN_CIRCUIT(victim)->build_state->desired_path_len :
|
|
|
|
-1);
|
2005-12-03 06:29:05 +01:00
|
|
|
|
2006-07-23 09:37:35 +02:00
|
|
|
circuit_log_path(LOG_INFO,LD_CIRC,TO_ORIGIN_CIRCUIT(victim));
|
2010-07-24 18:19:20 +02:00
|
|
|
if (victim->purpose == CIRCUIT_PURPOSE_C_MEASURE_TIMEOUT)
|
|
|
|
circuit_mark_for_close(victim, END_CIRC_REASON_MEASUREMENT_EXPIRED);
|
|
|
|
else
|
|
|
|
circuit_mark_for_close(victim, END_CIRC_REASON_TIMEOUT);
|
2012-10-25 02:34:18 +02:00
|
|
|
|
|
|
|
pathbias_count_timeout(TO_ORIGIN_CIRCUIT(victim));
|
2014-08-15 22:32:32 +02:00
|
|
|
} SMARTLIST_FOREACH_END(victim);
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2016-11-25 18:53:00 +01:00
|
|
|
/**
|
|
|
|
* Mark for close all circuits that start here, that were built through a
|
|
|
|
* guard we weren't sure if we wanted to use, and that have been waiting
|
|
|
|
* around for way too long.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
circuit_expire_waiting_for_better_guard(void)
|
|
|
|
{
|
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_origin_circuit_list(),
|
|
|
|
origin_circuit_t *, circ) {
|
|
|
|
if (TO_CIRCUIT(circ)->marked_for_close)
|
|
|
|
continue;
|
|
|
|
if (circ->guard_state == NULL)
|
|
|
|
continue;
|
|
|
|
if (entry_guard_state_should_expire(circ->guard_state))
|
|
|
|
circuit_mark_for_close(TO_CIRCUIT(circ), END_CIRC_REASON_NONE);
|
|
|
|
} SMARTLIST_FOREACH_END(circ);
|
|
|
|
}
|
|
|
|
|
2014-07-16 10:05:00 +02:00
|
|
|
/** For debugging #8387: track when we last called
|
|
|
|
* circuit_expire_old_circuits_clientside. */
|
|
|
|
static time_t last_expired_clientside_circuits = 0;
|
|
|
|
|
2014-04-29 20:02:12 +02:00
|
|
|
/**
|
|
|
|
* As a diagnostic for bug 8387, log information about how many one-hop
|
|
|
|
* circuits we have around that have been there for at least <b>age</b>
|
|
|
|
* seconds. Log a few of them.
|
2016-11-09 01:22:08 +01:00
|
|
|
* Ignores Single Onion Service intro and Tor2web redezvous circuits, they are
|
|
|
|
* expected to be long-term one-hop circuits.
|
2014-04-29 20:02:12 +02:00
|
|
|
*/
|
|
|
|
void
|
|
|
|
circuit_log_ancient_one_hop_circuits(int age)
|
|
|
|
{
|
|
|
|
#define MAX_ANCIENT_ONEHOP_CIRCUITS_TO_LOG 10
|
2014-06-10 18:04:06 +02:00
|
|
|
time_t now = time(NULL);
|
|
|
|
time_t cutoff = now - age;
|
2014-04-29 20:02:12 +02:00
|
|
|
int n_found = 0;
|
|
|
|
smartlist_t *log_these = smartlist_new();
|
2016-11-09 01:15:48 +01:00
|
|
|
const or_options_t *options = get_options();
|
2014-04-29 20:02:12 +02:00
|
|
|
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *, circ) {
|
2014-04-29 20:02:12 +02:00
|
|
|
const origin_circuit_t *ocirc;
|
|
|
|
if (! CIRCUIT_IS_ORIGIN(circ))
|
|
|
|
continue;
|
|
|
|
if (circ->timestamp_created.tv_sec >= cutoff)
|
|
|
|
continue;
|
2016-11-09 01:22:08 +01:00
|
|
|
/* Single Onion Services deliberately make long term one-hop intro
|
2018-02-05 16:52:17 +01:00
|
|
|
* and rendezvous connections. Don't log the established ones. */
|
2016-11-09 01:22:08 +01:00
|
|
|
if (rend_service_allow_non_anonymous_connection(options) &&
|
2018-02-05 16:52:17 +01:00
|
|
|
(circ->purpose == CIRCUIT_PURPOSE_S_INTRO ||
|
|
|
|
circ->purpose == CIRCUIT_PURPOSE_S_REND_JOINED))
|
2016-11-09 01:22:08 +01:00
|
|
|
continue;
|
|
|
|
/* Tor2web deliberately makes long term one-hop rend connections,
|
|
|
|
* particularly when Tor2webRendezvousPoints is used. We only ignore
|
|
|
|
* active rend point connections, if we take a long time to rendezvous,
|
|
|
|
* that's worth logging. */
|
|
|
|
if (rend_client_allow_non_anonymous_connection(options) &&
|
|
|
|
circ->purpose == CIRCUIT_PURPOSE_C_REND_JOINED)
|
|
|
|
continue;
|
2014-04-29 20:02:12 +02:00
|
|
|
ocirc = CONST_TO_ORIGIN_CIRCUIT(circ);
|
|
|
|
|
|
|
|
if (ocirc->build_state && ocirc->build_state->onehop_tunnel) {
|
|
|
|
++n_found;
|
|
|
|
|
|
|
|
if (smartlist_len(log_these) < MAX_ANCIENT_ONEHOP_CIRCUITS_TO_LOG)
|
|
|
|
smartlist_add(log_these, (origin_circuit_t*) ocirc);
|
|
|
|
}
|
|
|
|
}
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_END(circ);
|
2014-04-29 20:02:12 +02:00
|
|
|
|
|
|
|
if (n_found == 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
log_notice(LD_HEARTBEAT,
|
2014-05-08 04:13:29 +02:00
|
|
|
"Diagnostic for issue 8387: Found %d one-hop circuits more "
|
|
|
|
"than %d seconds old! Logging %d...",
|
2014-04-29 20:02:12 +02:00
|
|
|
n_found, age, smartlist_len(log_these));
|
|
|
|
|
|
|
|
SMARTLIST_FOREACH_BEGIN(log_these, const origin_circuit_t *, ocirc) {
|
|
|
|
char created[ISO_TIME_LEN+1];
|
2014-06-10 18:04:06 +02:00
|
|
|
int stream_num;
|
|
|
|
const edge_connection_t *conn;
|
|
|
|
char *dirty = NULL;
|
2014-08-15 22:32:32 +02:00
|
|
|
const circuit_t *circ = TO_CIRCUIT(ocirc);
|
2014-06-10 18:04:06 +02:00
|
|
|
|
2014-04-29 20:02:12 +02:00
|
|
|
format_local_iso_time(created,
|
2014-05-12 01:16:06 +02:00
|
|
|
(time_t)circ->timestamp_created.tv_sec);
|
2014-04-29 20:02:12 +02:00
|
|
|
|
2014-06-10 18:04:06 +02:00
|
|
|
if (circ->timestamp_dirty) {
|
|
|
|
char dirty_since[ISO_TIME_LEN+1];
|
|
|
|
format_local_iso_time(dirty_since, circ->timestamp_dirty);
|
|
|
|
|
|
|
|
tor_asprintf(&dirty, "Dirty since %s (%ld seconds vs %ld-second cutoff)",
|
|
|
|
dirty_since, (long)(now - circ->timestamp_dirty),
|
2016-11-09 01:15:48 +01:00
|
|
|
(long) options->MaxCircuitDirtiness);
|
2014-06-10 18:04:06 +02:00
|
|
|
} else {
|
|
|
|
dirty = tor_strdup("Not marked dirty");
|
|
|
|
}
|
|
|
|
|
2014-04-29 20:02:12 +02:00
|
|
|
log_notice(LD_HEARTBEAT, " #%d created at %s. %s, %s. %s for close. "
|
2015-02-18 19:25:01 +01:00
|
|
|
"Package window: %d. "
|
2014-06-10 18:04:06 +02:00
|
|
|
"%s for new conns. %s.",
|
2014-04-29 20:02:12 +02:00
|
|
|
ocirc_sl_idx,
|
|
|
|
created,
|
|
|
|
circuit_state_to_string(circ->state),
|
|
|
|
circuit_purpose_to_string(circ->purpose),
|
|
|
|
circ->marked_for_close ? "Marked" : "Not marked",
|
2015-02-18 19:25:01 +01:00
|
|
|
circ->package_window,
|
2014-06-10 18:04:06 +02:00
|
|
|
ocirc->unusable_for_new_conns ? "Not usable" : "usable",
|
|
|
|
dirty);
|
|
|
|
tor_free(dirty);
|
|
|
|
|
|
|
|
stream_num = 0;
|
|
|
|
for (conn = ocirc->p_streams; conn; conn = conn->next_stream) {
|
|
|
|
const connection_t *c = TO_CONN(conn);
|
|
|
|
char stream_created[ISO_TIME_LEN+1];
|
|
|
|
if (++stream_num >= 5)
|
|
|
|
break;
|
|
|
|
|
|
|
|
format_local_iso_time(stream_created, c->timestamp_created);
|
|
|
|
|
|
|
|
log_notice(LD_HEARTBEAT, " Stream#%d created at %s. "
|
|
|
|
"%s conn in state %s. "
|
2015-02-18 19:25:01 +01:00
|
|
|
"It is %slinked and %sreading from a linked connection %p. "
|
|
|
|
"Package window %d. "
|
2014-06-10 18:04:06 +02:00
|
|
|
"%s for close (%s:%d). Hold-open is %sset. "
|
|
|
|
"Has %ssent RELAY_END. %s on circuit.",
|
|
|
|
stream_num,
|
|
|
|
stream_created,
|
|
|
|
conn_type_to_string(c->type),
|
|
|
|
conn_state_to_string(c->type, c->state),
|
2015-02-18 19:25:01 +01:00
|
|
|
c->linked ? "" : "not ",
|
|
|
|
c->reading_from_linked_conn ? "": "not",
|
|
|
|
c->linked_conn,
|
|
|
|
conn->package_window,
|
2014-06-10 18:04:06 +02:00
|
|
|
c->marked_for_close ? "Marked" : "Not marked",
|
|
|
|
c->marked_for_close_file ? c->marked_for_close_file : "--",
|
|
|
|
c->marked_for_close,
|
|
|
|
c->hold_open_until_flushed ? "" : "not ",
|
|
|
|
conn->edge_has_sent_end ? "" : "not ",
|
|
|
|
conn->edge_blocked_on_circ ? "Blocked" : "Not blocked");
|
|
|
|
if (! c->linked_conn)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
c = c->linked_conn;
|
|
|
|
|
|
|
|
log_notice(LD_HEARTBEAT, " Linked to %s connection in state %s "
|
|
|
|
"(Purpose %d). %s for close (%s:%d). Hold-open is %sset. ",
|
|
|
|
conn_type_to_string(c->type),
|
|
|
|
conn_state_to_string(c->type, c->state),
|
|
|
|
c->purpose,
|
|
|
|
c->marked_for_close ? "Marked" : "Not marked",
|
|
|
|
c->marked_for_close_file ? c->marked_for_close_file : "--",
|
|
|
|
c->marked_for_close,
|
|
|
|
c->hold_open_until_flushed ? "" : "not ");
|
|
|
|
}
|
2014-04-29 20:02:12 +02:00
|
|
|
} SMARTLIST_FOREACH_END(ocirc);
|
|
|
|
|
2014-07-16 10:05:00 +02:00
|
|
|
log_notice(LD_HEARTBEAT, "It has been %ld seconds since I last called "
|
|
|
|
"circuit_expire_old_circuits_clientside().",
|
|
|
|
(long)(now - last_expired_clientside_circuits));
|
|
|
|
|
2014-04-29 20:02:12 +02:00
|
|
|
done:
|
|
|
|
smartlist_free(log_these);
|
|
|
|
}
|
|
|
|
|
2004-12-05 08:10:08 +01:00
|
|
|
/** Remove any elements in <b>needed_ports</b> that are handled by an
|
|
|
|
* open or in-progress circuit.
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
2004-12-05 08:10:08 +01:00
|
|
|
void
|
2005-06-11 20:52:12 +02:00
|
|
|
circuit_remove_handled_ports(smartlist_t *needed_ports)
|
|
|
|
{
|
2004-12-05 08:10:08 +01:00
|
|
|
int i;
|
2004-12-07 16:29:54 +01:00
|
|
|
uint16_t *port;
|
2004-12-05 08:10:08 +01:00
|
|
|
|
|
|
|
for (i = 0; i < smartlist_len(needed_ports); ++i) {
|
2004-12-07 16:29:54 +01:00
|
|
|
port = smartlist_get(needed_ports, i);
|
|
|
|
tor_assert(*port);
|
2006-12-10 09:04:50 +01:00
|
|
|
if (circuit_stream_is_being_handled(NULL, *port,
|
|
|
|
MIN_CIRCUITS_HANDLING_STREAM)) {
|
Don't consider a port "handled" by an isolated circuit.
Previously, circuit_stream_is_being_handled incorrectly reported
that (1) an exit port was "handled" by a circuit regardless of
whether the circuit was already isolated in some way, and
(2) that a stream could be "handled" by a circuit even if their
isolation settings were incompatible.
As a result of (1), in Tor Browser, circuit_get_unhandled_ports was
reporting that all ports were handled even though all non-internal
circuits had already been isolated by a SOCKS username+password.
Therefore, circuit_predict_and_launch_new was declining to launch
new exit circuits. Then, when the user visited a new site in Tor
Browser, a stream with new SOCKS credentials would be initiated,
and the stream would have to wait while a new circuit with those
credentials could be built. That wait was making the
time-to-first-byte longer than it needed to be.
Now, clean, not-yet-isolated circuit(s) will be automatically
launched ahead of time and be ready for use whenever a new stream
with new SOCKS credentials (or other isolation criteria) is
initiated.
Fixes bug 18859. Thanks to Nick Mathewson for improvements.
2017-12-06 05:23:02 +01:00
|
|
|
log_debug(LD_CIRC,"Port %d is already being handled; removing.", *port);
|
2004-12-05 08:10:08 +01:00
|
|
|
smartlist_del(needed_ports, i--);
|
2004-12-07 16:29:54 +01:00
|
|
|
tor_free(port);
|
2004-12-05 08:10:08 +01:00
|
|
|
} else {
|
2006-02-13 09:28:42 +01:00
|
|
|
log_debug(LD_CIRC,"Port %d is not handled.", *port);
|
2004-12-05 08:10:08 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2005-11-25 09:08:56 +01:00
|
|
|
/** Return 1 if at least <b>min</b> general-purpose non-internal circuits
|
|
|
|
* will have an acceptable exit node for exit stream <b>conn</b> if it
|
|
|
|
* is defined, else for "*:port".
|
2004-12-05 08:10:08 +01:00
|
|
|
* Else return 0.
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
int
|
2011-07-20 18:55:42 +02:00
|
|
|
circuit_stream_is_being_handled(entry_connection_t *conn,
|
2006-07-26 21:07:37 +02:00
|
|
|
uint16_t port, int min)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
const node_t *exitnode;
|
2004-05-13 09:24:49 +02:00
|
|
|
int num=0;
|
|
|
|
time_t now = time(NULL);
|
2012-04-11 18:59:57 +02:00
|
|
|
int need_uptime = smartlist_contains_int_as_string(
|
|
|
|
get_options()->LongLivedPorts,
|
2005-01-13 08:23:19 +01:00
|
|
|
conn ? conn->socks_request->port : port);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *, circ) {
|
2004-11-28 12:39:53 +01:00
|
|
|
if (CIRCUIT_IS_ORIGIN(circ) &&
|
|
|
|
!circ->marked_for_close &&
|
|
|
|
circ->purpose == CIRCUIT_PURPOSE_C_GENERAL &&
|
|
|
|
(!circ->timestamp_dirty ||
|
2005-12-04 23:23:24 +01:00
|
|
|
circ->timestamp_dirty + get_options()->MaxCircuitDirtiness > now)) {
|
2013-02-20 00:29:17 +01:00
|
|
|
origin_circuit_t *origin_circ = TO_ORIGIN_CIRCUIT(circ);
|
|
|
|
cpath_build_state_t *build_state = origin_circ->build_state;
|
2006-12-13 03:49:45 +01:00
|
|
|
if (build_state->is_internal || build_state->onehop_tunnel)
|
2006-07-23 09:37:35 +02:00
|
|
|
continue;
|
2013-12-21 16:15:09 +01:00
|
|
|
if (origin_circ->unusable_for_new_conns)
|
2013-02-20 00:29:17 +01:00
|
|
|
continue;
|
Don't consider a port "handled" by an isolated circuit.
Previously, circuit_stream_is_being_handled incorrectly reported
that (1) an exit port was "handled" by a circuit regardless of
whether the circuit was already isolated in some way, and
(2) that a stream could be "handled" by a circuit even if their
isolation settings were incompatible.
As a result of (1), in Tor Browser, circuit_get_unhandled_ports was
reporting that all ports were handled even though all non-internal
circuits had already been isolated by a SOCKS username+password.
Therefore, circuit_predict_and_launch_new was declining to launch
new exit circuits. Then, when the user visited a new site in Tor
Browser, a stream with new SOCKS credentials would be initiated,
and the stream would have to wait while a new circuit with those
credentials could be built. That wait was making the
time-to-first-byte longer than it needed to be.
Now, clean, not-yet-isolated circuit(s) will be automatically
launched ahead of time and be ready for use whenever a new stream
with new SOCKS credentials (or other isolation criteria) is
initiated.
Fixes bug 18859. Thanks to Nick Mathewson for improvements.
