/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */ /* See LICENSE for licensing information */ /* $Id$ */ #define OR_PUBLICKEY_BEGIN_TAG "-----BEGIN RSA PUBLIC KEY-----\n" #define OR_PUBLICKEY_END_TAG "-----END RSA PUBLIC KEY-----\n" #define OR_SIGNATURE_BEGIN_TAG "-----BEGIN SIGNATURE-----\n" #define OR_SIGNATURE_END_TAG "-----END SIGNATURE-----\n" #include "or.h" /****************************************************************************/ /* router array */ static directory_t *directory = NULL; extern or_options_t options; /* command-line and config-file options */ extern routerinfo_t *my_routerinfo; /* from main.c */ /****************************************************************************/ struct directory_token; typedef struct directory_token directory_token_t; /* static function prototypes */ void routerlist_free(routerinfo_t *list); static char *eat_whitespace(char *s); static char *eat_whitespace_no_nl(char *s); static char *find_whitespace(char *s); static void router_free_exit_policy(routerinfo_t *router); static routerinfo_t *router_get_entry_from_string_tok(char**s, directory_token_t *tok); static int router_get_list_from_string_tok(char **s, directory_t **dest, directory_token_t *tok); static int router_add_exit_policy(routerinfo_t *router, directory_token_t *tok); static int router_resolve_directory(directory_t *dir); /****************************************************************************/ int learn_my_address(struct sockaddr_in *me) { /* local host information */ char localhostname[512]; struct hostent *localhost; static struct sockaddr_in answer; static int already_learned=0; if(!already_learned) { /* obtain local host information */ if(gethostname(localhostname,512) < 0) { log_fn(LOG_ERR,"Error obtaining local hostname"); return -1; } log_fn(LOG_DEBUG,"localhostname is '%s'.",localhostname); localhost = gethostbyname(localhostname); if (!localhost) { log_fn(LOG_ERR,"Error obtaining local host info."); return -1; } memset(&answer,0,sizeof(struct sockaddr_in)); answer.sin_family = AF_INET; memcpy((void *)&answer.sin_addr,(void *)localhost->h_addr,sizeof(struct in_addr)); answer.sin_port = htons((uint16_t) options.ORPort); log_fn(LOG_DEBUG,"chose address as '%s'.",inet_ntoa(answer.sin_addr)); if (!strncmp("127.",inet_ntoa(answer.sin_addr), 4) && strcasecmp(localhostname, "localhost")) { /* We're a loopback IP but we're not called localhost. Uh oh! */ log_fn(LOG_WARNING, "Got a loopback address: /etc/hosts may be wrong"); } already_learned = 1; } memcpy(me,&answer,sizeof(struct sockaddr_in)); return 0; } void router_retry_connections(void) { int i; routerinfo_t *router; for (i=0;in_routers;i++) { router = directory->routers[i]; if(!connection_exact_get_by_addr_port(router->addr,router->or_port)) { /* not in the list */ log_fn(LOG_DEBUG,"connecting to OR %s:%u.",router->address,router->or_port); connection_or_connect(router); } } } routerinfo_t *router_pick_directory_server(void) { /* currently, pick the first router with a positive dir_port */ int i; routerinfo_t *router; if(!directory) return NULL; for(i=0;in_routers;i++) { router = directory->routers[i]; if(router->dir_port > 0) return router; } return NULL; } routerinfo_t *router_get_by_addr_port(uint32_t addr, uint16_t port) { int i; routerinfo_t *router; assert(directory); for(i=0;in_routers;i++) { router = directory->routers[i]; if ((router->addr == addr) && (router->or_port == port)) return router; } return NULL; } routerinfo_t *router_get_by_pk(crypto_pk_env_t *pk) { int i; routerinfo_t *router; assert(directory); for(i=0;in_routers;i++) { router = directory->routers[i]; /* XXX Should this really be a separate link key? */ if (0 == crypto_pk_cmp_keys(router->pkey, pk)) return router; } return NULL; } void router_get_directory(directory_t **pdirectory) { *pdirectory = directory; } /* return 1 if addr and port corresponds