aboutsummaryrefslogtreecommitdiff
path: root/src/core/or/reasons.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2018-07-05 16:31:38 -0400
committerNick Mathewson <nickm@torproject.org>2018-07-05 17:15:50 -0400
commit63b4ea22af8e8314dd718f02046de5f4b91edf9d (patch)
treeaf52b6fba37f22c86447fd5267dd5eb557807c8b /src/core/or/reasons.c
parentce84200542f48a92e8b56a8d032401ecd153e90c (diff)
downloadtor-63b4ea22af8e8314dd718f02046de5f4b91edf9d.tar.gz
tor-63b4ea22af8e8314dd718f02046de5f4b91edf9d.zip
Move literally everything out of src/or
This commit won't build yet -- it just puts everything in a slightly more logical place. The reasoning here is that "src/core" will hold the stuff that every (or nearly every) tor instance will need in order to do onion routing. Other features (including some necessary ones) will live in "src/feature". The "src/app" directory will hold the stuff needed to have Tor be an application you can actually run. This commit DOES NOT refactor the former contents of src/or into a logical set of acyclic libraries, or change any code at all. That will have to come in the future. We will continue to move things around and split them in the future, but I hope this lays a reasonable groundwork for doing so.
Diffstat (limited to 'src/core/or/reasons.c')
-rw-r--r--src/core/or/reasons.c497
1 files changed, 497 insertions, 0 deletions
diff --git a/src/core/or/reasons.c b/src/core/or/reasons.c
new file mode 100644
index 0000000000..7d8dcf374c
--- /dev/null
+++ b/src/core/or/reasons.c
@@ -0,0 +1,497 @@
+/* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
+ * Copyright (c) 2007-2018, The Tor Project, Inc. */
+/* See LICENSE for licensing information */
+
+/**
+ * \file reasons.c
+ * \brief Convert circuit, stream, and orconn error reasons to and/or from
+ * strings and errno values.
+ *
+ * This module is just a bunch of functions full of case statements that
+ * convert from one representation of our error codes to another. These are
+ * mainly used in generating log messages, in sending messages to the
+ * controller in control.c, and in converting errors from one protocol layer
+ * to another.
+ **/
+
+#include "or/or.h"
+#include "or/config.h"
+#include "or/reasons.h"
+#include "or/routerlist.h"
+#include "lib/tls/tortls.h"
+
+/***************************** Edge (stream) reasons **********************/
+
+/** Convert the reason for ending a stream <b>reason</b> into the format used
+ * in STREAM events. Return NULL if the reason is unrecognized. */
+const char *
+stream_end_reason_to_control_string(int reason)
+{
+ reason &= END_STREAM_REASON_MASK;
+ switch (reason) {
+ case END_STREAM_REASON_MISC: return "MISC";
+ case END_STREAM_REASON_RESOLVEFAILED: return "RESOLVEFAILED";
+ case END_STREAM_REASON_CONNECTREFUSED: return "CONNECTREFUSED";
+ case END_STREAM_REASON_EXITPOLICY: return "EXITPOLICY";
+ case END_STREAM_REASON_DESTROY: return "DESTROY";
+ case END_STREAM_REASON_DONE: return "DONE";
+ case END_STREAM_REASON_TIMEOUT: return "TIMEOUT";
+ case END_STREAM_REASON_NOROUTE: return "NOROUTE";
+ case END_STREAM_REASON_HIBERNATING: return "HIBERNATING";
+ case END_STREAM_REASON_INTERNAL: return "INTERNAL";
+ case END_STREAM_REASON_RESOURCELIMIT: return "RESOURCELIMIT";
+ case END_STREAM_REASON_CONNRESET: return "CONNRESET";
+ case END_STREAM_REASON_TORPROTOCOL: return "TORPROTOCOL";
+ case END_STREAM_REASON_NOTDIRECTORY: return "NOTDIRECTORY";
+
+ case END_STREAM_REASON_CANT_ATTACH: return "CANT_ATTACH";
+ case END_STREAM_REASON_NET_UNREACHABLE: return "NET_UNREACHABLE";
+ case END_STREAM_REASON_SOCKSPROTOCOL: return "SOCKS_PROTOCOL";
+ // XXXX Controlspec
+ case END_STREAM_REASON_HTTPPROTOCOL: return "HTTP_PROTOCOL";
+
+ case END_STREAM_REASON_PRIVATE_ADDR: return "PRIVATE_ADDR";
+
+ default: return NULL;
+ }
+}
+
+/** Translate <b>reason</b>, which came from a relay 'end' cell,
+ * into a static const string describing why the stream is closing.
