Merge remote-tracking branch 'tor-github/pr/1256' into maint-0.3.5

This commit is contained in:
teor 2019-10-23 08:28:03 +10:00
commit 003be727c4
No known key found for this signature in database
GPG Key ID: 10FEAA0E7075672A
7 changed files with 79 additions and 18 deletions

5
changes/bug23507 Normal file
View File

@ -0,0 +1,5 @@
o Minor bugfixes (v3 single onion services):
- Make v3 single onion services fall back to a 3-hop intro, when there
all intro points are unreachable via a 1-hop path. Previously, v3
single onion services failed when all intro nodes were unreachable
via a 1-hop path. Fixes bug 23507; bugfix on 0.3.2.1-alpha.

6
changes/bug23818_v2 Normal file
View File

@ -0,0 +1,6 @@
o Minor bugfixes (v2 single onion services):
- Always retry v2 single onion service intro and rend circuits with a
3-hop path. Previously, v2 single onion services used a 3-hop path
when rend circuits were retried after a remote or delayed failure,
but a 1-hop path for immediate retries. Fixes bug 23818;
bugfix on 0.2.9.3-alpha.

6
changes/bug23818_v3 Normal file
View File

@ -0,0 +1,6 @@
o Minor bugfixes (v3 single onion services):
- Always retry v3 single onion service intro and rend circuits with a
3-hop path. Previously, v3 single onion services used a 3-hop path
when rend circuits were retried after a remote or delayed failure,
but a 1-hop path for immediate retries. Fixes bug 23818;
bugfix on 0.3.2.1-alpha.

View File

@ -405,8 +405,12 @@ launch_rendezvous_point_circuit(const hs_service_t *service,
if (circ_needs_uptime) { if (circ_needs_uptime) {
circ_flags |= CIRCLAUNCH_NEED_UPTIME; circ_flags |= CIRCLAUNCH_NEED_UPTIME;
} }
/* Firewall and policies are checked when getting the extend info. */ /* Firewall and policies are checked when getting the extend info.
if (service->config.is_single_onion) { *
* We only use a one-hop path on the first attempt. If the first attempt
* fails, we use a 3-hop path for reachability / reliability.
* See the comment in retry_service_rendezvous_point() for details. */
if (service->config.is_single_onion && i == 0) {
circ_flags |= CIRCLAUNCH_ONEHOP_TUNNEL; circ_flags |= CIRCLAUNCH_ONEHOP_TUNNEL;
} }
@ -754,13 +758,16 @@ hs_circ_retry_service_rendezvous_point(origin_circuit_t *circ)
} }
/* For a given service and a service intro point, launch a circuit to the /* For a given service and a service intro point, launch a circuit to the
* extend info ei. If the service is a single onion, a one-hop circuit will be * extend info ei. If the service is a single onion, and direct_conn is true,
* requested. Return 0 if the circuit was successfully launched and tagged * a one-hop circuit will be requested.
*
* Return 0 if the circuit was successfully launched and tagged
* with the correct identifier. On error, a negative value is returned. */ * with the correct identifier. On error, a negative value is returned. */
int int
hs_circ_launch_intro_point(hs_service_t *service, hs_circ_launch_intro_point(hs_service_t *service,
const hs_service_intro_point_t *ip, const hs_service_intro_point_t *ip,
extend_info_t *ei) extend_info_t *ei,
bool direct_conn)
{ {
/* Standard flags for introduction circuit. */ /* Standard flags for introduction circuit. */
int ret = -1, circ_flags = CIRCLAUNCH_NEED_UPTIME | CIRCLAUNCH_IS_INTERNAL; int ret = -1, circ_flags = CIRCLAUNCH_NEED_UPTIME | CIRCLAUNCH_IS_INTERNAL;
@ -772,7 +779,16 @@ hs_circ_launch_intro_point(hs_service_t *service,
/* Update circuit flags in case of a single onion service that requires a /* Update circuit flags in case of a single onion service that requires a
* direct connection. */ * direct connection. */
if (service->config.is_single_onion) { tor_assert_nonfatal(ip->circuit_retries > 0);
/* Only single onion services can make direct conns */
if (BUG(!service->config.is_single_onion && direct_conn)) {
goto end;
}
/* We only use a one-hop path on the first attempt. If the first attempt
* fails, we use a 3-hop path for reachability / reliability.
* (Unlike v2, retries is incremented by the caller before it calls this
* function.) */
if (direct_conn && ip->circuit_retries == 1) {
circ_flags |= CIRCLAUNCH_ONEHOP_TUNNEL; circ_flags |= CIRCLAUNCH_ONEHOP_TUNNEL;
} }