to my addr and my or_listenport. else 0, * or -1 for failure. */ int router_is_me(uint32_t addr, uint16_t port) { /* XXXX Should this check the key too? */ struct sockaddr_in me; /* my router identity */ if(!options.OnionRouter) { /* we're not an OR. This obviously isn't us. */ return 0; } if(learn_my_address(&me) < 0) return -1; if(ntohl(me.sin_addr.s_addr) == addr && ntohs(me.sin_port) == port) return 1; return 0; } /* delete a list of routers from memory */ void routerinfo_free(routerinfo_t *router) { struct exit_policy_t *e = NULL, *etmp = NULL; if (!router) return; if (router->address) free(router->address); if (router->pkey) crypto_free_pk_env(router->pkey); if (router->signing_pkey) crypto_free_pk_env(router->signing_pkey); e = router->exit_policy; while (e) { etmp = e->next; if (e->string) free(e->string); if (e->address) free(e->address); if (e->port) free(e->port); free(e); e = etmp; } free(router); } void directory_free(directory_t *directory) { int i; for (i = 0; i < directory->n_routers; ++i) routerinfo_free(directory->routers[i]); free(directory->routers); if(directory->software_versions) free(directory->software_versions); free(directory); } void router_forget_router(uint32_t addr, uint16_t port) { int i; routerinfo_t *router; router = router_get_by_addr_port(addr,port); if(!router) /* we don't seem to know about him in the first place */ return; /* now walk down router_array until we get to router */ for(i=0;in_routers;i++) if(directory->routers[i] == router) break; assert(i != directory->n_routers); /* if so then router_get_by_addr_port should have returned null */ // free(router); /* don't actually free; we'll free it when we free the whole thing */ // log(LOG_DEBUG,"router_forget_router(): Forgot about router %d:%d",addr,port); for(; in_routers-1;i++) directory->routers[i] = directory->routers[i+1]; /* XXX bug, we're not decrementing n_routers here? needs more attention. -RD */ } /* load the router list */ int router_get_list_from_file(char *routerfile) { int fd; /* router file */ struct stat statbuf; char *string; assert(routerfile); if (strcspn(routerfile,CONFIG_LEGAL_FILENAME_CHARACTERS) != 0) { log_fn(LOG_ERR,"Filename %s contains illegal characters.",routerfile); return -1; } if(stat(routerfile, &statbuf) < 0) { log_fn(LOG_ERR,"Could not stat %s.",routerfile); return -1; } /* open the router list */ fd = open(routerfile,O_RDONLY,0); if (fd<0) { log_fn(LOG_ERR,"Could not open %s.",routerfile); return -1; } string = tor_malloc(statbuf.st_size+1); if(read(fd,string,statbuf.st_size) != statbuf.st_size) { log_fn(LOG_ERR,"Couldn't read all %ld bytes of file '%s'.", (long)statbuf.st_size,routerfile); free(string); close(fd); return -1; } close(fd); string[statbuf.st_size] = 0; /* null terminate it */ if(router_get_list_from_string(string) < 0) { log_fn(LOG_ERR,"The routerfile itself was corrupt."); free(string); return -1; } free(string); return 0; } typedef enum { K_ACCEPT, K_DIRECTORY_SIGNATURE, K_RECOMMENDED_SOFTWARE, K_REJECT, K_ROUTER, K_SIGNED_DIRECTORY, K_SIGNING_KEY, _SIGNATURE, _PUBLIC_KEY, _ERR, _EOF } directory_keyword; struct token_table_ent { char *t; int v; }; static struct token_table_ent token_table[] = { { "accept", K_ACCEPT }, { "directory-signature", K_DIRECTORY_SIGNATURE }, { "reject", K_REJECT }, { "router", K_ROUTER }, { "recommended-software", K_RECOMMENDED_SOFTWARE }, { "signed-directory", K_SIGNED_DIRECTORY }, { "signing-key", K_SIGNING_KEY }, { NULL, -1 } }; #define MAX_ARGS 8 struct directory_token { directory_keyword tp; union { struct { char *args[MAX_ARGS+1]; int n_args; } cmd; char *signature; char *error; crypto_pk_env_t *public_key; } val; }; /* Free any malloced resources allocated for a token. Don't call this if you inherit the reference to those resources. */ static void router_release_token(directory_token_t *tok) { switch (tok->tp) { case _SIGNATURE: free(tok->val.signature); break; case _PUBLIC_KEY: crypto_free_pk_env(tok->val.public_key); break; default: break; } } static int _router_get_next_token(char **s, directory_token_t *tok) { char *next; crypto_pk_env_t *pkey = NULL; char *signature = NULL; int i, done; tok->tp = _ERR; tok->val.error = ""; *s = eat_whitespace(*s); if (!