2004-08-09 06:21:12 +02:00
|
|
|
$Id$
|
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
TC: A Tor control protocol (Version 1)
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
0. Scope
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
This document describes an implementation-specific protocol that is used
|
|
|
|
for other programs (such as frontend user-interfaces) to communicate with a
|
|
|
|
locally running Tor process. It is not part of the Tor onion routing
|
|
|
|
protocol.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
This protocol replaces version 0 of TC, which is now deprecated. For
|
|
|
|
reference, TC is described in "control-spec-v0.txt". Implementors are
|
|
|
|
recommended to avoid using TC directly, but instead to use a library that
|
2006-03-05 06:13:57 +01:00
|
|
|
can easily be updated to use the newer protocol. (Version 0 is used by Tor
|
|
|
|
versions 0.1.0.x; the protocol in this document only works with Tor
|
|
|
|
versions in the 0.1.1.x series and later.)
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
1. Protocol outline
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
TC is a bidirectional message-based protocol. It assumes an underlying
|
2005-06-18 03:34:28 +02:00
|
|
|
stream for communication between a controlling process (the "client"
|
|
|
|
or "controller") and a Tor process (or "server"). The stream may be
|
|
|
|
implemented via TCP, TLS-over-TCP, a Unix-domain socket, or so on,
|
|
|
|
but it must provide reliable in-order delivery. For security, the
|
2005-06-17 20:49:04 +02:00
|
|
|
stream should not be accessible by untrusted parties.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
In TC, the client and server send typed messages to each other over the
|
|
|
|
underlying stream. The client sends "commands" and the server sends
|
|
|
|
"replies".
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
By default, all messages from the server are in response to messages from
|
|
|
|
the client. Some client requests, however, will cause the server to send
|
|
|
|
messages to the client indefinitely far into the future. Such
|
2005-06-18 03:34:28 +02:00
|
|
|
"asynchronous" replies are marked as such.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Servers respond to messages in the order messages are received.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
2. Message format
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
2.1. Description format
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-18 03:34:28 +02:00
|
|
|
The message formats listed below use ABNF as described in RFC2234.
|
2005-06-17 20:49:04 +02:00
|
|
|
The protocol itself is loosely based on SMTP (see RFC 2821).
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
We use the following nonterminals from RFC2822: atom, qcontent
|
2005-02-18 19:34:37 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
We define the following general-use nonterminals:
|
2005-02-18 19:34:37 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
String = DQUOTE *qcontent DQUOTE
|
2005-02-18 19:34:37 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
There are explicitly no limits on line length. All 8-bit characters are
|
|
|
|
permitted unless explicitly disallowed.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
2.2. Commands from controller to Tor
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Command = Keyword Arguments CRLF / "+" Keyword Arguments CRLF Data
|
|
|
|
Keyword = 1*ALPHA
|
|
|
|
Arguments = *(SP / VCHAR)
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Specific commands and their arguments are described below in section 3.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
2.3. Replies from Tor to the controller
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Reply = *(MidReplyLine / DataReplyLine) EndReplyLine
|
2004-11-07 23:58:35 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
MidReplyLine = "-" ReplyLine
|
|
|
|
DataReplyLine = "+" ReplyLine Data
|
|
|
|
EndReplyLine = SP ReplyLine
|
|
|
|
ReplyLine = StatusCode [ SP ReplyText ] CRLF
|
|
|
|
ReplyText = XXXX
|
|
|
|
StatusCode = XXXX
|
2004-11-07 23:58:35 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Specific replies are mentioned below in section 3, and described more fully
|
|
|
|
in section 4.
|
2004-11-07 23:58:35 +01:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
2.4. General-use tokens
|
2004-11-07 23:58:35 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
; Identifiers for servers.
|
|
|
|
ServerID = Nickname / Fingerprint
|
2005-06-18 03:49:03 +02:00
|
|
|
Nickname = 1*19 NicknameChar
|
2005-06-17 20:49:04 +02:00
|
|
|
NicknameChar = "a"-"z" / "A"-"Z" / "0" - "9"
|
|
|
|
Fingerprint = "$" 40*HEXDIG
|
2004-11-07 23:58:35 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
; Unique identifiers for streams or circuits. Currently, Tor only
|
|
|
|
; uses digits, but this may change
|
|
|
|
StreamID = 1*16 IDChar
|
|
|
|
CircuitID = 1*16 IDChar
|
|
|
|
IDChar = ALPHA / DIGIT
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Address = ip4-address / ip6-address / hostname (XXXX Define these)
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
; A "Data" section is a sequence of octets concluded by the terminating
|
|
|
|
; sequence CRLF "." CRLF. The terminating sequence may not appear in the
|
|
|
|
; body of the data. Leading periods on lines in the data are escaped with
|
|
|
|
; an additional leading period as in RFC2821 section 4.5.2
|
|
|
|
Data = *DataLine "." CRLF
|
2005-09-08 05:18:51 +02:00
|
|
|
DataLine = CRLF / "." 1*LineItem CRLF / NonDotItem *LineItem CRLF
|
2005-06-17 20:49:04 +02:00
|
|
|
LineItem = NonCR / 1*CR NonCRLF
|
|
|
|
NonDotItem = NonDotCR / 1*CR NonCRLF
|
2005-03-19 07:05:55 +01:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
3. Commands
|
2005-03-12 05:22:01 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
All commands and other keywords are case-insensitive.
|
2004-11-03 02:32:26 +01:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
3.1. SETCONF
|
2004-11-07 23:58:35 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Change the value of one or more configuration variables. The syntax is:
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
"SETCONF" 1*(SP keyword ["=" String]) CRLF
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Tor behaves as though it had just read each of the key-value pairs
|
|
|
|
from its configuration file. Keywords with no corresponding values have
|
2005-09-14 00:43:41 +02:00
|
|
|
their configuration values reset to 0 or NULL (use RESETCONF if you want
|
2005-09-14 00:36:11 +02:00
|
|
|
to set it back to its default). SETCONF is all-or-nothing: if there
|
|
|
|
is an error in any of the configuration settings, Tor sets none of them.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Tor responds with a "250 configuration values set" reply on success.