View File

@ -26,7 +26,8 @@ void hs_circ_service_rp_has_opened(const hs_service_t *service,
origin_circuit_t *circ); origin_circuit_t *circ);
int hs_circ_launch_intro_point(hs_service_t *service, int hs_circ_launch_intro_point(hs_service_t *service,
const hs_service_intro_point_t *ip, const hs_service_intro_point_t *ip,
extend_info_t *ei); extend_info_t *ei,
bool direct_conn);
int hs_circ_launch_rendezvous_point(const hs_service_t *service, int hs_circ_launch_rendezvous_point(const hs_service_t *service,
const curve25519_public_key_t *onion_key, const curve25519_public_key_t *onion_key,
const uint8_t *rendezvous_cookie); const uint8_t *rendezvous_cookie);

View File

@ -2105,6 +2105,7 @@ build_all_descriptors(time_t now)
static hs_service_intro_point_t * static hs_service_intro_point_t *
pick_intro_point(unsigned int direct_conn, smartlist_t *exclude_nodes) pick_intro_point(unsigned int direct_conn, smartlist_t *exclude_nodes)
{ {
const or_options_t *options = get_options();
const node_t *node; const node_t *node;
extend_info_t *info = NULL; extend_info_t *info = NULL;
hs_service_intro_point_t *ip = NULL; hs_service_intro_point_t *ip = NULL;
@ -2113,11 +2114,19 @@ pick_intro_point(unsigned int direct_conn, smartlist_t *exclude_nodes)
/* Single onion flags. */ /* Single onion flags. */
router_crn_flags_t direct_flags = flags | CRN_PREF_ADDR | CRN_DIRECT_CONN; router_crn_flags_t direct_flags = flags | CRN_PREF_ADDR | CRN_DIRECT_CONN;
node = router_choose_random_node(exclude_nodes, get_options()->ExcludeNodes, node = router_choose_random_node(exclude_nodes, options->ExcludeNodes,
direct_conn ? direct_flags : flags); direct_conn ? direct_flags : flags);
/* Unable to find a node. When looking for a node for a direct connection,
* we could try a 3-hop path instead. We'll add support for this in a later /* If we are in single onion mode, retry node selection for a 3-hop
* release. */ * path */
if (direct_conn && !node) {
log_info(LD_REND,
"Unable to find an intro point that we can connect to "
"directly, falling back to a 3-hop path.");
node = router_choose_random_node(exclude_nodes, options->ExcludeNodes,
flags);
}
if (!node) { if (!node) {
goto err; goto err;
} }
@ -2644,7 +2653,7 @@ launch_intro_point_circuits(hs_service_t *service)
* circuits using the current map. */ * circuits using the current map. */
FOR_EACH_DESCRIPTOR_BEGIN(service, desc) { FOR_EACH_DESCRIPTOR_BEGIN(service, desc) {
/* Keep a ref on if we need a direct connection. We use this often. */ /* Keep a ref on if we need a direct connection. We use this often. */
unsigned int direct_conn = service->config.is_single_onion; bool direct_conn = service->config.is_single_onion;
DIGEST256MAP_FOREACH_MODIFY(desc->intro_points.map, key, DIGEST256MAP_FOREACH_MODIFY(desc->intro_points.map, key,
hs_service_intro_point_t *, ip) { hs_service_intro_point_t *, ip) {
@ -2655,8 +2664,15 @@ launch_intro_point_circuits(hs_service_t *service)
if (hs_circ_service_get_intro_circ(ip)) { if (hs_circ_service_get_intro_circ(ip)) {
continue; continue;
} }
ei = get_extend_info_from_intro_point(ip, direct_conn); ei = get_extend_info_from_intro_point(ip, direct_conn);
/* If we can't connect directly to the intro point, get an extend_info
* for a multi-hop path instead. */
if (ei == NULL && direct_conn) {
direct_conn = false;
ei = get_extend_info_from_intro_point(ip, 0);
}
if (ei == NULL) { if (ei == NULL) {
/* This is possible if we can get a node_t but not the extend info out /* This is possible if we can get a node_t but not the extend info out
* of it. In this case, we remove the intro point and a new one will * of it. In this case, we remove the intro point and a new one will
@ -2668,7 +2684,7 @@ launch_intro_point_circuits(hs_service_t *service)
/* Launch a circuit to the intro point. */ /* Launch a circuit to the intro point. */
ip->circuit_retries++; ip->circuit_retries++;
if (hs_circ_launch_intro_point(service, ip, ei) < 0) { if (hs_circ_launch_intro_point(service, ip, ei, direct_conn) < 0) {
log_info(LD_REND, "Unable to launch intro circuit to node %s " log_info(LD_REND, "Unable to launch intro circuit to node %s "
"for service %s.", "for service %s.",
safe_str_client(extend_info_describe(ei)), safe_str_client(extend_info_describe(ei)),