+ * <b>reason</b> is -1 if no reason was provided.
+ */
+const char *
+stream_end_reason_to_string(int reason)
+{
+ switch (reason) {
+ case -1:
+ log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL,
+ "End cell arrived with length 0. Should be at least 1.");
+ return "MALFORMED";
+ case END_STREAM_REASON_MISC: return "misc error";
+ case END_STREAM_REASON_RESOLVEFAILED: return "resolve failed";
+ case END_STREAM_REASON_CONNECTREFUSED: return "connection refused";
+ case END_STREAM_REASON_EXITPOLICY: return "exit policy failed";
+ case END_STREAM_REASON_DESTROY: return "destroyed";
+ case END_STREAM_REASON_DONE: return "closed normally";
+ case END_STREAM_REASON_TIMEOUT: return "gave up (timeout)";
+ case END_STREAM_REASON_NOROUTE: return "no route to host";
+ case END_STREAM_REASON_HIBERNATING: return "server is hibernating";
+ case END_STREAM_REASON_INTERNAL: return "internal error at server";
+ case END_STREAM_REASON_RESOURCELIMIT: return "server out of resources";
+ case END_STREAM_REASON_CONNRESET: return "connection reset";
+ case END_STREAM_REASON_TORPROTOCOL: return "Tor protocol error";
+ case END_STREAM_REASON_NOTDIRECTORY: return "not a directory";
+ default:
+ log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL,
+ "Reason for ending (%d) not recognized.",reason);
+ return "unknown";
+ }
+}
+
+/** Translate <b>reason</b> (as from a relay 'end' cell) into an
+ * appropriate SOCKS5 reply code.
+ *
+ * A reason of 0 means that we're not actually expecting to send
+ * this code back to the socks client; we just call it 'succeeded'
+ * to keep things simple.
+ */
+socks5_reply_status_t
+stream_end_reason_to_socks5_response(int reason)
+{
+ switch (reason & END_STREAM_REASON_MASK) {
+ case 0:
+ return SOCKS5_SUCCEEDED;
+ case END_STREAM_REASON_MISC:
+ return SOCKS5_GENERAL_ERROR;
+ case END_STREAM_REASON_RESOLVEFAILED:
+ return SOCKS5_HOST_UNREACHABLE;
+ case END_STREAM_REASON_CONNECTREFUSED:
+ return SOCKS5_CONNECTION_REFUSED;
+ case END_STREAM_REASON_ENTRYPOLICY:
+ return SOCKS5_NOT_ALLOWED;
+ case END_STREAM_REASON_EXITPOLICY:
+ return SOCKS5_NOT_ALLOWED;
+ case END_STREAM_REASON_DESTROY:
+ return SOCKS5_GENERAL_ERROR;
+ case END_STREAM_REASON_DONE:
+ /* Note that 'DONE' usually indicates a successful close from the other
+ * side of the stream... but if we receive it before a connected cell --
+ * that is, before we have sent a SOCKS reply -- that means that the
+ * other side of the circuit closed the connection before telling us it
