mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-11 21:53:48 +01:00
237 lines
11 KiB
Markdown
237 lines
11 KiB
Markdown
|
|
||
|
## Data flow in the Tor process ##
|
||
|
|
||
|
We read bytes from the network, we write bytes to the network. For the
|
||
|
most part, the bytes we write correspond roughly to bytes we have read,
|
||
|
with bits of cryptography added in.
|
||
|
|
||
|
The rest is a matter of details.
|
||
|
|
||
|
![Diagram of main data flows in Tor](./diagrams/02/02-dataflow.png "Diagram of main data flows in Tor")
|
||
|
|
||
|
### Connections and buffers: reading, writing, and interpreting. ###
|
||
|
|
||
|
At a low level, Tor's networking code is based on "connections". Each
|
||
|
connection represents an object that can send or receive network-like
|
||
|
events. For the most part, each connection has a single underlying TCP
|
||
|
stream (I'll discuss counterexamples below).
|
||
|
|
||
|
A connection that behaves like a TCP stream has an input buffer and an
|
||
|
output buffer. Incoming data is
|
||
|
written into the input buffer ("inbuf"); data to be written to the
|
||
|
network is queued on an output buffer ("outbuf").
|
||
|
|
||
|
Buffers are implemented in buffers.c. Each of these buffers is
|
||
|
implemented as a linked queue of memory extents, in the style of classic
|
||
|
BSD mbufs, or Linux skbufs.
|
||
|
|
||
|
A connection's reading and writing can be enabled or disabled. Under
|
||
|
the hood, this functionality is implemented using libevent events: one
|
||
|
for reading, one for writing. These events are turned on/off in
|
||
|
main.c, in the functions connection_{start,stop}_{reading,writing}.
|
||
|
|
||
|
When a read or write event is turned on, the main libevent loop polls
|
||
|
the kernel, asking which sockets are ready to read or write. (This
|
||
|
polling happens in the event_base_loop() call in run_main_loop_once()
|
||
|
in main.c.) When libevent finds a socket that's ready to read or write,
|
||
|
it invokes conn_{read,write}_callback(), also in main.c
|
||
|
|
||
|
These callback functions delegate to connection_handle_read() and
|
||
|
connection_handle_write() in connection.c, which read or write on the
|
||
|
network as appropriate, possibly delegating to openssl.
|
||
|
|
||
|
After data is read or written, or other event occurs, these
|
||
|
connection_handle_read_write() functions call logic functions whose job is
|
||
|
to respond to the information. Some examples included:
|
||
|
|
||
|
* connection_flushed_some() -- called after a connection writes any
|
||
|
amount of data from its outbuf.
|
||
|
* connection_finished_flushing() -- called when a connection has
|
||
|
emptied its outbuf.
|
||
|
* connection_finished_connecting() -- called when an in-process connection
|
||
|
finishes making a remote connection.
|
||
|
* connection_reached_eof() -- called after receiving a FIN from the
|
||
|
remote server.
|
||
|
* connection_process_inbuf() -- called when more data arrives on
|
||
|
the inbuf.
|
||
|
|
||
|
These functions then call into specific implementations depending on
|
||
|
the type of the connection. For example, if the connection is an
|
||
|
edge_connection_t, connection_reached_eof() will call
|
||
|
connection_edge_reached_eof().
|
||
|
|
||
|
> **Note:** "Also there are bufferevents!" We have vestigial
|
||
|
> code for an alternative low-level networking
|
||
|
> implementation, based on Libevent's evbuffer and bufferevent
|
||
|
> code. These two object types take on (most of) the roles of
|
||
|
> buffers and connections respectively. It isn't working in today's
|
||
|
> Tor, due to code rot and possible lingering libevent bugs. More
|
||
|
> work is needed; it would be good to get this working efficiently
|
||
|
> again, to have IOCP support on Windows.
|
||
|
|
||
|
|
||
|
#### Controlling connections ####
|
||
|
|
||
|
A connection can have reading or writing enabled or disabled for a
|
||
|
wide variety of reasons, including:
|
||
|
|
||
|
* Writing is disabled when there is no more data to write
|
||
|
* For some connection types, reading is disabled when the inbuf is
|
||
|
too full.