2017-12-06 05:23:02 +01:00
|
|
|
if (origin_circ->isolation_values_set &&
|
|
|
|
(conn == NULL ||
|
|
|
|
!connection_edge_compatible_with_circuit(conn, origin_circ)))
|
|
|
|
continue;
|
2006-07-23 09:37:35 +02:00
|
|
|
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
exitnode = build_state_get_exit_node(build_state);
|
|
|
|
if (exitnode && (!need_uptime || build_state->need_uptime)) {
|
2005-03-19 07:57:16 +01:00
|
|
|
int ok;
|
|
|
|
if (conn) {
|
2011-04-27 20:36:30 +02:00
|
|
|
ok = connection_ap_can_use_exit(conn, exitnode);
|
2005-03-19 07:57:16 +01:00
|
|
|
} else {
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
addr_policy_result_t r;
|
2011-07-15 18:58:13 +02:00
|
|
|
r = compare_tor_addr_to_node_policy(NULL, port, exitnode);
|
2005-03-19 07:57:16 +01:00
|
|
|
ok = r != ADDR_POLICY_REJECTED && r != ADDR_POLICY_PROBABLY_REJECTED;
|
|
|
|
}
|
|
|
|
if (ok) {
|
|
|
|
if (++num >= min)
|
|
|
|
return 1;
|
|
|
|
}
|
2004-12-05 08:10:08 +01:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
}
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_END(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-03-12 23:48:18 +01:00
|
|
|
/** Don't keep more than this many unused open circuits around. */
|
2009-09-17 07:41:47 +02:00
|
|
|
#define MAX_UNUSED_OPEN_CIRCUITS 14
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
|
2016-10-14 14:00:35 +02:00
|
|
|
/* Return true if a circuit is available for use, meaning that it is open,
|
|
|
|
* clean, usable for new multi-hop connections, and a general purpose origin
|
|
|
|
* circuit.
|
|
|
|
* Accept any kind of circuit, return false if the above conditions are not
|
|
|
|
* met. */
|
|
|
|
STATIC int
|
|
|
|
circuit_is_available_for_use(const circuit_t *circ)
|
|
|
|
{
|
|
|
|
const origin_circuit_t *origin_circ;
|
|
|
|
cpath_build_state_t *build_state;
|
|
|
|
|
2016-11-21 21:12:21 +01:00
|
|
|
if (!CIRCUIT_IS_ORIGIN(circ))
|
|
|
|
return 0; /* We first filter out only origin circuits before doing the
|
|
|
|
following checks. */
|
2016-10-14 14:00:35 +02:00
|
|
|
if (circ->marked_for_close)
|
|
|
|
return 0; /* Don't mess with marked circs */
|
|
|
|
if (circ->timestamp_dirty)
|
|
|
|
return 0; /* Only count clean circs */
|
2017-12-22 07:35:29 +01:00
|
|
|
if (circ->purpose != CIRCUIT_PURPOSE_C_GENERAL &&
|
|
|
|
circ->purpose != CIRCUIT_PURPOSE_HS_VANGUARDS)
|
2016-11-21 21:12:21 +01:00
|
|
|
return 0; /* We only pay attention to general purpose circuits.
|
2016-11-02 15:45:02 +01:00
|
|
|
General purpose circuits are always origin circuits. */
|
2016-10-14 14:00:35 +02:00
|
|
|
|
|
|
|
origin_circ = CONST_TO_ORIGIN_CIRCUIT(circ);
|
|
|
|
if (origin_circ->unusable_for_new_conns)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
build_state = origin_circ->build_state;
|
|
|
|
if (build_state->onehop_tunnel)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return true if we need any more exit circuits.
|
|
|
|
* needs_uptime and needs_capacity are set only if we need more exit circuits.
|
|
|
|
* Check if we know of a port that's been requested recently and no circuit
|
|
|
|
* is currently available that can handle it. */
|
|
|
|
STATIC int
|
|
|
|
needs_exit_circuits(time_t now, int *needs_uptime, int *needs_capacity)
|
|
|
|
{
|
|
|
|
return (!circuit_all_predicted_ports_handled(now, needs_uptime,
|
|
|
|
needs_capacity) &&
|
|
|
|
router_have_consensus_path() == CONSENSUS_PATH_EXIT);
|
|
|
|
}
|
|
|
|
|
2016-11-22 20:57:19 +01:00
|
|
|
/* Hidden services need at least this many internal circuits */
|
2016-10-23 17:51:09 +02:00
|
|
|
#define SUFFICIENT_UPTIME_INTERNAL_HS_SERVERS 3
|
|
|
|
|
2016-10-14 14:00:35 +02:00
|
|
|
/* Return true if we need any more hidden service server circuits.
|
|
|
|
* HS servers only need an internal circuit. */
|
|
|
|
STATIC int
|
2017-08-04 18:06:34 +02:00
|
|
|
needs_hs_server_circuits(time_t now, int num_uptime_internal)
|
2016-10-14 14:00:35 +02:00
|
|
|
{
|
2017-08-04 18:06:34 +02:00
|
|
|
if (!rend_num_services() && !hs_service_get_num_services()) {
|
|
|
|
/* No services, we don't need anything. */
|
|
|
|
goto no_need;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (num_uptime_internal >= SUFFICIENT_UPTIME_INTERNAL_HS_SERVERS) {
|
|
|
|
/* We have sufficient amount of internal circuit. */
|
|
|
|
goto no_need;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (router_have_consensus_path() == CONSENSUS_PATH_UNKNOWN) {
|
|
|
|
/* Consensus hasn't been checked or might be invalid so requesting
|
|
|
|
* internal circuits is not wise. */
|
|
|
|
goto no_need;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* At this point, we need a certain amount of circuits and we will most
|
|
|
|
* likely use them for rendezvous so we note down the use of internal
|
|
|
|
* circuit for our prediction for circuit needing uptime and capacity. */
|
|
|
|
rep_hist_note_used_internal(now, 1, 1);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
no_need:
|
|
|
|
return 0;
|
2016-10-14 14:00:35 +02:00
|
|
|
}
|
|
|
|
|
2016-11-22 20:57:19 +01:00
|
|
|
/* We need at least this many internal circuits for hidden service clients */
|
2016-10-23 17:51:09 +02:00
|
|
|
#define SUFFICIENT_INTERNAL_HS_CLIENTS 3
|
2016-11-22 20:57:19 +01:00
|
|
|
|
|
|
|
/* We need at least this much uptime for internal circuits for hidden service
|
|
|
|
* clients */
|
2016-10-23 17:51:09 +02:00
|
|
|
#define SUFFICIENT_UPTIME_INTERNAL_HS_CLIENTS 2
|
|
|
|
|
2016-10-14 14:00:35 +02:00
|
|
|
/* Return true if we need any more hidden service client circuits.
|
|
|
|
* HS clients only need an internal circuit. */
|
|
|
|
STATIC int
|
|
|
|
needs_hs_client_circuits(time_t now, int *needs_uptime, int *needs_capacity,
|
|
|
|
int num_internal, int num_uptime_internal)
|
|
|
|
{
|
|
|
|
int used_internal_recently = rep_hist_get_predicted_internal(now,
|
|
|
|
needs_uptime,
|
|
|
|
needs_capacity);
|
2016-10-23 17:51:09 +02:00
|
|
|
int requires_uptime = num_uptime_internal <
|
|
|
|
SUFFICIENT_UPTIME_INTERNAL_HS_CLIENTS &&
|
|
|
|
needs_uptime;
|
|
|
|
|
2016-10-14 14:00:35 +02:00
|
|
|
return (used_internal_recently &&
|
2016-10-23 17:51:09 +02:00
|
|
|
(requires_uptime || num_internal < SUFFICIENT_INTERNAL_HS_CLIENTS) &&
|
2016-10-14 14:00:35 +02:00
|
|
|
router_have_consensus_path() != CONSENSUS_PATH_UNKNOWN);
|
|
|
|
}
|
|
|
|
|
2018-01-31 18:07:07 +01:00
|
|
|
/* This is how many circuits can be opened concurrently during the cbt learning
|
|
|
|
* phase. This number cannot exceed the tor-wide MAX_UNUSED_OPEN_CIRCUITS. */
|
|
|
|
#define DFLT_CBT_UNUSED_OPEN_CIRCS (10)
|
|
|
|
#define MIN_CBT_UNUSED_OPEN_CIRCS 0
|
|
|
|
#define MAX_CBT_UNUSED_OPEN_CIRCS MAX_UNUSED_OPEN_CIRCUITS
|
2016-10-23 17:51:09 +02:00
|
|
|
|
|
|
|
/* Return true if we need more circuits for a good build timeout.
|
2016-10-14 14:00:35 +02:00
|
|
|
* XXXX make the assumption that build timeout streams should be
|
|
|
|
* created whenever we can build internal circuits. */
|
|
|
|
STATIC int
|
|
|
|
needs_circuits_for_build(int num)
|
|
|
|
{
|
|
|
|
if (router_have_consensus_path() != CONSENSUS_PATH_UNKNOWN) {
|
2018-01-31 18:07:07 +01:00
|
|
|
if (num < networkstatus_get_param(NULL, "cbtmaxopencircs",
|
|
|
|
DFLT_CBT_UNUSED_OPEN_CIRCS,
|
|
|
|
MIN_CBT_UNUSED_OPEN_CIRCS,
|
|
|
|
MAX_CBT_UNUSED_OPEN_CIRCS) &&
|
2017-01-18 18:53:01 +01:00
|
|
|
!circuit_build_times_disabled(get_options()) &&
|
2016-11-22 22:00:59 +01:00
|
|
|
circuit_build_times_needs_circuits_now(get_circuit_build_times())) {
|
2016-10-14 14:00:35 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-12-22 07:35:29 +01:00
|
|
|
/**
|
|
|
|
* Launch the appropriate type of predicted circuit for hidden
|
|
|
|
* services, depending on our options.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
circuit_launch_predicted_hs_circ(int flags)
|
|
|
|
{
|
|
|
|
/* K.I.S.S. implementation of bug #23101: If we are using
|
|
|
|
* vanguards or pinned middles, pre-build a specific purpose
|
|
|
|
* for HS circs. */
|
|
|
|
if (circuit_should_use_vanguards(CIRCUIT_PURPOSE_HS_VANGUARDS)) {
|
|
|
|
circuit_launch(CIRCUIT_PURPOSE_HS_VANGUARDS, flags);
|
|
|
|
} else {
|
|
|
|
/* If no vanguards, then no HS-specific prebuilt circuits are needed.
|
|
|
|
* Normal GENERAL circs are fine */
|
|
|
|
circuit_launch(CIRCUIT_PURPOSE_C_GENERAL, flags);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-14 14:00:35 +02:00
|
|
|
/** Determine how many circuits we have open that are clean,
|
|
|
|
* Make sure it's enough for all the upcoming behaviors we predict we'll have.
|
2009-09-17 07:41:47 +02:00
|
|
|
* But put an upper bound on the total number of circuits.
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
circuit_predict_and_launch_new(void)
|
|
|
|
{
|
|
|
|
int num=0, num_internal=0, num_uptime_internal=0;
|
|
|
|
int hidserv_needs_uptime=0, hidserv_needs_capacity=1;
|
|
|
|
int port_needs_uptime=0, port_needs_capacity=1;
|
|
|
|
time_t now = time(NULL);
|
2007-12-23 20:15:22 +01:00
|
|
|
int flags = 0;
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
|
2016-10-14 14:00:35 +02:00
|
|
|
/* Count how many of each type of circuit we currently have. */
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *, circ) {
|
2016-10-14 14:00:35 +02:00
|
|
|
if (!circuit_is_available_for_use(circ))
|
2006-12-13 03:49:45 +01:00
|
|
|
continue;
|
2016-10-14 14:00:35 +02:00
|
|
|
|
2006-12-13 03:49:45 +01:00
|
|
|
num++;
|
2016-10-14 14:00:35 +02:00
|
|
|
|
|
|
|
cpath_build_state_t *build_state = TO_ORIGIN_CIRCUIT(circ)->build_state;
|
2006-07-23 09:37:35 +02:00
|
|
|
if (build_state->is_internal)
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
num_internal++;
|
2006-07-23 09:37:35 +02:00
|
|
|
if (build_state->need_uptime && build_state->is_internal)
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
num_uptime_internal++;
|
|
|
|
}
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_END(circ);
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
|
2005-08-13 02:22:07 +02:00
|
|
|
/* If that's enough, then stop now. */
|
|
|
|
if (num >= MAX_UNUSED_OPEN_CIRCUITS)
|
2016-10-14 14:00:35 +02:00
|
|
|
return;
|
|
|
|
|
|
|
|
if (needs_exit_circuits(now, &port_needs_uptime, &port_needs_capacity)) {
|
2007-12-23 20:15:22 +01:00
|
|
|
if (port_needs_uptime)
|
|
|
|
flags |= CIRCLAUNCH_NEED_UPTIME;
|
|
|
|
if (port_needs_capacity)
|
|
|
|
flags |= CIRCLAUNCH_NEED_CAPACITY;
|
2016-10-14 14:00:35 +02:00
|
|
|
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_CIRC,
|
|
|
|
"Have %d clean circs (%d internal), need another exit circ.",
|
|
|
|
num, num_internal);
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
circuit_launch(CIRCUIT_PURPOSE_C_GENERAL, flags);
|
2005-08-13 02:22:07 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-08-04 18:06:34 +02:00
|
|
|
if (needs_hs_server_circuits(now, num_uptime_internal)) {
|
2007-12-23 20:15:22 +01:00
|
|
|
flags = (CIRCLAUNCH_NEED_CAPACITY | CIRCLAUNCH_NEED_UPTIME |
|
|
|
|
CIRCLAUNCH_IS_INTERNAL);
|
2016-10-14 14:00:35 +02:00
|
|
|
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_CIRC,
|
|
|
|
"Have %d clean circs (%d internal), need another internal "
|
|
|
|
"circ for my hidden service.",
|
|
|
|
num, num_internal);
|
2017-12-22 07:35:29 +01:00
|
|
|
circuit_launch_predicted_hs_circ(flags);
|
2005-08-13 02:22:07 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-10-14 14:00:35 +02:00
|
|
|
if (needs_hs_client_circuits(now, &hidserv_needs_uptime,
|
|
|
|
&hidserv_needs_capacity,
|
|
|
|
num_internal, num_uptime_internal))
|
|
|
|
{
|
2007-12-23 20:15:22 +01:00
|
|
|
if (hidserv_needs_uptime)
|
|
|
|
flags |= CIRCLAUNCH_NEED_UPTIME;
|
|
|
|
if (hidserv_needs_capacity)
|
|
|
|
flags |= CIRCLAUNCH_NEED_CAPACITY;
|
|
|
|
flags |= CIRCLAUNCH_IS_INTERNAL;
|
2016-10-14 14:00:35 +02:00
|
|
|
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_CIRC,
|
|
|
|
"Have %d clean circs (%d uptime-internal, %d internal), need"
|
2009-05-27 23:55:51 +02:00
|
|
|
" another hidden service circ.",
|
2006-02-13 09:28:42 +01:00
|
|
|
num, num_uptime_internal, num_internal);
|
2017-12-22 07:35:29 +01:00
|
|
|
|
|
|
|
circuit_launch_predicted_hs_circ(flags);
|
2005-08-13 02:22:07 +02:00
|
|
|
return;
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
}
|
2009-09-01 03:10:27 +02:00
|
|
|
|
2016-10-14 14:00:35 +02:00
|
|
|
if (needs_circuits_for_build(num)) {
|
|
|
|
flags = CIRCLAUNCH_NEED_CAPACITY;
|
|
|
|
/* if there are no exits in the consensus, make timeout
|
|
|
|
* circuits internal */
|
|
|
|
if (router_have_consensus_path() == CONSENSUS_PATH_INTERNAL)
|
|
|
|
flags |= CIRCLAUNCH_IS_INTERNAL;
|
|
|
|
|
2014-12-25 14:31:16 +01:00
|
|
|
log_info(LD_CIRC,
|
|
|
|
"Have %d clean circs need another buildtime test circ.", num);
|
|
|
|
circuit_launch(CIRCUIT_PURPOSE_C_GENERAL, flags);
|
|
|
|
return;
|
2009-09-01 03:10:27 +02:00
|
|
|
}
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
}
|
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
/** Build a new test circuit every 5 minutes */
|
|
|
|
#define TESTING_CIRCUIT_INTERVAL 300
|
|
|
|
|
2017-03-06 17:27:50 +01:00
|
|
|
/** This function is called once a second, if router_have_minimum_dir_info()
|
|
|
|
* is true. Its job is to make sure all services we offer have enough circuits
|
2007-02-22 08:41:14 +01:00
|
|
|
* available. Some services just want enough circuits for current tasks,
|
|
|
|
* whereas others want a minimum set of idle circuits hanging around.
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
void
|
|
|
|
circuit_build_needed_circs(time_t now)
|
|
|
|
{
|
2011-06-14 19:01:38 +02:00
|
|
|
const or_options_t *options = get_options();
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2014-12-25 14:31:16 +01:00
|
|
|
/* launch a new circ for any pending streams that need one
|
|
|
|
* XXXX make the assumption that (some) AP streams (i.e. HS clients)
|
|
|
|
* don't require an exit circuit, review in #13814.
|
|
|
|
* This allows HSs to function in a consensus without exits. */
|
|
|
|
if (router_have_consensus_path() != CONSENSUS_PATH_UNKNOWN)
|
2015-11-13 19:38:01 +01:00
|
|
|
connection_ap_rescan_and_attach_pending();
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2014-07-09 22:14:14 +02:00
|
|
|
circuit_expire_old_circs_as_needed(now);
|
|
|
|
|
|
|
|
if (!options->DisablePredictedCircuits)
|
|
|
|
circuit_predict_and_launch_new();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Called once a second either directly or from
|
|
|
|
* circuit_build_needed_circs(). As appropriate (once per NewCircuitPeriod)
|
|
|
|
* resets failure counts and expires old circuits.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
circuit_expire_old_circs_as_needed(time_t now)
|
|
|
|
{
|
|
|
|
static time_t time_to_expire_and_reset = 0;
|
|
|
|
|
|
|
|
if (time_to_expire_and_reset < now) {
|
2004-08-18 10:51:04 +02:00
|
|
|
circuit_reset_failure_count(1);
|
2014-07-09 22:14:14 +02:00
|
|
|
time_to_expire_and_reset = now + get_options()->NewCircuitPeriod;
|
2004-11-28 10:05:49 +01:00
|
|
|
if (proxy_mode(get_options()))
|
2005-02-22 01:53:08 +01:00
|
|
|
addressmap_clean(now);
|
2011-03-26 06:34:42 +01:00
|
|
|
circuit_expire_old_circuits_clientside();
|
2004-05-13 09:24:49 +02:00
|
|
|
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
#if 0 /* disable for now, until predict-and-launch-new can cull leftovers */
|
2014-07-09 22:14:14 +02:00
|
|
|
|
|
|
|
/* If we ever re-enable, this has to move into
|
|
|
|
* circuit_build_needed_circs */
|
|
|
|
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
circ = circuit_get_youngest_clean_open(CIRCUIT_PURPOSE_C_GENERAL);
|
2004-11-28 12:39:53 +01:00
|
|
|
if (get_options()->RunTesting &&
|
|
|
|
circ &&
|
2012-10-26 02:43:10 +02:00
|
|
|
circ->timestamp_began.tv_sec + TESTING_CIRCUIT_INTERVAL < now) {
|
2004-05-13 09:24:49 +02:00
|
|
|
log_fn(LOG_INFO,"Creating a new testing circuit.");
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
circuit_launch(CIRCUIT_PURPOSE_C_GENERAL, 0);
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
2017-09-15 22:24:44 +02:00
|
|
|
#endif /* 0 */
|
2004-12-05 08:10:08 +01:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/** If the stream <b>conn</b> is a member of any of the linked
|
|
|
|
* lists of <b>circ</b>, then remove it from the list.
|
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
void
|
2006-07-26 21:07:26 +02:00
|
|
|
circuit_detach_stream(circuit_t *circ, edge_connection_t *conn)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2006-07-26 21:07:26 +02:00
|
|
|
edge_connection_t *prevconn;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2004-10-17 00:14:52 +02:00
|
|
|
tor_assert(circ);
|
|
|
|
tor_assert(conn);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2012-10-12 18:22:13 +02:00
|
|
|
if (conn->base_.type == CONN_TYPE_AP) {
|
2011-07-20 18:55:42 +02:00
|
|
|
entry_connection_t *entry_conn = EDGE_TO_ENTRY_CONN(conn);
|
|
|
|
entry_conn->may_use_optimistic_data = 0;
|
|
|
|
}
|
|
|
|
conn->cpath_layer = NULL; /* don't keep a stale pointer */
|
2005-04-06 08:13:49 +02:00
|
|
|
conn->on_circuit = NULL;
|
2004-10-11 03:17:42 +02:00
|
|
|
|
2006-07-23 09:37:35 +02:00
|
|
|
if (CIRCUIT_IS_ORIGIN(circ)) {
|
|
|
|
origin_circuit_t *origin_circ = TO_ORIGIN_CIRCUIT(circ);
|
2015-05-20 19:33:59 +02:00
|
|
|
int removed = 0;
|
2006-07-23 09:37:35 +02:00
|
|
|
if (conn == origin_circ->p_streams) {
|
|
|
|
origin_circ->p_streams = conn->next_stream;
|
2015-05-20 19:33:59 +02:00
|
|
|
removed = 1;
|
|
|
|
} else {
|
|
|
|
for (prevconn = origin_circ->p_streams;
|
|
|
|
prevconn && prevconn->next_stream && prevconn->next_stream != conn;
|
|
|
|
prevconn = prevconn->next_stream)
|
|
|
|
;
|
|
|
|
if (prevconn && prevconn->next_stream) {
|
|
|
|
prevconn->next_stream = conn->next_stream;
|
|
|
|
removed = 1;
|
|
|
|
}
|
2006-07-23 09:37:35 +02:00
|
|
|
}
|
2015-05-20 19:33:59 +02:00
|
|
|
if (removed) {
|
2015-08-17 20:34:50 +02:00
|
|
|
log_debug(LD_APP, "Removing stream %d from circ %u",
|
|
|
|
conn->stream_id, (unsigned)circ->n_circ_id);
|
|
|
|
|
2015-05-20 19:33:59 +02:00
|
|
|
/* If the stream was removed, and it was a rend stream, decrement the
|
|
|
|
* number of streams on the circuit associated with the rend service.
|
|
|
|
*/
|
|
|
|
if (circ->purpose == CIRCUIT_PURPOSE_S_REND_JOINED) {
|
2017-07-31 16:59:12 +02:00
|
|
|
hs_dec_rdv_stream_counter(origin_circ);
|
2015-05-20 19:33:59 +02:00
|
|
|
}
|
2006-07-23 09:37:35 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
or_circuit_t *or_circ = TO_OR_CIRCUIT(circ);
|
|
|
|
if (conn == or_circ->n_streams) {
|
|
|
|
or_circ->n_streams = conn->next_stream;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (conn == or_circ->resolving_streams) {
|
|
|
|
or_circ->resolving_streams = conn->next_stream;
|
|
|
|
return;
|
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2006-07-23 09:37:35 +02:00
|
|
|
for (prevconn = or_circ->n_streams;
|
|
|
|
prevconn && prevconn->next_stream && prevconn->next_stream != conn;
|
|
|
|
prevconn = prevconn->next_stream)
|
|
|
|
;
|
|
|
|
if (prevconn && prevconn->next_stream) {
|
|
|
|
prevconn->next_stream = conn->next_stream;
|
|
|
|
return;
|
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2006-07-23 09:37:35 +02:00
|
|
|
for (prevconn = or_circ->resolving_streams;
|
|
|
|
prevconn && prevconn->next_stream && prevconn->next_stream != conn;
|
|
|
|
prevconn = prevconn->next_stream)
|
|
|
|
;
|
|
|
|
if (prevconn && prevconn->next_stream) {
|
|
|
|
prevconn->next_stream = conn->next_stream;
|
|
|
|
return;
|
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2007-05-29 21:54:51 +02:00
|
|
|
log_warn(LD_BUG,"Edge connection not in circuit's list.");
|
|
|
|
/* Don't give an error here; it's harmless. */
|
2007-06-01 01:57:46 +02:00
|
|
|
tor_fragile_assert();
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2006-05-30 08:19:06 +02:00
|
|
|
/** Find each circuit that has been unused for too long, or dirty
|
2007-01-15 10:09:03 +01:00
|
|
|
* for too long and has no streams on it: mark it for close.