+ * was complete. */
+ return SOCKS5_CONNECTION_REFUSED;
+ case END_STREAM_REASON_TIMEOUT:
+ return SOCKS5_TTL_EXPIRED;
+ case END_STREAM_REASON_NOROUTE:
+ return SOCKS5_HOST_UNREACHABLE;
+ case END_STREAM_REASON_RESOURCELIMIT:
+ return SOCKS5_GENERAL_ERROR;
+ case END_STREAM_REASON_HIBERNATING:
+ return SOCKS5_GENERAL_ERROR;
+ case END_STREAM_REASON_INTERNAL:
+ return SOCKS5_GENERAL_ERROR;
+ case END_STREAM_REASON_CONNRESET:
+ return SOCKS5_CONNECTION_REFUSED;
+ case END_STREAM_REASON_TORPROTOCOL:
+ return SOCKS5_GENERAL_ERROR;
+
+ case END_STREAM_REASON_CANT_ATTACH:
+ return SOCKS5_GENERAL_ERROR;
+ case END_STREAM_REASON_NET_UNREACHABLE:
+ return SOCKS5_NET_UNREACHABLE;
+ case END_STREAM_REASON_SOCKSPROTOCOL:
+ return SOCKS5_GENERAL_ERROR;
+ case END_STREAM_REASON_HTTPPROTOCOL:
+ // LCOV_EXCL_START
+ tor_assert_nonfatal_unreached();
+ return SOCKS5_GENERAL_ERROR;
+ // LCOV_EXCL_STOP
+ case END_STREAM_REASON_PRIVATE_ADDR:
+ return SOCKS5_GENERAL_ERROR;
+
+ default:
+ log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL,
+ "Reason for ending (%d) not recognized; "
+ "sending generic socks error.", reason);
+ return SOCKS5_GENERAL_ERROR;
+ }
+}
+
+/* We need to use a few macros to deal with the fact that Windows
+ * decided that their sockets interface should be a permakludge.
+ * E_CASE is for errors where windows has both a EFOO and a WSAEFOO
+ * version, and S_CASE is for errors where windows has only a WSAEFOO
+ * version. (The E is for 'error', the S is for 'socket'). */
+#ifdef _WIN32
+#define E_CASE(s) case s: case WSA ## s
+#define S_CASE(s) case WSA ## s
+#else
+#define E_CASE(s) case s
+#define S_CASE(s) case s
+#endif /* defined(_WIN32) */
+
+/** Given an errno from a failed exit connection, return a reason code
+ * appropriate for use in a RELAY END cell. */
+uint8_t
+errno_to_stream_end_reason(int e)
+{
+ /* To add new errors here, find out if they exist on Windows, and if a WSA*
+ * equivalent exists on windows. Add a case, an S_CASE, or an E_CASE as
+ * appropriate. */
+ switch (e) {
+ case EPIPE:
+ return END_STREAM_REASON_DONE;
+ E_CASE(EBADF):
+ E_CASE(EFAULT):
+ E_CASE(EINVAL):
+ S_CASE(EISCONN):
+ S_CASE(ENOTSOCK):
+ S_CASE(EPROTONOSUPPORT):
+ S_CASE(EAFNOSUPPORT):
+ S_CASE(ENOTCONN):
+ return END_STREAM_REASON_INTERNAL;
+ S_CASE(ENETUNREACH):
+ S_CASE(EHOSTUNREACH):
+ E_CASE(EACCES):
+ case EPERM:
+ return END_STREAM_REASON_NOROUTE;
+ S_CASE(ECONNREFUSED):
+ return END_STREAM_REASON_CONNECTREFUSED;