|
||
|
* Reading/writing is temporarily disabled on connections that have
|
||
|
recently read/written enough data up to their bandwidth
|
||
|
* Reading is disabled on connections when reading more data from them
|
||
|
would require that data to be buffered somewhere else that is
|
||
|
already full.
|
||
|
|
||
|
Currently, these conditions are checked in a diffuse set of
|
||
|
increasingly complex conditional expressions. In the future, it could
|
||
|
be helpful to transition to a unified model for handling temporary
|
||
|
read/write suspensions.
|
||
|
|
||
|
#### Kinds of connections ####
|
||
|
|
||
|
Today Tor has the following connection and pseudoconnection types.
|
||
|
For the most part, each type of channel has an associated C module
|
||
|
that implements its underlying logic.
|
||
|
|
||
|
**Edge connections** receive data from and deliver data to points
|
||
|
outside the onion routing network. See `connection_edge.c`. They fall into two types:
|
||
|
|
||
|
**Entry connections** are a type of edge connection. They receive data
|
||
|
from the user running a Tor client, and deliver data to that user.
|
||
|
They are used to implement SOCKSPort, TransPort, NATDPort, and so on.
|
||
|
Sometimes they are called "AP" connections for historical reasons (it
|
||
|
used to stand for "Application Proxy").
|
||
|
|
||
|
**Exit connections** are a type of edge connection. They exist at an
|
||
|
exit node, and transmit traffic to and from the network.
|
||
|
|
||
|
(Entry connections and exit connections are also used as placeholders
|
||
|
when performing a remote DNS request; they are not decoupled from the
|
||
|
notion of "stream" in the Tor protocol. This is implemented partially
|
||
|
in `connection_edge.c`, and partially in `dnsserv.c` and `dns.c`.)
|
||
|
|
||
|
**OR connections** send and receive Tor cells over TLS, using some
|
||
|
version of the Tor link protocol. Their implementation is spread
|
||
|
across `connection_or.c`, with a bit of logic in `command.c`,
|
||
|
`relay.c`, and `channeltls.c`.
|
||
|
|
||
|
**Extended OR connections** are a type of OR connection for use on
|
||
|
bridges using pluggable transports, so that the PT can tell the bridge
|
||
|
some information about the incoming connection before passing on its
|
||
|
data. They are implemented in `ext_orport.c`.
|
||
|
|
||
|
**Directory connections** are server-side or client-side connections
|
||
|
that implement Tor's HTTP-based directory protocol. These are
|
||
|
instantiated using a socket when Tor is making an unencrypted HTTP
|
||
|
connection. When Tor is tunneling a directory request over a Tor
|
||
|
circuit, directory connections are implemented using a linked
|
||
|
connection pair (see below). Directory connections are implemented in
|
||
|
`directory.c`; some of the server-side logic is implemented in
|
||
|
`dirserver.c`.
|
||
|
|
||
|
**Controller connections** are local connections to a controller
|
||
|
process implementing the controller protocol from
|
||
|
control-spec.txt. These are in `control.c`.
|
||
|
|
||
|
**Listener connections** are not stream oriented! Rather, they wrap a
|
||
|
listening socket in order to detect new incoming connections. They
|
||
|
bypass most of stream logic. They don't have associated buffers.
|
||
|
They are implemented in `connection.c`.
|
||
|
|
||
|
![structure hierarchy for connection types](./diagrams/02/02-connection-types.png "structure hierarchy for connection types")
|
||
|
|
||
|
>**Note**: "History Time!" You might occasionally find reference to a couple types of connections
|
||
|
> which no longer exist in modern Tor. A *CPUWorker connection*
|
||
|
>connected the main Tor process to a thread or process used for
|
||
|
>computation. (Nowadays we use in-process communication.) Even more
|
||
|
>anciently, a *DNSWorker connection* connected the main tor process to
|
||
|
>a separate thread or process used for running `gethostbyname()` or
|
||
|
>`getaddrinfo()`. (Nowadays we use Libevent's evdns facility to
|
||
|
>perform DNS requests asynchronously.)