|
2005-11-17 23:01:24 +01:00
|
|
|
If some of the listed keywords can't be found, Tor replies with a
|
|
|
|
"552 Unrecognized option" message. Otherwise, Tor responds with a
|
|
|
|
"513 syntax error in configuration values" reply on syntax error, or a
|
|
|
|
"553 impossible configuration setting" reply on a semantic error.
|
2004-11-04 23:30:14 +01:00
|
|
|
|
2005-06-18 03:34:28 +02:00
|
|
|
When a configuration option takes multiple values, or when multiple
|
2005-06-17 20:49:04 +02:00
|
|
|
configuration keys form a context-sensitive group (see GETCONF below), then
|
2004-11-04 23:30:14 +01:00
|
|
|
setting _any_ of the options in a SETCONF command is taken to reset all of
|
2005-06-17 20:49:04 +02:00
|
|
|
the others. For example, if two ORBindAddress values are configured, and a
|
|
|
|
SETCONF command arrives containing a single ORBindAddress value, the new
|
|
|
|
command's value replaces the two old values.
|
2004-11-04 23:30:14 +01:00
|
|
|
|
2005-09-08 05:18:51 +02:00
|
|
|
3.2. RESETCONF
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-09-14 04:46:16 +02:00
|
|
|
Remove all settings for a given configuration option entirely, assign
|
|
|
|
its default value (if any), and then assign the String provided.
|
|
|
|
Typically the String is left empty, to simply set an option back to
|
|
|
|
its default. The syntax is:
|
2005-09-08 05:18:51 +02:00
|
|
|
|
2005-09-14 04:46:16 +02:00
|
|
|
"RESETCONF" 1*(SP keyword ["=" String]) CRLF
|
2005-09-08 05:18:51 +02:00
|
|
|
|
|
|
|
Otherwise it behaves like SETCONF above.
|
|
|
|
|
|
|
|
3.3. GETCONF
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
Request the value of a configuration variable. The syntax is:
|
|
|
|
|
|
|
|
"GETCONF" 1*(SP keyword) CRLF
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
If all of the listed keywords exist in the Tor configuration, Tor replies
|
|
|
|
with a series of reply lines of the form:
|
|
|
|
250 keyword=value
|
2005-06-20 01:22:34 +02:00
|
|
|
If any option is set to a 'default' value semantically different from an
|
|
|
|
empty string, Tor may reply with a reply line of the form:
|
|
|
|
250 keyword
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
If some of the listed keywords can't be found, Tor replies with a
|
2005-11-17 23:01:24 +01:00
|
|
|
"552 unknown configuration keyword" message.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2004-11-04 23:30:14 +01:00
|
|
|
If an option appears multiple times in the configuration, all of its
|
|
|
|
key-value pairs are returned in order.
|
|
|
|
|
|
|
|
Some options are context-sensitive, and depend on other options with
|
2004-11-07 23:36:43 +01:00
|
|
|
different keywords. These cannot be fetched directly. Currently there
|
|
|
|
is only one such option: clients should use the "HiddenServiceOptions"
|
|
|
|
virtual keyword to get all HiddenServiceDir, HiddenServicePort,
|
|
|
|
HiddenServiceNodes, and HiddenServiceExcludeNodes option settings.
|
2004-11-04 23:30:14 +01:00
|
|
|
|
2005-09-08 05:18:51 +02:00
|
|
|
3.4. SETEVENTS
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Request the server to inform the client about interesting events. The
|
|
|
|
syntax is:
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-10-12 15:49:13 +02:00
|
|
|
"SETEVENTS" [SP "EXTENDED"] *(SP EventCode) CRLF
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
EventCode = "CIRC" / "STREAM" / "ORCONN" / "BW" / "DEBUG" /
|
2005-11-19 19:35:43 +01:00
|
|
|
"INFO" / "NOTICE" / "WARN" / "ERR" / "NEWDESC" / "ADDRMAP" /
|
|
|
|
"AUTHDIR_NEWDESCS"
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Any events *not* listed in the SETEVENTS line are turned off; thus, sending
|
|
|
|
SETEVENTS with an empty body turns off all event reporting.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The server responds with a "250 OK" reply on success, and a "552
|
|
|
|
Unrecognized event" reply if one of the event codes isn't recognized. (On
|
|
|
|
error, the list of active event codes isn't changed.)
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-10-12 15:49:13 +02:00
|
|
|
If the flag string "EXTENDED" is provided, Tor may provide extra
|
|
|
|
information with events for this connection; see 4.1 for more information.
|
|
|
|
NOTE: All events on a given connection will be provided in extended format,
|
|
|
|
or none.
|
|
|
|
NOTE: "EXTENDED" is only supported in Tor 0.1.1.9-alpha or later.
|
|
|
|
|
2005-09-08 05:18:51 +02:00
|
|
|
3.5. AUTHENTICATE
|
2005-04-06 00:56:17 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The syntax is:
|
2005-06-28 01:41:03 +02:00
|
|
|
"AUTHENTICATE" [ SP 1*HEXDIG / QuotedString ] CRLF
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The server responds with "250 OK" on success or "515 Bad authentication" if
|
|
|
|
the authentication cookie is incorrect.
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The format of the 'cookie' is implementation-dependent; see 5.1 below for
|
|
|
|
information on how the standard Tor implementation handles it.
|
2005-04-06 00:56:17 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
If Tor requires authentication and the controller has not yet sent an
|
|
|
|
AUTHENTICATE message, Tor sends a "514 authentication required" reply to
|
|
|
|
any other kind of message.
|
2005-04-06 00:56:17 +02:00
|
|
|
|
2005-09-08 05:18:51 +02:00
|
|
|
3.6. SAVECONF
|
2005-04-06 00:56:17 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The syntax is:
|
|
|
|
"SAVECONF" CRLF
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Instructs the server to write out its config options into its torrc. Server
|
2005-06-18 03:34:28 +02:00
|
|
|
returns "250 OK" if successful, or "551 Unable to write configuration
|
|
|
|
to disk" if it can't write the file or some other error occurs.