View File

@ -2122,8 +2122,12 @@ rend_service_receive_introduction(origin_circuit_t *circuit,
int flags = CIRCLAUNCH_NEED_CAPACITY | CIRCLAUNCH_IS_INTERNAL; int flags = CIRCLAUNCH_NEED_CAPACITY | CIRCLAUNCH_IS_INTERNAL;
if (circ_needs_uptime) flags |= CIRCLAUNCH_NEED_UPTIME; if (circ_needs_uptime) flags |= CIRCLAUNCH_NEED_UPTIME;
/* A Single Onion Service only uses a direct connection if its /* A Single Onion Service only uses a direct connection if its
* firewall rules permit direct connections to the address. */ * firewall rules permit direct connections to the address.
if (rend_service_use_direct_connection(options, rp)) { *
* We only use a one-hop path on the first attempt. If the first attempt
* fails, we use a 3-hop path for reachability / reliability.
* See the comment in rend_service_relauch_rendezvous() for details. */
if (rend_service_use_direct_connection(options, rp) && i == 0) {
flags = flags | CIRCLAUNCH_ONEHOP_TUNNEL; flags = flags | CIRCLAUNCH_ONEHOP_TUNNEL;
} }
launched = circuit_launch_by_extend_info( launched = circuit_launch_by_extend_info(
@ -3063,8 +3067,15 @@ rend_service_launch_establish_intro(rend_service_t *service,
extend_info_t *launch_ei = intro->extend_info; extend_info_t *launch_ei = intro->extend_info;
extend_info_t *direct_ei = NULL; extend_info_t *direct_ei = NULL;
/* Are we in single onion mode? */ /* Are we in single onion mode?
if (rend_service_allow_non_anonymous_connection(options)) { *
* We only use a one-hop path on the first attempt. If the first attempt
* fails, we use a 3-hop path for reachability / reliability.
* (Unlike v3, retries is incremented by the caller after it calls this
* function.)
*/
if (rend_service_allow_non_anonymous_connection(options) &&
intro->circuit_retries == 0) {
/* Do we have a descriptor for the node? /* Do we have a descriptor for the node?
* We've either just chosen it from the consensus, or we've just reviewed * We've either just chosen it from the consensus, or we've just reviewed
* our intro points to see which ones are still valid, and deleted the ones * our intro points to see which ones are still valid, and deleted the ones