diff options
Diffstat (limited to 'src/or/reasons.c')
-rw-r--r-- | src/or/reasons.c | 497 |
1 files changed, 0 insertions, 497 deletions
diff --git a/src/or/reasons.c b/src/or/reasons.c deleted file mode 100644 index 7d8dcf374c..0000000000 --- a/src/or/reasons.c +++ /dev/null @@ -1,497 +0,0 @@ -/* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson. - * Copyright (c) 2007-2018, The Tor Project, Inc. */ -/* See LICENSE for licensing information */ - -/** - * \file reasons.c - * \brief Convert circuit, stream, and orconn error reasons to and/or from - * strings and errno values. - * - * This module is just a bunch of functions full of case statements that - * convert from one representation of our error codes to another. These are - * mainly used in generating log messages, in sending messages to the - * controller in control.c, and in converting errors from one protocol layer - * to another. - **/ - -#include "or/or.h" -#include "or/config.h" -#include "or/reasons.h" -#include "or/routerlist.h" -#include "lib/tls/tortls.h" - -/***************************** Edge (stream) reasons **********************/ - -/** Convert the reason for ending a stream <b>reason</b> into the format used - * in STREAM events. Return NULL if the reason is unrecognized. */ -const char * -stream_end_reason_to_control_string(int reason) -{ - reason &= END_STREAM_REASON_MASK; - switch (reason) { - case END_STREAM_REASON_MISC: return "MISC"; - case END_STREAM_REASON_RESOLVEFAILED: return "RESOLVEFAILED"; - case END_STREAM_REASON_CONNECTREFUSED: return "CONNECTREFUSED"; - case END_STREAM_REASON_EXITPOLICY: return "EXITPOLICY"; - case END_STREAM_REASON_DESTROY: return "DESTROY"; - case END_STREAM_REASON_DONE: return "DONE"; - case END_STREAM_REASON_TIMEOUT: return "TIMEOUT"; - case END_STREAM_REASON_NOROUTE: return "NOROUTE"; - case END_STREAM_REASON_HIBERNATING: return "HIBERNATING"; - case END_STREAM_REASON_INTERNAL: return "INTERNAL"; - case END_STREAM_REASON_RESOURCELIMIT: return "RESOURCELIMIT"; - case END_STREAM_REASON_CONNRESET: return "CONNRESET"; - case END_STREAM_REASON_TORPROTOCOL: return "TORPROTOCOL"; - case END_STREAM_REASON_NOTDIRECTORY: return "NOTDIRECTORY"; - - case END_STREAM_REASON_CANT_ATTACH: return "CANT_ATTACH"; - case END_STREAM_REASON_NET_UNREACHABLE: return "NET_UNREACHABLE"; - case END_STREAM_REASON_SOCKSPROTOCOL: return "SOCKS_PROTOCOL"; - // XXXX Controlspec - case END_STREAM_REASON_HTTPPROTOCOL: return "HTTP_PROTOCOL"; - - case END_STREAM_REASON_PRIVATE_ADDR: return "PRIVATE_ADDR"; - - default: return NULL; - } -} - -/** Translate <b>reason</b>, which came from a relay 'end' cell, - * into a static const string describing why the stream is closing. - * <b>reason</b> is -1 if no reason was provided. - */ -const char * -stream_end_reason_to_string(int reason) -{ - switch (reason) { - case -1: - log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL, - "End cell arrived with length 0. Should be at least 1."); - return "MALFORMED"; - case END_STREAM_REASON_MISC: return "misc error"; - case END_STREAM_REASON_RESOLVEFAILED: return "resolve failed"; - case END_STREAM_REASON_CONNECTREFUSED: return "connection refused"; - case END_STREAM_REASON_EXITPOLICY: return "exit policy failed"; - case END_STREAM_REASON_DESTROY: return "destroyed"; - case END_STREAM_REASON_DONE: return "closed normally"; - case END_STREAM_REASON_TIMEOUT: return "gave up (timeout)"; - case END_STREAM_REASON_NOROUTE: return "no route to host"; - case END_STREAM_REASON_HIBERNATING: return "server is hibernating"; - case END_STREAM_REASON_INTERNAL: return "internal error at server"; - case END_STREAM_REASON_RESOURCELIMIT: return "server out of