|
2005-06-05 16:10:48 +02:00
|
|
|
|
2005-09-08 05:18:51 +02:00
|
|
|
3.7. SIGNAL
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The syntax is:
|
2004-11-07 23:36:43 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
"SIGNAL" SP Signal CRLF
|
2004-11-07 23:36:43 +01:00
|
|
|
|
2005-06-18 03:49:03 +02:00
|
|
|
Signal = "RELOAD" / "SHUTDOWN" / "DUMP" / "DEBUG" / "HALT" /
|
2006-03-09 01:16:44 +01:00
|
|
|
"HUP" / "INT" / "USR1" / "USR2" / "TERM" / "NEWNYM"
|
2004-12-17 23:14:58 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The meaning of the signals are:
|
2004-12-17 23:14:58 +01:00
|
|
|
|
2005-06-18 03:34:28 +02:00
|
|
|
RELOAD -- Reload: reload config items, refetch directory. (like HUP)
|
2005-06-17 20:49:04 +02:00
|
|
|
SHUTDOWN -- Controlled shutdown: if server is an OP, exit immediately.
|
2005-02-18 19:34:37 +01:00
|
|
|
If it's an OR, close listeners and exit after 30 seconds.
|
2005-06-18 03:34:28 +02:00
|
|
|
(like INT)
|
2005-06-17 20:49:04 +02:00
|
|
|
DUMP -- Dump stats: log information about open connections and
|
2005-06-18 03:34:28 +02:00
|
|
|
circuits. (like USR1)
|
|
|
|
DEBUG -- Debug: switch all open logs to loglevel debug. (like USR2)
|
2005-06-18 03:49:03 +02:00
|
|
|
HALT -- Immediate shutdown: clean up and exit now. (like TERM)
|
2006-03-09 01:16:44 +01:00
|
|
|
NEWNYM -- Switch to clean circuits, so new application requests
|
|
|
|
don't share any circuits with old ones.
|
2004-12-17 23:14:58 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The server responds with "250 OK" if the signal is recognized (or simply
|
|
|
|
closes the socket if it was asked to close immediately), or "552
|
|
|
|
Unrecognized signal" if the signal is unrecognized.
|
2004-12-17 23:14:58 +01:00
|
|
|
|
2005-09-08 05:18:51 +02:00
|
|
|
3.8. MAPADDRESS
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The syntax is:
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
"MAPADDRESS" 1*(Address "=" Address SP) CRLF
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The first address in each pair is an "original" address; the second is a
|
|
|
|
"replacement" address. The client sends this message to the server in
|
|
|
|
order to tell it that future SOCKS requests for connections to the original
|
|
|
|
address should be replaced with connections to the specified replacement
|
|
|
|
address. If the addresses are well-formed, and the server is able to
|
|
|
|
fulfill the request, the server replies with a 250 message:
|
|
|
|
250-OldAddress1=NewAddress1
|
|
|
|
250 OldAddress2=NewAddress2
|
|
|
|
|
2006-02-09 04:44:49 +01:00
|
|
|
containing the source and destination addresses. If request is
|
|
|
|
malformed, the server replies with "512 syntax error in command
|
|
|
|
argument". If the server can't fulfill the request, it replies with
|
2006-04-03 04:36:47 +02:00
|
|
|
"451 resource exhausted".
|
2005-01-06 03:02:18 +01:00
|
|
|
|
|
|
|
The client may decline to provide a body for the original address, and
|
2005-02-23 07:58:18 +01:00
|
|
|
instead send a special null address ("0.0.0.0" for IPv4, "::0" for IPv6, or
|
|
|
|
"." for hostname), signifying that the server should choose the original
|
2005-06-17 20:49:04 +02:00
|
|
|
address itself, and return that address in the reply. The server
|
2005-02-23 07:58:18 +01:00
|
|
|
should ensure that it returns an element of address space that is unlikely
|
|
|
|
to be in actual use. If there is already an address mapped to the
|
|
|
|
destination address, the server may reuse that mapping.
|
2005-01-06 03:02:18 +01:00
|
|
|
|
|
|
|
If the original address is already mapped to a different address, the old
|
|
|
|
mapping is removed. If the original address and the destination address
|
|
|
|
are the same, the server removes any mapping in place for the original
|
|
|
|
address.
|
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Example:
|
|
|
|
C: MAPADDRESS 0.0.0.0=tor.eff.org 1.2.3.4=tor.freehaven.net
|
|
|
|
S: 250-127.192.10.10=tor.eff.org
|
|
|
|
S: 250 1.2.3.4=tor.freehaven.net
|
|
|
|
|
2005-01-06 03:02:18 +01:00
|
|
|
{Note: This feature is designed to be used to help Tor-ify applications
|
|
|
|
that need to use SOCKS4 or hostname-less SOCKS5. There are three
|
|
|
|
approaches to doing this:
|
|
|
|
1. Somehow make them use SOCKS4a or SOCKS5-with-hostnames instead.
|
|
|
|
2. Use tor-resolve (or another interface to Tor's resolve-over-SOCKS
|
|
|
|
feature) to resolve the hostname remotely. This doesn't work
|
|
|
|
with special addresses like x.onion or x.y.exit.
|
|
|
|
3. Use MAPADDRESS to map an IP address to the desired hostname, and then
|
|
|
|
arrange to fool the application into thinking that the hostname
|
|
|
|
has resolved to that IP.
|
|
|
|
This functionality is designed to help implement the 3rd approach.}
|
|
|
|
|
2005-06-18 03:34:28 +02:00
|
|
|
Mappings set by the controller last until the Tor process exits:
|
|
|
|
they never expire. If the controller wants the mapping to last only
|
|
|
|
a certain time, then it must explicitly un-map the address when that
|
|
|
|
time has elapsed.
