mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 13:13:44 +01:00
Merge remote-tracking branch 'tor-gitlab/mr/100'
This commit is contained in:
commit
04926126ee
6
changes/feature30045
Normal file
6
changes/feature30045
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
o Minor features (admin tools):
|
||||||
|
- Add new --format argument to -key-expiration option to allow
|
||||||
|
specifying the time format of expiration date. Adds Unix
|
||||||
|
timestamp format support. Patch by Daniel Pinto. Closes
|
||||||
|
ticket 30045.
|
||||||
|
|
@ -174,16 +174,22 @@ The following options in this section are only recognized on the
|
|||||||
If the file descriptor is not specified, the passphrase is read
|
If the file descriptor is not specified, the passphrase is read
|
||||||
from the terminal by default.
|
from the terminal by default.
|
||||||
|
|
||||||
[[opt-key-expiration]] **`--key-expiration`** [__purpose__]::
|
[[opt-key-expiration]] **`--key-expiration`** [__purpose__] [**`--format`** **`iso8601`**|**`timestamp`**]::
|
||||||
The __purpose__ specifies which type of key certificate to determine
|
The __purpose__ specifies which type of key certificate to determine
|
||||||
the expiration of. The only currently recognised __purpose__ is
|
the expiration of. The only currently recognised __purpose__ is
|
||||||
"sign". +
|
"sign". +
|
||||||
+
|
+
|
||||||
Running **`tor --key-expiration sign`** will attempt to find your
|
Running **`tor --key-expiration sign`** will attempt to find your
|
||||||
signing key certificate and will output, both in the logs as well
|
signing key certificate and will output, both in the logs as well
|
||||||
as to stdout, the signing key certificate's expiration time in
|
as to stdout. The optional **`--format`** argument lets you specify
|
||||||
ISO-8601 format. For example, the output sent to stdout will be
|
the time format. Currently, **`iso8601`** and **`timestamp`** are
|
||||||
of the form: "signing-cert-expiry: 2017-07-25 08:30:15 UTC"
|
supported. If **`--format`** is not specified, the signing key
|
||||||
|
certificate's expiration time will be in ISO-8601 format. For example,
|
||||||
|
the output sent to stdout will be of the form:
|
||||||
|
"signing-cert-expiry: 2017-07-25 08:30:15 UTC". If **`--format`** **`timestamp`**
|
||||||
|
is specified, the signing key certificate's expiration time will be in
|
||||||
|
Unix timestamp format. For example, the output sent to stdout will be of the form:
|
||||||
|
"signing-cert-expiry: 1500971415".
|
||||||
|
|
||||||
[[opt-dbg]] **--dbg-**...::
|
[[opt-dbg]] **--dbg-**...::
|
||||||
Tor may support other options beginning with the string "dbg". These
|
Tor may support other options beginning with the string "dbg". These
|
||||||
|
@ -37,7 +37,7 @@ problem file-size /src/app/config/config.c 7525
|
|||||||
problem include-count /src/app/config/config.c 81
|
problem include-count /src/app/config/config.c 81
|
||||||
problem function-size /src/app/config/config.c:options_act() 381
|
problem function-size /src/app/config/config.c:options_act() 381
|
||||||
problem function-size /src/app/config/config.c:options_validate_cb() 794
|
problem function-size /src/app/config/config.c:options_validate_cb() 794
|
||||||
problem function-size /src/app/config/config.c:options_init_from_torrc() 198
|
problem function-size /src/app/config/config.c:options_init_from_torrc() 230
|
||||||
problem function-size /src/app/config/config.c:options_init_from_string() 103
|
problem function-size /src/app/config/config.c:options_init_from_string() 103
|
||||||
problem function-size /src/app/config/config.c:options_init_logs() 125
|
problem function-size /src/app/config/config.c:options_init_logs() 125
|
||||||
problem function-size /src/app/config/config.c:parse_bridge_line() 104
|
problem function-size /src/app/config/config.c:parse_bridge_line() 104
|
||||||
@ -47,7 +47,7 @@ problem function-size /src/app/config/config.c:parse_dir_fallback_line() 101
|
|||||||
problem function-size /src/app/config/config.c:port_parse_config() 435
|
problem function-size /src/app/config/config.c:port_parse_config() 435
|
||||||
problem function-size /src/app/config/config.c:parse_ports() 132
