summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-09-26 18:58:45 +0000
committerNick Mathewson <nickm@torproject.org>2008-09-26 18:58:45 +0000
commite147e867bea13515c964e823e3f98c28f90cf22c (patch)
treea8af8f882985c2edfa36f1eee2e44de17a6a4a80 /src
parent87eb230c01693c0cdb81d05a6bd2c866874c5e3a (diff)
downloadtor-e147e867bea13515c964e823e3f98c28f90cf22c.tar.gz
tor-e147e867bea13515c964e823e3f98c28f90cf22c.zip
Proposal 152 implementation from Josh Albrecht, with tweaks.
svn:r16983
Diffstat (limited to 'src')
-rw-r--r--src/or/circuitbuild.c4
-rw-r--r--src/or/config.c3
-rw-r--r--src/or/connection_edge.c6
-rw-r--r--src/or/control.c21
-rw-r--r--src/or/or.h12
-rw-r--r--src/or/router.c5
-rw-r--r--src/or/routerlist.c10
-rw-r--r--src/or/routerparse.c5
8 files changed, 59 insertions, 7 deletions
diff --git a/src/or/circuitbuild.c b/src/or/circuitbuild.c
index c531dbe10a..42ccae71aa 100644
--- a/src/or/circuitbuild.c
+++ b/src/or/circuitbuild.c
@@ -1197,6 +1197,8 @@ choose_good_exit_server_general(routerlist_t *dir, int need_uptime,
connections = get_connection_array();
+ /* XXXX021 Respect ExcludeSingleHopRelays here. */
+
/* Count how many connections are waiting for a circuit to be built.
* We use this for log messages now, but in the future we may depend on it.
*/
@@ -2458,6 +2460,8 @@ choose_random_entry(cpath_build_state_t *state)
consider_exit_family = 1;
}
+ /* XXXX021 Respect ExcludeSingleHopRelays here. */
+
if (!entry_guards)
entry_guards = smartlist_create();
diff --git a/src/or/config.c b/src/or/config.c
index 219be16481..de1c6e0b3f 100644
--- a/src/or/config.c
+++ b/src/or/config.c
@@ -136,6 +136,8 @@ static config_var_t _option_vars[] = {
V(Address, STRING, NULL),
V(AllowInvalidNodes, CSV, "middle,rendezvous"),
V(AllowNonRFC953Hostnames, BOOL, "0"),
+ V(AllowSingleHopCircuits, BOOL, "0"),
+ V(AllowSingleHopExits, BOOL, "0"),
V(AlternateBridgeAuthority, LINELIST, NULL),
V(AlternateDirAuthority, LINELIST, NULL),
V(AlternateHSAuthority, LINELIST, NULL),
@@ -198,6 +200,7 @@ static config_var_t _option_vars[] = {
V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "10 minutes"),
V(ExcludeNodes, ROUTERSET, NULL),
V(ExcludeExitNodes, ROUTERSET, NULL),
+ V(ExcludeSingleHopRelays, BOOL, "1"),
V(ExitNodes, ROUTERSET, NULL),
V(ExitPolicy, LINELIST, NULL),
V(ExitPolicyRejectPrivate, BOOL, "1"),
diff --git a/src/or/connection_edge.c b/src/or/connection_edge.c
index fe05aed521..4d054a88a6 100644
--- a/src/or/connection_edge.c
+++ b/src/or/connection_edge.c
@@ -2498,8 +2498,10 @@ connection_exit_begin_conn(cell_t *cell, circuit_t *circ)
tor_free(address);
return 0;
}
- if (or_circ && or_circ->is_first_hop) {
- /* Don't let clients use us as a single-hop proxy; it attracts attackers
+ if (or_circ && or_circ->is_first_hop &&
+ !get_options()->AllowSingleHopExits) {
+ /* Don't let clients use us as a single-hop proxy, unless the user
+ * has explicitly allowed that in the config. It attracts attackers
* and users who'd be better off with, well, single-hop proxies.
*/
log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL,
diff --git a/src/or/control.c b/src/or/control.c
index 93a946405d..8ae93e4998 100644
--- a/src/or/control.c
+++ b/src/or/control.c
@@ -2324,11 +2324,26 @@ handle_control_attachstream(control_connection_t *conn, uint32_t len,
conn);
return 0;
}
+ /* Is this a single hop circuit? */
if (circ && (circuit_get_cpath_len(circ)<2 || hop==1)) {
- connection_write_str_to_buf(
- "551 Can't attach stream to one-hop circuit.\r\n", conn);
- return 0;
+ routerinfo_t *r = NULL;
+ char* exit_digest;
+ if (circ->build_state &&
+ circ->build_state->chosen_exit &&
+ circ->build_state->chosen_exit->identity_digest) {
+ exit_digest = circ->build_state->chosen_exit->identity_digest;
+ r = router_get_by_digest(exit_digest);
+ }
+ /* Do both the client and relay allow one-hop exit circuits? */
+ if (!r || !r->allow_single_hop_exits ||
+ !get_options()->AllowSingleHopCircuits) {
+ connection_write_str_to_buf(
+ "551 Can't attach stream to this one-hop circuit.\r\n", conn);
+ return 0;
+ }
+ ap_conn->chosen_exit_name = tor_strdup(hex_str(exit_digest, DIGEST_LEN));
}
+
if (circ && hop>0) {
/* find this hop in the circuit, and set cpath */
cpath = circuit_get_cpath_hop(circ, hop);
diff --git a/src/or/or.h b/src/or/or.h
index f57dcfbd90..5820a56c4e 100644
--- a/src/or/or.h
+++ b/src/or/or.h
@@ -1357,6 +1357,8 @@ typedef struct {
* dnsworker code. */
unsigned int caches_extra_info:1; /**< Whether the router caches and serves
* extrainfo documents. */
+ unsigned int allow_single_hop_exits:1; /**< Whether the router allows
+ * single hop exits. */
/* local info */
unsigned int is_running:1; /**< As far as we know, is this OR currently
@@ -2420,6 +2422,16 @@ typedef struct {
* if we are a cache). For authorities, this is always true. */
int DownloadExtraInfo;
+ /** If true, and we are acting as a relay, allow exit circuits even when
+ * we are the first hop of a circuit. */
+ int AllowSingleHopExits;
+ /** If true, don't allow relays with AllowSingleHopExits=1 to be used in
+ * circuits that we build. */
+ int ExcludeSingleHopRelays;
+ /** If true, and the controller tells us to use a one-hop circuit, and the
+ * exit allows it, we use it. */
+ int AllowSingleHopCircuits;
+
/** If true, do not believe anybody who tells us that a domain resolves
* to an internal address, or that an internal address has a PTR mapping.
