mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 22:03:31 +01:00
Merge branch 'bug24895_031_02' into bug24895_032_02
This commit is contained in:
commit
f870f9c8bc
8
changes/bug24895
Normal file
8
changes/bug24895
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
o Major bugfixes (onion services):
|
||||||
|
- Fix an "off by 2" error in counting rendezvous failures on the onion
|
||||||
|
service side. While we thought we would stop the rendezvous attempt
|
||||||
|
after one failed circuit, we were actually making three circuit attempts
|
||||||
|
before giving up. Now switch to a default of 2, and allow the consensus
|
||||||
|
parameter "hs_service_max_rdv_failures" to override. Fixes bug 24895;
|
||||||
|
bugfix on 0.0.6.
|
||||||
|
|
@ -484,9 +484,14 @@ can_relaunch_service_rendezvous_point(const origin_circuit_t *circ)
|
|||||||
goto disallow;
|
goto disallow;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* We check failure_count >= hs_get_service_max_rend_failures()-1 below, and
|
||||||
|
* the -1 is because we increment the failure count for our current failure
|
||||||
|
* *after* this clause. */
|
||||||
|
int max_rend_failures = hs_get_service_max_rend_failures() - 1;
|
||||||
|
|
||||||
/* A failure count that has reached maximum allowed or circuit that expired,
|
/* A failure count that has reached maximum allowed or circuit that expired,
|
||||||
* we skip relaunching. */
|
* we skip relaunching. */
|
||||||
if (circ->build_state->failure_count > MAX_REND_FAILURES ||
|
if (circ->build_state->failure_count > max_rend_failures ||
|
||||||
circ->build_state->expiry_time <= time(NULL)) {
|
circ->build_state->expiry_time <= time(NULL)) {
|
||||||
log_info(LD_REND, "Attempt to build a rendezvous circuit to %s has "
|
log_info(LD_REND, "Attempt to build a rendezvous circuit to %s has "
|
||||||
"failed with %d attempts and expiry time %ld. "
|
"failed with %d attempts and expiry time %ld. "
|
||||||
|
@ -210,6 +210,23 @@ hs_check_service_private_dir(const char *username, const char *path,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Default, minimum and maximum values for the maximum rendezvous failures
|
||||||
|
* consensus parameter. */
|
||||||
|
#define MAX_REND_FAILURES_DEFAULT 2
|
||||||
|
#define MAX_REND_FAILURES_MIN 1
|
||||||
|
#define MAX_REND_FAILURES_MAX 10
|
||||||
|
|
||||||
|
/** How many times will a hidden service operator attempt to connect to
|
||||||
|
* a requested rendezvous point before giving up? */
|
||||||
|
int
|
||||||
|
hs_get_service_max_rend_failures(void)
|
||||||
|
{
|
||||||
|
return networkstatus_get_param(NULL, "hs_service_max_rdv_failures",
|
||||||
|
MAX_REND_FAILURES_DEFAULT,
|
||||||
|
MAX_REND_FAILURES_MIN,
|
||||||
|
MAX_REND_FAILURES_MAX);
|
||||||
|
}
|
||||||
|
|
||||||
/** Get the default HS time period length in minutes from the consensus. */
|
/** Get the default HS time period length in minutes from the consensus. */
|
||||||
STATIC uint64_t
|
STATIC uint64_t
|
||||||
get_time_period_length(void)
|
get_time_period_length(void)
|
||||||
|
@ -166,6 +166,8 @@ void hs_cleanup_circ(circuit_t *circ);
|
|||||||
int hs_check_service_private_dir(const char *username, const char *path,
|
int hs_check_service_private_dir(const char *username, const char *path,
|
||||||
unsigned int dir_group_readable,
|
unsigned int dir_group_readable,
|
||||||
unsigned int create);
|
unsigned int create);
|
||||||
|
int hs_get_service_max_rend_failures(void);
|
||||||
|
|
||||||
char *hs_path_from_filename(const char *directory, const char *filename);
|
char *hs_path_from_filename(const char *directory, const char *filename);
|
||||||
void hs_build_address(const ed25519_public_key_t *key, uint8_t version,
|
void hs_build_address(const ed25519_public_key_t *key, uint8_t version,
|
||||||
char *addr_out);
|
char *addr_out);
|
||||||
|
@ -2042,7 +2042,8 @@ rend_service_receive_introduction(origin_circuit_t *circuit,
|
|||||||
|
|
||||||
/* Launch a circuit to the client's chosen rendezvous point.
|
/* Launch a circuit to the client's chosen rendezvous point.
|
||||||
*/
|
*/
|
||||||
for (i=0;i<MAX_REND_FAILURES;i++) {
|
int max_rend_failures=hs_get_service_max_rend_failures();
|
||||||
|
for (i=0;i<max_rend_failures;i++) {
|
||||||
int flags = CIRCLAUNCH_NEED_CAPACITY | CIRCLAUNCH_IS_INTERNAL;
|
int flags = CIRCLAUNCH_NEED_CAPACITY | CIRCLAUNCH_IS_INTERNAL;
|
||||||
if (circ_needs_uptime) flags |= CIRCLAUNCH_NEED_UPTIME;
|
if (circ_needs_uptime) flags |= CIRCLAUNCH_NEED_UPTIME;
|
||||||
/* A Single Onion Service only uses a direct connection if its
|
/* A Single Onion Service only uses a direct connection if its
|
||||||
@ -2938,7 +2939,6 @@ rend_service_relaunch_rendezvous(origin_circuit_t *oldcirc)
|
|||||||
cpath_build_state_t *newstate, *oldstate;
|
cpath_build_state_t *newstate, *oldstate;
|
||||||
|
|
||||||
tor_assert(oldcirc->base_.purpose == CIRCUIT_PURPOSE_S_CONNECT_REND);
|
tor_assert(oldcirc->base_.purpose == CIRCUIT_PURPOSE_S_CONNECT_REND);
|
||||||
|
|
||||||
oldstate = oldcirc->build_state;
|
oldstate = oldcirc->build_state;
|
||||||
tor_assert(oldstate);
|
tor_assert(oldstate);
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user