|
problem function-size /src/app/config/config.c:parse_ports() 132
|
||||||
problem function-size /src/app/config/resolve_addr.c:resolve_my_address_v4() 197
|
problem function-size /src/app/config/resolve_addr.c:resolve_my_address_v4() 197
|
||||||
problem file-size /src/app/config/or_options_st.h 1050
|
problem file-size /src/app/config/or_options_st.h 1072
|
||||||
problem include-count /src/app/main/main.c 71
|
problem include-count /src/app/main/main.c 71
|
||||||
problem function-size /src/app/main/main.c:dumpstats() 102
|
problem function-size /src/app/main/main.c:dumpstats() 102
|
||||||
problem function-size /src/app/main/main.c:tor_init() 109
|
problem function-size /src/app/main/main.c:tor_init() 109
|
||||||
|
@ -2468,6 +2468,8 @@ static const struct {
|
|||||||
{ .name="--key-expiration",
|
{ .name="--key-expiration",
|
||||||
.takes_argument=ARGUMENT_OPTIONAL,
|
.takes_argument=ARGUMENT_OPTIONAL,
|
||||||
.command=CMD_KEY_EXPIRATION },
|
.command=CMD_KEY_EXPIRATION },
|
||||||
|
{ .name="--format",
|
||||||
|
.takes_argument=ARGUMENT_NECESSARY },
|
||||||
{ .name="--newpass" },
|
{ .name="--newpass" },
|
||||||
{ .name="--no-passphrase" },
|
{ .name="--no-passphrase" },
|
||||||
{ .name="--passphrase-fd",
|
{ .name="--passphrase-fd",
|
||||||
@ -4425,6 +4427,38 @@ options_init_from_torrc(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const config_line_t *format_line = config_line_find(cmdline_only_options,
|
||||||
|
"--format");
|
||||||
|
if (format_line) {
|
||||||
|
if (command == CMD_KEY_EXPIRATION) {
|
||||||
|
const char *v = format_line->value;
|
||||||
|
// keep the same order as enum key_expiration_format
|
||||||
|
const char *formats[] = { "iso8601", "timestamp" };
|
||||||
|
int format = -1;
|
||||||
|
for (unsigned i = 0; i < ARRAY_LENGTH(formats); i++) {
|
||||||
|
if (!strcmp(v, formats[i])) {
|
||||||
|
format = i;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (format < 0) {
|
||||||
|
log_err(LD_CONFIG, "Invalid --format value %s", escaped(v));
|
||||||
|
retval = -1;
|
||||||
|
goto err;
|
||||||
|
} else {
|
||||||
|
get_options_mutable()->key_expiration_format = format;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
log_err(LD_CONFIG, "--format specified without --key-expiration!");
|
||||||
|
retval = -1;
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
get_options_mutable()->key_expiration_format =
|
||||||
|
KEY_EXPIRATION_FORMAT_ISO8601;
|
||||||
|
}
|
||||||
|
|
||||||
if (config_line_find(cmdline_only_options, "--newpass")) {
|
if (config_line_find(cmdline_only_options, "--newpass")) {
|
||||||
if (command == CMD_KEYGEN) {
|
if (command == CMD_KEYGEN) {
|
||||||
get_options_mutable()->change_key_passphrase = 1;
|
get_options_mutable()->change_key_passphrase = 1;
|
||||||
|
@ -35,6 +35,12 @@ typedef enum {
|
|||||||
TCP_PROXY_PROTOCOL_HAPROXY
|
TCP_PROXY_PROTOCOL_HAPROXY
|
||||||
} tcp_proxy_protocol_t;
|
} tcp_proxy_protocol_t;
|
||||||
|
|
||||||
|
/** Enumeration of available time formats for output of --key-expiration */
|
||||||
|
typedef enum {
|
||||||
|
KEY_EXPIRATION_FORMAT_ISO8601 = 0,
|
||||||
|
KEY_EXPIRATION_FORMAT_TIMESTAMP
|
||||||
|
} key_expiration_format_t;
|
||||||
|
|
||||||
/** Configuration options for a Tor process. */
|
/** Configuration options for a Tor process. */
|
||||||
struct or_options_t {
|
struct or_options_t {
|
||||||
uint32_t magic_;
|
uint32_t magic_;
|
||||||
@ -944,6 +950,8 @@ struct or_options_t {
|
|||||||
* ed25519 identity key except from tor --keygen */
|
* ed25519 identity key except from tor --keygen */
|
||||||
int OfflineMasterKey;
|
int OfflineMasterKey;
|
||||||
|
|
||||||
|
key_expiration_format_t key_expiration_format;
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
FORCE_PASSPHRASE_AUTO=0,
|
FORCE_PASSPHRASE_AUTO=0,
|
||||||
FORCE_PASSPHRASE_ON,
|
FORCE_PASSPHRASE_ON,
|
||||||
|
@ -519,19 +519,33 @@ print_cert_expiration(const char *expiration,
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Log when a certificate, <b>cert</b>, with some <b>description</b> and
|
* Log when a certificate, <b>cert</b>, with some <b>description</b> and
|
||||||
* stored in a file named <b>fname</b>, is going to expire.