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-09-08 05:18:51 +02:00
|
|
|
3.9. GETINFO
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The syntax is as for GETCONF:
|
|
|
|
"GETINFO" 1*(SP keyword) CRLF
|
2005-02-18 19:34:37 +01:00
|
|
|
one or more NL-terminated strings. The server replies with an INFOVALUE
|
2006-04-02 09:54:34 +02:00
|
|
|
message, or a 551 or 552 error.
|
2005-02-18 19:34:37 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Unlike GETCONF, this message is used for data that are not stored in the Tor
|
|
|
|
configuration file, and that may be longer than a single line. On success,
|
|
|
|
one ReplyLine is sent for each requested value, followed by a final 250 OK
|
|
|
|
ReplyLine. If a value fits on a single line, the format is:
|
|
|
|
250-keyword=value
|
2005-08-22 22:05:41 +02:00
|
|
|
If a value must be split over multiple lines, the format is:
|
2005-06-17 20:49:04 +02:00
|
|
|
250+keyword=
|
|
|
|
value
|
|
|
|
.
|
2005-08-22 22:05:41 +02:00
|
|
|
Recognized keys and their values include:
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-02-18 19:34:37 +01:00
|
|
|
"version" -- The version of the server's software, including the name
|
|
|
|
of the software. (example: "Tor 0.0.9.4")
|
|
|
|
|
2005-08-10 20:05:20 +02:00
|
|
|
"config-file" -- The location of Tor's configuration file ("torrc").
|
|
|
|
|
2006-06-13 11:16:09 +02:00
|
|
|
["exit-policy/prepend" -- The default exit policy lines that Tor will
|
|
|
|
*prepend* to the ExitPolicy config option.
|
|
|
|
-- Never implemented. Useful?]
|
|
|
|
|
|
|
|
"exit-policy/default" -- The default exit policy lines that Tor will
|
|
|
|
*append* to the ExitPolicy config option.
|
|
|
|
|
2006-04-10 01:48:12 +02:00
|
|
|
"desc/id/<OR identity>" or "desc/name/<OR nickname>" -- the latest
|
|
|
|
server descriptor for a given OR, NUL-terminated.
|
2005-02-18 19:34:37 +01:00
|
|
|
|
2006-01-10 21:08:56 +01:00
|
|
|
"desc/all-recent" -- the latest server descriptor for every router that
|
|
|
|
Tor knows about.
|
|
|
|
|
2005-03-22 04:35:37 +01:00
|
|
|
"network-status" -- a space-separated list of all known OR identities.
|
|
|
|
This is in the same format as the router-status line in directories;
|
|
|
|
see tor-spec.txt for details.
|
2005-02-18 19:34:37 +01:00
|
|
|
|
2005-03-02 21:54:09 +01:00
|
|
|
"addr-mappings/all"
|
|
|
|
"addr-mappings/config"
|
|
|
|
"addr-mappings/cache"
|
2006-02-09 04:44:49 +01:00
|
|
|
"addr-mappings/control" -- a space-separated list of address
|
|
|
|
mappings, each in the form of "from-address=to-address".
|
|
|
|
The 'config' key returns those address mappings set in the
|
|
|
|
configuration; the 'cache' key returns the mappings in the
|
|
|
|
client-side DNS cache; the 'control' key returns the mappings set
|
|
|
|
via the control interface; the 'all' target returns the mappings
|
|
|
|
set through any mechanism.
|
2005-03-02 21:54:09 +01:00
|
|
|
|
2006-09-09 05:18:39 +02:00
|
|
|
"address" -- the best guess at our external IP address. If we
|
|
|
|
have no guess, return a 551 error.
|
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
"circuit-status"
|
2006-02-09 04:44:49 +01:00
|
|
|
A series of lines as for a circuit status event. Each line is of
|
|
|
|
the form:
|
2006-05-21 22:01:13 +02:00
|
|
|
CircuitID SP CircStatus [SP Path] CRLF
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
"stream-status"
|
|
|
|
A series of lines as for a stream status event. Each is of the form:
|
2005-06-19 22:40:41 +02:00
|
|
|
StreamID SP StreamStatus SP CircID SP Target CRLF
|
2005-02-18 19:34:37 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
"orconn-status"
|
2005-06-18 03:34:28 +02:00
|
|
|
A series of lines as for an OR connection status event. Each is of the
|
2005-06-17 20:49:04 +02:00
|
|
|
form:
|
|
|
|
ServerID SP ORStatus CRLF
|
2005-02-18 19:34:37 +01:00
|
|
|
|
2006-01-10 23:26:21 +01:00
|
|
|
"entry-guards"
|
|
|
|
A series of lines listing the currently chosen entry guards, if any.
|
2005-08-04 21:56:41 +02:00
|
|
|
Each is of the form:
|
2005-12-25 06:44:30 +01:00
|
|
|
ServerID SP (Status-with-time / Status) CRLF
|
|
|
|
|
|
|
|
Status-with-time = ("down" / "unlisted") SP ISOTime
|
|
|
|
Status = ("up" / "never-connected")
|
2005-08-04 21:56:41 +02:00
|
|
|
|
2005-12-28 10:11:14 +01:00
|
|
|
[From 0.1.1.4-alpha to 0.1.1.10-alpha, this was called "helper-nodes".
|
|
|
|
Tor still supports calling it that for now, but support will be
|
|
|
|
removed in the future.]
|
|
|
|
|
2005-08-04 21:56:41 +02:00
|
|
|
"accounting/enabled"
|
|
|
|
"accounting/hibernating"
|
|
|
|
"accounting/bytes"
|
|
|
|
"accounting/bytes-left"
|
|
|
|
"accounting/interval-start"
|
|
|
|
"accounting/interval-wake"
|
|
|
|
"accounting/interval-end"
|
|
|
|
Information about accounting status. If accounting is enabled,
|
|
|
|
"enabled" is 1; otherwise it is 0. The "hibernating" field is "hard"
|
|
|
|
if we are accepting no data; "soft" if we're accepting no new
|
|
|
|
connections, and "awake" if we're not hibernating at all. The "bytes"
|
|
|
|
and "bytes-left" fields contain (read-bytes SP write-bytes), for the
|
|
|
|
start and the rest of the interval respectively. The 'interval-start'
|
|
|
|
and 'interval-end' fields are the borders of the current interval; the
|
|
|
|
'interval-wake' field is the time within the current interval (if any)
|
|
|
|
where we plan[ned] to start being active.