resources"; - case END_STREAM_REASON_CONNRESET: return "connection reset"; - case END_STREAM_REASON_TORPROTOCOL: return "Tor protocol error"; - case END_STREAM_REASON_NOTDIRECTORY: return "not a directory"; - default: - log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL, - "Reason for ending (%d) not recognized.",reason); - return "unknown"; - } -} - -/** Translate <b>reason</b> (as from a relay 'end' cell) into an - * appropriate SOCKS5 reply code. - * - * A reason of 0 means that we're not actually expecting to send - * this code back to the socks client; we just call it 'succeeded' - * to keep things simple. - */ -socks5_reply_status_t -stream_end_reason_to_socks5_response(int reason) -{ - switch (reason & END_STREAM_REASON_MASK) { - case 0: - return SOCKS5_SUCCEEDED; - case END_STREAM_REASON_MISC: - return SOCKS5_GENERAL_ERROR; - case END_STREAM_REASON_RESOLVEFAILED: - return SOCKS5_HOST_UNREACHABLE; - case END_STREAM_REASON_CONNECTREFUSED: - return SOCKS5_CONNECTION_REFUSED; - case END_STREAM_REASON_ENTRYPOLICY: - return SOCKS5_NOT_ALLOWED; - case END_STREAM_REASON_EXITPOLICY: - return SOCKS5_NOT_ALLOWED; - case END_STREAM_REASON_DESTROY: - return SOCKS5_GENERAL_ERROR; - case END_STREAM_REASON_DONE: - /* Note that 'DONE' usually indicates a successful close from the other - * side of the stream... but if we receive it before a connected cell -- - * that is, before we have sent a SOCKS reply -- that means that the - * other side of the circuit closed the connection before telling us it - * was complete. */ - return SOCKS5_CONNECTION_REFUSED; - case END_STREAM_REASON_TIMEOUT: - return SOCKS5_TTL_EXPIRED; - case END_STREAM_REASON_NOROUTE: - return SOCKS5_HOST_UNREACHABLE; - case END_STREAM_REASON_RESOURCELIMIT: - return SOCKS5_GENERAL_ERROR; - case END_STREAM_REASON_HIBERNATING: - return SOCKS5_GENERAL_ERROR; - case END_STREAM_REASON_INTERNAL: - return SOCKS5_GENERAL_ERROR; - case END_STREAM_REASON_CONNRESET: - return SOCKS5_CONNECTION_REFUSED; - case END_STREAM_REASON_TORPROTOCOL: - return SOCKS5_GENERAL_ERROR; - - case END_STREAM_REASON_CANT_ATTACH: - return SOCKS5_GENERAL_ERROR; - case END_STREAM_REASON_NET_UNREACHABLE: - return SOCKS5_NET_UNREACHABLE; - case END_STREAM_REASON_SOCKSPROTOCOL: - return SOCKS5_GENERAL_ERROR; - case END_STREAM_REASON_HTTPPROTOCOL: - // LCOV_EXCL_START - tor_assert_nonfatal_unreached(); - return SOCKS5_GENERAL_ERROR; - // LCOV_EXCL_STOP - case END_STREAM_REASON_PRIVATE_ADDR: - return SOCKS5_GENERAL_ERROR; - - default: - log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL, - "Reason for ending (%d) not recognized; " - "sending generic socks error.", reason); - return SOCKS5_GENERAL_ERROR; - } -} - -/* We need to use a few macros to deal with the fact that Windows - * decided that their sockets interface should be a permakludge. - * E_CASE is for errors where windows has both a EFOO and a WSAEFOO - * version, and S_CASE is for errors where windows has only a WSAEFOO - * version. (The E is for 'error', the S is for 'socket'). */ -#ifdef _WIN32 -#define E_CASE(s) case s: case WSA ## s -#define S_CASE(s) case WSA ## s -#else -#define E_CASE(s) case s -#define S_CASE(s) case s -#endif /* defined(_WIN32) */ - -/** Given an errno from a failed exit connection, return a reason code - * appropriate for use in a RELAY END cell. */ -uint8_t -errno_to_stream_end_reason(int e) -{ - /* To add new errors here, find out if they exist on Windows, and if a WSA* - * equivalent exists on windows. Add a case, an S_CASE, or an E_CASE as - * appropriate. */ - switch (e) { - case EPIPE: - return END_STREAM_REASON_DONE; - E_CASE(EBADF): - E_CASE(EFAULT): - E_CASE(EINVAL): - S_CASE(EISCONN): - S_CASE(ENOTSOCK): - S_CASE(EPROTONOSUPPORT): - S_CASE(EAFNOSUPPORT): - S_CASE(ENOTCONN): - return