+ S_CASE(ECONNRESET):
+ return END_STREAM_REASON_CONNRESET;
+ S_CASE(ETIMEDOUT):
+ return END_STREAM_REASON_TIMEOUT;
+ S_CASE(ENOBUFS):
+ case ENOMEM:
+ case ENFILE:
+ S_CASE(EADDRINUSE):
+ S_CASE(EADDRNOTAVAIL):
+ E_CASE(EMFILE):
+ return END_STREAM_REASON_RESOURCELIMIT;
+ default:
+ log_info(LD_EXIT, "Didn't recognize errno %d (%s); telling the client "
+ "that we are ending a stream for 'misc' reason.",
+ e, tor_socket_strerror(e));
+ return END_STREAM_REASON_MISC;
+ }
+}
+
+/***************************** ORConn reasons *****************************/
+
+/** Convert the reason for ending an OR connection <b>r</b> into the format
+ * used in ORCONN events. Return "UNKNOWN" if the reason is unrecognized. */
+const char *
+orconn_end_reason_to_control_string(int r)
+{
+ /* To add new errors here, find out if they exist on Windows, and if a WSA*
+ * equivalent exists on windows. Add a case, an S_CASE, or an E_CASE as
+ * appropriate. */
+ switch (r) {
+ case END_OR_CONN_REASON_DONE:
+ return "DONE";
+ case END_OR_CONN_REASON_REFUSED:
+ return "CONNECTREFUSED";
+ case END_OR_CONN_REASON_OR_IDENTITY:
+ return "IDENTITY";
+ case END_OR_CONN_REASON_CONNRESET:
+ return "CONNECTRESET";
+ case END_OR_CONN_REASON_TIMEOUT:
+ return "TIMEOUT";
+ case END_OR_CONN_REASON_NO_ROUTE:
+ return "NOROUTE";
+ case END_OR_CONN_REASON_IO_ERROR:
+ return "IOERROR";
+ case END_OR_CONN_REASON_RESOURCE_LIMIT:
+ return "RESOURCELIMIT";
+ case END_OR_CONN_REASON_MISC:
+ return "MISC";
+ case END_OR_CONN_REASON_PT_MISSING:
+ return "PT_MISSING";
+ case 0:
+ return "";
+ default:
+ log_warn(LD_BUG, "Unrecognized or_conn reason code %d", r);
+ return "UNKNOWN";
+ }
+}
+
+/** Convert a TOR_TLS_* error code into an END_OR_CONN_* reason. */
+int
+tls_error_to_orconn_end_reason(int e)
+{
+ switch (e) {
+ case TOR_TLS_ERROR_IO:
+ return END_OR_CONN_REASON_IO_ERROR;
+ case TOR_TLS_ERROR_CONNREFUSED:
+ return END_OR_CONN_REASON_REFUSED;
+ case TOR_TLS_ERROR_CONNRESET:
+ return END_OR_CONN_REASON_CONNRESET;
+ case TOR_TLS_ERROR_NO_ROUTE:
+ return END_OR_CONN_REASON_NO_ROUTE;
+ case TOR_TLS_ERROR_TIMEOUT:
+ return END_OR_CONN_REASON_TIMEOUT;
+ case TOR_TLS_WANTREAD:
+ case TOR_TLS_WANTWRITE:
+ case TOR_TLS_CLOSE:
+ case TOR_TLS_DONE:
+ return END_OR_CONN_REASON_DONE;
+ default:
+ return END_OR_CONN_REASON_MISC;
+ }
+}
+
+/** Given an errno from a failed ORConn connection, return a reason code
+ * appropriate for use in the controller orconn events. */
