Merge remote-tracking branch 'tor-github/pr/1382'

This commit is contained in:
Nick Mathewson 2019-10-03 09:08:23 -04:00
commit de7fcae72a
3 changed files with 46 additions and 21 deletions

4
changes/bug28966 Normal file
View File

@ -0,0 +1,4 @@
o Minor features (onion services v3):
- Assist users who try to setup v2 client authorization in v3 onion
services by pointing them to the right documentation. Closes ticket
28966.

View File

@ -1142,7 +1142,7 @@ The following options are useful only for clients (that is, if
information) to port 80. information) to port 80.
[[HidServAuth]] **HidServAuth** __onion-address__ __auth-cookie__ [__service-name__]:: [[HidServAuth]] **HidServAuth** __onion-address__ __auth-cookie__ [__service-name__]::
Client authorization for a hidden service. Valid onion addresses contain 16 Client authorization for a v2 hidden service. Valid onion addresses contain 16
characters in a-z2-7 plus ".onion", and valid auth cookies contain 22 characters in a-z2-7 plus ".onion", and valid auth cookies contain 22
characters in A-Za-z0-9+/. The service name is only used for internal characters in A-Za-z0-9+/. The service name is only used for internal
purposes, e.g., for Tor controllers. This option may be used multiple times purposes, e.g., for Tor controllers. This option may be used multiple times
@ -2961,7 +2961,7 @@ The next section describes the per service options that can only be set
service. Currently, versions 2 and 3 are supported. (Default: 3) service. Currently, versions 2 and 3 are supported. (Default: 3)
[[HiddenServiceAuthorizeClient]] **HiddenServiceAuthorizeClient** __auth-type__ __client-name__,__client-name__,__...__:: [[HiddenServiceAuthorizeClient]] **HiddenServiceAuthorizeClient** __auth-type__ __client-name__,__client-name__,__...__::
If configured, the hidden service is accessible for authorized clients If configured, the v2 hidden service is accessible for authorized clients
only. The auth-type can either be \'basic' for a general-purpose only. The auth-type can either be \'basic' for a general-purpose
authorization protocol or \'stealth' for a less scalable protocol that also authorization protocol or \'stealth' for a less scalable protocol that also
hides service activity from unauthorized clients. Only clients that are hides service activity from unauthorized clients. Only clients that are
@ -3105,31 +3105,42 @@ Client Authorization
(Version 3 only) (Version 3 only)
To configure client authorization on the service side, the Service side:
"<HiddenServiceDir>/authorized_clients/" directory needs to exist. Each file
in that directory should be suffixed with ".auth" (i.e. "alice.auth"; the
file name is irrelevant) and its content format MUST be:
<auth-type>:<key-type>:<base32-encoded-public-key> To configure client authorization on the service side, the
"<HiddenServiceDir>/authorized_clients/" directory needs to exist. Each file
in that directory should be suffixed with ".auth" (i.e. "alice.auth"; the
file name is irrelevant) and its content format MUST be:
The supported <auth-type> are: "descriptor". The supported <key-type> are: <auth-type>:<key-type>:<base32-encoded-public-key>
"x25519". The <base32-encoded-public-key> is the base32 representation of
the raw key bytes only (32 bytes for x25519).
Each file MUST contain one line only. Any malformed file will be The supported <auth-type> are: "descriptor". The supported <key-type> are:
ignored. Client authorization will only be enabled for the service if tor "x25519". The <base32-encoded-public-key> is the base32 representation of
successfully loads at least one authorization file. the raw key bytes only (32 bytes for x25519).
Note that once you've configured client authorization, anyone else with the Each file MUST contain one line only. Any malformed file will be
address won't be able to access it from this point on. If no authorization is ignored. Client authorization will only be enabled for the service if tor
configured, the service will be accessible to anyone with the onion address. successfully loads at least one authorization file.
Revoking a client can be done by removing their ".auth" file, however the Note that once you've configured client authorization, anyone else with the
revocation will be in effect only after the tor process gets restarted even if address won't be able to access it from this point on. If no authorization is
a SIGHUP takes place. configured, the service will be accessible to anyone with the onion address.
See the Appendix G in the rend-spec-v3.txt file of Revoking a client can be done by removing their ".auth" file, however the
https://spec.torproject.org/[torspec] for more information. revocation will be in effect only after the tor process gets restarted even if
a SIGHUP takes place.
Client side:
To access a v3 onion service with client authorization as a client, make sure
you have ClientOnionAuthDir set in your torrc. Then, in the
<ClientOnionAuthDir> directory, create an .auth_private file for the onion
service corresponding to this key (i.e. 'bob_onion.auth_private'). The
contents of the <ClientOnionAuthDir>/<user>.auth_private file should look like:
<56-char-onion-addr-without-.onion-part>:descriptor:x25519:<x25519 private key in base32>
For more information, please see https://2019.www.torproject.org/docs/tor-onion-service.html.en#ClientAuthorization .
TESTING NETWORK OPTIONS TESTING NETWORK OPTIONS
----------------------- -----------------------

View File

@ -253,6 +253,16 @@ config_has_invalid_options(const config_line_t *line_,
"version %" PRIu32 " of service in %s", "version %" PRIu32 " of service in %s",
opt, service->config.version, opt, service->config.version,
service->config.directory_path); service->config.directory_path);
if (!strcasecmp(line->key, "HiddenServiceAuthorizeClient")) {
/* Special case this v2 option so that we can offer alternatives.
* If more such special cases appear, it would be good to
* generalize the exception mechanism here. */
log_warn(LD_CONFIG, "For v3 onion service client authorization, "
"please read the 'CLIENT AUTHORIZATION' section in the "
"manual.");
}
ret = 1; ret = 1;
/* Continue the loop so we can find all possible options. */ /* Continue the loop so we can find all possible options. */
continue; continue;