diff options
author | Nick Mathewson <nickm@torproject.org> | 2018-11-15 16:37:41 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2018-11-15 16:37:41 -0500 |
commit | 1e6ffeaeaaf3c01a85c69e9cee76f124720bb8c8 (patch) | |
tree | b21ba82a90d83b4ec2780b9f6c1b0a4fca86ddc1 /src | |
parent | 27b91704753ae3235630b298449b4c8a107bd107 (diff) | |
parent | 34e4d5a78362b3f133958740a18d0ee06ae4fdad (diff) | |
download | tor-1e6ffeaeaaf3c01a85c69e9cee76f124720bb8c8.tar.gz tor-1e6ffeaeaaf3c01a85c69e9cee76f124720bb8c8.zip |
Merge branch 'maint-0.3.3' into maint-0.3.4
Diffstat (limited to 'src')
-rw-r--r-- | src/or/directory.c | 2 | ||||
-rw-r--r-- | src/or/hs_client.c | 4 | ||||
-rw-r--r-- | src/or/hs_descriptor.c | 9 |
3 files changed, 7 insertions, 8 deletions
diff --git a/src/or/directory.c b/src/or/directory.c index ca53756cbe..efb6cd0e94 100644 --- a/src/or/directory.c +++ b/src/or/directory.c @@ -3095,7 +3095,7 @@ handle_response_fetch_hsdesc_v3(dir_connection_t *conn, case 200: /* We got something: Try storing it in the cache. */ if (hs_cache_store_as_client(body, &conn->hs_ident->identity_pk) < 0) { - log_warn(LD_REND, "Failed to store hidden service descriptor"); + log_info(LD_REND, "Failed to store hidden service descriptor"); /* Fire control port FAILED event. */ hs_control_desc_event_failed(conn->hs_ident, conn->identity_digest, "BAD_DESC"); diff --git a/src/or/hs_client.c b/src/or/hs_client.c index 5546746202..8ecefc1209 100644 --- a/src/or/hs_client.c +++ b/src/or/hs_client.c @@ -1225,10 +1225,6 @@ hs_client_decode_descriptor(const char *desc_str, ret = hs_desc_decode_descriptor(desc_str, subcredential, desc); memwipe(subcredential, 0, sizeof(subcredential)); if (ret < 0) { - log_warn(LD_GENERAL, "Could not parse received descriptor as client."); - if (get_options()->SafeLogging_ == SAFELOG_SCRUB_NONE) { - log_warn(LD_GENERAL, "%s", escaped(desc_str)); - } goto err; } diff --git a/src/or/hs_descriptor.c b/src/or/hs_descriptor.c index 7ffa885ca8..e85c29a24e 100644 --- a/src/or/hs_descriptor.c +++ b/src/or/hs_descriptor.c @@ -1363,7 +1363,7 @@ decrypt_desc_layer,(const hs_descriptor_t *desc, * This is a critical check that is making sure the computed MAC matches the * one in the descriptor. */ if (!tor_memeq(our_mac, desc_mac, sizeof(our_mac))) { - log_warn(LD_REND, "Encrypted service descriptor MAC check failed"); + log_info(LD_REND, "Encrypted service descriptor MAC check failed"); goto err; } @@ -1546,7 +1546,6 @@ desc_decrypt_all(const hs_descriptor_t *desc, char **decrypted_out) superencrypted_len, &encrypted_blob); if (!encrypted_len) { - log_warn(LD_REND, "Decrypting encrypted desc failed."); goto err; } tor_assert(encrypted_blob); @@ -2048,7 +2047,11 @@ desc_decode_encrypted_v3(const hs_descriptor_t *desc, * in the descriptor as a blob of bytes. */ message_len = desc_decrypt_all(desc, &message); if (!message_len) { - log_warn(LD_REND, "Service descriptor decryption failed."); + /* Inform at notice level that the onion address requested can't be + * reached without client authorization most likely. */ + log_notice(LD_REND, "Fail to decrypt descriptor for requested onion " + "address. It is likely requiring client " + "authorization."); goto err; } tor_assert(message); |