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
|
|
|
static void
|
2011-03-26 06:34:42 +01:00
|
|
|
circuit_expire_old_circuits_clientside(void)
|
2004-05-13 09:24:49 +02:00
|
|
|
{
|
2011-03-26 06:34:42 +01:00
|
|
|
struct timeval cutoff, now;
|
|
|
|
|
|
|
|
tor_gettimeofday(&now);
|
2014-07-16 10:05:00 +02:00
|
|
|
last_expired_clientside_circuits = now.tv_sec;
|
2009-09-01 03:10:27 +02:00
|
|
|
|
2014-08-15 22:32:32 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *, circ) {
|
2010-08-10 00:50:49 +02:00
|
|
|
if (circ->marked_for_close || !CIRCUIT_IS_ORIGIN(circ))
|
2004-05-13 09:24:49 +02:00
|
|
|
continue;
|
2017-02-22 03:28:00 +01:00
|
|
|
|
|
|
|
cutoff = now;
|
|
|
|
cutoff.tv_sec -= TO_ORIGIN_CIRCUIT(circ)->circuit_idle_timeout;
|
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
/* If the circuit has been dirty for too long, and there are no streams
|
|
|
|
* on it, mark it for close.
|
|
|
|
*/
|
|
|
|
if (circ->timestamp_dirty &&
|
2011-04-27 21:18:34 +02:00
|
|
|
circ->timestamp_dirty + get_options()->MaxCircuitDirtiness <
|
|
|
|
now.tv_sec &&
|
2006-07-23 09:37:35 +02:00
|
|
|
!TO_ORIGIN_CIRCUIT(circ)->p_streams /* nothing attached */ ) {
|
2013-03-10 13:32:58 +01:00
|
|
|
log_debug(LD_CIRC, "Closing n_circ_id %u (dirty %ld sec ago, "
|
2009-05-28 17:54:56 +02:00
|
|
|
"purpose %d)",
|
2013-03-10 13:32:58 +01:00
|
|
|
(unsigned)circ->n_circ_id,
|
|
|
|
(long)(now.tv_sec - circ->timestamp_dirty),
|
2006-02-13 09:28:42 +01:00
|
|
|
circ->purpose);
|
2013-01-20 06:16:24 +01:00
|
|
|
/* Don't do this magic for testing circuits. Their death is governed
|
|
|
|
* by circuit_expire_building */
|
|
|
|
if (circ->purpose != CIRCUIT_PURPOSE_PATH_BIAS_TESTING)
|
|
|
|
circuit_mark_for_close(circ, END_CIRC_REASON_FINISHED);
|
2010-06-15 23:46:01 +02:00
|
|
|
} else if (!circ->timestamp_dirty && circ->state == CIRCUIT_STATE_OPEN) {
|
2014-11-12 19:28:07 +01:00
|
|
|
if (timercmp(&circ->timestamp_began, &cutoff, OP_LT)) {
|
2010-06-15 23:46:01 +02:00
|
|
|
if (circ->purpose == CIRCUIT_PURPOSE_C_GENERAL ||
|
2017-12-02 03:28:16 +01:00
|
|
|
circ->purpose == CIRCUIT_PURPOSE_C_HSDIR_GET ||
|
|
|
|
circ->purpose == CIRCUIT_PURPOSE_S_HSDIR_POST ||
|
2017-12-22 07:35:29 +01:00
|
|
|
circ->purpose == CIRCUIT_PURPOSE_HS_VANGUARDS ||
|
2010-06-15 23:46:01 +02:00
|
|
|
circ->purpose == CIRCUIT_PURPOSE_C_MEASURE_TIMEOUT ||
|
|
|
|
circ->purpose == CIRCUIT_PURPOSE_S_ESTABLISH_INTRO ||
|
|
|
|
circ->purpose == CIRCUIT_PURPOSE_TESTING ||
|
|
|
|
(circ->purpose >= CIRCUIT_PURPOSE_C_INTRODUCING &&
|
|
|
|
circ->purpose <= CIRCUIT_PURPOSE_C_REND_READY_INTRO_ACKED) ||
|
|
|
|
circ->purpose == CIRCUIT_PURPOSE_S_CONNECT_REND) {
|
2017-02-22 03:28:00 +01:00
|
|
|
log_info(LD_CIRC,
|
|
|
|
"Closing circuit "U64_FORMAT
|
|
|
|
" that has been unused for %ld msec.",
|
|
|
|
U64_PRINTF_ARG(TO_ORIGIN_CIRCUIT(circ)->global_identifier),
|
2012-10-26 02:43:10 +02:00
|
|
|
tv_mdiff(&circ->timestamp_began, &now));
|
2010-06-15 23:46:01 +02:00
|
|
|
circuit_mark_for_close(circ, END_CIRC_REASON_FINISHED);
|
|
|
|
} else if (!TO_ORIGIN_CIRCUIT(circ)->is_ancient) {
|
2010-08-14 10:22:08 +02:00
|
|
|
/* Server-side rend joined circuits can end up really old, because
|
2010-07-27 17:45:23 +02:00
|
|
|
* they are reused by clients for longer than normal. The client
|
2010-08-14 02:50:51 +02:00
|
|
|
* controls their lifespan. (They never become dirty, because
|
2010-08-14 10:22:08 +02:00
|
|
|
* connection_exit_begin_conn() never marks anything as dirty.)
|
|
|
|
* Similarly, server-side intro circuits last a long time. */
|
|
|
|
if (circ->purpose != CIRCUIT_PURPOSE_S_REND_JOINED &&
|
|
|
|
circ->purpose != CIRCUIT_PURPOSE_S_INTRO) {
|
2010-07-27 17:45:23 +02:00
|
|
|
log_notice(LD_CIRC,
|
|
|
|
"Ancient non-dirty circuit %d is still around after "
|
2011-04-08 19:27:25 +02:00
|
|
|
"%ld milliseconds. Purpose: %d (%s)",
|
2010-07-27 17:45:23 +02:00
|
|
|
TO_ORIGIN_CIRCUIT(circ)->global_identifier,
|
2012-10-26 02:43:10 +02:00
|
|
|
tv_mdiff(&circ->timestamp_began, &now),
|
2011-04-08 19:27:25 +02:00
|
|
|
circ->purpose,
|
|
|
|
circuit_purpose_to_string(circ->purpose));
|
2010-07-27 17:45:23 +02:00
|
|
|
TO_ORIGIN_CIRCUIT(circ)->is_ancient = 1;
|
|
|
|
}
|
2010-06-15 23:46:01 +02:00
|
|
|
}
|
2004-12-05 08:10:08 +01:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
2014-08-15 22:32:32 +02:00
|
|
|
} SMARTLIST_FOREACH_END(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2010-04-24 00:35:11 +02:00
|
|
|
/** How long do we wait before killing circuits with the properties
|
|
|
|
* described below?
|
|
|
|
*
|
|
|
|
* Probably we could choose a number here as low as 5 to 10 seconds,
|
|
|
|
* since these circs are used for begindir, and a) generally you either
|
|
|
|
* ask another begindir question right after or you don't for a long time,
|
|
|
|
* b) clients at least through 0.2.1.x choose from the whole set of
|
|
|
|
* directory mirrors at each choice, and c) re-establishing a one-hop
|
|
|
|
* circuit via create-fast is a light operation assuming the TLS conn is
|
|
|
|
* still there.
|
|
|
|
*
|
|
|
|
* I expect "b" to go away one day when we move to using directory
|
|
|
|
* guards, but I think "a" and "c" are good enough reasons that a low
|
|
|
|
* number is safe even then.
|
|
|
|
*/
|
|
|
|
#define IDLE_ONE_HOP_CIRC_TIMEOUT 60
|
|
|
|
|
|
|
|
/** Find each non-origin circuit that has been unused for too long,
|
2017-09-06 20:39:40 +02:00
|
|
|
* has no streams on it, came from a client, and ends here: mark it
|
2010-04-24 00:35:11 +02:00
|
|
|
* for close.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
circuit_expire_old_circuits_serverside(time_t now)
|
|
|
|
{
|
|
|
|
or_circuit_t *or_circ;
|
|
|
|
time_t cutoff = now - IDLE_ONE_HOP_CIRC_TIMEOUT;
|
|
|
|
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *, circ) {
|
2010-04-24 00:35:11 +02:00
|
|
|
if (circ->marked_for_close || CIRCUIT_IS_ORIGIN(circ))
|
|
|
|
continue;
|
|
|
|
or_circ = TO_OR_CIRCUIT(circ);
|
|
|
|
/* If the circuit has been idle for too long, and there are no streams
|
|
|
|
* on it, and it ends here, and it used a create_fast, mark it for close.
|
|
|
|
*/
|
2017-09-06 20:39:40 +02:00
|
|
|
if (or_circ->p_chan && channel_is_client(or_circ->p_chan) &&
|
|
|
|
!circ->n_chan &&
|
2010-04-24 00:35:11 +02:00
|
|
|
!or_circ->n_streams && !or_circ->resolving_streams &&
|
2012-08-08 15:02:47 +02:00
|
|
|
channel_when_last_xmit(or_circ->p_chan) <= cutoff) {
|
2013-03-10 13:32:58 +01:00
|
|
|
log_info(LD_CIRC, "Closing circ_id %u (empty %d secs ago)",
|
|
|
|
(unsigned)or_circ->p_circ_id,
|
2012-08-08 15:02:47 +02:00
|
|
|
(int)(now - channel_when_last_xmit(or_circ->p_chan)));
|
2010-04-24 00:35:11 +02:00
|
|
|
circuit_mark_for_close(circ, END_CIRC_REASON_FINISHED);
|
|
|
|
}
|
|
|
|
}
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_END(circ);
|
2010-04-24 00:35:11 +02:00
|
|
|
}
|
|
|
|
|
2007-02-24 08:50:38 +01:00
|
|
|
/** Number of testing circuits we want open before testing our bandwidth. */
|
2006-09-15 07:30:25 +02:00
|
|
|
#define NUM_PARALLEL_TESTING_CIRCS 4
|
|
|
|
|
2007-02-24 08:50:38 +01:00
|
|
|
/** True iff we've ever had enough testing circuits open to test our
|
2007-02-16 21:39:37 +01:00
|
|
|
* bandwidth. */
|
2006-09-15 07:30:25 +02:00
|
|
|
static int have_performed_bandwidth_test = 0;
|
|
|
|
|
|
|
|
/** Reset have_performed_bandwidth_test, so we'll start building
|
|
|
|
* testing circuits again so we can exercise our bandwidth. */
|
|
|
|
void
|
|
|
|
reset_bandwidth_test(void)
|
|
|
|
{
|
|
|
|
have_performed_bandwidth_test = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Return 1 if we've already exercised our bandwidth, or if we
|
|
|
|
* have fewer than NUM_PARALLEL_TESTING_CIRCS testing circuits
|
|
|
|
* established or on the way. Else return 0.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
circuit_enough_testing_circs(void)
|
|
|
|
{
|
|
|
|
int num = 0;
|
|
|
|
|
|
|
|
if (have_performed_bandwidth_test)
|
|
|
|
return 1;
|
|
|
|
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_BEGIN(circuit_get_global_list(), circuit_t *, circ) {
|
2006-09-15 07:30:25 +02:00
|
|
|
if (!circ->marked_for_close && CIRCUIT_IS_ORIGIN(circ) &&
|
|
|
|
circ->purpose == CIRCUIT_PURPOSE_TESTING &&
|
|
|
|
circ->state == CIRCUIT_STATE_OPEN)
|
|
|
|
num++;
|
|
|
|
}
|
2014-08-15 22:23:22 +02:00
|
|
|
SMARTLIST_FOREACH_END(circ);
|
2006-09-15 07:30:25 +02:00
|
|
|
return num >= NUM_PARALLEL_TESTING_CIRCS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** A testing circuit has completed. Take whatever stats we want.
|
|
|
|
* Noticing reachability is taken care of in onionskin_answer(),
|
|
|
|
* so there's no need to record anything here. But if we still want
|
|
|
|
* to do the bandwidth test, and we now have enough testing circuits
|
|
|
|
* open, do it.
|
|
|
|
*/
|
2005-02-27 10:47:01 +01:00
|
|
|
static void
|
2006-07-23 09:37:35 +02:00
|
|
|
circuit_testing_opened(origin_circuit_t *circ)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2008-09-29 11:36:42 +02:00
|
|
|
if (have_performed_bandwidth_test ||
|
2016-05-16 23:43:47 +02:00
|
|
|
!check_whether_orport_reachable(get_options())) {
|
2008-09-29 11:36:42 +02:00
|
|
|
/* either we've already done everything we want with testing circuits,
|
|
|
|
* or this testing circuit became open due to a fluke, e.g. we picked
|
|
|
|
* a last hop where we already had the connection open due to an
|
|
|
|
* outgoing local circuit. */
|
2006-09-15 07:30:25 +02:00
|
|
|
circuit_mark_for_close(TO_CIRCUIT(circ), END_CIRC_AT_ORIGIN);
|
|
|
|
} else if (circuit_enough_testing_circs()) {
|
|
|
|
router_perform_bandwidth_test(NUM_PARALLEL_TESTING_CIRCS, time(NULL));
|
|
|
|
have_performed_bandwidth_test = 1;
|
2006-09-15 07:53:00 +02:00
|
|
|
} else
|
2018-01-24 20:07:49 +01:00
|
|
|
router_do_reachability_checks(1, 0);
|
2005-02-27 10:47:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/** A testing circuit has failed to build. Take whatever stats we want. */
|
|
|
|
static void
|
2006-07-23 09:37:35 +02:00
|
|
|
circuit_testing_failed(origin_circuit_t *circ, int at_last_hop)
|
2005-09-30 03:09:52 +02:00
|
|
|
{
|
2016-05-16 23:43:47 +02:00
|
|
|
const or_options_t *options = get_options();
|
|
|
|
if (server_mode(options) && check_whether_orport_reachable(options))
|
2006-09-18 06:59:15 +02:00
|
|
|
return;
|
|
|
|
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_GENERAL,
|
|
|
|
"Our testing circuit (to see if your ORPort is reachable) "
|
2006-09-18 06:59:15 +02:00
|
|
|
"has failed. I'll try again later.");
|
2006-06-05 00:42:13 +02:00
|
|
|
|
|
|
|
/* These aren't used yet. */
|
|
|
|
(void)circ;
|
|
|
|
(void)at_last_hop;
|
2005-02-27 10:47:01 +01:00
|
|
|
}
|
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
/** The circuit <b>circ</b> has just become open. Take the next
|
|
|
|
* step: for rendezvous circuits, we pass circ to the appropriate
|
|
|
|
* function in rendclient or rendservice. For general circuits, we
|
|
|
|
* call connection_ap_attach_pending, which looks for pending streams
|
|
|
|
* that could use circ.
|
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
void
|
2006-07-23 09:37:35 +02:00
|
|
|
circuit_has_opened(origin_circuit_t *circ)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2006-10-09 17:47:27 +02:00
|
|
|
control_event_circuit_status(circ, CIRC_EVENT_BUILT, 0);
|
2004-11-03 19:33:07 +01:00
|
|
|
|
2010-09-29 20:41:27 +02:00
|
|
|
/* Remember that this circuit has finished building. Now if we start
|
|
|
|
* it building again later (e.g. by extending it), we will know not
|
|
|
|
* to consider its build time. */
|
|
|
|
circ->has_opened = 1;
|
|
|
|
|
2006-07-23 09:37:35 +02:00
|
|
|
switch (TO_CIRCUIT(circ)->purpose) {
|
2004-05-13 09:24:49 +02:00
|
|
|
case CIRCUIT_PURPOSE_C_ESTABLISH_REND:
|
2017-07-21 19:56:10 +02:00
|
|
|
hs_client_circuit_has_opened(circ);
|
2011-12-06 12:46:02 +01:00
|
|
|
/* Start building an intro circ if we don't have one yet. */
|
2015-11-17 14:49:30 +01:00
|
|
|
connection_ap_attach_pending(1);
|
2011-12-06 12:46:02 +01:00
|
|
|
/* This isn't a call to circuit_try_attaching_streams because a
|
|
|
|
* circuit in _C_ESTABLISH_REND state isn't connected to its
|
|
|
|
* hidden service yet, thus we can't attach streams to it yet,
|
|
|
|
* thus circuit_try_attaching_streams would always clear the
|
|
|
|
* circuit's isolation state. circuit_try_attaching_streams is
|
|
|
|
* called later, when the rend circ enters _C_REND_JOINED
|
|
|
|
* state. */
|
2004-05-13 09:24:49 +02:00
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_C_INTRODUCING:
|
2017-07-21 19:56:10 +02:00
|
|
|
hs_client_circuit_has_opened(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_C_GENERAL:
|
2017-12-02 03:28:16 +01:00
|
|
|
case CIRCUIT_PURPOSE_C_HSDIR_GET:
|
|
|
|
case CIRCUIT_PURPOSE_S_HSDIR_POST:
|
2004-05-13 09:24:49 +02:00
|
|
|
/* Tell any AP connections that have been waiting for a new
|
|
|
|
* circuit that one is ready. */
|
2011-12-06 12:46:02 +01:00
|
|
|
circuit_try_attaching_streams(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_S_ESTABLISH_INTRO:
|
2016-01-26 03:48:31 +01:00
|
|
|
/* at the service, waiting for introductions */
|
2017-02-21 20:20:39 +01:00
|
|
|
hs_service_circuit_has_opened(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_S_CONNECT_REND:
|
2016-01-26 03:48:31 +01:00
|
|
|
/* at the service, connecting to rend point */
|
2017-02-21 20:20:39 +01:00
|
|
|
hs_service_circuit_has_opened(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
break;
|
2005-02-27 10:47:01 +01:00
|
|
|
case CIRCUIT_PURPOSE_TESTING:
|
|
|
|
circuit_testing_opened(circ);
|
|
|
|
break;
|
2006-10-10 00:26:21 +02:00
|
|
|
/* default:
|
|
|
|
* This won't happen in normal operation, but might happen if the
|
|
|
|
* controller did it. Just let it slide. */
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
2011-12-06 12:46:02 +01:00
|
|
|
}
|
2011-07-19 19:51:43 +02:00
|
|
|
|
2011-12-06 12:46:02 +01:00
|
|
|
/** If the stream-isolation state of <b>circ</b> can be cleared, clear
|
|
|
|
* it. Return non-zero iff <b>circ</b>'s isolation state was cleared. */
|
|
|
|
static int
|
|
|
|
circuit_try_clearing_isolation_state(origin_circuit_t *circ)
|
|
|
|
{
|
2011-07-21 02:27:36 +02:00
|
|
|
if (/* The circuit may have become non-open if it was cannibalized.*/
|
2012-10-12 18:22:13 +02:00
|
|
|
circ->base_.state == CIRCUIT_STATE_OPEN &&
|
2011-07-21 02:27:36 +02:00
|
|
|
/* If !isolation_values_set, there is nothing to clear. */
|
2011-07-19 19:51:43 +02:00
|
|
|
circ->isolation_values_set &&
|
2011-07-21 02:27:36 +02:00
|
|
|
/* It's not legal to clear a circuit's isolation info if it's ever had
|
|
|
|
* streams attached */
|
2011-07-19 19:51:43 +02:00
|
|
|
!circ->isolation_any_streams_attached) {
|
|
|
|
/* If we have any isolation information set on this circuit, and
|
|
|
|
* we didn't manage to attach any streams to it, then we can
|
|
|
|
* and should clear it and try again. */
|
|
|
|
circuit_clear_isolation(circ);
|
2011-12-06 12:46:02 +01:00
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Called when a circuit becomes ready for streams to be attached to
|
|
|
|
* it. */
|
|
|
|
void
|
|
|
|
circuit_try_attaching_streams(origin_circuit_t *circ)
|
|
|
|
{
|
|
|
|
/* Attach streams to this circuit if we can. */
|
2015-11-17 14:49:30 +01:00
|
|
|
connection_ap_attach_pending(1);
|
2011-12-06 12:46:02 +01:00
|
|
|
|
|
|
|
/* The call to circuit_try_clearing_isolation_state here will do
|
|
|
|
* nothing and return 0 if we didn't attach any streams to circ
|
|
|
|
* above. */
|
|
|
|
if (circuit_try_clearing_isolation_state(circ)) {
|
|
|
|
/* Maybe *now* we can attach some streams to this circuit. */
|
2015-11-17 14:49:30 +01:00
|
|
|
connection_ap_attach_pending(1);
|
2011-07-19 19:51:43 +02:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2005-06-11 20:52:12 +02:00
|
|
|
/** Called whenever a circuit could not be successfully built.