|
|
|
|
|
|
|
|
"config/names"
|
|
|
|
A series of lines listing the available configuration options. Each is
|
|
|
|
of the form:
|
|
|
|
OptionName SP OptionType [ SP Documentation ] CRLF
|
|
|
|
OptionName = Keyword
|
|
|
|
OptionType = "Integer" / "TimeInterval" / "DataSize" / "Float" /
|
|
|
|
"Boolean" / "Time" / "CommaList" / "Dependant" / "Virtual" /
|
|
|
|
"String" / "LineList"
|
|
|
|
Documentation = Text
|
|
|
|
|
|
|
|
"info/names"
|
|
|
|
A series of lines listing the available GETINFO options. Each is of
|
2005-08-22 22:05:41 +02:00
|
|
|
one of these forms:
|
2005-08-04 21:56:41 +02:00
|
|
|
OptionName SP Documentation CRLF
|
|
|
|
OptionPrefix SP Documentation CRLF
|
|
|
|
OptionPrefix = OptionName "/*"
|
|
|
|
|
2006-03-08 01:13:54 +01:00
|
|
|
"dir/status/authority"
|
|
|
|
"dir/status/fp/<F>"
|
|
|
|
"dir/status/fp/<F1>+<F2>+<F3>"
|
|
|
|
"dir/status/all"
|
|
|
|
"dir/server/fp/<F>"
|
|
|
|
"dir/server/fp/<F1>+<F2>+<F3>"
|
|
|
|
"dir/server/d/<D>"
|
|
|
|
"dir/server/d/<D1>+<D2>+<D3>"
|
|
|
|
"dir/server/authority"
|
|
|
|
"dir/server/all"
|
|
|
|
[DRAFT] [Not Implemented] A series of lines listing directory
|
|
|
|
contents, provided according to the specification for the URLs listed
|
|
|
|
in Section 4.4 of dir-spec.txt. Note that Tor MUST NOT provide
|
|
|
|
private information, such as descriptors for routers not marked as
|
2006-03-15 06:06:56 +01:00
|
|
|
general-purpose. When asked for 'authority' information for which this
|
|
|
|
Tor is not authoritative, Tor replies with an empty string.
|
2006-03-07 17:00:40 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Examples:
|
|
|
|
C: GETINFO version desc/name/moria1
|
|
|
|
S: 250+desc/name/moria=
|
|
|
|
S: [Descriptor for moria]
|
|
|
|
S: .
|
|
|
|
S: 250-version=Tor 0.1.1.0-alpha-cvs
|
|
|
|
S: 250 OK
|
2005-01-06 03:02:18 +01:00
|
|
|
|
2005-09-08 05:18:51 +02:00
|
|
|
3.10. EXTENDCIRCUIT
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The format is:
|
2006-02-23 07:51:09 +01:00
|
|
|
"EXTENDCIRCUIT" SP CircuitID SP
|
|
|
|
ServerID *("," ServerID) SP
|
|
|
|
("purpose=" Purpose) CRLF
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2006-02-23 07:51:09 +01:00
|
|
|
This request takes one of two forms: either the CircuitID is zero, in
|
2005-02-16 20:49:39 +01:00
|
|
|
which case it is a request for the server to build a new circuit according
|
2006-02-23 07:51:09 +01:00
|
|
|
to the specified path, or the CircuitID is nonzero, in which case it is a
|
2005-02-16 20:49:39 +01:00
|
|
|
request for the server to extend an existing circuit with that ID according
|
|
|
|
to the specified path.
|
|
|
|
|
2006-02-23 07:51:09 +01:00
|
|
|
If CircuitID is 0 and "purpose=" is specified, then the circuit's
|
|
|
|
purpose is set. Two choices are recognized: "general" and
|
|
|
|
"controller". If not specified, circuits are created as "general".
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2006-02-23 07:51:09 +01:00
|
|
|
If the request is successful, the server sends a reply containing a
|
|
|
|
message body consisting of the CircuitID of the (maybe newly created)
|
|
|
|
circuit. The syntax is "250" SP "EXTENDED" SP CircuitID CRLF.
|
|
|
|
|
|
|
|
3.11. SETCIRCUITPURPOSE
|
|
|
|
|
|
|
|
Sent from the client to the server. The format is:
|
|
|
|
"SETCIRCUITPURPOSE" SP CircuitID SP Purpose CRLF
|
|
|
|
|
|
|
|
This changes the circuit's purpose. See EXTENDCIRCUIT above for details.
|
|
|
|
|
2006-03-17 23:07:20 +01:00
|
|
|
3.12. SETROUTERPURPOSE
|
|
|
|
|
|
|
|
Sent from the client to the server. The format is:
|
|
|
|
"SETROUTERPURPOSE" SP NicknameOrKey SP Purpose CRLF
|
|
|
|
|
|
|
|
This changes the descriptor's purpose. See +POSTDESCRIPTOR below
|
|
|
|
for details.
|
|
|
|
|
|
|
|
3.13. ATTACHSTREAM
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The syntax is:
|
|
|
|
"ATTACHSTREAM" SP StreamID SP CircuitID CRLF
|
2005-02-16 20:49:39 +01:00
|
|
|
|
|
|
|
This message informs the server that the specified stream should be
|
|
|
|
associated with the specified circuit. Each stream may be associated with
|
|
|
|
at most one circuit, and multiple streams may share the same circuit.
|
2005-03-24 07:29:28 +01:00
|
|
|
Streams can only be attached to completed circuits (that is, circuits that
|
2005-06-18 03:49:03 +02:00
|
|
|
have sent a circuit status 'BUILT' event or are listed as built in a
|
2005-06-18 03:34:28 +02:00
|
|
|
GETINFO circuit-status request).
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2005-03-12 05:22:01 +01:00
|
|
|
If the circuit ID is 0, responsibility for attaching the given stream is
|
|
|
|
returned to Tor.
|
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Tor responds with "250 OK" if it can attach the stream, 552 if the circuit
|
|
|
|
or stream didn't exist, or 551 if the stream couldn't be attached for
|
|
|
|
another reason.
