tor/src/or/hs_config.c

293 lines
10 KiB
C
Raw Normal View History

/* Copyright (c) 2017, The Tor Project, Inc. */
/* See LICENSE for licensing information */
/**
* \file hs_config.c
* \brief Implement hidden service configuration subsystem.
*
* \details
*
* This file has basically one main entry point: hs_config_service_all(). It
* takes the torrc options and configure hidden service from it. In validate
* mode, nothing is added to the global service list or keys are not generated
* nor loaded.
*
* A service is configured in two steps. It is first created using the tor
* options and then put in a staging list. It will stay there until
* hs_service_load_all_keys() is called. That function is responsible to
* load/generate the keys for the service in the staging list and if
* successful, transfert the service to the main global service list where
* at that point it is ready to be used.
*
* Configuration handlers are per-version (see config_service_handlers[]) and
* there is a main generic one for every option that is common to all version
* (config_generic_service).
**/
#define HS_CONFIG_PRIVATE
#include "hs_common.h"
#include "hs_config.h"
#include "hs_service.h"
#include "rendservice.h"
/* Configuration handler for a version 3 service. Return 0 on success else a
* negative value. */
static int
config_service_v3(const config_line_t *line,
const or_options_t *options, int validate_only,
hs_service_t *service)
{
(void) line;
(void) service;
(void) validate_only;
(void) options;
/* XXX: Configure a v3 service with specific options. */
/* XXX: Add service to v3 list and pruning on reload. */
return 0;
}
/* Configure a service using the given options in line_ and options. This is
* called for any service regardless of its version which means that all
* directives in this function are generic to any service version. This
* function will also check the validity of the service directory path.
*
* The line_ must be pointing to the directive directly after a
* HiddenServiceDir. That way, when hitting the next HiddenServiceDir line or
* reaching the end of the list of lines, we know that we have to stop looking
* for more options.
*
* Return 0 on success else -1. */
static int
config_generic_service(const config_line_t *line_,
const or_options_t *options,
hs_service_t *service)
{
int ok, dir_seen = 0;
const config_line_t *line;
hs_service_config_t *config;
tor_assert(line_);
tor_assert(options);
tor_assert(service);
/* Makes thing easier. */
config = &service->config;
memset(config, 0, sizeof(*config));
/* The first line starts with HiddenServiceDir so we consider what's next is
* the configuration of the service. */
for (line = line_; line ; line = line->next) {
/* This indicate that we have a new service to configure. */
if (!strcasecmp(line->key, "HiddenServiceDir")) {
/* This function only configures one service at a time so if we've
* already seen one, stop right now. */
if (dir_seen) {
break;
}
/* Ok, we've seen one and we are about to configure it. */
dir_seen = 1;
config->directory_path = tor_strdup(line->value);
log_info(LD_CONFIG, "HiddenServiceDir=%s. Configuring...",
escaped(config->directory_path));
continue;
}
if (BUG(!dir_seen)) {
goto err;
}
/* Version of the service. */
if (!strcasecmp(line->key, "HiddenServiceVersion")) {
service->version = (uint32_t) tor_parse_ulong(line->value,
10, HS_VERSION_TWO,
HS_VERSION_MAX,
&ok, NULL);
if (!ok) {
log_warn(LD_CONFIG,
"HiddenServiceVersion be between %u and %u, not %s",
HS_VERSION_TWO, HS_VERSION_MAX, line->value);
goto err;
}
log_info(LD_CONFIG, "HiddenServiceVersion=%" PRIu32 " for %s",
service->version, escaped(config->directory_path));
continue;
}
/* Virtual port. */
if (!strcasecmp(line->key, "HiddenServicePort")) {
char *err_msg = NULL;
/* XXX: Can we rename this? */
rend_service_port_config_t *portcfg =
rend_service_parse_port_config(line->value, " ", &err_msg);
if (!portcfg) {
if (err_msg) {
log_warn(LD_CONFIG, "%s", err_msg);
}
tor_free(err_msg);
goto err;
}
tor_assert(!err_msg);
smartlist_add(config->ports, portcfg);
log_info(LD_CONFIG, "HiddenServicePort=%s for %s",
line->value, escaped(config->directory_path));
continue;
}
/* Do we allow unknown ports. */
if (!strcasecmp(line->key, "HiddenServiceAllowUnknownPorts")) {
config->allow_unknown_ports = (unsigned int) tor_parse_long(line->value,
10, 0, 1,
&ok, NULL);
if (!ok) {
log_warn(LD_CONFIG,