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
void
|
2006-07-23 09:37:35 +02:00
|
|
|
circuit_build_failed(origin_circuit_t *circ)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2012-08-08 15:02:47 +02:00
|
|
|
channel_t *n_chan = NULL;
|
2004-05-13 09:24:49 +02:00
|
|
|
/* we should examine circ and see if it failed because of
|
|
|
|
* the last hop or an earlier hop. then use this info below.
|
|
|
|
*/
|
|
|
|
int failed_at_last_hop = 0;
|
|
|
|
/* If the last hop isn't open, and the second-to-last is, we failed
|
|
|
|
* at the last hop. */
|
|
|
|
if (circ->cpath &&
|
|
|
|
circ->cpath->prev->state != CPATH_STATE_OPEN &&
|
|
|
|
circ->cpath->prev->prev->state == CPATH_STATE_OPEN) {
|
2005-11-19 07:57:44 +01:00
|
|
|
failed_at_last_hop = 1;
|
|
|
|
}
|
2017-12-22 07:35:29 +01:00
|
|
|
|
|
|
|
/* Check if we failed at first hop */
|
2005-11-19 07:57:44 +01:00
|
|
|
if (circ->cpath &&
|
2013-10-31 21:53:31 +01:00
|
|
|
circ->cpath->state != CPATH_STATE_OPEN &&
|
|
|
|
! circ->base_.received_destroy) {
|
|
|
|
/* We failed at the first hop for some reason other than a DESTROY cell.
|
|
|
|
* If there's an OR connection to blame, blame it. Also, avoid this relay
|
|
|
|
* for a while, and fail any one-hop directory fetches destined for it. */
|
2018-01-26 19:35:00 +01:00
|
|
|
const char *n_chan_ident = circ->cpath->extend_info->identity_digest;
|
|
|
|
tor_assert(n_chan_ident);
|
2010-09-29 04:32:38 +02:00
|
|
|
int already_marked = 0;
|
2012-10-12 18:22:13 +02:00
|
|
|
if (circ->base_.n_chan) {
|
|
|
|
n_chan = circ->base_.n_chan;
|
2012-08-08 15:02:47 +02:00
|
|
|
|
2012-10-09 09:51:33 +02:00
|
|
|
if (n_chan->is_bad_for_new_circs) {
|
2010-09-29 05:27:00 +02:00
|
|
|
/* We only want to blame this router when a fresh healthy
|
|
|
|
* connection fails. So don't mark this router as newly failed,
|
|
|
|
* since maybe this was just an old circuit attempt that's
|
|
|
|
* finally timing out now. Also, there's no need to blow away
|
|
|
|
* circuits/streams/etc, since the failure of an unhealthy conn
|
|
|
|
* doesn't tell us much about whether a healthy conn would
|
|
|
|
* succeed. */
|
2010-09-29 04:32:38 +02:00
|
|
|
already_marked = 1;
|
|
|
|
}
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_OR,
|
2017-09-20 17:56:44 +02:00
|
|
|
"Our circuit %u (id: %" PRIu32 ") failed to get a response "
|
|
|
|
"from the first hop (%s). I'm going to try to rotate to a "
|
|
|
|
"better connection.",
|
|
|
|
TO_CIRCUIT(circ)->n_circ_id, circ->global_identifier,
|
2012-08-08 15:02:47 +02:00
|
|
|
channel_get_canonical_remote_descr(n_chan));
|
2012-10-09 09:51:33 +02:00
|
|
|
n_chan->is_bad_for_new_circs = 1;
|
2009-09-18 11:01:39 +02:00
|
|
|
} else {
|
|
|
|
log_info(LD_OR,
|
2017-09-20 17:56:44 +02:00
|
|
|
"Our circuit %u (id: %" PRIu32 ") died before the first hop "
|
|
|
|
"with no connection",
|
|
|
|
TO_CIRCUIT(circ)->n_circ_id, circ->global_identifier);
|
2005-11-19 07:57:44 +01:00
|
|
|
}
|
2018-01-26 19:35:00 +01:00
|
|
|
if (!already_marked) {
|
2017-12-22 06:43:44 +01:00
|
|
|
/*
|
|
|
|
* If we have guard state (new guard API) and our path selection
|
|
|
|
* code actually chose a full path, then blame the failure of this
|
|
|
|
* circuit on the guard.
|
|
|
|
*
|
|
|
|
* Note that we deliberately use circuit_get_cpath_len() (and not
|
|
|
|
* circuit_get_cpath_opened_len()) because we only want to ensure
|
|
|
|
* that a full path is *chosen*. This is different than a full path
|
|
|
|
* being *built*. We only want to blame *build* failures on this
|
|
|
|
* guard. Path selection failures can happen spuriously for a number
|
|
|
|
* of reasons (such as aggressive/invalid user-specified path
|
|
|
|
* restrictions in the torrc, as well as non-user reasons like
|
|
|
|
* exitpolicy issues), and so should not be counted here.
|
|
|
|
*/
|
|
|
|
if (circ->guard_state &&
|
|
|
|
circuit_get_cpath_len(circ) >= circ->build_state->desired_path_len)
|
2016-11-28 17:04:28 +01:00
|
|
|
entry_guard_failed(&circ->guard_state);
|
2009-01-06 22:42:05 +01:00
|
|
|
/* if there are any one-hop streams waiting on this circuit, fail
|
|
|
|
* them now so they can retry elsewhere. */
|
2018-01-26 19:35:00 +01:00
|
|
|
connection_ap_fail_onehop(n_chan_ident, circ->build_state);
|
2009-01-06 22:42:05 +01:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2012-10-12 18:22:13 +02:00
|
|
|
switch (circ->base_.purpose) {
|
2017-12-02 03:28:16 +01:00
|
|
|
case CIRCUIT_PURPOSE_C_HSDIR_GET:
|
|
|
|
case CIRCUIT_PURPOSE_S_HSDIR_POST:
|
2004-05-13 09:24:49 +02:00
|
|
|
case CIRCUIT_PURPOSE_C_GENERAL:
|
2006-06-05 10:25:02 +02:00
|
|
|
/* If we never built the circuit, note it as a failure. */
|
|
|
|
circuit_increment_failure_count();
|
2006-10-01 08:41:13 +02:00
|
|
|
if (failed_at_last_hop) {
|
|
|
|
/* Make sure any streams that demand our last hop as their exit
|
|
|
|
* know that it's unlikely to happen. */
|
|
|
|
circuit_discard_optional_exit_enclaves(circ->cpath->prev->extend_info);
|
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
break;
|
2005-02-27 10:47:01 +01:00
|
|
|
case CIRCUIT_PURPOSE_TESTING:
|
|
|
|
circuit_testing_failed(circ, failed_at_last_hop);
|
|
|
|
break;
|
2004-05-13 09:24:49 +02:00
|
|
|
case CIRCUIT_PURPOSE_S_ESTABLISH_INTRO:
|
2016-01-26 03:48:31 +01:00
|
|
|
/* at the service, waiting for introductions */
|
2012-10-12 18:22:13 +02:00
|
|
|
if (circ->base_.state != CIRCUIT_STATE_OPEN) {
|
2004-05-13 09:24:49 +02:00
|
|
|
circuit_increment_failure_count();
|
|
|
|
}
|
2016-01-26 03:48:31 +01:00
|
|
|
/* no need to care here, because the service will rebuild intro
|
2004-05-13 09:24:49 +02:00
|
|
|
* points periodically. */
|
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_C_INTRODUCING:
|
2016-01-26 03:48:31 +01:00
|
|
|
/* at the client, connecting to intro point */
|
|
|
|
/* Don't increment failure count, since the service may have picked
|
2004-05-13 09:24:49 +02:00
|
|
|
* the introduction point maliciously */
|
2016-01-26 03:48:31 +01:00
|
|
|
/* The client will pick a new intro point when this one dies, if
|
2004-05-13 09:24:49 +02:00
|
|
|
* the stream in question still cares. No need to act here. */
|
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_C_ESTABLISH_REND:
|
2016-01-26 03:48:31 +01:00
|
|
|
/* at the client, waiting for the service */
|
2006-06-05 10:25:02 +02:00
|
|
|
circuit_increment_failure_count();
|
2016-01-26 03:48:31 +01:00
|
|
|
/* the client will pick a new rend point when this one dies, if
|
2004-05-13 09:24:49 +02:00
|
|
|
* the stream in question still cares. No need to act here. */
|
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_S_CONNECT_REND:
|
2016-01-26 03:48:31 +01:00
|
|
|
/* at the service, connecting to rend point */
|
|
|
|
/* Don't increment failure count, since the client may have picked
|
2004-05-13 09:24:49 +02:00
|
|
|
* the rendezvous point maliciously */
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_REND,
|
2016-01-26 03:49:16 +01:00
|
|
|
"Couldn't connect to the client's chosen rend point %s "
|
2006-02-13 09:28:42 +01:00
|
|
|
"(%s hop failed).",
|
2006-03-05 10:50:26 +01:00
|
|
|
escaped(build_state_get_exit_nickname(circ->build_state)),
|
2006-02-13 09:28:42 +01:00
|
|
|
failed_at_last_hop?"last":"non-last");
|
2017-05-30 22:11:59 +02:00
|
|
|
hs_circ_retry_service_rendezvous_point(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
break;
|
2006-10-10 00:26:21 +02:00
|
|
|
/* default:
|
|
|
|
* This won't happen in normal operation, but might happen if the
|
|
|
|
* controller did it. Just let it slide. */
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Number of consecutive failures so far; should only be touched by
|
|
|
|
* circuit_launch_new and circuit_*_failure_count.
|
|
|
|
*/
|
|
|
|
static int n_circuit_failures = 0;
|
2007-02-16 21:39:37 +01:00
|
|
|
/** Before the last time we called circuit_reset_failure_count(), were
|
|
|
|
* there a lot of failures? */
|
2004-08-18 10:51:04 +02:00
|
|
|
static int did_circs_fail_last_period = 0;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
|
|
|
/** Don't retry launching a new circuit if we try this many times with no
|
|
|
|
* success. */
|
|
|
|
#define MAX_CIRCUIT_FAILURES 5
|
|
|
|
|
2005-07-14 10:43:19 +02:00
|
|
|
/** Launch a new circuit; see circuit_launch_by_extend_info() for
|
|
|
|
* details on arguments. */
|
2006-07-23 09:37:35 +02:00
|
|
|
origin_circuit_t *
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
circuit_launch(uint8_t purpose, int flags)
|
2004-07-03 01:40:03 +02:00
|
|
|
{
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
return circuit_launch_by_extend_info(purpose, NULL, flags);
|
2005-06-29 23:46:55 +02:00
|
|
|
}
|
|
|
|
|
2016-05-09 20:26:13 +02:00
|
|
|
/* Do we have enough descriptors to build paths?
|
|
|
|
* If need_exit is true, return 1 if we can build exit paths.
|
|
|
|
* (We need at least one Exit in the consensus to build exit paths.)
|
2016-05-11 19:03:49 +02:00
|
|
|
* If need_exit is false, return 1 if we can build internal paths.
|
2016-05-09 20:26:13 +02:00
|
|
|
*/
|
2014-12-25 14:31:16 +01:00
|
|
|
static int
|
|
|
|
have_enough_path_info(int need_exit)
|
|
|
|
{
|
|
|
|
if (need_exit)
|
|
|
|
return router_have_consensus_path() == CONSENSUS_PATH_EXIT;
|
|
|
|
else
|
2014-12-30 16:00:11 +01:00
|
|
|
return router_have_consensus_path() != CONSENSUS_PATH_UNKNOWN;
|
2014-12-25 14:31:16 +01:00
|
|
|
}
|
|
|
|
|
2017-12-22 06:43:44 +01:00
|
|
|
/**
|
|
|
|
* Tell us if a circuit is a hidden service circuit.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
circuit_purpose_is_hidden_service(uint8_t purpose)
|
|
|
|
{
|
2017-12-22 07:35:29 +01:00
|
|
|
if (purpose == CIRCUIT_PURPOSE_HS_VANGUARDS) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-12-22 06:43:44 +01:00
|
|
|
/* Client-side purpose */
|
2017-12-02 03:28:16 +01:00
|
|
|
if (purpose >= CIRCUIT_PURPOSE_C_HS_MIN_ &&
|
|
|
|
purpose <= CIRCUIT_PURPOSE_C_HS_MAX_) {
|
2017-12-22 06:43:44 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Service-side purpose */
|
2017-12-02 03:28:16 +01:00
|
|
|
if (purpose >= CIRCUIT_PURPOSE_S_HS_MIN_ &&
|
|
|
|
purpose <= CIRCUIT_PURPOSE_S_HS_MAX_) {
|
2017-12-22 06:43:44 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Return true if this circuit purpose should use vanguards
|
|
|
|
* or pinned Layer2 or Layer3 guards.
|
|
|
|
*
|
|
|
|
* This function takes both the circuit purpose and the
|
|
|
|
* torrc options for pinned middles/vanguards into account
|
|
|
|
* (ie: the circuit must be a hidden service circuit and
|
|
|
|
* vanguards/pinned middles must be enabled for it to return
|
|
|
|
* true).
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
circuit_should_use_vanguards(uint8_t purpose)
|
|
|
|
{
|
|
|
|
const or_options_t *options = get_options();
|
|
|
|
|
|
|
|
/* Only hidden service circuits use vanguards */
|
|
|
|
if (!circuit_purpose_is_hidden_service(purpose))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Pinned middles are effectively vanguards */
|
|
|
|
if (options->HSLayer2Nodes || options->HSLayer3Nodes)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-12-22 07:35:29 +01:00
|
|
|
/**
|
|
|
|
* Return true for the set of conditions for which it is OK to use
|
|
|
|
* a cannibalized circuit.
|
|
|
|
*
|
|
|
|
* Don't cannibalize for onehops, or tor2web, or certain purposes.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
circuit_should_cannibalize_to_build(uint8_t purpose_to_build,
|
|
|
|
int has_extend_info,
|
|
|
|
int onehop_tunnel,
|
|
|
|
int need_specific_rp)
|
|
|
|
{
|
|
|
|
|
|
|
|
/* Do not try to cannibalize if this is a one hop circuit, or
|
|
|
|
* is a tor2web/special rp. */
|
|
|
|
if (onehop_tunnel || need_specific_rp) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Don't try to cannibalize for general purpose circuits that do not
|
|
|
|
* specify a custom exit. */
|
|
|
|
if (purpose_to_build == CIRCUIT_PURPOSE_C_GENERAL && !has_extend_info) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Don't cannibalize for testing circuits. We want to see if they
|
|
|
|
* complete normally. Also don't cannibalize for vanguard-purpose
|
|
|
|
* circuits, since those are specially pre-built for later
|
|
|
|
* cannibalization by the actual specific circuit types that need
|
|
|
|
* vanguards.
|
|
|
|
*/
|
|
|
|
if (purpose_to_build == CIRCUIT_PURPOSE_TESTING ||
|
|
|
|
purpose_to_build == CIRCUIT_PURPOSE_HS_VANGUARDS) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* For vanguards, the server-side intro circ is not cannibalized
|
|
|
|
* because we pre-build 4 hop HS circuits, and it only needs a 3 hop
|
|
|
|
* circuit. It is also long-lived, so it is more important that
|
|
|
|
* it have lower latency than get built fast.
|
|
|
|
*/
|
|
|
|
if (circuit_should_use_vanguards(purpose_to_build) &&
|
|
|
|
purpose_to_build == CIRCUIT_PURPOSE_S_ESTABLISH_INTRO) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2007-07-29 06:38:21 +02:00
|
|
|
/** Launch a new circuit with purpose <b>purpose</b> and exit node
|
2007-12-23 20:15:22 +01:00
|
|
|
* <b>extend_info</b> (or NULL to select a random exit node). If flags
|
|
|
|
* contains CIRCLAUNCH_NEED_UPTIME, choose among routers with high uptime. If
|
|
|
|
* CIRCLAUNCH_NEED_CAPACITY is set, choose among routers with high bandwidth.
|
|
|
|
* If CIRCLAUNCH_IS_INTERNAL is true, the last hop need not be an exit node.
|
|
|
|
* If CIRCLAUNCH_ONEHOP_TUNNEL is set, the circuit will have only one hop.
|
|
|
|
* Return the newly allocated circuit on success, or NULL on failure. */
|
2006-07-23 09:37:35 +02:00
|
|
|
origin_circuit_t *
|
2007-12-23 20:15:22 +01:00
|
|
|
circuit_launch_by_extend_info(uint8_t purpose,
|
|
|
|
extend_info_t *extend_info,
|
|
|
|
int flags)
|
2005-06-29 23:46:55 +02:00
|
|
|
{
|
2006-07-23 09:37:35 +02:00
|
|
|
origin_circuit_t *circ;
|
2008-07-01 01:27:11 +02:00
|
|
|
int onehop_tunnel = (flags & CIRCLAUNCH_ONEHOP_TUNNEL) != 0;
|
2014-12-25 14:31:16 +01:00
|
|
|
int have_path = have_enough_path_info(! (flags & CIRCLAUNCH_IS_INTERNAL) );
|
2014-09-15 14:27:27 +02:00
|
|
|
int need_specific_rp = 0;
|
2014-12-25 14:31:16 +01:00
|
|
|
|
2018-01-23 11:31:06 +01:00
|
|
|
/* Keep some stats about our attempts to launch HS rendezvous circuits */
|
|
|
|
if (purpose == CIRCUIT_PURPOSE_S_CONNECT_REND) {
|
|
|
|
hs_stats_note_service_rendezvous_launch();
|
|
|
|
}
|
|
|
|
|
2014-12-25 14:31:16 +01:00
|
|
|
if (!onehop_tunnel && (!router_have_minimum_dir_info() || !have_path)) {
|
|
|
|
log_debug(LD_CIRC,"Haven't %s yet; canceling "
|
|
|
|
"circuit launch.",
|
|
|
|
!router_have_minimum_dir_info() ?