* Helps avoid some cross-site attacks. */
diff --git a/src/or/router.c b/src/or/router.c
index 94fa8d59de..29b930bbc0 100644
--- a/src/or/router.c
+++ b/src/or/router.c
@@ -1687,7 +1687,7 @@ router_dump_router_to_string(char *s, size_t maxlen, routerinfo_t *router,
"opt extra-info-digest %s\n%s"
"onion-key\n%s"
"signing-key\n%s"
- "%s%s%s",
+ "%s%s%s%s",
router->nickname,
router->address,
router->or_port,
@@ -1704,7 +1704,8 @@ router_dump_router_to_string(char *s, size_t maxlen, routerinfo_t *router,
onion_pkey, identity_pkey,
family_line,
we_are_hibernating() ? "opt hibernating 1\n" : "",
- options->HidServDirectoryV2 ? "opt hidden-service-dir\n" : "");
+ options->HidServDirectoryV2 ? "opt hidden-service-dir\n" : "",
+ options->AllowSingleHopExits ? "opt allow-single-hop-exits\n" : "");
tor_free(family_line);
tor_free(onion_pkey);
diff --git a/src/or/routerlist.c b/src/or/routerlist.c
index 3a5c4d5998..be38cc569e 100644
--- a/src/or/routerlist.c
+++ b/src/or/routerlist.c
@@ -1767,6 +1767,16 @@ router_choose_random_node(const char *preferred,
excludednodes = smartlist_create();
+ /* Exclude relays that allow single hop exit circuits, if the user
+ * wants to (such relays might be risky) */
+ if (get_options()->ExcludeSingleHopRelays) {
+ routerlist_t *rl = router_get_routerlist();
+ SMARTLIST_FOREACH(rl->routers, routerinfo_t *, r,
+ if (r->allow_single_hop_exits) {
+ smartlist_add(excludednodes, r);
+ });
+ }
+
if ((r = routerlist_find_my_routerinfo())) {
smartlist_add(excludednodes, r);
routerlist_add_family(excludednodes, r);
diff --git a/src/or/routerparse.c b/src/or/routerparse.c
index 5a8a17796a..c6b7454966 100644
--- a/src/or/routerparse.c
+++ b/src/or/routerparse.c
@@ -63,6 +63,7 @@ typedef enum {
K_EXTRA_INFO_DIGEST,
K_CACHES_EXTRA_INFO,
K_HIDDEN_SERVICE_DIR,
+ K_ALLOW_SINGLE_HOP_EXITS,
K_DIR_KEY_CERTIFICATE_VERSION,
K_DIR_IDENTITY_KEY,
@@ -239,6 +240,7 @@ static token_rule_t routerdesc_token_table[] = {
T01("write-history", K_WRITE_HISTORY, ARGS, NO_OBJ ),
T01("extra-info-digest", K_EXTRA_INFO_DIGEST, GE(1), NO_OBJ ),
T01("hidden-service-dir", K_HIDDEN_SERVICE_DIR, NO_ARGS, NO_OBJ ),
+ T01("allow-single-hop-exits",K_ALLOW_SINGLE_HOP_EXITS, NO_ARGS, NO_OBJ ),
T01("family", K_FAMILY, ARGS, NO_OBJ ),
T01("caches-extra-info", K_CACHES_EXTRA_INFO, NO_ARGS, NO_OBJ ),
@@ -1363,6 +1365,9 @@ router_parse_entry_from_string(const char *s, const char *end,
if ((tok = find_first_by_keyword(tokens, K_CACHES_EXTRA_INFO)))
router->caches_extra_info = 1;
+ if ((tok = find_first_by_keyword(tokens, K_ALLOW_SINGLE_HOP_EXITS)))
+ router->allow_single_hop_exits = 1;
+
if ((tok = find_first_by_keyword(tokens, K_EXTRA_INFO_DIGEST))) {
tor_assert(tok->n_args >= 1);
if (strlen(tok->args[0]) == HEX_DIGEST_LEN) {