**s) { tok->tp = _EOF; return 0; } else if (**s == '-') { next = strchr(*s, '\n'); if (! next) { tok->val.error = "No newline at EOF"; return -1; } ++next; if (! strncmp(*s, OR_PUBLICKEY_BEGIN_TAG, next-*s)) { next = strstr(*s, OR_PUBLICKEY_END_TAG); if (!next) { tok->val.error = "No public key end tag found"; return -1; } next = strchr(next, '\n'); /* Part of OR_PUBLICKEY_END_TAG; can't fail.*/ ++next; if (!(pkey = crypto_new_pk_env(CRYPTO_PK_RSA))) return -1; if (crypto_pk_read_public_key_from_string(pkey, *s, next-*s)) { crypto_free_pk_env(pkey); tok->val.error = "Couldn't parse public key."; return -1; } tok->tp = _PUBLIC_KEY; tok->val.public_key = pkey; *s = next; return 0; } else if (! strncmp(*s, OR_SIGNATURE_BEGIN_TAG, next-*s)) { /* Advance past newline; can't fail. */ *s = strchr(*s, '\n'); ++*s; /* Find end of base64'd data */ next = strstr(*s, OR_SIGNATURE_END_TAG); if (!next) { tok->val.error = "No signature end tag found"; return -1; } signature = tor_malloc(256); i = base64_decode(signature, 256, *s, next-*s); if (i<0) { free(signature); tok->val.error = "Error decoding signature."; return -1; } else if (i != 128) { free(signature); tok->val.error = "Bad length on decoded signature."; return -1; } tok->tp = _SIGNATURE; tok->val.signature = signature; next = strchr(next, '\n'); /* Part of OR_SIGNATURE_END_TAG; can't fail.*/ *s = next+1; return 0; } else { tok->val.error = "Unrecognized begin line"; return -1; } } else { next = find_whitespace(*s); if (!next) { tok->val.error = "Unexpected EOF"; return -1; } for (i = 0 ; token_table[i].t ; ++i) { if (!strncmp(token_table[i].t, *s, next-*s)) { tok->tp = token_table[i].v; i = 0; done = (*next == '\n'); *s = eat_whitespace_no_nl(next); while (**s != '\n' && i <= MAX_ARGS && !done) { next = find_whitespace(*s); if (*next == '\n') done = 1; *next = 0; tok->val.cmd.args[i++] = *s; *s = eat_whitespace_no_nl(next+1); }; tok->val.cmd.n_args = i; if (i > MAX_ARGS) { tok->tp = _ERR; tok->val.error = "Too many arguments"; return -1; } return 0; } } tok->val.error = "Unrecognized command"; return -1; } } #ifdef DEBUG_ROUTER_TOKENS static void router_dump_token(directory_token_t *tok) { int i; switch(tok->tp) { case _SIGNATURE: puts("(signature)"); return; case _PUBLIC_KEY: puts("(public key)"); return; case _ERR: printf("(Error: %s\n)", tok->val.error); return; case _EOF: puts("EOF"); return; case K_ACCEPT: printf("Accept"); break; case K_DIRECTORY_SIGNATURE: printf("Directory-Signature"); break; case K_REJECT: printf("Reject"); break; case K_RECOMMENDED_SOFTWARE: printf("Server-Software"); break; case K_ROUTER: printf("Router"); break; case K_SIGNED_DIRECTORY: printf("Signed-Directory"); break; case K_SIGNING_KEY: printf("Signing-Key"); break; default: printf("?????? %d\n", tok->tp); return; } for (i = 0; i < tok->val.cmd.n_args; ++i) { printf(" \"%s\"", tok->val.cmd.args[i]); } printf("\n"); return; } static int router_get_next_token(char **s, directory_token_t *tok) { int i; i = _router_get_next_token(s, tok); router_dump_token(tok); return i; } #else #define router_get_next_token _router_get_next_token #endif /* return the first char of s that is not whitespace and not a comment */ static char *eat_whitespace(char *s) { assert(s); while(isspace(*s) || *s == '#') { while(isspace(*s)) s++; if(*s == '#') { /* read to a \n or \0 */ while(*s && *s != '\n') s++; if(!