|
* stored in a file named <b>fname</b>, is going to expire. Formats the expire
|
||||||
|
* time according to <b>time_format</b>.
|
||||||
*/
|
*/
|
||||||
static void
|
static void
|
||||||
log_ed_cert_expiration(const tor_cert_t *cert,
|
log_ed_cert_expiration(const tor_cert_t *cert,
|
||||||
const char *description,
|
const char *description,
|
||||||
const char *fname) {
|
const char *fname,
|
||||||
char expiration[ISO_TIME_LEN+1];
|
key_expiration_format_t time_format) {
|
||||||
|
|
||||||
if (BUG(!cert)) { /* If the specified key hasn't been loaded */
|
if (BUG(!cert)) { /* If the specified key hasn't been loaded */
|
||||||
log_warn(LD_OR, "No %s key loaded; can't get certificate expiration.",
|
log_warn(LD_OR, "No %s key loaded; can't get certificate expiration.",
|
||||||
description);
|
description);
|
||||||
} else {
|
} else {
|
||||||
|
char expiration[ISO_TIME_LEN+1];
|
||||||
|
switch (time_format) {
|
||||||
|
case KEY_EXPIRATION_FORMAT_ISO8601:
|
||||||
format_local_iso_time(expiration, cert->valid_until);
|
format_local_iso_time(expiration, cert->valid_until);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case KEY_EXPIRATION_FORMAT_TIMESTAMP:
|
||||||
|
tor_snprintf(expiration, sizeof(expiration), "%"PRId64,
|
||||||
|
(int64_t) cert->valid_until);
|
||||||
|
break;
|
||||||
|
|
||||||
|
default:
|
||||||
|
log_err(LD_BUG, "Unknown time format value: %d.", time_format);
|
||||||
|
return;
|
||||||
|
}
|
||||||
log_notice(LD_OR, "The %s certificate stored in %s is valid until %s.",
|
log_notice(LD_OR, "The %s certificate stored in %s is valid until %s.",
|
||||||
description, fname, expiration);
|
description, fname, expiration);
|
||||||
print_cert_expiration(expiration, description);
|
print_cert_expiration(expiration, description);
|
||||||
@ -567,7 +581,8 @@ log_master_signing_key_cert_expiration(const or_options_t *options)
|
|||||||
|
|
||||||
/* If we do have a signing key, log the expiration time. */
|
/* If we do have a signing key, log the expiration time. */
|
||||||
if (signing_key) {
|
if (signing_key) {
|
||||||
log_ed_cert_expiration(signing_key, "signing", fn);
|
key_expiration_format_t time_format = options->key_expiration_format;
|
||||||
|
log_ed_cert_expiration(signing_key, "signing", fn, time_format);
|
||||||
} else {
|
} else {
|
||||||
log_warn(LD_OR, "Could not load signing key certificate from %s, so " \
|
log_warn(LD_OR, "Could not load signing key certificate from %s, so " \
|
||||||
"we couldn't learn anything about certificate expiration.", fn);
|
"we couldn't learn anything about certificate expiration.", fn);
|
||||||
|
@ -61,6 +61,11 @@ fi
|
|||||||
CASE1=$dflt
|
CASE1=$dflt
|
||||||
CASE2=$dflt
|
CASE2=$dflt
|
||||||
CASE3=$dflt
|
CASE3=$dflt
|
||||||
|
CASE4=$dflt
|
||||||
|
CASE5=$dflt
|
||||||
|
CASE6=$dflt
|
||||||
|
CASE7=$dflt
|
||||||
|
CASE8=$dflt
|
||||||
|
|
||||||
if [ $# -ge 1 ]; then
|
if [ $# -ge 1 ]; then
|
||||||
eval "CASE${1}"=1
|
eval "CASE${1}"=1
|
||||||
@ -125,16 +130,17 @@ if [ "$CASE1" = 1 ]; then
|
|||||||
|
|
||||||
${TOR} ${QUIETLY} --key-expiration 2>"$FN" || true
|
${TOR} ${QUIETLY} --key-expiration 2>"$FN" || true
|
||||||
grep "No valid argument to --key-expiration found!" "$FN" >/dev/null || \
|
grep "No valid argument to --key-expiration found!" "$FN" >/dev/null || \
|
||||||
die "Tor didn't mention supported --key-expiration argmuents"
|
die "Tor didn't mention supported --key-expiration arguments"
|
||||||
|
|
||||||
echo "==== Case 1: ok"
|
echo "==== Case 1: ok"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ "$CASE2" = 1 ]; then
|
if [ "$CASE2" = 1 ]; then
|
||||||
echo "==== Case 2: Start Tor with --key-expiration 'sign' and make sure it prints an expiration."
