mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 13:13:44 +01:00
hs-v3: Report SOCKS ExtendedErrors when all intro timed out
Signed-off-by: David Goulet <dgoulet@torproject.org>
This commit is contained in:
parent
cf39276f78
commit
6ab11bbf30
@ -961,6 +961,37 @@ client_get_random_intro(const ed25519_public_key_t *service_pk)
|
||||
return ei;
|
||||
}
|
||||
|
||||
/** Return true iff all intro points for the given service have timed out. */
|
||||
static bool
|
||||
intro_points_all_timed_out(const ed25519_public_key_t *service_pk)
|
||||
{
|
||||
bool ret = false;
|
||||
|
||||
tor_assert(service_pk);
|
||||
|
||||
const hs_descriptor_t *desc = hs_cache_lookup_as_client(service_pk);
|
||||
|
||||
SMARTLIST_FOREACH_BEGIN(desc->encrypted_data.intro_points,
|
||||
const hs_desc_intro_point_t *, ip) {
|
||||
const hs_cache_intro_state_t *state =
|
||||
hs_cache_client_intro_state_find(service_pk,
|
||||
&ip->auth_key_cert->signed_key);
|
||||
if (!state || !state->timed_out) {
|
||||
/* No state or if this intro point has not timed out, we are done since
|
||||
* clearly not all of them have timed out. */
|
||||
goto end;
|
||||
}
|
||||
} SMARTLIST_FOREACH_END(ip);
|
||||
|
||||
/* Exiting the loop here means that all intro points we've looked at have
|
||||
* timed out. Note that we can _not_ have a descriptor without intro points
|
||||
* in the client cache. */
|
||||
ret = true;
|
||||
|
||||
end:
|
||||
return ret;
|
||||
}
|
||||
|
||||
/** Called when a rendezvous circuit has timed out. Every streams attached to
|
||||
* the circuit will get set with the SOCKS5_HS_REND_FAILED (0xF3) extended
|
||||
* error code so if the connection to the rendezvous point ends up not
|
||||
@ -986,14 +1017,23 @@ socks_report_rend_circuit_timed_out(const origin_circuit_t *rend_circ)
|
||||
* introduction points to be used (either NACKed or failed) for the given
|
||||
* entry connection.
|
||||
*
|
||||
* This function only reports back the SOCKS5_HS_INTRO_FAILED (0xF2) code. The
|
||||
* caller has to make sure to close the entry connections. */
|
||||
* This function only reports back the SOCKS5_HS_INTRO_FAILED (0xF2) code or
|
||||
* SOCKS5_HS_INTRO_TIMEDOUT (0xF7) if all intros have timed out. The caller
|
||||
* has to make sure to close the entry connections. */
|
||||
static void
|
||||
socks_report_introduction_failed(entry_connection_t *conn)
|
||||
socks_report_introduction_failed(entry_connection_t *conn,
|
||||
const ed25519_public_key_t *identity_pk)
|
||||
{
|
||||
socks5_reply_status_t code = SOCKS5_HS_INTRO_FAILED;
|
||||
|
||||
tor_assert(conn);
|
||||
tor_assert(conn->socks_request);
|
||||
conn->socks_request->socks_extended_error_code = SOCKS5_HS_INTRO_FAILED;
|
||||
tor_assert(identity_pk);
|
||||
|
||||
if (intro_points_all_timed_out(identity_pk)) {
|
||||
code = SOCKS5_HS_INTRO_TIMEDOUT;
|
||||
}
|
||||
conn->socks_request->socks_extended_error_code = code;
|
||||
}
|
||||
|
||||
/** For this introduction circuit, we'll look at if we have any usable
|
||||
@ -1350,7 +1390,7 @@ client_desc_has_arrived(const smartlist_t *entry_conns)
|
||||
"Closing streams.");
|
||||
/* Report the extended socks error code that we were unable to introduce
|
||||
* to the service. */
|
||||
socks_report_introduction_failed(entry_conn);
|
||||
socks_report_introduction_failed(entry_conn, identity_pk);
|
||||
|
||||
connection_mark_unattached_ap(entry_conn,
|
||||
END_STREAM_REASON_RESOLVEFAILED);
|
||||
|
@ -37,6 +37,7 @@ typedef enum {
|
||||
SOCKS5_HS_MISSING_CLIENT_AUTH = 0xF4,
|
||||
SOCKS5_HS_BAD_CLIENT_AUTH = 0xF5,
|
||||
SOCKS5_HS_BAD_ADDRESS = 0xF6,
|
||||
SOCKS5_HS_INTRO_TIMEDOUT = 0xF7,
|
||||
} socks5_reply_status_t;
|
||||
|
||||
#endif /* !defined(TOR_SOCKS5_STATUS_H) */
|
||||
|
Loading…
Reference in New Issue
Block a user