|
|
|
|
"fetched enough directory info" :
|
|
|
|
"received a consensus with exits");
|
2004-07-13 03:25:39 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2014-09-15 14:27:27 +02:00
|
|
|
/* If Tor2webRendezvousPoints is enabled and we are dealing with an
|
|
|
|
RP circuit, we want a specific RP node so we shouldn't canibalize
|
|
|
|
an already existing circuit. */
|
|
|
|
if (get_options()->Tor2webRendezvousPoints &&
|
|
|
|
purpose == CIRCUIT_PURPOSE_C_ESTABLISH_REND) {
|
|
|
|
need_specific_rp = 1;
|
|
|
|
}
|
|
|
|
|
2017-12-22 07:35:29 +01:00
|
|
|
/* If we can/should cannibalize another circuit to build this one,
|
|
|
|
* then do so. */
|
|
|
|
if (circuit_should_cannibalize_to_build(purpose,
|
|
|
|
extend_info != NULL,
|
|
|
|
onehop_tunnel,
|
|
|
|
need_specific_rp)) {
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
/* see if there are appropriate circs available to cannibalize. */
|
2008-12-18 17:11:03 +01:00
|
|
|
/* XXX if we're planning to add a hop, perhaps we want to look for
|
2007-10-28 09:16:19 +01:00
|
|
|
* internal circs rather than exit circs? -RD */
|
2007-12-23 20:15:22 +01:00
|
|
|
circ = circuit_find_to_cannibalize(purpose, extend_info, flags);
|
2005-11-11 20:25:30 +01:00
|
|
|
if (circ) {
|
2012-10-12 18:22:13 +02:00
|
|
|
uint8_t old_purpose = circ->base_.purpose;
|
2014-04-15 20:51:19 +02:00
|
|
|
struct timeval old_timestamp_began = circ->base_.timestamp_began;
|
2011-06-25 22:46:20 +02:00
|
|
|
|
2017-09-25 22:08:11 +02:00
|
|
|
log_info(LD_CIRC, "Cannibalizing circ %u (id: %" PRIu32 ") for "
|
|
|
|
"purpose %d (%s)",
|
|
|
|
TO_CIRCUIT(circ)->n_circ_id, circ->global_identifier, purpose,
|
2011-04-08 19:27:25 +02:00
|
|
|
circuit_purpose_to_string(purpose));
|
2011-06-25 22:46:20 +02:00
|
|
|
|
2012-12-08 23:16:29 +01:00
|
|
|
if ((purpose == CIRCUIT_PURPOSE_S_CONNECT_REND ||
|
|
|
|
purpose == CIRCUIT_PURPOSE_C_INTRODUCING) &&
|
2012-12-08 21:07:58 +01:00
|
|
|
circ->path_state == PATH_STATE_BUILD_SUCCEEDED) {
|
|
|
|
/* Path bias: Cannibalized rends pre-emptively count as a
|
2013-01-30 22:01:10 +01:00
|
|
|
* successfully built but unused closed circuit. We don't
|
|
|
|
* wait until the extend (or the close) because the rend
|
|
|
|
* point could be malicious.
|
2012-12-08 23:16:29 +01:00
|
|
|
*
|
|
|
|
* Same deal goes for client side introductions. Clients
|
|
|
|
* can be manipulated to connect repeatedly to them
|
2012-12-10 04:18:04 +01:00
|
|
|
* (especially web clients).
|
|
|
|
*
|
|
|
|
* If we decide to probe the initial portion of these circs,
|
2013-01-30 22:01:10 +01:00
|
|
|
* (up to the adversary's final hop), we need to remove this,
|
|
|
|
* or somehow mark the circuit with a special path state.
|
2012-12-10 04:18:04 +01:00
|
|
|
*/
|
2013-01-19 04:34:01 +01:00
|
|
|
|
2012-12-08 21:07:58 +01:00
|
|
|
/* This must be called before the purpose change */
|
2012-12-10 05:02:08 +01:00
|
|
|
pathbias_check_close(circ, END_CIRC_REASON_FINISHED);
|
2012-12-08 21:07:58 +01:00
|
|
|
}
|
|
|
|
|
2011-11-24 15:52:38 +01:00
|
|
|
circuit_change_purpose(TO_CIRCUIT(circ), purpose);
|
2012-10-26 02:43:10 +02:00
|
|
|
/* Reset the start date of this circ, else expire_building
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
* will see it and think it's been trying to build since it
|
2012-10-26 02:43:10 +02:00
|
|
|
* began.
|
|
|
|
*
|
|
|
|
* Technically, the code should reset this when the
|
|
|
|
* create cell is finally sent, but we're close enough
|
|
|
|
* here. */
|
|
|
|
tor_gettimeofday(&circ->base_.timestamp_began);
|
2011-06-25 22:46:20 +02:00
|
|
|
|
2012-01-11 16:28:20 +01:00
|
|
|
control_event_circuit_cannibalized(circ, old_purpose,
|
2012-10-26 02:43:10 +02:00
|
|
|
&old_timestamp_began);
|
2011-06-25 22:46:20 +02:00
|
|
|
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
switch (purpose) {
|
|
|
|
case CIRCUIT_PURPOSE_C_ESTABLISH_REND:
|
|
|
|
/* it's ready right now */
|
|
|
|
break;
|
|
|
|
case CIRCUIT_PURPOSE_C_INTRODUCING:
|
|
|
|
case CIRCUIT_PURPOSE_S_CONNECT_REND:
|
2005-08-15 05:25:40 +02:00
|
|
|
case CIRCUIT_PURPOSE_C_GENERAL:
|
2017-12-02 03:28:16 +01:00
|
|
|
case CIRCUIT_PURPOSE_S_HSDIR_POST:
|
|
|
|
case CIRCUIT_PURPOSE_C_HSDIR_GET:
|
2015-06-16 16:29:29 +02:00
|
|
|
case CIRCUIT_PURPOSE_S_ESTABLISH_INTRO:
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
/* need to add a new hop */
|
2005-11-15 04:05:23 +01:00
|
|
|
tor_assert(extend_info);
|
|
|
|
if (circuit_extend_to_new_exit(circ, extend_info) < 0)
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
return NULL;
|
|
|
|
break;
|
|
|
|
default:
|
2006-02-13 09:28:42 +01:00
|
|
|
log_warn(LD_BUG,
|
2007-03-04 21:11:46 +01:00
|
|
|
"unexpected purpose %d when cannibalizing a circ.",
|
2006-02-13 09:28:42 +01:00
|
|
|
purpose);
|
2005-04-26 20:52:16 +02:00
|
|
|
tor_fragile_assert();
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return circ;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-08-18 10:51:04 +02:00
|
|
|
if (did_circs_fail_last_period &&
|
|
|
|
n_circuit_failures > MAX_CIRCUIT_FAILURES) {
|
2004-05-13 09:24:49 +02:00
|
|
|
/* too many failed circs in a row. don't try. */
|
|
|
|
// log_fn(LOG_INFO,"%d failures so far, not trying.",n_circuit_failures);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2005-12-14 21:40:40 +01:00
|
|
|
/* try a circ. if it fails, circuit_mark_for_close will increment
|
|
|
|
* n_circuit_failures */
|
2007-12-23 20:15:22 +01:00
|
|
|
return circuit_establish_circuit(purpose, extend_info, flags);
|
2004-07-03 01:40:03 +02:00
|
|
|
}
|
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
/** Record another failure at opening a general circuit. When we have
|
|
|
|
* too many, we'll stop trying for the remainder of this minute.
|
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
static void
|
|
|
|
circuit_increment_failure_count(void)
|
|
|
|
{
|
2004-05-13 09:24:49 +02:00
|
|
|
++n_circuit_failures;
|
2006-02-13 09:28:42 +01:00
|
|
|
log_debug(LD_CIRC,"n_circuit_failures now %d.",n_circuit_failures);
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/** Reset the failure count for opening general circuits. This means
|
|
|
|
* we will try MAX_CIRCUIT_FAILURES times more (if necessary) before
|
|
|
|
* stopping again.
|
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
void
|
|
|
|
circuit_reset_failure_count(int timeout)
|
|
|
|
{
|
2004-11-28 10:05:49 +01:00
|
|
|
if (timeout && n_circuit_failures > MAX_CIRCUIT_FAILURES)
|
2004-08-18 10:51:04 +02:00
|
|
|
did_circs_fail_last_period = 1;
|
|
|
|
else
|
|
|
|
did_circs_fail_last_period = 0;
|
2004-05-13 09:24:49 +02:00
|
|
|
n_circuit_failures = 0;
|
|
|
|
}
|
|
|
|
|
2006-09-21 23:48:42 +02:00
|
|
|
/** Find an open circ that we're happy to use for <b>conn</b> and return 1. If
|
|
|
|
* there isn't one, and there isn't one on the way, launch one and return
|
|
|
|
* 0. If it will never work, return -1.
|
2004-05-13 09:24:49 +02:00
|
|
|
*
|
|
|
|
* Write the found or in-progress or launched circ into *circp.
|
|
|
|
*/
|
|
|
|
static int
|
2011-07-20 18:55:42 +02:00
|
|
|
circuit_get_open_circ_or_launch(entry_connection_t *conn,
|
2004-05-13 09:24:49 +02:00
|
|
|
uint8_t desired_circuit_purpose,
|
2006-07-23 09:37:35 +02:00
|
|
|
origin_circuit_t **circp)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2006-07-23 09:37:35 +02:00
|
|
|
origin_circuit_t *circ;
|
2006-12-13 01:28:56 +01:00
|
|
|
int check_exit_policy;
|
2005-11-25 09:08:56 +01:00
|
|
|
int need_uptime, need_internal;
|
2006-12-13 03:49:45 +01:00
|
|
|
int want_onehop;
|
2011-06-14 19:01:38 +02:00
|
|
|
const or_options_t *options = get_options();
|
2004-05-13 09:24:49 +02:00
|
|
|
|
|
|
|
tor_assert(conn);
|
|
|
|
tor_assert(circp);
|
2015-06-11 15:55:47 +02:00
|
|
|
if (ENTRY_TO_CONN(conn)->state != AP_CONN_STATE_CIRCUIT_WAIT) {
|
|
|
|
connection_t *c = ENTRY_TO_CONN(conn);
|
|
|
|
log_err(LD_BUG, "Connection state mismatch: wanted "
|
|
|
|
"AP_CONN_STATE_CIRCUIT_WAIT, but got %d (%s)",
|
|
|
|
c->state, conn_state_to_string(c->type, c->state));
|
|
|
|
}
|
2011-07-20 18:55:42 +02:00
|
|
|
tor_assert(ENTRY_TO_CONN(conn)->state == AP_CONN_STATE_CIRCUIT_WAIT);
|
2016-10-27 18:03:52 +02:00
|
|
|
|
|
|
|
/* Will the exit policy of the exit node apply to this stream? */
|
2006-12-13 01:28:56 +01:00
|
|
|
check_exit_policy =
|
2007-10-28 09:16:19 +01:00
|
|
|
conn->socks_request->command == SOCKS_COMMAND_CONNECT &&
|
|
|
|
!conn->use_begindir &&
|
2011-07-20 18:55:42 +02:00
|
|
|
!connection_edge_is_rendezvous_stream(ENTRY_TO_EDGE_CONN(conn));
|
2016-10-27 18:03:52 +02:00
|
|
|
|
|
|
|
/* Does this connection want a one-hop circuit? */
|
2007-10-28 09:16:19 +01:00
|
|
|
want_onehop = conn->want_onehop;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Do we need a high-uptime circuit? */
|
2007-10-28 09:16:19 +01:00
|
|
|
need_uptime = !conn->want_onehop && !conn->use_begindir &&
|
2012-04-11 18:50:50 +02:00
|
|
|
smartlist_contains_int_as_string(options->LongLivedPorts,
|
2005-11-25 09:08:56 +01:00
|
|
|
conn->socks_request->port);
|
2012-05-15 15:41:45 +02:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Do we need an "internal" circuit? */
|
2012-05-15 15:41:45 +02:00
|
|
|
if (desired_circuit_purpose != CIRCUIT_PURPOSE_C_GENERAL)
|
|
|
|
need_internal = 1;
|
|
|
|
else if (conn->use_begindir || conn->want_onehop)
|
|
|
|
need_internal = 1;
|
|
|
|
else
|
|
|
|
need_internal = 0;
|
2005-11-25 09:08:56 +01:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* We now know what kind of circuit we need. See if there is an
|
|
|
|
* open circuit that we can use for this stream */
|
|
|
|
circ = circuit_get_best(conn, 1 /* Insist on open circuits */,
|
|
|
|
desired_circuit_purpose,
|
2005-11-25 09:08:56 +01:00
|
|
|
need_uptime, need_internal);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2004-11-28 10:05:49 +01:00
|
|
|
if (circ) {
|
2016-10-27 18:03:52 +02:00
|
|
|
/* We got a circuit that will work for this stream! We can return it. */
|
2004-05-13 09:24:49 +02:00
|
|
|
*circp = circ;
|
|
|
|
return 1; /* we're happy */
|
|
|
|
}
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Okay, there's no circuit open that will work for this stream. Let's
|
|
|
|
* see if there's an in-progress circuit or if we have to launch one */
|
|
|
|
|
|
|
|
/* Do we know enough directory info to build circuits at all? */
|
2014-12-25 14:31:16 +01:00
|
|
|
int have_path = have_enough_path_info(!need_internal);
|
|
|
|
|
|
|
|
if (!want_onehop && (!router_have_minimum_dir_info() || !have_path)) {
|
2016-10-27 18:03:52 +02:00
|
|
|
/* If we don't have enough directory information, we can't build
|
|
|
|
* multihop circuits.
|
|
|
|
*/
|
2005-01-07 16:57:57 +01:00
|
|
|
if (!connection_get_by_type(CONN_TYPE_DIR)) {
|
2008-08-03 07:35:18 +02:00
|
|
|
int severity = LOG_NOTICE;
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Retry some stuff that might help the connection work. */
|
2017-12-10 15:14:28 +01:00
|
|
|
/* If we are configured with EntryNodes or UseBridges */
|
|
|
|
if (entry_list_is_constrained(options)) {
|
|
|
|
/* Retry all our guards / bridges.
|
|
|
|
* guards_retry_optimistic() always returns true here. */
|
|
|
|
int rv = guards_retry_optimistic(options);
|
|
|
|
tor_assert_nonfatal_once(rv);
|
2008-08-03 07:35:18 +02:00
|
|
|
log_fn(severity, LD_APP|LD_DIR,
|
2014-12-25 14:31:16 +01:00
|
|
|
"Application request when we haven't %s. "
|
|
|
|
"Optimistically trying known %s again.",
|
|
|
|
!router_have_minimum_dir_info() ?
|
|
|
|
"used client functionality lately" :
|
|
|
|
"received a consensus with exits",
|
2010-09-24 04:41:01 +02:00
|
|
|
options->UseBridges ? "bridges" : "entrynodes");
|
2017-12-10 15:14:28 +01:00
|
|
|
} else {
|
|
|
|
/* Getting directory documents doesn't help much if we have a limited
|
|
|
|
* number of guards */
|
|
|
|
tor_assert_nonfatal(!options->UseBridges);
|
|
|
|
tor_assert_nonfatal(!options->EntryNodes);
|
|
|
|
/* Retry our directory fetches, so we have a fresh set of guard info */
|
2008-08-03 07:35:18 +02:00
|
|
|
log_fn(severity, LD_APP|LD_DIR,
|
2014-12-25 14:31:16 +01:00
|
|
|
"Application request when we haven't %s. "
|
|
|
|
"Optimistically trying directory fetches again.",
|
|
|
|
!router_have_minimum_dir_info() ?
|
|
|
|
"used client functionality lately" :
|
|
|
|
"received a consensus with exits");
|
2007-07-29 06:38:21 +02:00
|
|
|
routerlist_retry_directory_downloads(time(NULL));
|
|
|
|
}
|
2005-01-07 16:57:57 +01:00
|
|
|
}
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Since we didn't have enough directory info, we can't attach now. The
|
|
|
|
* stream will be dealt with when router_have_minimum_dir_info becomes 1,
|
|
|
|
* or when all directory attempts fail and directory_all_unreachable()
|
2005-01-07 16:57:57 +01:00
|
|
|
* kills it.
|
|
|
|
*/
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Check whether the exit policy of the chosen exit, or the exit policies
|
|
|
|
* of _all_ nodes, would forbid this node. */
|
2006-12-13 01:28:56 +01:00
|
|
|
if (check_exit_policy) {
|
2008-10-21 19:09:04 +02:00
|
|
|
if (!conn->chosen_exit_name) {
|
|
|
|
struct in_addr in;
|
2011-07-15 18:58:13 +02:00
|
|
|
tor_addr_t addr, *addrp=NULL;
|
|
|
|
if (tor_inet_aton(conn->socks_request->address, &in)) {
|
|
|
|
tor_addr_from_in(&addr, &in);
|
|
|
|
addrp = &addr;
|
|
|
|
}
|
|
|
|
if (router_exit_policy_all_nodes_reject(addrp,
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
conn->socks_request->port,
|
|
|
|
need_uptime)) {
|
2008-10-21 19:09:04 +02:00
|
|
|
log_notice(LD_APP,
|
2008-11-07 02:48:55 +01:00
|
|
|
"No Tor server allows exit to %s:%d. Rejecting.",
|
2009-12-15 23:23:36 +01:00
|
|
|
safe_str_client(conn->socks_request->address),
|
2008-10-21 19:09:04 +02:00
|
|
|
conn->socks_request->port);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
} else {
|
2016-05-30 22:18:16 +02:00
|
|
|
/* XXXX Duplicates checks in connection_ap_handshake_attach_circuit:
|
|
|
|
* refactor into a single function. */
|
2017-08-23 01:04:31 +02:00
|
|
|
const node_t *node = node_get_by_nickname(conn->chosen_exit_name, 0);
|
2008-12-17 15:59:28 +01:00
|
|
|
int opt = conn->chosen_exit_optional;
|
2011-04-27 20:36:30 +02:00
|
|
|
if (node && !connection_ap_can_use_exit(conn, node)) {
|
2008-10-21 19:09:04 +02:00
|
|
|
log_fn(opt ? LOG_INFO : LOG_WARN, LD_APP,
|
2011-04-27 01:55:34 +02:00
|
|
|
"Requested exit point '%s' is excluded or "
|
|
|
|
"would refuse request. %s.",
|
2008-10-21 19:09:04 +02:00
|
|
|
conn->chosen_exit_name, opt ? "Trying others" : "Closing");
|
|
|
|
if (opt) {
|
2008-12-17 15:59:28 +01:00
|
|
|
conn->chosen_exit_optional = 0;
|
2008-10-21 19:09:04 +02:00
|
|
|
tor_free(conn->chosen_exit_name);
|
|
|
|
/* Try again. */
|
|
|
|
return circuit_get_open_circ_or_launch(conn,
|
|
|
|
desired_circuit_purpose,
|
|
|
|
circp);
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Now, check whether there already a circuit on the way that could handle
|
|
|
|
* this stream. This check matches the one above, but this time we
|
|
|
|
* do not require that the circuit will work. */
|
|
|
|
circ = circuit_get_best(conn, 0 /* don't insist on open circuits */,
|
|
|
|
desired_circuit_purpose,
|
2005-11-25 09:08:56 +01:00
|
|
|
need_uptime, need_internal);
|
2007-10-28 09:16:19 +01:00
|
|
|
if (circ)
|
|
|
|
log_debug(LD_CIRC, "one on the way!");
|
2016-10-27 18:03:52 +02:00
|
|
|
|
2004-11-28 10:05:49 +01:00
|
|
|
if (!circ) {
|
2016-10-27 18:03:52 +02:00
|
|
|
/* No open or in-progress circuit could handle this stream! We
|
|
|
|
* will have to launch one!