|
|
|
|
|
2005-12-05 02:09:11 +01:00
|
|
|
{Implementation note: Tor will close unattached streams by itself,
|
|
|
|
roughly two minutes after they are born. Let the developers know if
|
|
|
|
that turns out to be a problem.}
|
|
|
|
|
2005-03-14 23:13:42 +01:00
|
|
|
{Implementation note: By default, Tor automatically attaches streams to
|
2005-03-27 08:42:27 +02:00
|
|
|
circuits itself, unless the configuration variable
|
|
|
|
"__LeaveStreamsUnattached" is set to "1". Attempting to attach streams
|
|
|
|
via TC when "__LeaveStreamsUnattached" is false may cause a race between
|
|
|
|
Tor and the controller, as both attempt to attach streams to circuits.}
|
2005-03-14 23:13:42 +01:00
|
|
|
|
2006-03-09 07:30:27 +01:00
|
|
|
{Implementation note: You can try to attachstream to a stream that
|
|
|
|
has already sent a connect or resolve request but hasn't succeeded
|
|
|
|
yet, in which case Tor will detach the stream from its current circuit
|
|
|
|
before proceeding with the new attach request.}
|
|
|
|
|
2006-03-17 23:07:20 +01:00
|
|
|
3.14. POSTDESCRIPTOR
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The syntax is:
|
2006-03-17 23:07:20 +01:00
|
|
|
"+POSTDESCRIPTOR" ("purpose=" Purpose) CRLF Descriptor CRLF "." CRLF
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2006-03-17 23:07:20 +01:00
|
|
|
This message informs the server about a new descriptor. If Purpose is
|
|
|
|
specified, it must be either "general" or "controller", else we
|
|
|
|
return a 552 error.
|
2005-02-16 20:49:39 +01:00
|
|
|
|
|
|
|
The descriptor, when parsed, must contain a number of well-specified
|
|
|
|
fields, including fields for its nickname and identity.
|
|
|
|
|
2005-06-18 03:49:03 +02:00
|
|
|
If there is an error in parsing the descriptor, the server must send a "554
|
|
|
|
Invalid descriptor" reply. If the descriptor is well-formed but the server
|
|
|
|
chooses not to add it, it must reply with a 251 message whose body explains
|
|
|
|
why the server was not added. If the descriptor is added, Tor replies with
|
|
|
|
"250 OK".
|
2005-02-16 20:49:39 +01:00
|
|
|
|
2006-03-17 23:07:20 +01:00
|
|
|
3.15. REDIRECTSTREAM
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
Sent from the client to the server. The syntax is:
|
2005-12-22 04:27:37 +01:00
|
|
|
"REDIRECTSTREAM" SP StreamID SP Address (SP Port) CRLF
|
2005-06-17 20:49:04 +02:00
|
|
|
|
2005-11-18 12:17:24 +01:00
|
|
|
Tells the server to change the exit address on the specified stream. If
|
|
|
|
Port is specified, changes the destination port as well. No remapping
|
|
|
|
is performed on the new provided address.
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
To be sure that the modified address will be used, this event must be sent
|
|
|
|
after a new stream event is received, and before attaching this stream to
|
|
|
|
a circuit.
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Tor replies with "250 OK" on success.
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2006-03-17 23:07:20 +01:00
|
|
|
3.16. CLOSESTREAM
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Sent from the client to the server. The syntax is:
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
"CLOSESTREAM" SP StreamID SP Reason *(SP Flag) CRLF
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Tells the server to close the specified stream. The reason should be one
|
|
|
|
of the Tor RELAY_END reasons given in tor-spec.txt, as a decimal. Flags is
|
|
|
|
not used currently; Tor servers SHOULD ignore unrecognized flags. Tor may
|
|
|
|
hold the stream open for a while to flush any data that is pending.
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2005-11-18 12:17:24 +01:00
|
|
|
Tor replies with "250 OK" on success, or a 512 if there aren't enough
|
|
|
|
arguments, or a 552 if it doesn't recognize the StreamID or reason.
|
|
|
|
|
2006-03-17 23:07:20 +01:00
|
|
|
3.17. CLOSECIRCUIT
|
2005-03-02 21:22:10 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The syntax is:
|
|
|
|
CLOSECIRCUIT SP CircuitID *(SP Flag) CRLF
|
|
|
|
Flag = "IfUnused"
|
2005-03-17 13:38:37 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Tells the server to close the specified circuit. If "IfUnused" is
|
|
|
|
provided, do not close the circuit unless it is unused.
|
2005-03-19 07:05:55 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Other flags may be defined in the future; Tor SHOULD ignore unrecognized
|
|
|
|
flags.
|
2005-03-19 07:05:55 +01:00
|
|
|
|
2005-11-18 12:17:24 +01:00
|
|
|
Tor replies with "250 OK" on success, or a 512 if there aren't enough
|
|
|
|
arguments, or a 552 if it doesn't recognize the CircuitID.
|
|
|
|
|
2006-03-17 23:07:20 +01:00
|
|
|
3.18. QUIT
|
2005-08-13 04:22:11 +02:00
|
|
|
|
|
|
|
Tells the server to hang up on this controller connection. This command
|
|
|
|
can be used before authenticating.
|
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
4. Replies
|
2005-03-19 07:05:55 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
Reply codes follow the same 3-character format as used by SMTP, with the
|
|
|
|
first character defining a status, the second character defining a
|
2005-06-18 03:34:28 +02:00
|
|
|
subsystem, and the third designating fine-grained information.
|
2005-03-17 13:38:37 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The TC protocol currently uses the following first characters:
|
2005-03-22 20:36:38 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
2yz Positive Completion Reply
|
|
|
|
The command was successful; a new request can be started.
|
2005-03-22 20:36:38 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
4yz Temporary Negative Completion reply
|
|
|
|
The command was unsuccessful but might be reattempted later.
|
2005-03-22 20:36:38 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
5yz Permanent Negative Completion Reply
|
|
|
|
The command was unsuccessful; the client should not try exactly
|
|
|
|
that sequence of commands again.
|
2005-03-22 20:36:38 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
6yz Asynchronous Reply
|
|
|
|
Sent out-of-order in response to an earlier SETEVENTS command.
|
2005-03-22 20:36:38 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
The following second characters are used:
|
2005-03-22 20:36:38 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
x0z Syntax
|
|
|
|
Sent in response to ill-formed or nonsensical commands.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
x1z Protocol
|
|
|
|
Refers to operations of the Tor Control protocol.
|
|
|
|
|
2005-06-18 03:34:28 +02:00
|
|
|
x5z Tor
|
2005-06-17 20:49:04 +02:00
|
|
|
Refers to actual operations of Tor system.
|
|
|
|
|
|
|
|
The following codes are defined:
|
|
|
|
|
|
|
|
250 OK
|
|
|
|
251 Operation was unnecessary
|
|
|
|
[Tor has declined to perform the operation, but no harm was done.]