|
echo "==== Case 2: Start Tor with --key-expiration 'sign' and make sure it"
|
||||||
|
echo " prints an expiration using ISO8601 date format."
|
||||||
|
|
||||||
${TOR} ${QUIETLY} --key-expiration sign 2>"$FN"
|
${TOR} ${QUIETLY} --key-expiration sign 2>"$FN"
|
||||||
grep "signing-cert-expiry:" "$FN" >/dev/null || \
|
grep "signing-cert-expiry: [0-9]\{4\}-[0-9]\{2\}-[0-9]\{2\} [0-9]\{2\}:[0-9]\{2\}:[0-9]\{2\}" "$FN" >/dev/null || \
|
||||||
die "Tor didn't print an expiration"
|
die "Tor didn't print an expiration"
|
||||||
|
|
||||||
echo "==== Case 2: ok"
|
echo "==== Case 2: ok"
|
||||||
@ -160,3 +166,61 @@ if [ "$CASE3" = 1 ]; then
|
|||||||
|
|
||||||
echo "==== Case 3: ok"
|
echo "==== Case 3: ok"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [ "$CASE4" = 1 ]; then
|
||||||
|
echo "==== Case 4: Start Tor with --format iso8601 and make sure it prints an"
|
||||||
|
echo " error message due to missing --key-expiration argument."
|
||||||
|
|
||||||
|
${TOR} --format iso8601 > "$FN" 2>&1 || true
|
||||||
|
grep -- "--format specified without --key-expiration!" "$FN" >/dev/null || \
|
||||||
|
die "Tor didn't print a missing --key-expiration error message"
|
||||||
|
|
||||||
|
echo "==== Case 4: ok"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "$CASE5" = 1 ]; then
|
||||||
|
echo "==== Case 5: Start Tor with --key-expiration 'sign' --format '' and"
|
||||||
|
echo " make sure it prints an error message due to missing value."
|
||||||
|
|
||||||
|
${TOR} --key-expiration sign --format > "$FN" 2>&1 || true
|
||||||
|
grep "Command-line option '--format' with no value. Failing." "$FN" >/dev/null || \
|
||||||
|
die "Tor didn't print a missing format value error message"
|
||||||
|
|
||||||
|
echo "==== Case 5: ok"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "$CASE6" = 1 ]; then
|
||||||
|
echo "==== Case 6: Start Tor with --key-expiration 'sign' --format 'invalid'"
|
||||||
|
echo " and make sure it prints an error message due to invalid"
|
||||||
|
echo " value."
|
||||||
|
|
||||||
|
${TOR} --key-expiration sign --format invalid > "$FN" 2>&1 || true
|
||||||
|
grep "Invalid --format value" "$FN" >/dev/null || \
|
||||||
|
die "Tor didn't print an invalid format value error message"
|
||||||
|
|
||||||
|
echo "==== Case 6: ok"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "$CASE7" = 1 ]; then
|
||||||
|
echo "==== Case 7: Start Tor with --key-expiration 'sign' --format 'iso8601'"
|
||||||
|
echo " and make sure it prints an expiration using ISO8601 date"
|
||||||
|
echo " format."
|
||||||
|
|
||||||
|
${TOR} ${QUIETLY} --key-expiration sign --format iso8601 2>"$FN"
|
||||||
|
grep "signing-cert-expiry: [0-9]\{4\}-[0-9]\{2\}-[0-9]\{2\} [0-9]\{2\}:[0-9]\{2\}:[0-9]\{2\}" "$FN" >/dev/null || \
|
||||||
|
die "Tor didn't print an expiration"
|
||||||
|
|
||||||
|
echo "==== Case 7: ok"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "$CASE8" = 1 ]; then
|
||||||
|
echo "==== Case 8: Start Tor with --key-expiration 'sign' --format 'timestamp'"
|
||||||
|
echo " and make sure it prints an expiration using timestamp date"
|
||||||
|
echo " format."
|
||||||
|
|
||||||
|
${TOR} ${QUIETLY} --key-expiration sign --format timestamp 2>"$FN"
|
||||||
|
grep "signing-cert-expiry: [0-9]\{5,\}" "$FN" >/dev/null || \
|
||||||
|
die "Tor didn't print an expiration"
|
||||||
|
|
||||||
|
echo "==== Case 8: ok"
|
||||||
|
fi
|
||||||
|
Loading…
Reference in New Issue
Block a user