|
|
|
|
*/
|
|
|
|
|
2016-12-18 10:06:02 +01:00
|
|
|
/* The chosen exit node, if there is one. */
|
2005-06-29 23:46:55 +02:00
|
|
|
extend_info_t *extend_info=NULL;
|
2011-07-07 20:54:54 +02:00
|
|
|
const int n_pending = count_pending_general_client_circuits();
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Do we have too many pending circuits? */
|
2011-07-07 20:54:54 +02:00
|
|
|
if (n_pending >= options->MaxClientCircuitsPending) {
|
|
|
|
static ratelim_t delay_limit = RATELIM_INIT(10*60);
|
|
|
|
char *m;
|
|
|
|
if ((m = rate_limit_log(&delay_limit, approx_time()))) {
|
|
|
|
log_notice(LD_APP, "We'd like to launch a circuit to handle a "
|
|
|
|
"connection, but we already have %d general-purpose client "
|
2012-10-03 19:03:09 +02:00
|
|
|
"circuits pending. Waiting until some finish.%s",
|
|
|
|
n_pending, m);
|
2011-07-07 20:54:54 +02:00
|
|
|
tor_free(m);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* If this is a hidden service trying to start an introduction point,
|
|
|
|
* handle that case. */
|
2004-11-28 10:05:49 +01:00
|
|
|
if (desired_circuit_purpose == CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT) {
|
2017-07-21 22:31:27 +02:00
|
|
|
const edge_connection_t *edge_conn = ENTRY_TO_EDGE_CONN(conn);
|
2004-05-13 09:24:49 +02:00
|
|
|
/* need to pick an intro point */
|
2017-07-21 22:31:27 +02:00
|
|
|
extend_info = hs_client_get_random_intro_from_edge(edge_conn);
|
2005-06-29 23:46:55 +02:00
|
|
|
if (!extend_info) {
|
2017-07-21 22:31:27 +02:00
|
|
|
log_info(LD_REND, "No intro points: re-fetching service descriptor.");
|
|
|
|
if (edge_conn->rend_data) {
|
|
|
|
rend_client_refetch_v2_renddesc(edge_conn->rend_data);
|
|
|
|
} else {
|
|
|
|
hs_client_refetch_hsdesc(&edge_conn->hs_ident->identity_pk);
|
|
|
|
}
|
2015-11-27 18:54:57 +01:00
|
|
|
connection_ap_mark_as_non_pending_circuit(conn);
|
2011-07-20 18:55:42 +02:00
|
|
|
ENTRY_TO_CONN(conn)->state = AP_CONN_STATE_RENDDESC_WAIT;
|
2005-01-20 00:15:59 +01:00
|
|
|
return 0;
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
2011-05-16 03:58:46 +02:00
|
|
|
log_info(LD_REND,"Chose %s as intro point for '%s'.",
|
|
|
|
extend_info_describe(extend_info),
|
2017-07-21 22:31:27 +02:00
|
|
|
(edge_conn->rend_data) ?
|
|
|
|
safe_str_client(rend_data_get_address(edge_conn->rend_data)) :
|
|
|
|
"service");
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2004-11-29 09:34:54 +01:00
|
|
|
/* If we have specified a particular exit node for our
|
|
|
|
* connection, then be sure to open a circuit to that exit node.
|
|
|
|
*/
|
2017-12-02 03:28:16 +01:00
|
|
|
if (desired_circuit_purpose == CIRCUIT_PURPOSE_C_GENERAL ||
|
|
|
|
desired_circuit_purpose == CIRCUIT_PURPOSE_S_HSDIR_POST ||
|
|
|
|
desired_circuit_purpose == CIRCUIT_PURPOSE_C_HSDIR_GET) {
|
2004-11-29 09:34:54 +01:00
|
|
|
if (conn->chosen_exit_name) {
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
const node_t *r;
|
2008-12-17 15:59:28 +01:00
|
|
|
int opt = conn->chosen_exit_optional;
|
2017-08-23 01:04:31 +02:00
|
|
|
r = node_get_by_nickname(conn->chosen_exit_name, 0);
|
2018-04-16 16:38:55 +02:00
|
|
|
if (r && node_has_preferred_descriptor(r, conn->want_onehop ? 1 : 0)) {
|
2011-11-24 18:29:56 +01:00
|
|
|
/* We might want to connect to an IPv6 bridge for loading
|
|
|
|
descriptors so we use the preferred address rather than
|
2016-01-22 07:43:24 +01:00
|
|
|
the primary. */
|
2011-11-24 18:29:56 +01:00
|
|
|
extend_info = extend_info_from_node(r, conn->want_onehop ? 1 : 0);
|
2016-01-22 07:43:24 +01:00
|
|
|
if (!extend_info) {
|
|
|
|
log_warn(LD_CIRC,"Could not make a one-hop connection to %s. "
|
|
|
|
"Discarding this circuit.", conn->chosen_exit_name);
|
|
|
|
return -1;
|
|
|
|
}
|
2018-04-16 16:38:55 +02:00
|
|
|
} else { /* ! (r && node_has_preferred_descriptor(...)) */
|
2007-03-01 04:56:21 +01:00
|
|
|
log_debug(LD_DIR, "considering %d, %s",
|
|
|
|
want_onehop, conn->chosen_exit_name);
|
2007-01-27 20:29:16 +01:00
|
|
|
if (want_onehop && conn->chosen_exit_name[0] == '$') {
|
|
|
|
/* We're asking for a one-hop circuit to a router that
|
2007-06-12 11:17:23 +02:00
|
|
|
* we don't have a routerinfo about. Make up an extend_info. */
|
2016-10-28 22:11:05 +02:00
|
|
|
/* XXX prop220: we need to make chosen_exit_name able to
|
|
|
|
* encode both key formats. This is not absolutely critical
|
|
|
|
* since this is just for one-hop circuits, but we should
|
|
|
|
* still get it done */
|
2007-06-12 11:17:23 +02:00
|
|
|
char digest[DIGEST_LEN];
|
|
|
|
char *hexdigest = conn->chosen_exit_name+1;
|
2008-08-05 22:08:19 +02:00
|
|
|
tor_addr_t addr;
|
2007-06-12 11:17:23 +02:00
|
|
|
if (strlen(hexdigest) < HEX_DIGEST_LEN ||
|
2016-06-17 16:41:45 +02:00
|
|
|
base16_decode(digest,DIGEST_LEN,
|
|
|
|
hexdigest,HEX_DIGEST_LEN) != DIGEST_LEN) {
|
2007-06-12 11:17:23 +02:00
|
|
|
log_info(LD_DIR, "Broken exit digest on tunnel conn. Closing.");
|
2007-01-27 20:29:16 +01:00
|
|
|
return -1;
|
|
|
|
}
|
2011-10-11 17:21:31 +02:00
|
|
|
if (tor_addr_parse(&addr, conn->socks_request->address) < 0) {
|
2008-08-05 22:08:19 +02:00
|
|
|
log_info(LD_DIR, "Broken address %s on tunnel conn. Closing.",
|
2009-12-15 23:23:36 +01:00
|
|
|
escaped_safe_str_client(conn->socks_request->address));
|
2007-06-12 11:17:23 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2016-10-28 22:11:05 +02:00
|
|
|
/* XXXX prop220 add a workaround for ed25519 ID below*/
|
2012-09-06 17:38:32 +02:00
|
|
|
extend_info = extend_info_new(conn->chosen_exit_name+1,
|
2016-09-14 20:34:25 +02:00
|
|
|
digest,
|
2016-10-28 22:11:05 +02:00
|
|
|
NULL, /* Ed25519 ID */
|
2016-09-14 20:34:25 +02:00
|
|
|
NULL, NULL, /* onion keys */
|
|
|
|
&addr, conn->socks_request->port);
|
2016-10-27 18:03:52 +02:00
|
|
|
} else { /* ! (want_onehop && conn->chosen_exit_name[0] == '$') */
|
2007-01-27 20:29:16 +01:00
|
|
|
/* We will need an onion key for the router, and we
|
|
|
|
* don't have one. Refuse or relax requirements. */
|
|
|
|
log_fn(opt ? LOG_INFO : LOG_WARN, LD_APP,
|
|
|
|
"Requested exit point '%s' is not known. %s.",
|
|
|
|
conn->chosen_exit_name, opt ? "Trying others" : "Closing");
|
|
|
|
if (opt) {
|
2008-12-17 15:59:28 +01:00
|
|
|
conn->chosen_exit_optional = 0;
|
2007-01-27 20:29:16 +01:00
|
|
|
tor_free(conn->chosen_exit_name);
|
2009-02-09 17:55:48 +01:00
|
|
|
/* Try again with no requested exit */
|
|
|
|
return circuit_get_open_circ_or_launch(conn,
|
|
|
|
desired_circuit_purpose,
|
|
|
|
circp);
|
2007-01-27 20:29:16 +01:00
|
|
|
}
|
|
|
|
return -1;
|
2006-07-18 02:59:46 +02:00
|
|
|
}
|
2004-11-29 09:34:54 +01:00
|
|
|
}
|
|
|
|
}
|
2016-10-27 18:03:52 +02:00
|
|
|
} /* Done checking for general circutis with chosen exits. */
|
2004-11-29 09:34:54 +01:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* What purpose do we need to launch this circuit with? */
|
|
|
|
uint8_t new_circ_purpose;
|
2004-11-28 10:05:49 +01:00
|
|
|
if (desired_circuit_purpose == CIRCUIT_PURPOSE_C_REND_JOINED)
|
2004-05-13 09:24:49 +02:00
|
|
|
new_circ_purpose = CIRCUIT_PURPOSE_C_ESTABLISH_REND;
|
2004-11-28 10:05:49 +01:00
|
|
|
else if (desired_circuit_purpose == CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT)
|
2004-05-13 09:24:49 +02:00
|
|
|
new_circ_purpose = CIRCUIT_PURPOSE_C_INTRODUCING;
|
|
|
|
else
|
|
|
|
new_circ_purpose = desired_circuit_purpose;
|
|
|
|
|
2015-02-19 15:09:25 +01:00
|
|
|
#ifdef ENABLE_TOR2WEB_MODE
|
2016-10-27 18:03:52 +02:00
|
|
|
/* If tor2Web is on, then hidden service requests should be one-hop.
|
|
|
|
*/
|
2011-06-01 11:00:59 +02:00
|
|
|
if (options->Tor2webMode &&
|
|
|
|
(new_circ_purpose == CIRCUIT_PURPOSE_C_ESTABLISH_REND ||
|
|
|
|
new_circ_purpose == CIRCUIT_PURPOSE_C_INTRODUCING)) {
|
|
|
|
want_onehop = 1;
|
|
|
|
}
|
2017-09-15 22:24:44 +02:00
|
|
|
#endif /* defined(ENABLE_TOR2WEB_MODE) */
|
2011-06-01 11:00:59 +02:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Determine what kind of a circuit to launch, and actually launch it. */
|
2007-12-23 20:15:22 +01:00
|
|
|
{
|
|
|
|
int flags = CIRCLAUNCH_NEED_CAPACITY;
|
|
|
|
if (want_onehop) flags |= CIRCLAUNCH_ONEHOP_TUNNEL;
|
|
|
|
if (need_uptime) flags |= CIRCLAUNCH_NEED_UPTIME;
|
|
|
|
if (need_internal) flags |= CIRCLAUNCH_IS_INTERNAL;
|
2017-08-30 16:13:22 +02:00
|
|
|
|
|
|
|
/* If we are about to pick a v3 RP right now, make sure we pick a
|
|
|
|
* rendezvous point that supports the v3 protocol! */
|
|
|
|
if (desired_circuit_purpose == CIRCUIT_PURPOSE_C_REND_JOINED &&
|
|
|
|
new_circ_purpose == CIRCUIT_PURPOSE_C_ESTABLISH_REND &&
|
|
|
|
ENTRY_TO_EDGE_CONN(conn)->hs_ident) {
|
|
|
|
flags |= CIRCLAUNCH_IS_V3_RP;
|
|
|
|
log_info(LD_GENERAL, "Getting rendezvous circuit to v3 service!");
|
|
|
|
}
|
|
|
|
|
2007-12-23 20:15:22 +01:00
|
|
|
circ = circuit_launch_by_extend_info(new_circ_purpose, extend_info,
|
|
|
|
flags);
|
|
|
|
}
|
|
|
|
|
2009-12-12 08:07:59 +01:00
|
|
|
extend_info_free(extend_info);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Now trigger things that need to happen when we launch circuits */
|
|
|
|
|
2017-12-02 03:28:16 +01:00
|
|
|
if (desired_circuit_purpose == CIRCUIT_PURPOSE_C_GENERAL ||
|
|
|
|
desired_circuit_purpose == CIRCUIT_PURPOSE_C_HSDIR_GET ||
|
|
|
|
desired_circuit_purpose == CIRCUIT_PURPOSE_S_HSDIR_POST) {
|
2011-04-27 04:18:01 +02:00
|
|
|
/* We just caused a circuit to get built because of this stream.
|
|
|
|
* If this stream has caused a _lot_ of circuits to be built, that's
|
|
|
|
* a bad sign: we should tell the user. */
|
|
|
|
if (conn->num_circuits_launched < NUM_CIRCUITS_LAUNCHED_THRESHOLD &&
|
|
|
|
++conn->num_circuits_launched == NUM_CIRCUITS_LAUNCHED_THRESHOLD)
|
2011-05-13 01:41:08 +02:00
|
|
|
log_info(LD_CIRC, "The application request to %s:%d has launched "
|
2011-04-27 04:18:01 +02:00
|
|
|
"%d circuits without finding one it likes.",
|
|
|
|
escaped_safe_str_client(conn->socks_request->address),
|
|
|
|
conn->socks_request->port,
|
|
|
|
conn->num_circuits_launched);
|
|
|
|
} else {
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
/* help predict this next time */
|
2005-11-25 09:08:56 +01:00
|
|
|
rep_hist_note_used_internal(time(NULL), need_uptime, 1);
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
if (circ) {
|
2017-07-21 22:31:27 +02:00
|
|
|
const edge_connection_t *edge_conn = ENTRY_TO_EDGE_CONN(conn);
|
|
|
|
if (edge_conn->rend_data) {
|
|
|
|
/* write the service_id into circ */
|
|
|
|
circ->rend_data = rend_data_dup(edge_conn->rend_data);
|
|
|
|
} else if (edge_conn->hs_ident) {
|
|
|
|
circ->hs_ident =
|
|
|
|
hs_ident_circuit_new(&edge_conn->hs_ident->identity_pk,
|
|
|
|
HS_IDENT_CIRCUIT_INTRO);
|
|
|
|
}
|
2012-10-12 18:22:13 +02:00
|
|
|
if (circ->base_.purpose == CIRCUIT_PURPOSE_C_ESTABLISH_REND &&
|
|
|
|
circ->base_.state == CIRCUIT_STATE_OPEN)
|
2014-12-10 19:05:41 +01:00
|
|
|
circuit_has_opened(circ);
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
Launch sufficient circuits to satisfy pending isolated streams
Our old "do we need to launch a circuit for stream S" logic was,
more or less, that if we had a pending circuit that could handle S,
we didn't need to launch a new one.
But now that we have streams isolated from one another, we need
something stronger here: It's possible that some pending C can
handle either S1 or S2, but not both.
This patch reuses the existing isolation logic for a simple
solution: when we decide during circuit launching that some pending
C would satisfy stream S1, we "hypothetically" mark C as though S1
had been connected to it. Now if S2 is incompatible with S1, it
won't be something that can attach to C, and so we'll launch a new
stream.
When the circuit becomes OPEN for the first time (with no streams
attached to it), we reset the circuit's isolation status. I'm not
too sure about this part: I wanted some way to be sure that, if all
streams that would have used a circuit die before the circuit is
done, the circuit can still get used. But I worry that this
approach could also lead to us launching too many circuits. Careful
thought needed here.
2011-07-07 16:40:23 +02:00
|
|
|
} /* endif (!circ) */
|
2016-10-27 18:03:52 +02:00
|
|
|
|
|
|
|
/* We either found a good circuit, or launched a new circuit, or failed to
|
|
|
|
* do so. Report success, and delay. */
|
|
|
|
|
Launch sufficient circuits to satisfy pending isolated streams
Our old "do we need to launch a circuit for stream S" logic was,
more or less, that if we had a pending circuit that could handle S,
we didn't need to launch a new one.
But now that we have streams isolated from one another, we need
something stronger here: It's possible that some pending C can
handle either S1 or S2, but not both.
This patch reuses the existing isolation logic for a simple
solution: when we decide during circuit launching that some pending
C would satisfy stream S1, we "hypothetically" mark C as though S1
had been connected to it. Now if S2 is incompatible with S1, it
won't be something that can attach to C, and so we'll launch a new
stream.
When the circuit becomes OPEN for the first time (with no streams
attached to it), we reset the circuit's isolation status. I'm not
too sure about this part: I wanted some way to be sure that, if all
streams that would have used a circuit die before the circuit is
done, the circuit can still get used. But I worry that this
approach could also lead to us launching too many circuits. Careful
thought needed here.
2011-07-07 16:40:23 +02:00
|
|
|
if (circ) {
|
|
|
|
/* Mark the circuit with the isolation fields for this connection.
|
|
|
|
* When the circuit arrives, we'll clear these flags: this is
|
|
|
|
* just some internal bookkeeping to make sure that we have
|
|
|
|
* launched enough circuits.
|
|
|
|
*/
|
|
|
|
connection_edge_update_circuit_isolation(conn, circ, 0);
|
|
|
|
} else {
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_APP,
|
|
|
|
"No safe circuit (purpose %d) ready for edge "
|
|
|
|
"connection; delaying.",
|
|
|
|
desired_circuit_purpose);
|
Launch sufficient circuits to satisfy pending isolated streams
Our old "do we need to launch a circuit for stream S" logic was,
more or less, that if we had a pending circuit that could handle S,
we didn't need to launch a new one.
But now that we have streams isolated from one another, we need
something stronger here: It's possible that some pending C can
handle either S1 or S2, but not both.
This patch reuses the existing isolation logic for a simple
solution: when we decide during circuit launching that some pending
C would satisfy stream S1, we "hypothetically" mark C as though S1
had been connected to it. Now if S2 is incompatible with S1, it
won't be something that can attach to C, and so we'll launch a new
stream.
When the circuit becomes OPEN for the first time (with no streams
attached to it), we reset the circuit's isolation status. I'm not
too sure about this part: I wanted some way to be sure that, if all
streams that would have used a circuit die before the circuit is
done, the circuit can still get used. But I worry that this
approach could also lead to us launching too many circuits. Careful
thought needed here.
2011-07-07 16:40:23 +02:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
*circp = circ;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-04-30 16:09:11 +02:00
|
|
|
/** Return true iff <b>crypt_path</b> is one of the crypt_paths for
|
2007-05-02 11:12:04 +02:00
|
|
|
* <b>circ</b>. */
|
2007-04-30 16:09:11 +02:00
|
|
|
static int
|
|
|
|
cpath_is_on_circuit(origin_circuit_t *circ, crypt_path_t *crypt_path)
|
|
|
|
{
|
|
|
|
crypt_path_t *cpath, *cpath_next = NULL;
|
|
|
|
for (cpath = circ->cpath; cpath_next != circ->cpath; cpath = cpath_next) {
|
|
|
|
cpath_next = cpath->next;
|
|
|
|
if (crypt_path == cpath)
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-07-20 16:38:00 +02:00
|
|
|
/** Return true iff client-side optimistic data is supported. */
|
|
|
|
static int
|
|
|
|
optimistic_data_enabled(void)
|
|
|
|
{
|
|
|
|
const or_options_t *options = get_options();
|
|
|
|
if (options->OptimisticData < 0) {
|
2016-04-18 19:55:23 +02:00
|
|
|
/* Note: this default was 0 before #18815 was merged. We can't take the
|
|
|
|
* parameter out of the consensus until versions before that are all
|
|
|
|
* obsolete. */
|
2011-07-20 16:38:00 +02:00
|
|
|
const int32_t enabled =
|
2016-04-18 19:55:23 +02:00
|
|
|
networkstatus_get_param(NULL, "UseOptimisticData", /*default*/ 1, 0, 1);
|
2011-07-20 16:38:00 +02:00
|
|
|
return (int)enabled;
|
|
|
|
}
|
|
|
|
return options->OptimisticData;
|
|
|
|
}
|
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
/** Attach the AP stream <b>apconn</b> to circ's linked list of
|
2007-04-30 16:09:11 +02:00
|
|
|
* p_streams. Also set apconn's cpath_layer to <b>cpath</b>, or to the last
|
|
|
|
* hop in circ's cpath if <b>cpath</b> is NULL.