*s) return s; } } return s; } static char *eat_whitespace_no_nl(char *s) { while(*s == ' ' || *s == '\t') ++s; return s; } /* return the first char of s that is whitespace or '#' or '\0 */ static char *find_whitespace(char *s) { assert(s); while(*s && !isspace(*s) && *s != '#') s++; return s; } int router_get_list_from_string(char *s) { if (router_get_list_from_string_impl(s, &directory)) { log(LOG_ERR, "Error parsing router file"); return -1; } if (router_resolve_directory(directory)) { log(LOG_ERR, "Error resolving directory"); return -1; } return 0; } int router_get_list_from_string_impl(char *s, directory_t **dest) { directory_token_t tok; if (router_get_next_token(&s, &tok)) { log(LOG_ERR, "Error reading routers: %s", tok.val.error); return -1; } return router_get_list_from_string_tok(&s, dest, &tok); } static int router_get_dir_hash(char *s, char *digest) { char *start, *end; start = strstr(s, "signed-directory"); if (!start) { log(LOG_ERR,"router_get_dir_hash(): couldn't find \"signed-directory\""); return -1; } end = strstr(start, "directory-signature"); if (!end) { log(LOG_ERR,"router_get_dir_hash(): couldn't find \"directory-signature\""); return -1; } end = strchr(end, '\n'); if (!end) { log(LOG_ERR,"router_get_dir_hash(): couldn't find EOL"); return -1; } ++end; if (crypto_SHA_digest(start, end-start, digest)) { log(LOG_ERR,"router_get_dir_hash(): couldn't compute digest"); return -1; } return 0; } /* return 0 if myversion is in start. Else return -1. */ int compare_recommended_versions(char *myversion, char *start) { int len_myversion = strlen(myversion); char *comma; char *end = start + strlen(start); log_fn(LOG_DEBUG,"checking '%s' in '%s'.", myversion, start); for(;;) { comma = strchr(start, ','); if( ((comma ? comma : end) - start == len_myversion) && !strncmp(start, myversion, len_myversion)) /* only do strncmp if the length matches */ return 0; /* success, it's there */ if(!comma) return -1; /* nope */ start = comma+1; } } int router_get_dir_from_string(char *s, crypto_pk_env_t *pkey) { if (router_get_dir_from_string_impl(s, &directory, pkey)) { log(LOG_ERR, "router_get_dir_from_string: Couldn't parse directory."); return -1; } if (router_resolve_directory(directory)) { log(LOG_ERR, "Error resolving directory"); return -1; } if (compare_recommended_versions(VERSION, directory->software_versions) < 0) { log(LOG_ERR, "You are running tor version %s, which is no longer supported.\nPlease upgrade to one of %s.", VERSION, RECOMMENDED_SOFTWARE_VERSIONS); if(options.IgnoreVersion) { log(LOG_WARNING, "IgnoreVersion is set. If it breaks, we told you so."); } else { log(LOG_ERR,"Set IgnoreVersion config variable if you want to survive this error."); fflush(0); exit(0); } } return 0; } int router_get_dir_from_string_impl(char *s, directory_t **dest, crypto_pk_env_t *pkey) { directory_token_t tok; char digest[20]; char signed_digest[128]; directory_t *new_dir = NULL; char *versions; #define NEXT_TOK() \ do { \ if (router_get_next_token(&s, &tok)) { \ log(LOG_ERR, "Error reading directory: %s", tok.val.error); \ return -1; \ } } while (0) #define TOK_IS(type,name) \ do { \ if (tok.tp != type) { \ router_release_token(&tok); \ log(LOG_ERR, "Error reading directory: expected %s", name); \ return -1; \ } } while(0) if (router_get_dir_hash(s, digest)) { log(LOG_ERR, "Unable to compute digest of directory"); return -1; } NEXT_TOK(); TOK_IS(K_SIGNED_DIRECTORY, "signed-directory"); NEXT_TOK(); TOK_IS(K_RECOMMENDED_SOFTWARE, "recommended-software"); if (tok.val.cmd.n_args != 1) { log(LOG_ERR, "Invalid recommded-software line"); return -1; } versions = strdup(tok.val.cmd.args[0]); NEXT_TOK(); if (router_get_list_from_string_tok(&s, &new_dir, &tok)) { log(LOG_ERR, "Error reading routers from directory"); return -1; } new_dir->software_versions = versions; TOK_IS(K_DIRECTORY_SIGNATURE, "directory-signature"); NEXT_TOK(); TOK_IS(_SIGNATURE, "signature"); if (pkey) { if (crypto_pk_public_checksig(pkey, tok.val.signature, 128, signed_digest) != 20) { log(LOG_ERR, "Error