+int
+errno_to_orconn_end_reason(int e)
+{
+ switch (e) {
+ case EPIPE:
+ return END_OR_CONN_REASON_DONE;
+ S_CASE(ENOTCONN):
+ S_CASE(ENETUNREACH):
+ S_CASE(ENETDOWN):
+ S_CASE(EHOSTUNREACH):
+ return END_OR_CONN_REASON_NO_ROUTE;
+ S_CASE(ECONNREFUSED):
+ return END_OR_CONN_REASON_REFUSED;
+ S_CASE(ECONNRESET):
+ return END_OR_CONN_REASON_CONNRESET;
+ S_CASE(ETIMEDOUT):
+ return END_OR_CONN_REASON_TIMEOUT;
+ S_CASE(ENOBUFS):
+ case ENOMEM:
+ case ENFILE:
+ E_CASE(EMFILE):
+ E_CASE(EACCES):
+ E_CASE(EBADF):
+ E_CASE(EFAULT):
+ E_CASE(EINVAL):
+ return END_OR_CONN_REASON_RESOURCE_LIMIT;
+ default:
+ log_info(LD_OR, "Didn't recognize errno %d (%s).",
+ e, tor_socket_strerror(e));
+ return END_OR_CONN_REASON_MISC;
+ }
+}
+
+/***************************** Circuit reasons *****************************/
+
+/** Convert a numeric reason for destroying a circuit into a string for a
+ * CIRCUIT event. */
+const char *
+circuit_end_reason_to_control_string(int reason)
+{
+ int is_remote = 0;
+
+ if (reason >= 0 && reason & END_CIRC_REASON_FLAG_REMOTE) {
+ reason &= ~END_CIRC_REASON_FLAG_REMOTE;
+ is_remote = 1;
+ }
+
+ switch (reason) {
+ case END_CIRC_AT_ORIGIN:
+ /* This shouldn't get passed here; it's a catch-all reason. */
+ return "ORIGIN";
+ case END_CIRC_REASON_NONE:
+ /* This shouldn't get passed here; it's a catch-all reason. */
+ return "NONE";
+ case END_CIRC_REASON_TORPROTOCOL:
+ return "TORPROTOCOL";
+ case END_CIRC_REASON_INTERNAL:
+ return "INTERNAL";
+ case END_CIRC_REASON_REQUESTED:
+ return "REQUESTED";
+ case END_CIRC_REASON_HIBERNATING:
+ return "HIBERNATING";
+ case END_CIRC_REASON_RESOURCELIMIT:
+ return "RESOURCELIMIT";
+ case END_CIRC_REASON_CONNECTFAILED:
+ return "CONNECTFAILED";
+ case END_CIRC_REASON_OR_IDENTITY:
+ return "OR_IDENTITY";
+ case END_CIRC_REASON_CHANNEL_CLOSED:
+ return "CHANNEL_CLOSED";
+ case END_CIRC_REASON_FINISHED:
+ return "FINISHED";
+ case END_CIRC_REASON_TIMEOUT:
+ return "TIMEOUT";
+ case END_CIRC_REASON_DESTROYED:
+ return "DESTROYED";
+ case END_CIRC_REASON_NOPATH:
+ return "NOPATH";
+ case END_CIRC_REASON_NOSUCHSERVICE:
+ return "NOSUCHSERVICE";
+ case END_CIRC_REASON_MEASUREMENT_EXPIRED:
+ return "MEASUREMENT_EXPIRED";
+ case END_CIRC_REASON_IP_NOW_REDUNDANT:
+ return "IP_NOW_REDUNDANT";
+ default:
+ if (is_remote) {
+ /*
+ * If it's remote, it's not a bug *here*, so don't use LD_BUG, but
+ * do note that the someone we're talking to is speaking the Tor
+ * protocol with a weird accent.
