diff options
author | Roger Dingledine <arma@torproject.org> | 2002-07-02 09:36:58 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2002-07-02 09:36:58 +0000 |
commit | d982925593dbb724e4c8ebeb4f945c2184f11831 (patch) | |
tree | c3f22938ad261f3c45ed2744ae0950388c1c04e8 /src/or/connection_ap.c | |
parent | b34fad4d38ac9c45eb2112fa9dde26e499ccdcc5 (diff) | |
download | tor-d982925593dbb724e4c8ebeb4f945c2184f11831.tar.gz tor-d982925593dbb724e4c8ebeb4f945c2184f11831.zip |
Integrated onion proxy into or/
The 'or' process can now be told (by the global_role variable) what
roles this server should play -- connect to all ORs, listen for ORs,
listen for OPs, listen for APs, or any combination.
* everything in /src/op/ is now obsolete.
* connection_ap.c now handles all interactions with application proxies
* "port" is now or_port, op_port, ap_port. But routers are still always
referenced (say, in conn_get_by_addr_port()) by addr / or_port. We
should make routers.c actually read these new ports (currently I've
kludged it so op_port = or_port+10, ap_port=or_port+20)
* circuits currently know if they're at the beginning of the path because
circ->cpath is set. They use this instead for crypts (both ways),
if it's set.
* I still obey the "send a 0 back to the AP when you're ready" protocol,
but I think we should phase it out. I can simply not read from the AP
socket until I'm ready.
I need to do a lot of cleanup work here, but the code appears to work, so
now's a good time for a checkin.
svn:r22
Diffstat (limited to 'src/or/connection_ap.c')
-rw-r--r-- | src/or/connection_ap.c | 381 |
1 files changed, 381 insertions, 0 deletions
diff --git a/src/or/connection_ap.c b/src/or/connection_ap.c new file mode 100644 index 0000000000..cd57d90ed8 --- /dev/null +++ b/src/or/connection_ap.c @@ -0,0 +1,381 @@ + +#include "or.h" + +extern int global_role; /* from main.c */ + +int connection_ap_process_inbuf(connection_t *conn) { + + assert(conn && conn->type == CONN_TYPE_AP); + + if(conn->inbuf_reached_eof) { + /* eof reached, kill it. */ + log(LOG_DEBUG,"connection_ap_process_inbuf(): conn reached eof. Closing."); + return -1; + } + + log(LOG_DEBUG,"connection_ap_process_inbuf(): state %d.",conn->state); + + switch(conn->state) { + case AP_CONN_STATE_SS_WAIT: + return ap_handshake_process_ss(conn); + case AP_CONN_STATE_OPEN: + return connection_package_raw_inbuf(conn); + default: + log(LOG_DEBUG,"connection_ap_process_inbuf() called in state where I'm waiting. Ignoring buf for now."); + } + + return 0; +} + +int ap_handshake_process_ss(connection_t *conn) { + uint16_t len; + + assert(conn); + + log(LOG_DEBUG,"ap_handshake_process_ss() entered."); + + if(!conn->ss_received) { /* try to pull it in */ + + if(conn->inbuf_datalen < sizeof(ss_t)) /* entire ss available? */ + return 0; /* not yet */ + + if(connection_fetch_from_buf((char *)&conn->ss,sizeof(ss_t),conn) < 0) + return -1; + + conn->ss_received = sizeof(ss_t); + log(LOG_DEBUG,"ap_handshake_process_ss(): Successfully read ss."); + + if ((conn->ss.version == 0) || (conn->ss.version != VERSION)) { /* unsupported version */ + log(LOG_DEBUG,"ap_handshake_process_ss(): ss: Unsupported version."); + return -1; + } + if (conn->ss.addr_fmt != SS_ADDR_FMT_ASCII_HOST_PORT) { /* unrecognized address format */ + log(LOG_DEBUG,"ap_handshake_process_ss(): ss: Unrecognized address format."); + return -1; + } + } + + if(!conn->dest_addr) { /* no dest_addr found yet */ + + if(conn->inbuf_datalen < sizeof(uint16_t)) + return 0; /* not yet */ + + if(connection_fetch_from_buf((char *)&len,sizeof(uint16_t),conn) < 0) + return -1; + + len = ntohs(len); + if(len > 