aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorDavid Goulet <dgoulet@torproject.org>2019-05-28 13:36:34 -0400
committerGeorge Kadianakis <desnacked@riseup.net>2019-11-18 19:06:43 +0200
commitfb1d2120212bef100f2b5e90d27b8c251280cb0c (patch)
treebcabf8608fadbe6b5fcfda67dca548affc17b4ff /src
parent7bba8bf72f20aa2ac71ac381a7fdf66fadbd473f (diff)
downloadtor-fb1d2120212bef100f2b5e90d27b8c251280cb0c.tar.gz
tor-fb1d2120212bef100f2b5e90d27b8c251280cb0c.zip
hs-v3: Set extended error when descriptor is not found
Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org>
Diffstat (limited to 'src')
-rw-r--r--src/feature/dirclient/dirclient.c1
-rw-r--r--src/feature/hs/hs_client.c24
-rw-r--r--src/feature/hs/hs_client.h1
3 files changed, 26 insertions, 0 deletions
diff --git a/src/feature/dirclient/dirclient.c b/src/feature/dirclient/dirclient.c
index 3b506317b0..64205a44e3 100644
--- a/src/feature/dirclient/dirclient.c
+++ b/src/feature/dirclient/dirclient.c
@@ -2761,6 +2761,7 @@ handle_response_fetch_hsdesc_v3(dir_connection_t *conn,
"NOT_FOUND");
hs_control_desc_event_content(conn->hs_ident, conn->identity_digest,
NULL);
+ hs_client_desc_not_found(conn->hs_ident);
break;
case 400:
log_warn(LD_REND, "Fetching v3 hidden service descriptor failed: "
diff --git a/src/feature/hs/hs_client.c b/src/feature/hs/hs_client.c
index 491c52a047..0e4df73b9f 100644
--- a/src/feature/hs/hs_client.c
+++ b/src/feature/hs/hs_client.c
@@ -42,6 +42,7 @@
#include "core/or/entry_connection_st.h"
#include "core/or/extend_info_st.h"
#include "core/or/origin_circuit_st.h"
+#include "core/or/socks_request_st.h"
/** Client-side authorizations for hidden services; map of service identity
* public key to hs_client_service_authorization_t *. */
@@ -1758,6 +1759,29 @@ hs_client_desc_has_arrived(const hs_ident_dir_conn_t *ident)
smartlist_free(entry_conns);
}
+/** This is called when a descriptor fetch was not found. Every entry
+ * connection that matches the requested onion service, its extended error
+ * code will be set accordingly. */
+void
+hs_client_desc_not_found(const hs_ident_dir_conn_t *ident)
+{
+ smartlist_t *entry_conns;
+
+ tor_assert(ident);
+
+ entry_conns = find_entry_conns(&ident->identity_pk);
+
+ SMARTLIST_FOREACH_BEGIN(entry_conns, entry_connection_t *, entry_conn) {
+ /* Descriptor was not found. We'll flag the socks request with the
+ * extended error code. If it is supported, it will be sent back. */
+ entry_conn->socks_request->socks_extended_error_code =
+ SOCKS5_HS_NOT_FOUND;
+ } SMARTLIST_FOREACH_END(entry_conn);
+
+ /* We don't have ownership of the objects in this list. */
+ smartlist_free(entry_conns);
+}
+
/** Return a newly allocated extend_info_t for a randomly chosen introduction
* point for the given edge connection identifier ident. Return NULL if we
* can't pick any usable introduction points. */
diff --git a/src/feature/hs/hs_client.h b/src/feature/hs/hs_client.h
index 0e22a2e044..6bd6e5748f 100644
--- a/src/feature/hs/hs_client.h
+++ b/src/feature/hs/hs_client.h
@@ -73,6 +73,7 @@ int hs_client_receive_rendezvous2(origin_circuit_t *circ,
size_t payload_len);
void hs_client_desc_has_arrived(const hs_ident_dir_conn_t *ident);
+void hs_client_desc_not_found(const hs_ident_dir_conn_t *ident);
extend_info_t *hs_client_get_random_intro_from_edge(
const edge_connection_t *edge_conn);