+ */
+ log_warn(LD_PROTOCOL,
+ "Remote server sent bogus reason code %d", reason);
+ } else {
+ log_warn(LD_BUG,
+ "Unrecognized reason code %d", reason);
+ }
+ return NULL;
+ }
+}
+
+/** Return a string corresponding to a SOCKS4 response code. */
+const char *
+socks4_response_code_to_string(uint8_t code)
+{
+ switch (code) {
+ case 0x5a:
+ return "connection accepted";
+ case 0x5b:
+ return "server rejected connection";
+ case 0x5c:
+ return "server cannot connect to identd on this client";
+ case 0x5d:
+ return "user id does not match identd";
+ default:
+ return "invalid SOCKS 4 response code";
+ }
+}
+
+/** Return a string corresponding to a SOCKS5 response code. */
+const char *
+socks5_response_code_to_string(uint8_t code)
+{
+ switch (code) {
+ case 0x00:
+ return "connection accepted";
+ case 0x01:
+ return "general SOCKS server failure";
+ case 0x02:
+ return "connection not allowed by ruleset";
+ case 0x03:
+ return "Network unreachable";
+ case 0x04:
+ return "Host unreachable";
+ case 0x05:
+ return "Connection refused";
+ case 0x06:
+ return "TTL expired";
+ case 0x07:
+ return "Command not supported";
+ case 0x08:
+ return "Address type not supported";
+ default:
+ return "unknown reason";
+ }
+}
+
+/** Return a string corresponding to a bandwidth_weight_rule_t */
+const char *
+bandwidth_weight_rule_to_string(bandwidth_weight_rule_t rule)
+{
+ switch (rule)
+ {
+ case NO_WEIGHTING:
+ return "no weighting";
+ case WEIGHT_FOR_EXIT:
+ return "weight as exit";
+ case WEIGHT_FOR_MID:
+ return "weight as middle node";
+ case WEIGHT_FOR_GUARD:
+ return "weight as guard";
+ case WEIGHT_FOR_DIR:
+ return "weight as directory";
+ default:
+ return "unknown rule";
+ }
+}
+
+/** Given a RELAY_END reason value, convert it to an HTTP response to be
+ * send over an HTTP tunnel connection. */
+const char *
+end_reason_to_http_connect_response_line(int endreason)
+{
+ endreason &= END_STREAM_REASON_MASK;
+ /* XXXX these are probably all wrong. Should they all be 502? */
+ switch (endreason) {
+ case 0:
+ return "HTTP/1.0 200 OK\r\n\r\n";
+ case END_STREAM_REASON_MISC:
+ return "HTTP/1.0 500 Internal Server Error\r\n\r\n";
+ case END_STREAM_REASON_RESOLVEFAILED:
+ return "HTTP/1.0 404 Not Found (resolve failed)\r\n\r\n";
+ case END_STREAM_REASON_NOROUTE:
+ return "HTTP/1.0 404 Not Found (no route)\r\n\r\n";
+ case END_STREAM_REASON_CONNECTREFUSED:
+ return "HTTP/1.0 403 Forbidden (connection refused)\r\n\r\n";
+ case END_STREAM_REASON_EXITPOLICY:
+ return "HTTP/1.0 403 Forbidden (exit policy)\r\n\r\n";
+ case END_STREAM_REASON_DESTROY:
+ return "HTTP/1.0 502 Bad Gateway (destroy cell received)\r\n\r\n";
+ case END_STREAM_REASON_DONE:
+ return "HTTP/1.0 502 Bad Gateway (unexpected close)\r\n\r\n";
+ case END_STREAM_REASON_TIMEOUT:
+ return "HTTP/1.0 504 Gateway Timeout\r\n\r\n";
+ case END_STREAM_REASON_HIBERNATING:
+ return "HTTP/1.0 502 Bad Gateway (hibernating server)\r\n\r\n";
+ case END_STREAM_REASON_INTERNAL:
+ return "HTTP/1.0 502 Bad Gateway (internal error)\r\n\r\n";
+ case END_STREAM_REASON_RESOURCELIMIT:
+ return "HTTP/1.0 502 Bad Gateway (resource limit)\r\n\r\n";
+ case END_STREAM_REASON_CONNRESET:
+ return "HTTP/1.0 403 Forbidden (connection reset)\r\n\r\n";
+ case END_STREAM_REASON_TORPROTOCOL:
+ return "HTTP/1.0 502 Bad Gateway (tor protocol violation)\r\n\r\n";
+ case END_STREAM_REASON_ENTRYPOLICY:
+ return "HTTP/1.0 403 Forbidden (entry policy violation)\r\n\r\n";
+ case END_STREAM_REASON_NOTDIRECTORY: /* Fall Through */
+ default:
+ tor_assert_nonfatal_unreached();
+ return "HTTP/1.0 500 Internal Server Error (weird end reason)\r\n\r\n";
+ }
+}