reading directory: invalid signature."); free(tok.val.signature); return -1; } if (memcmp(digest, signed_digest, 20)) { log(LOG_ERR, "Error reading directory: signature does not match."); free(tok.val.signature); return -1; } } free(tok.val.signature); NEXT_TOK(); TOK_IS(_EOF, "end of directory"); if (*dest) directory_free(*dest); *dest = new_dir; return 0; #undef NEXT_TOK #undef TOK_IS } static int router_get_list_from_string_tok(char **s, directory_t **dest, directory_token_t *tok) { routerinfo_t *router; routerinfo_t **rarray; int rarray_len = 0; assert(s); rarray = (routerinfo_t **)tor_malloc((sizeof(routerinfo_t *))*MAX_ROUTERS_IN_DIR); while (tok->tp == K_ROUTER) { router = router_get_entry_from_string_tok(s, tok); if (!router) { log(LOG_ERR, "Error reading router"); return -1; } if (rarray_len >= MAX_ROUTERS_IN_DIR) { log(LOG_ERR, "router_get_list_from_string_tok(): too many routers"); routerinfo_free(router); continue; } rarray[rarray_len++] = router; } if (*dest) directory_free(*dest); *dest = (directory_t *)tor_malloc(sizeof(directory_t)); (*dest)->routers = rarray; (*dest)->n_routers = rarray_len; (*dest)->software_versions = NULL; return 0; } static int router_resolve(routerinfo_t *router) { struct hostent *rent; rent = (struct hostent *)gethostbyname(router->address); if (!rent) { log(LOG_ERR,"router_resolve(): Could not get address for router %s.",router->address); return -1; } assert(rent->h_length == 4); memcpy(&router->addr, rent->h_addr,rent->h_length); router->addr = ntohl(router->addr); /* get it back into host order */ return 0; } static int router_resolve_directory(directory_t *dir) { int i, max, remove; if (!dir) dir = directory; max = dir->n_routers; for (i = 0; i < max; ++i) { remove = 0; if (router_resolve(dir->routers[i])) { log(LOG_INFO, "Couldn't resolve router %s; removing", dir->routers[i]->address); remove = 1; routerinfo_free(dir->routers[i]); } else if (router_is_me(dir->routers[i]->addr, dir->routers[i]->or_port)) { my_routerinfo = dir->routers[i]; remove = 1; } if (remove) { dir->routers[i] = dir->routers[--max]; --dir->n_routers; --i; } } return 0; } routerinfo_t *router_get_entry_from_string(char **s) { directory_token_t tok; routerinfo_t *router; if (router_get_next_token(s, &tok)) return NULL; router = router_get_entry_from_string_tok(s, &tok); if (tok.tp != _EOF) { router_release_token(&tok); return NULL; } return router; } /* reads a single router entry from s. * updates s so it points to after the router it just read. * mallocs a new router, returns it if all goes well, else returns NULL. */ static routerinfo_t *router_get_entry_from_string_tok(char**s, directory_token_t *tok) { routerinfo_t *router = NULL; #define NEXT_TOKEN() \ do { if (router_get_next_token(s, tok)) { \ log(LOG_ERR, "Error reading directory: %s", tok->val.error); \ goto err; \ } } while(0) #define ARGS tok->val.cmd.args if (tok->tp != K_ROUTER) { router_release_token(tok); log(LOG_ERR,"router_get_entry_from_string(): Entry does not start with \"router\""); return NULL; } router = tor_malloc(sizeof(routerinfo_t)); memset(router,0,sizeof(routerinfo_t)); /* zero it out first */ /* C doesn't guarantee that NULL is represented by 0 bytes. You'll thank me for this someday. */ router->pkey = router->signing_pkey = NULL; if (tok->val.cmd.n_args != 5) { log(LOG_ERR,"router_get_entry_from_string(): Wrong # of arguments to \"router\""); goto err; } /* read router.address */ if (!