|
|
|
|
|
|
|
|
451 Resource exhausted
|
|
|
|
|
|
|
|
500 Syntax error: protocol
|
|
|
|
|
|
|
|
510 Unrecognized command
|
|
|
|
511 Unimplemented command
|
|
|
|
512 Syntax error in command argument
|
|
|
|
513 Unrecognized command argument
|
|
|
|
514 Authentication required
|
|
|
|
515 Bad authentication
|
|
|
|
|
|
|
|
550 Unspecified Tor error
|
|
|
|
|
|
|
|
551 Internal error
|
|
|
|
[Something went wrong inside Tor, so that the client's
|
|
|
|
request couldn't be fulfilled.]
|
|
|
|
|
|
|
|
552 Unrecognized entity
|
|
|
|
[A configuration key, a stream ID, circuit ID, event,
|
|
|
|
mentioned in the command did not actually exist.]
|
|
|
|
|
|
|
|
553 Invalid configuration value
|
|
|
|
[The client tried to set a configuration option to an
|
|
|
|
incorrect, ill-formed, or impossible value.]
|
|
|
|
|
2005-06-18 03:49:03 +02:00
|
|
|
554 Invalid descriptor
|
|
|
|
|
2005-06-19 22:40:41 +02:00
|
|
|
555 Unmanaged entity
|
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
650 Asynchronous event notification
|
|
|
|
|
2005-06-18 03:49:03 +02:00
|
|
|
Unless specified to have specific contents, the human-readable messages
|
|
|
|
in error replies should not be relied upon to match those in this document.
|
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
4.1. Asynchronous events
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
These replies can be sent after a corresponding SETEVENTS command has been
|
|
|
|
received. They will not be interleaved with other Reply elements, but they
|
|
|
|
can appear between a command and its corresponding reply. For example,
|
|
|
|
this sequence is possible:
|
|
|
|
|
|
|
|
C: SETEVENTS CIRC
|
|
|
|
S: 250 OK
|
2005-07-18 00:39:21 +02:00
|
|
|
C: GETCONF SOCKSPORT ORPORT
|
2005-06-17 20:49:04 +02:00
|
|
|
S: 650 CIRC 1000 EXTENDED moria1,moria2
|
|
|
|
S: 250-SOCKSPORT=9050
|
|
|
|
S: 250 ORPORT=0
|
|
|
|
|
|
|
|
But this sequence is disallowed:
|
|
|
|
C: SETEVENTS CIRC
|
|
|
|
S: 250 OK
|
2005-07-18 00:39:21 +02:00
|
|
|
C: GETCONF SOCKSPORT ORPORT
|
2005-06-17 20:49:04 +02:00
|
|
|
S: 250-SOCKSPORT=9050
|
|
|
|
S: 650 CIRC 1000 EXTENDED moria1,moria2
|
|
|
|
S: 250 ORPORT=0
|
|
|
|
|
2005-06-20 01:22:34 +02:00
|
|
|
Clients SHOULD tolerate more arguments in an asynchonous reply than
|
|
|
|
expected, and SHOULD tolerate more lines in an asynchronous reply than
|
|
|
|
expected. For instance, a client that expects a CIRC message like:
|
|
|
|
650 CIRC 1000 EXTENDED moria1,moria2
|
|
|
|
should tolerate:
|
2005-10-12 15:49:13 +02:00
|
|
|
650-CIRC 1000 EXTENDED moria1,moria2 0xBEEF
|
2005-06-20 01:22:34 +02:00
|
|
|
650-EXTRAMAGIC=99
|
|
|
|
650 ANONYMITY=high
|
|
|
|
|
2005-10-12 15:49:13 +02:00
|
|
|
If clients ask for extended events, then each event line as specified below
|
|
|
|
will be followed by additional extensions. Clients that do so MUST
|
|
|
|
tolerate additional arguments and lines. Additional lines will be of the
|
|
|
|
form
|
|
|
|
"650" ("-"/" ") KEYWORD ["=" ARGUMENTS] CRLF
|
|
|
|
Additional arguments will be of the form
|
2005-11-01 07:27:43 +01:00
|
|
|
SP KEYWORD ["=" ( QuotedString / * NonSpDquote ) ]
|
2005-10-12 15:49:13 +02:00
|
|
|
Such clients MUST tolerate lines with keywords they do not recognize.
|
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
4.1.1. Circuit status changed
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
|
2006-05-21 22:01:13 +02:00
|
|
|
"650" SP "CIRC" SP CircuitID SP CircStatus [SP Path]
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
CircStatus =
|
|
|
|
"LAUNCHED" / ; circuit ID assigned to new circuit
|
|
|
|
"BUILT" / ; all hops finished, can now accept streams
|
|
|
|
"EXTENDED" / ; one more hop has been completed
|
|
|
|
"FAILED" / ; circuit closed (was not built)
|
|
|
|
"CLOSED" ; circuit closed (was built)
|
|
|
|
|
|
|
|
Path = ServerID *("," ServerID)
|
|
|
|
|
2006-05-21 22:01:13 +02:00
|
|
|
The path is provided only when the circuit has been extended at least one
|
|
|
|
hop.
|
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
4.1.2. Stream status changed
|
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
|
2006-02-04 01:26:12 +01:00
|
|
|
"650" SP "STREAM" SP StreamID SP StreamStatus SP CircID SP Target
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
StreamStatus =
|
|
|
|
"NEW" / ; New request to connect
|
2005-07-12 20:20:54 +02:00
|
|
|
"NEWRESOLVE" / ; New request to resolve an address
|
|
|
|
"SENTCONNECT" / ; Sent a connect cell along a circuit
|
|
|
|
"SENTRESOLVE" / ; Sent a resolve cell along a circuit
|
2005-06-19 22:40:41 +02:00
|
|
|
"SUCCEEDED" / ; Received a reply; stream established
|
2006-03-08 23:26:36 +01:00
|
|
|
"FAILED" / ; Stream failed and not retriable
|
2005-06-17 20:49:04 +02:00
|
|
|
"CLOSED" / ; Stream closed
|
2006-03-08 23:26:36 +01:00
|
|
|
"DETACHED" ; Detached from circuit; still retriable
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
Target = Address ":" Port
|
|
|
|
|
2005-06-19 22:40:41 +02:00
|
|
|
The circuit ID designates which circuit this stream is attached to. If
|
|
|
|
the stream is unattached, the circuit ID "0" is given.