512) { + log(LOG_DEBUG,"ap_handshake_process_ss(): Addr length %d too high.",len); + return -1; + } + + conn->dest_addr = malloc(len+1); + if(!conn->dest_addr) { + log(LOG_DEBUG,"ap_handshake_process_ss(): Addr malloc failed"); + return -1; + } + + conn->dest_addr[len] = 0; /* null terminate it */ + conn->dest_addr_len = len; + log(LOG_DEBUG,"Preparing a dest_addr of %d+1 bytes.",len); + } + if(conn->dest_addr_len != conn->dest_addr_received) { /* try to fetch it all in */ + + if(conn->inbuf_datalen < conn->dest_addr_len) + return 0; /* not yet */ + + if(connection_fetch_from_buf(conn->dest_addr,conn->dest_addr_len,conn) < 0) + return -1; + log(LOG_DEBUG,"ap_handshake_process_ss(): Read dest_addr '%s'.",conn->dest_addr); + + conn->dest_addr_received = conn->dest_addr_len; + } + /* now do the same thing for port */ + if(!conn->dest_port) { /* no dest_port found yet */ + + if(conn->inbuf_datalen < sizeof(uint16_t)) + return 0; /* not yet */ + + if(connection_fetch_from_buf((char *)&len,sizeof(uint16_t),conn) < 0) + return -1; + + len = ntohs(len); + if(len > 10) { + log(LOG_DEBUG,"ap_handshake_process_ss(): Port length %d too high.",len); + return -1; + } + + conn->dest_port = malloc(len+1); + if(!conn->dest_port) { + log(LOG_DEBUG,"ap_handshake_process_ss(): Port malloc failed"); + return -1; + } + + conn->dest_port[len] = 0; /* null terminate it */ + conn->dest_port_len = len; + log(LOG_DEBUG,"Preparing a dest_port of %d+1 bytes.",len); + } + if(conn->dest_port_len != conn->dest_port_received) { /* try to fetch it all in */ + + if(conn->inbuf_datalen < conn->dest_port_len) + return 0; /* not yet */ + + if(connection_fetch_from_buf(conn->dest_port,conn->dest_port_len,conn) < 0) + return -1; + log(LOG_DEBUG,"ap_handshake_process_ss(): Read dest_port (network order) '%s'.",conn->dest_port); + + conn->dest_port_received = conn->dest_port_len; + } + + /* now we're all ready to make an onion, etc */ + return ap_handshake_create_onion(conn); +} + +int ap_handshake_create_onion(connection_t *conn) { + int i; + int routelen = 0; /* length of the route */ + unsigned int *route = NULL; /* hops in the route as an array of indexes into rarray */ + unsigned char *onion = NULL; /* holds the onion */ + int onionlen = 0; /* onion length in host order */ + crypt_path_t **cpath = NULL; /* defines the crypt operations that need to be performed on incoming/outgoing data */ + + assert(conn); + + /* choose a route */ + route = (unsigned int *)router_new_route(&routelen); + if (!route) { + log(LOG_ERR,"ap_handshake_create_onion(): Error choosing a route through the OR network."); + return -1; + } + log(LOG_DEBUG,"ap_handshake_create_onion(): Chosen a route of length %u : ",routelen); +#if 0 + for (i=routelen-1;i>=0;i--) + { + log(LOG_DEBUG,"ap_handshake_process_ss() : %u : %s:%u, %u",routelen-i,(routerarray[route[i]])->address,ntohs((routerarray[route[i]])->port),RSA_size((routerarray[route[i]])->pkey)); + } +#endif + + /* allocate memory for the crypt path */ + cpath = malloc(routelen * sizeof(crypt_path_t *)); + if (!cpath) { + log(LOG_ERR,"ap_handshake_create_onion(): Error allocating memory for cpath."); + free(route); + return -1; + } + + /* create an onion and calculate crypto keys */ + onion = router_create_onion(route,routelen,&onionlen,cpath); + if (!onion) { + log(LOG_ERR,"ap_handshake_create_onion(): Error creating an onion."); + free(route); + free(cpath); /* it's got nothing in it, since !onion */ + return -1; + } + log(LOG_DEBUG,"ap_handshake_create_onion(): Created an onion of size %u bytes.",onionlen); + log(LOG_DEBUG,"ap_handshake_create_onion(): Crypt path :"); + for (i=0;i<routelen;i++) { + log(LOG_DEBUG,"ap_handshake_create_onion() : %u/%u",(cpath[i])->forwf, (cpath[i])->backf); + } + + return ap_handshake_establish_circuit(conn, route, routelen, onion, onionlen, cpath); +} + +int ap_handshake_establish_circuit(connection_t *conn, unsigned int *route, int routelen, char *onion, + int onionlen, crypt_path_t **cpath) { + routerinfo_t *firsthop; + connection_t *n_conn; + circuit_t *circ; + + /* now see if we're already connected to the first OR in 'route' */ + firsthop = router_get_first_in_route(route, routelen); + assert(firsthop); /* should always be defined */ + free(route); /* we don't need it anymore */ + + circ = circuit_new(0, conn); /* sets circ->p_aci and circ->p_conn */ + circ->n_addr = firsthop->addr; + circ->n_port = firsthop->or_port; + circ->state = CIRCUIT_STATE_OR_WAIT; + circ->onion = onion; + circ->onionlen = onionlen; + circ->cpath = cpath; + circ->cpathlen = routelen; + + log(LOG_DEBUG,"ap_handshake_establish_circuit(): Looking for firsthop '%s:%u'", + firsthop->address,ntohs(firsthop->or_port)); + n_conn = connection_get_by_addr_port(firsthop->addr,firsthop->or_port); + if(!n_conn) { /* not currently connected */ + if(global_role & ROLE_OR_CONNECT_ALL) { /* we would be connected if he were up. but he's not. */ + log(LOG_DEBUG,"ap_handshake_establish_circuit(): Route's firsthop isn't connected."); + circuit_close(circ); + return -1; + } + + /* ok, launch the connection */ + n_conn = connect_to_router_as_op(firsthop); + /* FIXME react to this somehow */ + if(!n_conn) { /* connect failed, forget the whole thing */ + log(LOG_DEBUG,"ap_handshake_establish_circuit(): connect to firsthop failed. Closing."); + circuit_close(circ); + return -1; + } + conn->state = AP_CONN_STATE_OR_WAIT; + connection_watch_events(conn, 0); /* Stop listening for input from the AP! */ + return 0; /* return success. The onion/circuit/etc will be taken care of automatically + * (may already have been) whenever n_conn reaches OR_CONN_STATE_OPEN. + */ + } else { /* it's already open. use it. */ + return ap_handshake_send_onion(conn, n_conn, circ); + } +} + +/* find the circ that's waiting on me, if any, and get it to send its onion */ +int ap_handshake_n_conn_open(connection_t *or_conn) { + circuit_t *circ; + + log(LOG_DEBUG,"ap_handshake_n_conn_open(): Starting."); + circ = circuit_get_by_naddr_nport(or_conn->addr, or_conn->port); + if(!circ) + return 0; /* i'm ok with that */ + + if(circ->p_conn->state != AP_CONN_STATE_OR_WAIT) { + log(LOG_DEBUG,"Bug: ap_handshake_n_conn_open() got an ap_conn not in OR_WAIT state."); + } + connection_watch_events(or_conn, POLLIN); /* resume listening for reads */ + log(LOG_DEBUG,"ap_handshake_n_conn_open(): Found circ, sending onion."); + return ap_handshake_send_onion(circ->p_conn, or_conn, circ); +} + +int ap_handshake_send_onion(connection_t *ap_conn, connection_t *n_conn, circuit_t *circ) { + cell_t cell; + int tmpbuflen, dataleft; + char *tmpbuf; + char zero=0; + + circ->n_aci = get_unique_aci_by_addr_port(circ->n_addr, circ->n_port, ACI_TYPE_BOTH); + circ->n_conn = n_conn; + log(LOG_DEBUG,"ap_handshake_send_onion(): n_conn is %s:%u",n_conn->address,ntohs(n_conn->port)); + + /* deliver the onion as one or more create cells */ + cell.command = CELL_CREATE; + cell.aci = circ->n_aci; + + tmpbuflen = circ->onionlen+4; + tmpbuf = malloc(tmpbuflen); + if(!tmpbuf) + return -1; + circ->onionlen = htonl(circ->onionlen); + memcpy(tmpbuf,&circ->onionlen,4); + circ->onionlen = ntohl(circ->onionlen); + memcpy(tmpbuf+4, circ->onion, circ->onionlen); + + dataleft = tmpbuflen; + while(dataleft) { + cell.command = CELL_CREATE; + cell.aci = circ->n_aci; + log(LOG_DEBUG,"ap_handshake_send_onion(): Sending