(router->address = strdup(ARGS[0]))) goto err; router->addr = 0; /* Read router->or_port */ router->or_port = atoi(ARGS[1]); if(!router->or_port) { log(LOG_ERR,"router_get_entry_from_string(): or_port unreadable or 0. Failing."); goto err; } /* Router->ap_port */ router->ap_port = atoi(ARGS[2]); /* Router->dir_port */ router->dir_port = atoi(ARGS[3]); /* Router->bandwidth */ router->bandwidth = atoi(ARGS[4]); if (!router->bandwidth) { log(LOG_ERR,"router_get_entry_from_string(): bandwidth unreadable or 0. Failing."); } log(LOG_DEBUG,"or_port %d, ap_port %d, dir_port %d, bandwidth %d.", router->or_port, router->ap_port, router->dir_port, router->bandwidth); NEXT_TOKEN(); if (tok->tp != _PUBLIC_KEY) { log(LOG_ERR,"router_get_entry_from_string(): Missing public key"); goto err; } /* Check key length */ router->pkey = tok->val.public_key; NEXT_TOKEN(); if (tok->tp == K_SIGNING_KEY) { NEXT_TOKEN(); if (tok->tp != _PUBLIC_KEY) { log(LOG_ERR,"router_get_entry_from_string(): Missing signing key"); goto err; } router->signing_pkey = tok->val.public_key; NEXT_TOKEN(); } while (tok->tp == K_ACCEPT || tok->tp == K_REJECT) { router_add_exit_policy(router, tok); NEXT_TOKEN(); } return router; err: router_release_token(tok); if(router->address) free(router->address); if(router->pkey) crypto_free_pk_env(router->pkey); if(router->signing_pkey) crypto_free_pk_env(router->signing_pkey); router_free_exit_policy(router); free(router); return NULL; #undef ARGS #undef NEXT_TOKEN } static void router_free_exit_policy(routerinfo_t *router) { struct exit_policy_t *tmpe; while(router->exit_policy) { tmpe = router->exit_policy; router->exit_policy = tmpe->next; free(tmpe->string); free(tmpe->address); free(tmpe->port); free(tmpe); } } #if 0 void test_write_pkey(crypto_pk_env_t *pkey) { char *string; int len; log(LOG_DEBUG,"Trying test write."); if(crypto_pk_write_public_key_to_string(pkey,&string,&len)<0) { log(LOG_DEBUG,"router_get_entry_from_string(): write pkey to string failed\n"); return; } log(LOG_DEBUG,"I did it: len %d, string '%s'.",len,string); free(string); } #endif static int router_add_exit_policy(routerinfo_t *router, directory_token_t *tok) { struct exit_policy_t *tmpe, *newe; char *arg, *colon; if (tok->val.cmd.n_args != 1) return -1; arg = tok->val.cmd.args[0]; newe = tor_malloc(sizeof(struct exit_policy_t)); memset(newe,0,sizeof(struct exit_policy_t)); newe->string = tor_malloc(8+strlen(arg)); if (tok->tp == K_REJECT) { strcpy(newe->string, "reject "); newe->policy_type = EXIT_POLICY_REJECT; } else { assert(tok->tp == K_ACCEPT); strcpy(newe->string, "accept "); newe->policy_type = EXIT_POLICY_ACCEPT; } strcat(newe->string, arg); colon = strchr(arg,':'); if(!colon) goto policy_read_failed; *colon = 0; newe->address = strdup(arg); newe->port = strdup(colon+1); log(LOG_DEBUG,"router_add_exit_policy(): %s %s:%s", newe->policy_type == EXIT_POLICY_REJECT ? "reject" : "accept", newe->address, newe->port); /* now link newe onto the end of exit_policy */ if(!router->exit_policy) { router->exit_policy = newe; return 0; } for(tmpe=router->exit_policy; tmpe->next; tmpe=tmpe->next) ; tmpe->next = newe; return 0; policy_read_failed: assert(newe->string); log(LOG_INFO,"router_add_exit_policy(): Couldn't parse line '%s'. Dropping", newe->string); if(newe->string) free(newe->string); if(newe->address) free(newe->address); if(newe->port) free(newe->port); free(newe); return -1; } /* Return 0 if my exit policy says to allow connection to conn. * Else return -1. */ int router_compare_to_exit_policy(connection_t *conn) { struct exit_policy_t *tmpe; if(!my_routerinfo) { log(LOG_WARNING, "router_compare_to_exit_policy(): my_routerinfo undefined! Rejected."); return -1; } for(tmpe=my_routerinfo->exit_policy; tmpe; tmpe=tmpe->next) { assert(tmpe->address); assert(tmpe->port); /* Totally ignore the address field of the exit policy, for now. */ if(!strcmp(tmpe->port,"*") || atoi(tmpe->port) == conn->port) { log(LOG_INFO,"router_compare_to_exit_policy(): Port '%s' matches '%d'. %s.", tmpe->port, conn->port, tmpe->policy_type == EXIT_POLICY_ACCEPT ? "Accepting" : "Rejecting"); if(tmpe->policy_type == EXIT_POLICY_ACCEPT) return 0; else return -1; } } return 0; /* accept all by default. */ } /* Local Variables: mode:c indent-tabs-mode:nil c-basic-offset:2 End: */