|
2005-06-17 20:49:04 +02:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
4.1.3. OR Connection status changed
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
The syntax is:
|
2006-03-08 23:26:36 +01:00
|
|
|
"650" SP "ORCONN" SP (ServerID / Target) SP ORStatus
|
2005-06-17 20:49:04 +02:00
|
|
|
|
2006-03-08 23:26:36 +01:00
|
|
|
ORStatus = "NEW" / "LAUNCHED" / "CONNECTED" / "FAILED" / "CLOSED"
|
|
|
|
|
|
|
|
NEW is for incoming connections, and LAUNCHED is for outgoing
|
|
|
|
connections. CONNECTED means the TLS handshake has finished (in
|
|
|
|
either direction). FAILED means a connection is being closed that
|
|
|
|
hasn't finished its handshake, and CLOSED is for connections that
|
|
|
|
have handshaked.
|
|
|
|
|
|
|
|
A ServerID is specified unless it's a NEW connection, in which
|
|
|
|
case we don't know what server it is yet, so we use Address:Port.
|
2005-06-17 20:49:04 +02:00
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
4.1.4. Bandwidth used in the last second
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"650" SP "BW" SP BytesRead SP BytesWritten
|
|
|
|
BytesRead = 1*DIGIT
|
|
|
|
BytesWritten = 1*DIGIT
|
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
4.1.5. Log message
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"650" SP Severity SP ReplyText
|
|
|
|
or
|
|
|
|
"650+" Severity CRLF Data
|
|
|
|
|
|
|
|
Severity = "DEBUG" / "INFO" / "NOTICE" / "WARN"/ "ERR"
|
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
4.1.6. New descriptors available
|
2005-06-17 20:49:04 +02:00
|
|
|
|
|
|
|
Syntax:
|
|
|
|
"650" SP "NEWDESC" 1*(SP ServerID)
|
|
|
|
|
2005-08-29 06:49:44 +02:00
|
|
|
4.1.7. New Address mapping
|
2005-06-19 22:40:41 +02:00
|
|
|
|
|
|
|
Syntax:
|
|
|
|
"650" SP "ADDRMAP" SP Address SP Address SP Expiry
|
|
|
|
Expiry = DQOUTE ISOTime DQUOTE / "NEVER"
|
|
|
|
|
2005-11-19 19:35:43 +01:00
|
|
|
4.1.8. Descriptors uploaded to us in our role as authoritative dirserver
|
|
|
|
|
|
|
|
Syntax:
|
2006-02-09 04:44:49 +01:00
|
|
|
"650" "+" "AUTHDIR_NEWDESCS" CRLF Action CRLF Message CRLF
|
|
|
|
Descriptor CRLF "." CRLF
|
2005-11-19 19:35:43 +01:00
|
|
|
Action = "ACCEPTED" / "DROPPED" / "REJECTED"
|
|
|
|
Message = Text
|
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
5. Implementation notes
|
|
|
|
|
|
|
|
5.1. Authentication
|
2005-06-05 16:10:48 +02:00
|
|
|
|
|
|
|
By default, the current Tor implementation trusts all local users.
|
|
|
|
|
|
|
|
If the 'CookieAuthentication' option is true, Tor writes a "magic cookie"
|
|
|
|
file named "control_auth_cookie" into its data directory. To authenticate,
|
|
|
|
the controller must send the contents of this file.
|
|
|
|
|
2006-06-07 08:53:43 +02:00
|
|
|
[With the v1 controller protocol, what we really mean is that you should
|
|
|
|
send the base16 of the contents of this file. Is this it, or is there
|
|
|
|
more to it? Should we write a control_auth_cookie.asc file too that
|
|
|
|
makes this step easier for people doing it manually? -RD]
|
|
|
|
|
2005-06-05 16:10:48 +02:00
|
|
|
If the 'HashedControlPassword' option is set, it must contain the salted
|
|
|
|
hash of a secret password. The salted hash is computed according to the
|
|
|
|
S2K algorithm in RFC 2440 (OpenPGP), and prefixed with the s2k specifier.
|
|
|
|
This is then encoded in hexadecimal, prefixed by the indicator sequence
|
|
|
|
"16:". Thus, for example, the password 'foo' could encode to:
|
|
|
|
16:660537E3E1CD49996044A3BF558097A981F539FEA2F9DA662B4626C1C2
|
|
|
|
++++++++++++++++**^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
salt hashed value
|
|
|
|
indicator
|
|
|
|
You can generate the salt of a password by calling
|
|
|
|
'tor --hash-password <password>'
|
|
|
|
or by using the example code in the Python and Java controller libraries.
|
|
|
|
To authenticate under this scheme, the controller sends Tor the original
|
|
|
|
secret that was used to generate the password.
|
2004-11-07 23:36:43 +01:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
5.2. Don't let the buffer get too big.
|
2004-11-03 20:57:43 +01:00
|
|
|
|
2004-11-07 23:36:43 +01:00
|
|
|
If you ask for lots of events, and 16MB of them queue up on the buffer,
|
|
|
|
the Tor process will close the socket.
|
2004-08-09 06:21:12 +02:00
|
|
|
|
2005-06-17 20:49:04 +02:00
|
|
|
5.3. Backward compatibility
|
|
|
|
|
|
|
|
For backward compatibility with the "version 0" control protocol, Tor checks
|
2005-06-24 20:04:00 +02:00
|
|
|
whether the third octet the first command is zero. If it is, Tor
|
2005-06-17 20:49:04 +02:00
|
|
|
assumes that version 0 is in use. This feature is deprecated, and will be
|
|
|
|
removed in the 0.1.2.x Tor development series.
|
2005-06-18 03:34:28 +02:00
|
|
|
|
2005-06-24 20:04:00 +02:00
|
|
|
In order to detect which version of the protocol is supported controllers
|
|
|
|
should send the sequence [00 00 0D 0A]. This is a valid and unrecognized
|
|
|
|
command in both protocol versions, and implementations can detect which
|
|
|
|
error they have received.
|
2006-02-09 04:44:49 +01:00
|
|
|
|