|
||
|
|
||
|
#### Linked connections ####
|
||
|
|
||
|
Sometimes two channels are joined together, such that data which the
|
||
|
Tor process sends on one should immediately be received by the same
|
||
|
Tor process on the other. (For example, when Tor makes a tunneled
|
||
|
directory connection, this is implemented on the client side as a
|
||
|
directory connection whose output goes, not to the network, but to a
|
||
|
local entry connection. And when a directory receives a tunnelled
|
||
|
directory connection, this is implemented as an exit connection whose
|
||
|
output goes, not to the network, but to a local directory connection.)
|
||
|
|
||
|
The earliest versions of Tor to support linked connections used
|
||
|
socketpairs for the purpose. But using socketpairs forced us to copy
|
||
|
data through kernelspace, and wasted limited file descriptors. So
|
||
|
instead, a pair of connections can be linked in-process. Each linked
|
||
|
connection has a pointer to the other, such that data written on one
|
||
|
is immediately readable on the other, and vice versa.
|
||
|
|
||
|
### From connections to channels ###
|
||
|
|
||
|
There's an abstraction layer above OR connections (the ones that
|
||
|
handle cells) and below cells called **Channels**. A channel's
|
||
|
purpose is to transmit authenticated cells from one Tor instance
|
||
|
(relay or client) to another.
|
||
|
|
||
|
Currently, only one implementation exists: Channel_tls, which sends
|
||
|
and receiveds cells over a TLS-based OR connection.
|
||
|
|
||
|
Cells are sent on a channel using
|
||
|
`channel_write_{,packed_,var_}cell()`. Incoming cells arrive on a
|
||
|
channel from its backend using `channel_queue*_cell()`, and are
|
||
|
immediately processed using `channel_process_cells()`.
|
||
|
|
||
|
Some cell types are handled below the channel layer, such as those
|
||
|
that affect handshaking only. And some others are passed up to the
|
||
|
generic cross-channel code in `command.c`: cells like `DESTROY` and
|
||
|
`CREATED` are all trivial to handle. But relay cells
|
||
|
require special handling...
|
||
|
|
||
|
### From channels through circuits ###
|
||
|
|
||
|
When a relay cell arrives on an existing circuit, it is handled in
|
||
|
`circuit_receive_relay_cell()` -- one of the innermost functions in
|
||
|
Tor. This function encrypts or decrypts the relay cell as
|
||
|
appropriate, and decides whether the cell is intended for the current
|
||
|
hop of the circuit.
|
||
|
|
||
|
If the cell *is* intended for the current hop, we pass it to
|
||
|
`connection_edge_process_relay_cell()` in `relay.c`, which acts on it
|
||
|
based on its relay command, and (possibly) queues its data on an
|
||
|
`edge_connection_t`.
|
||
|
|
||
|
If the cell *is not* intended for the current hop, we queue it for the
|
||
|
next channel in sequence with `append cell_to_circuit_queue()`. This
|
||
|
places the cell on a per-circuit queue for cells headed out on that
|
||
|
particular channel.
|
||
|
|
||
|
### Sending cells on circuits: the complicated bit. ###
|
||
|
|
||
|
Relay cells are queued onto circuits from one of two (main) sources:
|
||
|
reading data from edge connections, and receiving a cell to be relayed
|
||
|
on a circuit. Both of these sources place their cells on cell queue:
|
||
|
each circuit has one cell queue for each direction that it travels.
|
||
|
|
||
|
A naive implementation would skip using cell queues, and instead write
|
||
|
each outgoing relay cell. (Tor did this in its earlier versions.)
|
||
|
But such an approach tends to give poor performance, because it allows
|
||
|
high-volume circuits to clog channels, and it forces the Tor server to
|
||
|
send data queued on a circuit even after that circuit has been closed.
|
||
|
|
||
|
So by using queues on each circuit, we can add cells to each channel
|
||
|
on a just-in-time basis, choosing the cell at each moment based on
|
||
|
a performance-aware algorithm.
|
||
|
|
||
|
This logic is implemented in two main modules: `scheduler.c` and
|
||
|
`circuitmux*.c`. The scheduler code is responsible for determining
|
||
|
globally, across all channels that could write cells, which one should
|
||
|
next receive queued cells. The circuitmux code determines, for all
|
||
|
of the circuits with queued cells for a channel, which one should
|
||
|
queue the next cell.
|
||
|
|
||
|
(This logic applies to outgoing relay cells only; incoming relay cells
|
||
|
are processed as they arrive.)
|