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
2005-06-11 20:52:12 +02:00
|
|
|
static void
|
2011-07-20 18:55:42 +02:00
|
|
|
link_apconn_to_circ(entry_connection_t *apconn, origin_circuit_t *circ,
|
2007-04-30 13:10:45 +02:00
|
|
|
crypt_path_t *cpath)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2014-09-22 01:12:20 +02:00
|
|
|
const node_t *exitnode = NULL;
|
2011-07-18 19:56:22 +02:00
|
|
|
|
2004-05-13 09:24:49 +02:00
|
|
|
/* add it into the linked list of streams on this circuit */
|
2013-03-10 13:32:58 +01:00
|
|
|
log_debug(LD_APP|LD_CIRC, "attaching new conn to circ. n_circ_id %u.",
|
|
|
|
(unsigned)circ->base_.n_circ_id);
|
2005-12-14 21:40:40 +01:00
|
|
|
/* reset it, so we can measure circ timeouts */
|
2018-02-01 03:12:38 +01:00
|
|
|
ENTRY_TO_CONN(apconn)->timestamp_last_read_allowed = time(NULL);
|
2011-07-20 18:55:42 +02:00
|
|
|
ENTRY_TO_EDGE_CONN(apconn)->next_stream = circ->p_streams;
|
|
|
|
ENTRY_TO_EDGE_CONN(apconn)->on_circuit = TO_CIRCUIT(circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
/* assert_connection_ok(conn, time(NULL)); */
|
2011-07-20 18:55:42 +02:00
|
|
|
circ->p_streams = ENTRY_TO_EDGE_CONN(apconn);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2011-10-03 21:13:38 +02:00
|
|
|
if (connection_edge_is_rendezvous_stream(ENTRY_TO_EDGE_CONN(apconn))) {
|
2011-09-17 12:23:26 +02:00
|
|
|
/* We are attaching a stream to a rendezvous circuit. That means
|
|
|
|
* that an attempt to connect to a hidden service just
|
|
|
|
* succeeded. Tell rendclient.c. */
|
2017-05-02 15:22:00 +02:00
|
|
|
hs_client_note_connection_attempt_succeeded(ENTRY_TO_EDGE_CONN(apconn));
|
2011-09-17 12:23:26 +02:00
|
|
|
}
|
|
|
|
|
2007-04-30 13:10:45 +02:00
|
|
|
if (cpath) { /* we were given one; use it */
|
2007-04-30 16:09:11 +02:00
|
|
|
tor_assert(cpath_is_on_circuit(circ, cpath));
|
2011-07-20 18:55:42 +02:00
|
|
|
} else {
|
|
|
|
/* use the last hop in the circuit */
|
2007-04-30 13:10:45 +02:00
|
|
|
tor_assert(circ->cpath);
|
|
|
|
tor_assert(circ->cpath->prev);
|
|
|
|
tor_assert(circ->cpath->prev->state == CPATH_STATE_OPEN);
|
2011-07-20 18:55:42 +02:00
|
|
|
cpath = circ->cpath->prev;
|
2007-04-30 13:10:45 +02:00
|
|
|
}
|
2011-07-20 18:55:42 +02:00
|
|
|
ENTRY_TO_EDGE_CONN(apconn)->cpath_layer = cpath;
|
2011-07-06 23:08:24 +02:00
|
|
|
|
Launch sufficient circuits to satisfy pending isolated streams
Our old "do we need to launch a circuit for stream S" logic was,
more or less, that if we had a pending circuit that could handle S,
we didn't need to launch a new one.
But now that we have streams isolated from one another, we need
something stronger here: It's possible that some pending C can
handle either S1 or S2, but not both.
This patch reuses the existing isolation logic for a simple
solution: when we decide during circuit launching that some pending
C would satisfy stream S1, we "hypothetically" mark C as though S1
had been connected to it. Now if S2 is incompatible with S1, it
won't be something that can attach to C, and so we'll launch a new
stream.
When the circuit becomes OPEN for the first time (with no streams
attached to it), we reset the circuit's isolation status. I'm not
too sure about this part: I wanted some way to be sure that, if all
streams that would have used a circuit die before the circuit is
done, the circuit can still get used. But I worry that this
approach could also lead to us launching too many circuits. Careful
thought needed here.
2011-07-07 16:40:23 +02:00
|
|
|
circ->isolation_any_streams_attached = 1;
|
2011-07-06 23:08:24 +02:00
|
|
|
connection_edge_update_circuit_isolation(apconn, circ, 0);
|
2011-07-20 15:50:53 +02:00
|
|
|
|
2014-09-22 01:12:20 +02:00
|
|
|
/* Compute the exitnode if possible, for logging below */
|
|
|
|
if (cpath->extend_info)
|
|
|
|
exitnode = node_get_by_id(cpath->extend_info->identity_digest);
|
|
|
|
|
2011-07-18 19:56:22 +02:00
|
|
|
/* See if we can use optimistic data on this circuit */
|
2014-09-22 01:12:20 +02:00
|
|
|
if (optimistic_data_enabled() &&
|
2014-09-22 02:02:12 +02:00
|
|
|
(circ->base_.purpose == CIRCUIT_PURPOSE_C_GENERAL ||
|
2017-12-02 03:28:16 +01:00
|
|
|
circ->base_.purpose == CIRCUIT_PURPOSE_C_HSDIR_GET ||
|
|
|
|
circ->base_.purpose == CIRCUIT_PURPOSE_S_HSDIR_POST ||
|
2014-09-22 02:02:12 +02:00
|
|
|
circ->base_.purpose == CIRCUIT_PURPOSE_C_REND_JOINED))
|
2014-09-22 01:12:20 +02:00
|
|
|
apconn->may_use_optimistic_data = 1;
|
|
|
|
else
|
|
|
|
apconn->may_use_optimistic_data = 0;
|
|
|
|
log_info(LD_APP, "Looks like completed circuit to %s %s allow "
|
|
|
|
"optimistic data for connection to %s",
|
2014-09-22 02:02:12 +02:00
|
|
|
circ->base_.purpose == CIRCUIT_PURPOSE_C_GENERAL ?
|
|
|
|
/* node_describe() does the right thing if exitnode is NULL */
|
|
|
|
safe_str_client(node_describe(exitnode)) :
|
|
|
|
"hidden service",
|
2014-09-22 01:12:20 +02:00
|
|
|
apconn->may_use_optimistic_data ? "does" : "doesn't",
|
|
|
|
safe_str_client(apconn->socks_request->address));
|
2004-05-13 09:24:49 +02:00
|
|
|
}
|
|
|
|
|
2011-05-13 22:22:10 +02:00
|
|
|
/** Return true iff <b>address</b> is matched by one of the entries in
|
|
|
|
* TrackHostExits. */
|
|
|
|
int
|
2011-06-14 19:01:38 +02:00
|
|
|
hostname_in_track_host_exits(const or_options_t *options, const char *address)
|
2011-05-13 22:22:10 +02:00
|
|
|
{
|
|
|
|
if (!options->TrackHostExits)
|
|
|
|
return 0;
|
|
|
|
SMARTLIST_FOREACH_BEGIN(options->TrackHostExits, const char *, cp) {
|
|
|
|
if (cp[0] == '.') { /* match end */
|
|
|
|
if (cp[1] == '\0' ||
|
|
|
|
!strcasecmpend(address, cp) ||
|
|
|
|
!strcasecmp(address, &cp[1]))
|
|
|
|
return 1;
|
|
|
|
} else if (strcasecmp(cp, address) == 0) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
} SMARTLIST_FOREACH_END(cp);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-05-15 17:37:33 +02:00
|
|
|
/** If an exit wasn't explicitly specified for <b>conn</b>, consider saving
|
|
|
|
* the exit that we *did* choose for use by future connections to
|
|
|
|
* <b>conn</b>'s destination.
|
|
|
|
*/
|
2005-02-22 01:53:08 +01:00
|
|
|
static void
|
2011-07-20 18:55:42 +02:00
|
|
|
consider_recording_trackhost(const entry_connection_t *conn,
|
2011-07-06 22:30:02 +02:00
|
|
|
const origin_circuit_t *circ)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2011-06-14 19:01:38 +02:00
|
|
|
const or_options_t *options = get_options();
|
2011-05-15 17:41:49 +02:00
|
|
|
char *new_address = NULL;
|
2005-12-05 01:15:42 +01:00
|
|
|
char fp[HEX_DIGEST_LEN+1];
|
2005-02-22 01:53:08 +01:00
|
|
|
|
|
|
|
/* Search the addressmap for this conn's destination. */
|
2016-01-26 03:45:01 +01:00
|
|
|
/* If they're not in the address map.. */
|
2005-02-22 01:53:08 +01:00
|
|
|
if (!options->TrackHostExits ||
|
2008-09-29 16:53:53 +02:00
|
|
|
addressmap_have_mapping(conn->socks_request->address,
|
|
|
|
options->TrackHostExitsExpire))
|
2005-02-22 01:53:08 +01:00
|
|
|
return; /* nothing to track, or already mapped */
|
|
|
|
|
2011-05-13 22:22:10 +02:00
|
|
|
if (!hostname_in_track_host_exits(options, conn->socks_request->address) ||
|
|
|
|
!circ->build_state->chosen_exit)
|
2005-02-22 01:53:08 +01:00
|
|
|
return;
|
|
|
|
|
2005-12-05 01:15:42 +01:00
|
|
|
/* write down the fingerprint of the chosen exit, not the nickname,
|
2006-03-19 02:21:59 +01:00
|
|
|
* because the chosen exit might not be named. */
|
2005-12-05 01:15:42 +01:00
|
|
|
base16_encode(fp, sizeof(fp),
|
|
|
|
circ->build_state->chosen_exit->identity_digest, DIGEST_LEN);
|
|
|
|
|
2005-02-22 01:53:08 +01:00
|
|
|
/* Add this exit/hostname pair to the addressmap. */
|
2011-05-15 17:41:49 +02:00
|
|
|
tor_asprintf(&new_address, "%s.%s.exit",
|
2005-12-05 01:15:42 +01:00
|
|
|
conn->socks_request->address, fp);
|
2005-02-22 01:53:08 +01:00
|
|
|
|
|
|
|
addressmap_register(conn->socks_request->address, new_address,
|
2008-02-21 19:45:11 +01:00
|
|
|
time(NULL) + options->TrackHostExitsExpire,
|
2011-11-26 01:46:11 +01:00
|
|
|
ADDRMAPSRC_TRACKEXIT, 0, 0);
|
2005-02-22 01:53:08 +01:00
|
|
|
}
|
|
|
|
|
2007-04-30 16:09:11 +02:00
|
|
|
/** Attempt to attach the connection <b>conn</b> to <b>circ</b>, and send a
|
|
|
|
* begin or resolve cell as appropriate. Return values are as for
|
|
|
|
* connection_ap_handshake_attach_circuit. The stream will exit from the hop
|
2007-05-01 01:24:38 +02:00
|
|
|
* indicated by <b>cpath</b>, or from the last hop in circ's cpath if
|
2007-04-30 16:09:11 +02:00
|
|
|
* <b>cpath</b> is NULL. */
|
2005-03-12 05:22:01 +01:00
|
|
|
int
|
2011-07-20 18:55:42 +02:00
|
|
|
connection_ap_handshake_attach_chosen_circuit(entry_connection_t *conn,
|
2007-04-30 13:10:45 +02:00
|
|
|
origin_circuit_t *circ,
|
|
|
|
crypt_path_t *cpath)
|
2005-03-12 05:22:01 +01:00
|
|
|
{
|
2011-07-20 18:55:42 +02:00
|
|
|
connection_t *base_conn = ENTRY_TO_CONN(conn);
|
2005-03-12 05:22:01 +01:00
|
|
|
tor_assert(conn);
|
2011-07-20 18:55:42 +02:00
|
|
|
tor_assert(base_conn->state == AP_CONN_STATE_CIRCUIT_WAIT ||
|
|
|
|
base_conn->state == AP_CONN_STATE_CONTROLLER_WAIT);
|
2005-03-12 05:22:01 +01:00
|
|
|
tor_assert(conn->socks_request);
|
|
|
|
tor_assert(circ);
|
2012-10-12 18:22:13 +02:00
|
|
|
tor_assert(circ->base_.state == CIRCUIT_STATE_OPEN);
|
2005-03-24 07:05:14 +01:00
|
|
|
|
2011-07-20 18:55:42 +02:00
|
|
|
base_conn->state = AP_CONN_STATE_CIRCUIT_WAIT;
|
2005-03-12 05:22:01 +01:00
|
|
|
|
2015-09-01 18:30:48 +02:00
|
|
|
if (!circ->base_.timestamp_dirty ||
|
|
|
|
((conn->entry_cfg.isolation_flags & ISO_SOCKSAUTH) &&
|
|
|
|
(conn->entry_cfg.socks_iso_keep_alive) &&
|
|
|
|
(conn->socks_request->usernamelen ||
|
|
|
|
conn->socks_request->passwordlen))) {
|
2015-03-27 20:57:37 +01:00
|
|
|
/* When stream isolation is in use and controlled by an application
|
|
|
|
* we are willing to keep using the stream. */
|
|
|
|
circ->base_.timestamp_dirty = approx_time();
|
|
|
|
}
|
2005-03-12 05:22:01 +01:00
|
|
|
|
2013-01-19 04:37:16 +01:00
|
|
|
pathbias_count_use_attempt(circ);
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Now, actually link the connection. */
|
2007-04-30 13:10:45 +02:00
|
|
|
link_apconn_to_circ(conn, circ, cpath);
|
2016-10-27 18:03:52 +02:00
|
|
|
|
2005-03-12 05:22:01 +01:00
|
|
|
tor_assert(conn->socks_request);
|
2007-10-28 09:16:19 +01:00
|
|
|
if (conn->socks_request->command == SOCKS_COMMAND_CONNECT) {
|
|
|
|
if (!conn->use_begindir)
|
2006-12-13 01:28:56 +01:00
|
|
|
consider_recording_trackhost(conn, circ);
|
2007-10-28 09:16:19 +01:00
|
|
|
if (connection_ap_handshake_send_begin(conn) < 0)
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
if (connection_ap_handshake_send_resolve(conn) < 0)
|
|
|
|
return -1;
|
2005-03-12 05:22:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2017-12-02 03:28:16 +01:00
|
|
|
/**
|
|
|
|
* Return an appropriate circuit purpose for non-rend streams.
|
|
|
|
* We don't handle rends here because a rend stream triggers two
|
|
|
|
* circuit builds with different purposes, so it is handled elsewhere.
|
|
|
|
*
|
|
|
|
* This function just figures out what type of hsdir activity this is,
|
|
|
|
* and tells us. Everything else is general.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
connection_ap_get_nonrend_circ_purpose(const entry_connection_t *conn)
|
|
|
|
{
|
|
|
|
const connection_t *base_conn = ENTRY_TO_CONN(conn);
|
|
|
|
tor_assert_nonfatal(!connection_edge_is_rendezvous_stream(
|
|
|
|
ENTRY_TO_EDGE_CONN(conn)));
|
|
|
|
|
|
|
|
if (base_conn->linked_conn &&
|
|
|
|
base_conn->linked_conn->type == CONN_TYPE_DIR) {
|
|
|
|
/* Set a custom purpose for hsdir activity */
|
|
|
|
if (base_conn->linked_conn->purpose == DIR_PURPOSE_UPLOAD_RENDDESC_V2 ||
|
|
|
|
base_conn->linked_conn->purpose == DIR_PURPOSE_UPLOAD_HSDESC) {
|
|
|
|
return CIRCUIT_PURPOSE_S_HSDIR_POST;
|
|
|
|
} else if (base_conn->linked_conn->purpose
|
|
|
|
== DIR_PURPOSE_FETCH_RENDDESC_V2 ||
|
|
|
|
base_conn->linked_conn->purpose
|
|
|
|
== DIR_PURPOSE_FETCH_HSDESC) {
|
|
|
|
return CIRCUIT_PURPOSE_C_HSDIR_GET;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* All other purposes are general for now */
|
|
|
|
return CIRCUIT_PURPOSE_C_GENERAL;
|
|
|
|
}
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/** Try to find a safe live circuit for stream <b>conn</b>. If we find one,
|
|
|
|
* attach the stream, send appropriate cells, and return 1. Otherwise,
|
|
|
|
* try to launch new circuit(s) for the stream. If we can launch
|
|
|
|
* circuits, return 0. Otherwise, if we simply can't proceed with
|
|
|
|
* this stream, return -1. (conn needs to die, and is maybe already marked).
|
2004-05-13 09:24:49 +02:00
|
|
|
*/
|
2008-12-18 17:11:24 +01:00
|
|
|
/* XXXX this function should mark for close whenever it returns -1;
|
2008-03-17 04:37:54 +01:00
|
|
|
* its callers shouldn't have to worry about that. */
|
2005-06-11 20:52:12 +02:00
|
|
|
int
|
2011-07-20 18:55:42 +02:00
|
|
|
connection_ap_handshake_attach_circuit(entry_connection_t *conn)
|
2005-06-11 20:52:12 +02:00
|
|
|
{
|
2011-07-20 18:55:42 +02:00
|
|
|
connection_t *base_conn = ENTRY_TO_CONN(conn);
|
2004-05-13 09:24:49 +02:00
|
|
|
int retval;
|
|
|
|
int conn_age;
|
2007-03-01 04:56:21 +01:00
|
|
|
int want_onehop;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
|
|
|
tor_assert(conn);
|
2011-07-20 18:55:42 +02:00
|
|
|
tor_assert(base_conn->state == AP_CONN_STATE_CIRCUIT_WAIT);
|
2004-05-13 09:24:49 +02:00
|
|
|
tor_assert(conn->socks_request);
|
2007-10-28 09:16:19 +01:00
|
|
|
want_onehop = conn->want_onehop;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2011-07-20 18:55:42 +02:00
|
|
|
conn_age = (int)(time(NULL) - base_conn->timestamp_created);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Is this connection so old that we should give up on it? */
|
2007-08-19 09:17:40 +02:00
|
|
|
if (conn_age >= get_options()->SocksTimeout) {
|
2011-07-20 18:55:42 +02:00
|
|
|
int severity = (tor_addr_is_null(&base_conn->addr) && !base_conn->port) ?
|
2008-08-05 22:08:19 +02:00
|
|
|
LOG_INFO : LOG_NOTICE;
|
2007-08-19 09:17:40 +02:00
|
|
|
log_fn(severity, LD_APP,
|
|
|
|
"Tried for %d seconds to get a connection to %s:%d. Giving up.",
|
2009-12-15 23:23:36 +01:00
|
|
|
conn_age, safe_str_client(conn->socks_request->address),
|
2007-08-19 09:17:40 +02:00
|
|
|
conn->socks_request->port);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* We handle "general" (non-onion) connections much more straightforwardly.
|
|
|
|
*/
|
2011-07-20 18:55:42 +02:00
|
|
|
if (!connection_edge_is_rendezvous_stream(ENTRY_TO_EDGE_CONN(conn))) {
|
|
|
|
/* we're a general conn */
|
2006-07-23 09:37:35 +02:00
|
|
|
origin_circuit_t *circ=NULL;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2016-04-13 07:08:17 +02:00
|
|
|
/* Are we linked to a dir conn that aims to fetch a consensus?
|
2016-10-27 18:03:52 +02:00
|
|
|
* We check here because the conn might no longer be needed. */
|
2016-04-13 07:08:17 +02:00
|
|
|
if (base_conn->linked_conn &&
|
|
|
|
base_conn->linked_conn->type == CONN_TYPE_DIR &&
|
|
|
|
base_conn->linked_conn->purpose == DIR_PURPOSE_FETCH_CONSENSUS) {
|
|
|
|
|
|
|
|
/* Yes we are. Is there a consensus fetch farther along than us? */
|
|
|
|
if (networkstatus_consensus_is_already_downloading(
|
|
|
|
TO_DIR_CONN(base_conn->linked_conn)->requested_resource)) {
|
|
|
|
/* We're doing the "multiple consensus fetch attempts" game from
|
|
|
|
* proposal 210, and we're late to the party. Just close this conn.
|
|
|
|
* The circuit and TLS conn that we made will time out after a while
|
|
|
|
* if nothing else wants to use them. */
|
|
|
|
log_info(LD_DIR, "Closing extra consensus fetch (to %s) since one "
|
|
|
|
"is already downloading.", base_conn->linked_conn->address);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* If we have a chosen exit, we need to use a circuit that's
|
|
|
|
* open to that exit. See what exit we meant, and whether we can use it.
|
|
|
|
*/
|
2004-11-30 09:39:14 +01:00
|
|
|
if (conn->chosen_exit_name) {
|
2017-08-23 01:04:31 +02:00
|
|
|
const node_t *node = node_get_by_nickname(conn->chosen_exit_name, 0);
|
2008-12-17 15:59:28 +01:00
|
|
|
int opt = conn->chosen_exit_optional;
|
Initial conversion to use node_t throughout our codebase.
A node_t is an abstraction over routerstatus_t, routerinfo_t, and
microdesc_t. It should try to present a consistent interface to all
of them. There should be a node_t for a server whenever there is
* A routerinfo_t for it in the routerlist
* A routerstatus_t in the current_consensus.