"HiddenServiceAllowUnknownPorts should be 0 or 1, not %s",
line->value);
goto err;
}
log_info(LD_CONFIG,
"HiddenServiceAllowUnknownPorts=%u for %s",
config->allow_unknown_ports, escaped(config->directory_path));
continue;
}
/* Directory group readable. */
if (!strcasecmp(line->key, "HiddenServiceDirGroupReadable")) {
config->dir_group_readable = (unsigned int) tor_parse_long(line->value,
10, 0, 1,
&ok, NULL);
if (!ok) {
log_warn(LD_CONFIG,
"HiddenServiceDirGroupReadable should be 0 or 1, not %s",
line->value);
goto err;
}
log_info(LD_CONFIG,
"HiddenServiceDirGroupReadable=%u for %s",
config->dir_group_readable, escaped(config->directory_path));
continue;
}
/* Maximum streams per circuit. */
if (!strcasecmp(line->key, "HiddenServiceMaxStreams")) {
config->max_streams_per_rdv_circuit = tor_parse_uint64(line->value,
10, 0, 65535,
&ok, NULL);
if (!ok) {
log_warn(LD_CONFIG,
"HiddenServiceMaxStreams should be between 0 and %d, not %s",
65535, line->value);
goto err;
}
log_info(LD_CONFIG,
"HiddenServiceMaxStreams=%" PRIu64 " for %s",
config->max_streams_per_rdv_circuit,
escaped(config->directory_path));
continue;
}
/* Maximum amount of streams before we close the circuit. */
if (!strcasecmp(line->key, "HiddenServiceMaxStreamsCloseCircuit")) {
config->max_streams_close_circuit =
(unsigned int) tor_parse_long(line->value, 10, 0, 1, &ok, NULL);
if (!ok) {
log_warn(LD_CONFIG,
"HiddenServiceMaxStreamsCloseCircuit should be 0 or 1, "
"not %s", line->value);
goto err;
}
log_info(LD_CONFIG,
"HiddenServiceMaxStreamsCloseCircuit=%u for %s",
config->max_streams_close_circuit,
escaped(config->directory_path));
continue;
}
}
/* Check permission on service directory. */
if (hs_check_service_private_dir(options->User, config->directory_path,
config->dir_group_readable, 0) < 0) {
goto err;
}
/* Check if we are configured in non anonymous mode and single hop mode
* meaning every service become single onion. */
if (rend_service_allow_non_anonymous_connection(options) &&
rend_service_non_anonymous_mode_enabled(options)) {
config->is_single_onion = 1;
}
/* Success */
return 0;
err:
return -1;
}
/* Configuration handler indexed by version number. */
static int
(*config_service_handlers[])(const config_line_t *line,
const or_options_t *options,
int validate_only,
hs_service_t *service) =
{
NULL, /* v0 */
NULL, /* v1 */
rend_config_service, /* v2 */
config_service_v3, /* v3 */
};
/* From a set of <b>options</b>, setup every hidden service found. Return 0 on
* success or -1 on failure. If <b>validate_only</b> is set, parse, warn and
* return as normal, but don't actually change the configured services. */
int
hs_config_service_all(const or_options_t *options, int validate_only)
{
int dir_option_seen = 0;
hs_service_t *service = NULL;
const config_line_t *line;
tor_assert(options);
for (line = options->RendConfigLines; line; line = line->next) {
if (!strcasecmp(line->key, "HiddenServiceDir")) {
/* We have a new hidden service. */
service = hs_service_new(options);
/* We'll configure that service as a generic one and then pass it to the
* specific handler according to the configured version number. */
if (config_generic_service(line, options, service) < 0) {
goto err;
}
tor_assert(service->version <= HS_VERSION_MAX);
/* The handler is in charge of specific options for a version. We start
* after this service directory line so once we hit another directory
* line, the handler knows that it has to stop. */
if (config_service_handlers[service->version](line->next, options,
validate_only,
service) < 0) {
goto err;
}
/* Whatever happens, on success we loose the ownership of the service
* object so we nullify the pointer to be safe. */
service = NULL;
/* Flag that we've seen a directory directive and we'll use that to make
* sure that the torrc options ordering are actually valid. */
dir_option_seen = 1;
continue;
}
/* The first line must be a directory option else tor is misconfigured. */
if (!dir_option_seen) {
log_warn(LD_CONFIG, "%s with no preceding HiddenServiceDir directive",
line->key);
goto err;
}
}
if (!validate_only) {
/* Trigger service pruning which will make sure the just configured
* services end up in the main global list. This is v2 specific. */
rend_service_prune_list();
/* XXX: Need the v3 one. */
}
/* Success. */
return 0;
err:
hs_service_free(service);
/* Tor main should call the free all function. */
return -1;
}