a create cell for the onion..."); + if(dataleft >= CELL_PAYLOAD_SIZE) { + cell.length = CELL_PAYLOAD_SIZE; + memcpy(cell.payload, tmpbuf + tmpbuflen - dataleft, CELL_PAYLOAD_SIZE); + connection_write_cell_to_buf(&cell, n_conn); /* clobbers cell */ + dataleft -= CELL_PAYLOAD_SIZE; + } else { /* last cell */ + cell.length = dataleft; + memcpy(cell.payload, tmpbuf + tmpbuflen - dataleft, dataleft); + connection_write_cell_to_buf(&cell, n_conn); /* clobbers cell */ + dataleft = 0; + } + } + free(tmpbuf); + + /* deliver the ss in a data cell */ + cell.command = CELL_DATA; + cell.aci = circ->n_aci; + cell.length = sizeof(ss_t); + memcpy(cell.payload, &ap_conn->ss, sizeof(ss_t)); + log(LOG_DEBUG,"ap_handshake_send_onion(): Sending a data cell for ss..."); + if(circuit_deliver_data_cell(&cell, circ, circ->n_conn, 'e') < 0) { + log(LOG_DEBUG,"ap_handshake_send_onion(): failed to deliver ss cell. Closing."); + circuit_close(circ); + return -1; + } + + /* deliver the dest_addr in a data cell */ + cell.command = CELL_DATA; + cell.aci = circ->n_aci; + cell.length = ap_conn->dest_addr_len+1; + strncpy(cell.payload, ap_conn->dest_addr, ap_conn->dest_addr_len+1); + log(LOG_DEBUG,"ap_handshake_send_onion(): Sending a data cell for addr..."); + if(circuit_deliver_data_cell(&cell, circ, circ->n_conn, 'e') < 0) { + log(LOG_DEBUG,"ap_handshake_send_onion(): failed to deliver addr cell. Closing."); + circuit_close(circ); + return -1; + } + + /* deliver the dest_port in a data cell */ + cell.command = CELL_DATA; + cell.aci = circ->n_aci; + cell.length = ap_conn->dest_port_len+1; + strncpy(cell.payload, ap_conn->dest_port, ap_conn->dest_port_len+1); + log(LOG_DEBUG,"ap_handshake_send_onion(): Sending a data cell for port..."); + if(circuit_deliver_data_cell(&cell, circ, circ->n_conn, 'e') < 0) { + log(LOG_DEBUG,"ap_handshake_send_onion(): failed to deliver port cell. Closing."); + circuit_close(circ); + return -1; + } + + circ->state = CIRCUIT_STATE_OPEN; + ap_conn->state = AP_CONN_STATE_OPEN; + + /* FIXME should set circ->expire to something here */ + + /* now we want to give the AP a "0" byte, because it wants to hear + * back from us */ + connection_write_to_buf(&zero, 1, ap_conn); + + return 0; +} + +int connection_ap_process_data_cell(cell_t *cell, connection_t *conn) { + + /* an incoming data cell has arrived */ + + assert(conn && conn->type == CONN_TYPE_AP); + + if(conn->state == AP_CONN_STATE_OPEN) { + log(LOG_DEBUG,"connection_ap_process_data_cell(): In state 'open', writing to buf."); + return connection_write_to_buf(cell->payload, cell->length, conn); + } + + /* else we shouldn't have gotten this cell */ + log(LOG_DEBUG,"connection_ap_process_data_cell(): Got a data cell when not in 'open' state. Closing."); + return -1; +} + +int connection_ap_finished_flushing(connection_t *conn) { + + assert(conn && conn->type == CONN_TYPE_AP); + + switch(conn->state) { + case AP_CONN_STATE_OPEN: + /* FIXME down the road, we'll clear out circuits that are pending to close */ + connection_watch_events(conn, POLLIN); + return 0; + default: + log(LOG_DEBUG,"Bug: connection_ap_finished_flushing() called in unexpected state."); + return 0; + } + + return 0; + +} + +int connection_ap_create_listener(RSA *prkey, struct sockaddr_in *local) { + log(LOG_DEBUG,"connection_create_ap_listener starting"); + return connection_create_listener(prkey, local, CONN_TYPE_AP_LISTENER); +} + +int connection_ap_handle_listener_read(connection_t *conn) { + log(LOG_NOTICE,"AP: Received a connection request. Waiting for keys."); + return connection_handle_listener_read(conn, CONN_TYPE_AP, AP_CONN_STATE_SS_WAIT); +} + |