(note that a microdesc_t alone isn't enough to make a node_t exist,
since microdescriptors aren't usable on their own.)
There are three ways to get a node_t right now: looking it up by ID,
looking it up by nickname, and iterating over the whole list of
microdescriptors.
All (or nearly all) functions that are supposed to return "a router"
-- especially those used in building connections and circuits --
should return a node_t, not a routerinfo_t or a routerstatus_t.
A node_t should hold all the *mutable* flags about a node. This
patch moves the is_foo flags from routerinfo_t into node_t. The
flags in routerstatus_t remain, but they get set from the consensus
and should not change.
Some other highlights of this patch are:
* Looking up routerinfo and routerstatus by nickname is now
unified and based on the "look up a node by nickname" function.
This tries to look only at the values from current consensus,
and not get confused by the routerinfo_t->is_named flag, which
could get set for other weird reasons. This changes the
behavior of how authorities (when acting as clients) deal with
nodes that have been listed by nickname.
* I tried not to artificially increase the size of the diff here
by moving functions around. As a result, some functions that
now operate on nodes are now in the wrong file -- they should
get moved to nodelist.c once this refactoring settles down.
This moving should happen as part of a patch that moves
functions AND NOTHING ELSE.
* Some old code is now left around inside #if 0/1 blocks, and
should get removed once I've verified that I don't want it
sitting around to see how we used to do things.
There are still some unimplemented functions: these are flagged
with "UNIMPLEMENTED_NODELIST()." I'll work on filling in the
implementation here, piece by piece.
I wish this patch could have been smaller, but there did not seem to
be any piece of it that was independent from the rest. Moving flags
forces many functions that once returned routerinfo_t * to return
node_t *, which forces their friends to change, and so on.
2010-09-29 21:00:41 +02:00
|
|
|
if (!node && !want_onehop) {
|
2008-09-09 10:41:58 +02:00
|
|
|
/* We ran into this warning when trying to extend a circuit to a
|
|
|
|
* hidden service directory for which we didn't have a router
|
|
|
|
* descriptor. See flyspray task 767 for more details. We should
|
|
|
|
* keep this in mind when deciding to use BEGIN_DIR cells for other
|
|
|
|
* directory requests as well. -KL*/
|
2006-07-18 02:59:46 +02:00
|
|
|
log_fn(opt ? LOG_INFO : LOG_WARN, LD_APP,
|
|
|
|
"Requested exit point '%s' is not known. %s.",
|
|
|
|
conn->chosen_exit_name, opt ? "Trying others" : "Closing");
|
|
|
|
if (opt) {
|
2016-10-27 18:03:52 +02:00
|
|
|
/* If we are allowed to ignore the .exit request, do so */
|
2008-12-17 15:59:28 +01:00
|
|
|
conn->chosen_exit_optional = 0;
|
2006-07-18 02:59:46 +02:00
|
|
|
tor_free(conn->chosen_exit_name);
|
|
|
|
return 0;
|
|
|
|
}
|
2004-11-30 09:39:14 +01:00
|
|
|
return -1;
|
|
|
|
}
|
2011-04-27 20:36:30 +02:00
|
|
|
if (node && !connection_ap_can_use_exit(conn, node)) {
|
2006-07-18 02:59:46 +02:00
|
|
|
log_fn(opt ? LOG_INFO : LOG_WARN, LD_APP,
|
2011-04-27 01:55:34 +02:00
|
|
|
"Requested exit point '%s' is excluded or "
|
|
|
|
"would refuse request. %s.",
|
2006-07-18 02:59:46 +02:00
|
|
|
conn->chosen_exit_name, opt ? "Trying others" : "Closing");
|
|
|
|
if (opt) {
|
2016-10-27 18:03:52 +02:00
|
|
|
/* If we are allowed to ignore the .exit request, do so */
|
2008-12-17 15:59:28 +01:00
|
|
|
conn->chosen_exit_optional = 0;
|
2006-07-18 02:59:46 +02:00
|
|
|
tor_free(conn->chosen_exit_name);
|
|
|
|
return 0;
|
|
|
|
}
|
2004-11-30 09:39:14 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* Find the circuit that we should use, if there is one. Otherwise
|
2017-12-02 03:28:16 +01:00
|
|
|
* launch it
|
|
|
|
*/
|
|
|
|
retval = circuit_get_open_circ_or_launch(conn,
|
|
|
|
connection_ap_get_nonrend_circ_purpose(conn),
|
|
|
|
&circ);
|
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
if (retval < 1) {
|
|
|
|
/* We were either told "-1" (complete failure) or 0 (circuit in
|
|
|
|
* progress); we can't attach this stream yet. */
|
2004-05-13 09:24:49 +02:00
|
|
|
return retval;
|
2016-10-27 18:03:52 +02:00
|
|
|
}
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2006-02-13 09:28:42 +01:00
|
|
|
log_debug(LD_APP|LD_CIRC,
|
2013-03-10 13:32:58 +01:00
|
|
|
"Attaching apconn to circ %u (stream %d sec old).",
|
|
|
|
(unsigned)circ->base_.n_circ_id, conn_age);
|
2016-12-10 01:13:11 +01:00
|
|
|
/* print the circ's path, so clients can figure out which circs are
|
2005-12-14 21:40:40 +01:00
|
|
|
* sucking. */
|
2005-10-25 09:04:36 +02:00
|
|
|
circuit_log_path(LOG_INFO,LD_APP|LD_CIRC,circ);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2016-10-27 18:03:52 +02:00
|
|
|
/* We have found a suitable circuit for our conn. Hurray. Do
|
|
|
|
* the attachment. */
|
2007-04-30 13:10:45 +02:00
|
|
|
return connection_ap_handshake_attach_chosen_circuit(conn, circ, NULL);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
|
|
|
} else { /* we're a rendezvous conn */
|
2006-07-23 09:37:35 +02:00
|
|
|
origin_circuit_t *rendcirc=NULL, *introcirc=NULL;
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2011-07-20 18:55:42 +02:00
|
|
|
tor_assert(!ENTRY_TO_EDGE_CONN(conn)->cpath_layer);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
|
|
|
/* start by finding a rendezvous circuit for us */
|
|
|
|
|
2005-12-14 21:40:40 +01:00
|
|
|
retval = circuit_get_open_circ_or_launch(
|
|
|
|
conn, CIRCUIT_PURPOSE_C_REND_JOINED, &rendcirc);
|
2004-11-28 10:05:49 +01:00
|
|
|
if (retval < 0) return -1; /* failed */
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2004-11-28 10:05:49 +01:00
|
|
|
if (retval > 0) {
|
2004-10-12 00:19:12 +02:00
|
|
|
tor_assert(rendcirc);
|
2004-05-13 09:24:49 +02:00
|
|
|
/* one is already established, attach */
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_REND,
|
2017-09-25 22:20:15 +02:00
|
|
|
"rend joined circ %u (id: %" PRIu32 ") already here. "
|
|
|
|
"Attaching. (stream %d sec old)",
|
|
|
|
(unsigned) TO_CIRCUIT(rendcirc)->n_circ_id,
|
|
|
|
rendcirc->global_identifier, conn_age);
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
/* Mark rendezvous circuits as 'newly dirty' every time you use
|
|
|
|
* them, since the process of rebuilding a rendezvous circ is so
|
2009-05-27 23:55:51 +02:00
|
|
|
* expensive. There is a tradeoff between linkability and
|
Introduce a notion of 'internal' circs, which are chosen without regard
to the exit policy of the last hop. Intro and rendezvous circs must
be internal circs, to avoid leaking information. Resolve and connect
streams can use internal circs if they want.
New circuit pooling algorithm: make sure to have enough circs around
to satisfy any predicted ports, and also make sure to have 2 internal
circs around if we've required internal circs lately (with high uptime
if we've seen that lately).
Split NewCircuitPeriod config option into NewCircuitPeriod (30 secs),
which describes how often we retry making new circuits if current ones
are dirty, and MaxCircuitDirtiness (10 mins), which describes how long
we're willing to make use of an already-dirty circuit.
Once rendezvous circuits are established, keep using the same circuit as
long as you attach a new stream to it at least every 10 minutes. (So web
browsing doesn't require you to build new rend circs every 30 seconds.)
Cannibalize GENERAL circs to be C_REND, C_INTRO, S_INTRO, and S_REND
circ as necessary, if there are any completed ones lying around when
we try to launch one.
Re-instate the ifdef's to use version-0 style introduce cells, since
there was yet another bug in handling version-1 style. We'll try switching
over again after 0.0.9 is obsolete.
Bugfix: when choosing an exit node for a new non-internal circ, don't take
into account whether it'll be useful for any pending x.onion addresses --
it won't.
Bugfix: we weren't actually publishing the hidden service descriptor when
it became dirty. So we only published it every 20 minutes or so, which
means when you first start your Tor, the hidden service will seem broken.
svn:r3360
2005-01-17 19:13:09 +01:00
|
|
|
* feasibility, at this point.
|
|
|
|
*/
|
2012-10-12 18:22:13 +02:00
|
|
|
rendcirc->base_.timestamp_dirty = time(NULL);
|
2013-01-19 04:37:16 +01:00
|
|
|
|
|
|
|
/* We've also attempted to use them. If they fail, we need to
|
|
|
|
* probe them for path bias */
|
|
|
|
pathbias_count_use_attempt(rendcirc);
|
|
|
|
|
2007-04-30 13:10:45 +02:00
|
|
|
link_apconn_to_circ(conn, rendcirc, NULL);
|
2007-03-24 16:58:11 +01:00
|
|
|
if (connection_ap_handshake_send_begin(conn) < 0)
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0; /* already marked, let them fade away */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-06-25 17:10:43 +02:00
|
|
|
/* At this point we need to re-check the state, since it's possible that
|
|
|
|
* our call to circuit_get_open_circ_or_launch() changed the connection's
|
|
|
|
* state from "CIRCUIT_WAIT" to "RENDDESC_WAIT" because we decided to
|
|
|
|
* re-fetch the descriptor.
|
|
|
|
*/
|
|
|
|
if (ENTRY_TO_CONN(conn)->state != AP_CONN_STATE_CIRCUIT_WAIT) {
|
|
|
|
log_info(LD_REND, "This connection is no longer ready to attach; its "
|
|
|
|
"state changed."
|
|
|
|
"(We probably have to re-fetch its descriptor.)");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-10-12 18:22:13 +02:00
|
|
|
if (rendcirc && (rendcirc->base_.purpose ==
|
2005-12-14 21:40:40 +01:00
|
|
|
CIRCUIT_PURPOSE_C_REND_READY_INTRO_ACKED)) {
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_REND,
|
2017-09-25 22:20:15 +02:00
|
|
|
"pending-join circ %u (id: %" PRIu32 ") already here, with "
|
|
|
|
"intro ack. Stalling. (stream %d sec old)",
|
|
|
|
(unsigned) TO_CIRCUIT(rendcirc)->n_circ_id,
|
|
|
|
rendcirc->global_identifier, conn_age);
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* it's on its way. find an intro circ. */
|
2005-12-14 21:40:40 +01:00
|
|
|
retval = circuit_get_open_circ_or_launch(
|
|
|
|
conn, CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT, &introcirc);
|
2004-11-28 10:05:49 +01:00
|
|
|
if (retval < 0) return -1; /* failed */
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2004-11-28 10:05:49 +01:00
|
|
|
if (retval > 0) {
|
2004-05-13 09:24:49 +02:00
|
|
|
/* one has already sent the intro. keep waiting. */
|
2004-10-12 00:19:12 +02:00
|
|
|
tor_assert(introcirc);
|
2017-09-25 22:20:15 +02:00
|
|
|
log_info(LD_REND, "Intro circ %u (id: %" PRIu32 ") present and "
|
|
|
|
"awaiting ACK. Rend circuit %u (id: %" PRIu32 "). "
|
|
|
|
"Stalling. (stream %d sec old)",
|
|
|
|
(unsigned) TO_CIRCUIT(introcirc)->n_circ_id,
|
|
|
|
introcirc->global_identifier,
|
|
|
|
rendcirc ? (unsigned) TO_CIRCUIT(rendcirc)->n_circ_id : 0,
|
|
|
|
rendcirc ? rendcirc->global_identifier : 0,
|
2006-02-13 09:28:42 +01:00
|
|
|
conn_age);
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2004-10-12 00:19:12 +02:00
|
|
|
/* now rendcirc and introcirc are each either undefined or not finished */
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2005-12-14 21:40:40 +01:00
|
|
|
if (rendcirc && introcirc &&
|
2012-10-12 18:22:13 +02:00
|
|
|
rendcirc->base_.purpose == CIRCUIT_PURPOSE_C_REND_READY) {
|
2006-02-13 09:28:42 +01:00
|
|
|
log_info(LD_REND,
|
2017-09-25 22:20:15 +02:00
|
|
|
"ready rend circ %u (id: %" PRIu32 ") already here. No"
|
|
|
|
"intro-ack yet on intro %u (id: %" PRIu32 "). "
|
|
|
|
"(stream %d sec old)",
|
|
|
|
(unsigned) TO_CIRCUIT(rendcirc)->n_circ_id,
|
|
|
|
rendcirc->global_identifier,
|
|
|
|
(unsigned) TO_CIRCUIT(introcirc)->n_circ_id,
|
|
|
|
introcirc->global_identifier, conn_age);
|
2004-05-13 09:24:49 +02:00
|
|
|
|
2012-10-12 18:22:13 +02:00
|
|
|
tor_assert(introcirc->base_.purpose == CIRCUIT_PURPOSE_C_INTRODUCING);
|
|
|
|
if (introcirc->base_.state == CIRCUIT_STATE_OPEN) {
|
2017-07-21 22:31:27 +02:00
|
|
|
int ret;
|
2017-09-25 22:20:15 +02:00
|
|
|
log_info(LD_REND, "Found open intro circ %u (id: %" PRIu32 "). "
|
|
|
|
"Rend circuit %u (id: %" PRIu32 "); Sending "
|
|
|
|
"introduction. (stream %d sec old)",
|
|
|
|
(unsigned) TO_CIRCUIT(introcirc)->n_circ_id,
|
|
|
|
introcirc->global_identifier,
|
|
|
|
(unsigned) TO_CIRCUIT(rendcirc)->n_circ_id,
|
|
|
|
rendcirc->global_identifier, conn_age);
|
2017-07-21 22:31:27 +02:00
|
|
|
ret = hs_client_send_introduce1(introcirc, rendcirc);
|
|
|
|
switch (ret) {
|
2011-04-25 17:36:02 +02:00
|
|
|
case 0: /* success */
|
2012-10-12 18:22:13 +02:00
|
|
|
rendcirc->base_.timestamp_dirty = time(NULL);
|
|
|
|
introcirc->base_.timestamp_dirty = time(NULL);
|
2013-01-19 04:37:16 +01:00
|
|
|
|
|
|
|
pathbias_count_use_attempt(introcirc);
|
|
|
|
pathbias_count_use_attempt(rendcirc);
|
|
|
|
|
2011-04-25 17:36:02 +02:00
|
|
|
assert_circuit_ok(TO_CIRCUIT(rendcirc));
|
|
|
|
assert_circuit_ok(TO_CIRCUIT(introcirc));
|
|
|
|
return 0;
|
|
|
|
case -1: /* transient error */
|
|
|
|
return 0;
|
|
|
|
case -2: /* permanent error */
|
2004-05-13 09:24:49 +02:00
|
|
|
return -1;
|
2011-04-25 17:36:02 +02:00
|
|
|
default: /* oops */
|
|
|
|
tor_fragile_assert();
|
2004-05-13 09:24:49 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-25 22:20:15 +02:00
|
|
|
log_info(LD_REND, "Intro %u (id: %" PRIu32 ") and rend circuit %u "
|
|
|
|
"(id: %" PRIu32 ") circuits are not both ready. "
|
|
|
|
"Stalling conn. (%d sec old)",
|
|
|
|
introcirc ? (unsigned) TO_CIRCUIT(introcirc)->n_circ_id : 0,
|
|
|
|
introcirc ? introcirc->global_identifier : 0,
|
|
|
|
rendcirc ? (unsigned) TO_CIRCUIT(rendcirc)->n_circ_id : 0,
|
|
|
|
rendcirc ? rendcirc->global_identifier : 0, conn_age);
|
2004-05-13 09:24:49 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2005-06-09 21:03:31 +02:00
|
|
|
|
2011-11-24 15:52:38 +01:00
|
|
|
/** Change <b>circ</b>'s purpose to <b>new_purpose</b>. */
|
|
|
|
void
|
|
|
|
circuit_change_purpose(circuit_t *circ, uint8_t new_purpose)
|
|
|
|
{
|
2011-11-24 15:54:55 +01:00
|
|
|
uint8_t old_purpose;
|
2011-11-24 15:52:38 +01:00
|
|
|
/* Don't allow an OR circ to become an origin circ or vice versa. */
|
|
|
|
tor_assert(!!(CIRCUIT_IS_ORIGIN(circ)) ==
|
|
|
|
!!(CIRCUIT_PURPOSE_IS_ORIGIN(new_purpose)));
|
|
|
|
|
|
|
|
if (circ->purpose == new_purpose) return;
|
|
|
|
|
|
|
|
if (CIRCUIT_IS_ORIGIN(circ)) {
|
2011-11-24 15:54:55 +01:00
|
|
|
char old_purpose_desc[80] = "";
|
2011-11-24 15:52:38 +01:00
|
|
|
|
2011-11-24 15:54:55 +01:00
|
|
|
strncpy(old_purpose_desc, circuit_purpose_to_string(circ->purpose), 80-1);
|
|
|
|
old_purpose_desc[80-1] = '\0';
|
2011-11-24 15:52:38 +01:00
|
|
|
|
|
|
|
log_debug(LD_CIRC,
|
|
|
|
"changing purpose of origin circ %d "
|
|
|
|
"from \"%s\" (%d) to \"%s\" (%d)",
|
|
|
|
TO_ORIGIN_CIRCUIT(circ)->global_identifier,
|
2011-11-24 15:54:55 +01:00
|
|
|
old_purpose_desc,
|
2011-11-24 15:52:38 +01:00
|
|
|
circ->purpose,
|
|
|
|
circuit_purpose_to_string(new_purpose),
|
|
|
|
new_purpose);
|
|
|
|
}
|
|
|
|
|
2011-11-24 15:54:55 +01:00
|
|
|
old_purpose = circ->purpose;
|
2011-11-24 15:52:38 +01:00
|
|
|
circ->purpose = new_purpose;
|
2011-11-24 15:54:55 +01:00
|
|
|
|
|
|
|
if (CIRCUIT_IS_ORIGIN(circ)) {
|
2012-01-11 16:28:20 +01:00
|
|
|
control_event_circuit_purpose_changed(TO_ORIGIN_CIRCUIT(circ),
|
|
|
|
old_purpose);
|
2011-11-24 15:54:55 +01:00
|
|
|
}
|
2011-11-24 15:52:38 +01:00
|
|
|
}
|
|
|
|
|
2013-02-20 00:29:17 +01:00
|
|
|
/** Mark <b>circ</b> so that no more connections can be attached to it. */
|
|
|
|
void
|
|
|
|
mark_circuit_unusable_for_new_conns(origin_circuit_t *circ)
|
|
|
|
{
|
|
|
|
const or_options_t *options = get_options();
|
|
|
|
tor_assert(circ);
|
|
|
|
|
2016-05-30 22:18:16 +02:00
|
|
|
/* XXXX This is a kludge; we're only keeping it around in case there's
|
2013-02-20 00:29:17 +01:00
|
|
|
* something that doesn't check unusable_for_new_conns, and to avoid
|
|
|
|
* deeper refactoring of our expiration logic. */
|
|
|
|
if (! circ->base_.timestamp_dirty)
|
|
|
|
circ->base_.timestamp_dirty = approx_time();
|
|
|
|
if (options->MaxCircuitDirtiness >= circ->base_.timestamp_dirty)
|
|
|
|
circ->base_.timestamp_dirty = 1; /* prevent underflow */
|
|
|
|
else
|
|
|
|
circ->base_.timestamp_dirty -= options->MaxCircuitDirtiness;
|
|
|
|
|
|
|
|
circ->unusable_for_new_conns = 1;
|
|
|
|
}
|
2013-03-20 19:03:18 +01:00
|
|
|
|