END_STREAM_REASON_INTERNAL; - S_CASE(ENETUNREACH): - S_CASE(EHOSTUNREACH): - E_CASE(EACCES): - case EPERM: - return END_STREAM_REASON_NOROUTE; - S_CASE(ECONNREFUSED): - return END_STREAM_REASON_CONNECTREFUSED; - S_CASE(ECONNRESET): - return END_STREAM_REASON_CONNRESET; - S_CASE(ETIMEDOUT): - return END_STREAM_REASON_TIMEOUT; - S_CASE(ENOBUFS): - case ENOMEM: - case ENFILE: - S_CASE(EADDRINUSE): - S_CASE(EADDRNOTAVAIL): - E_CASE(EMFILE): - return END_STREAM_REASON_RESOURCELIMIT; - default: - log_info(LD_EXIT, "Didn't recognize errno %d (%s); telling the client " - "that we are ending a stream for 'misc' reason.", - e, tor_socket_strerror(e)); - return END_STREAM_REASON_MISC; - } -} - -/***************************** ORConn reasons *****************************/ - -/** Convert the reason for ending an OR connection <b>r</b> into the format - * used in ORCONN events. Return "UNKNOWN" if the reason is unrecognized. */ -const char * -orconn_end_reason_to_control_string(int r) -{ - /* To add new errors here, find out if they exist on Windows, and if a WSA* - * equivalent exists on windows. Add a case, an S_CASE, or an E_CASE as - * appropriate. */ - switch (r) { - case END_OR_CONN_REASON_DONE: - return "DONE"; - case END_OR_CONN_REASON_REFUSED: - return "CONNECTREFUSED"; - case END_OR_CONN_REASON_OR_IDENTITY: - return "IDENTITY"; - case END_OR_CONN_REASON_CONNRESET: - return "CONNECTRESET"; - case END_OR_CONN_REASON_TIMEOUT: - return "TIMEOUT"; - case END_OR_CONN_REASON_NO_ROUTE: - return "NOROUTE"; - case END_OR_CONN_REASON_IO_ERROR: - return "IOERROR"; - case END_OR_CONN_REASON_RESOURCE_LIMIT: - return "RESOURCELIMIT"; - case END_OR_CONN_REASON_MISC: - return "MISC"; - case END_OR_CONN_REASON_PT_MISSING: - return "PT_MISSING"; - case 0: - return ""; - default: - log_warn(LD_BUG, "Unrecognized or_conn reason code %d", r); - return "UNKNOWN"; - } -} - -/** Convert a TOR_TLS_* error code into an END_OR_CONN_* reason. */ -int -tls_error_to_orconn_end_reason(int e) -{ - switch (e) { - case TOR_TLS_ERROR_IO: - return END_OR_CONN_REASON_IO_ERROR; - case TOR_TLS_ERROR_CONNREFUSED: - return END_OR_CONN_REASON_REFUSED; - case TOR_TLS_ERROR_CONNRESET: - return END_OR_CONN_REASON_CONNRESET; - case TOR_TLS_ERROR_NO_ROUTE: - return END_OR_CONN_REASON_NO_ROUTE; - case TOR_TLS_ERROR_TIMEOUT: - return END_OR_CONN_REASON_TIMEOUT; - case TOR_TLS_WANTREAD: - case TOR_TLS_WANTWRITE: - case TOR_TLS_CLOSE: - case TOR_TLS_DONE: - return END_OR_CONN_REASON_DONE; - default: - return END_OR_CONN_REASON_MISC; - } -} - -/** Given an errno from a failed ORConn connection, return a reason code - * appropriate for use in the controller orconn events. */ -int -errno_to_orconn_end_reason(int e) -{ - switch (e) { - case EPIPE: - return END_OR_CONN_REASON_DONE; - S_CASE(ENOTCONN): - S_CASE(ENETUNREACH): - S_CASE(ENETDOWN): - S_CASE(EHOSTUNREACH): - return END_OR_CONN_REASON_NO_ROUTE; - S_CASE(ECONNREFUSED): - return END_OR_CONN_REASON_REFUSED; - S_CASE(ECONNRESET): - return END_OR_CONN_REASON_CONNRESET; - S_CASE(ETIMEDOUT): - return END_OR_CONN_REASON_TIMEOUT; - S_CASE(ENOBUFS): - case ENOMEM: - case ENFILE: - E_CASE(EMFILE): - E_CASE(EACCES): - E_CASE(EBADF): - E_CASE(EFAULT): - E_CASE(EINVAL): - return END_OR_CONN_REASON_RESOURCE_LIMIT; - default: - log_info(LD_OR, "Didn't recognize errno %d (%s).", - e, tor_socket_strerror(e)); - return END_OR_CONN_REASON_MISC; - } -} - -/***************************** Circuit reasons *****************************/ - -/** Convert a numeric reason for destroying a circuit into a string for a - * CIRCUIT event. */ -const char * -circuit_end_reason_to_control_string(int reason) -{ - int is_remote = 0; - - if (reason >= 0 && reason & END_CIRC_REASON_FLAG_REMOTE) { - reason &= ~END_CIRC_REASON_FLAG_REMOTE; - is_remote = 1; - } - - switch (reason) { - case END_CIRC_AT_ORIGIN: - /* This shouldn't get passed here; it's a catch-all reason. */ - return "ORIGIN"; - case END_CIRC_REASON_NONE: - /* This shouldn't get passed here; it's a catch-all reason. */ - return "NONE"; - case END_CIRC_REASON_TORPROTOCOL: - return "TORPROTOCOL"; - case END_CIRC_REASON_INTERNAL: - return "INTERNAL"; - case END_CIRC_REASON_REQUESTED: - return "REQUESTED"; - case END_CIRC_REASON_HIBERNATING: - return "HIBERNATING"; - case END_CIRC_REASON_RESOURCELIMIT: - return "RESOURCELIMIT"; - case END_CIRC_REASON_CONNECTFAILED: - return "CONNECTFAILED"; - case END_CIRC_REASON_OR_IDENTITY: - return "OR_IDENTITY"; - case END_CIRC_REASON_CHANNEL_CLOSED: - return "CHANNEL_CLOSED"; - case END_CIRC_REASON_FINISHED: - return "FINISHED"; - case END_CIRC_REASON_TIMEOUT: - return "TIMEOUT"; - case END_CIRC_REASON_DESTROYED: - return "DESTROYED"; - case END_CIRC_REASON_NOPATH: - return "NOPATH"; - case END_CIRC_REASON_NOSUCHSERVICE: - return "NOSUCHSERVICE"; - case END_CIRC_REASON_MEASUREMENT_EXPIRED: - return "MEASUREMENT_EXPIRED"; - case END_CIRC_REASON_IP_NOW_REDUNDANT: - return "IP_NOW_REDUNDANT"; - default: - if (is_remote) { - /* - * If it's remote, it's not a bug *here*, so don't use LD_BUG, but - * do note that the someone we're talking to is speaking the Tor - * protocol with a weird accent. - */ - log_warn(LD_PROTOCOL, - "Remote server sent bogus reason code %d", reason); - } else { - log_warn(LD_BUG, - "Unrecognized reason code %d", reason); - } - return NULL; - } -} - -/** Return a string corresponding to a SOCKS4 response code. */ -const char * -socks4_response_code_to_string(uint8_t code) -{ - switch (code) { - case 0x5a: - return "connection accepted"; - case 0x5b: - return "server rejected connection"; - case 0x5c: - return "server cannot connect to identd on this client"; - case 0x5d: - return "user id does not match identd"; - default: - return "invalid SOCKS 4 response code"; - } -} - -/** Return a string corresponding to a SOCKS5 response code. */ -const char * -socks5_response_code_to_string(uint8_t code) -{ - switch (code) { - case 0x00: - return "connection accepted"; - case 0x01: - return "general SOCKS server failure"; - case 0x02: - return "connection not allowed by ruleset"; - case 0x03: - return "Network unreachable"; - case 0x04: - return "Host unreachable"; - case 0x05: - return "Connection refused"; - case 0x06: - return "TTL expired"; - case 0x07: - return "Command not supported"; - case 0x08: - return "Address type not supported"; - default: - return "unknown reason"; - } -} - -/** Return a string corresponding to a bandwidth_weight_rule_t */ -const char * -bandwidth_weight_rule_to_string(bandwidth_weight_rule_t rule) -{ - switch (rule) - { - case NO_WEIGHTING: - return "no weighting"; - case WEIGHT_FOR_EXIT: - return "weight as exit"; - case WEIGHT_FOR_MID: - return "weight as middle node"; - case WEIGHT_FOR_GUARD: - return "weight as guard"; - case WEIGHT_FOR_DIR: - return "weight as directory"; - default: - return "unknown rule"; - } -} - -/** Given a RELAY_END reason value, convert it to an HTTP response to be - * send over an HTTP tunnel connection. */ -const char * -end_reason_to_http_connect_response_line(int endreason) -{ - endreason &= END_STREAM_REASON_MASK; - /* XXXX these are probably all wrong. Should they all be 502? */ - switch (endreason) { - case 0: - return "HTTP/1.0 200 OK\r\n\r\n"; - case END_STREAM_REASON_MISC: - return "HTTP/1.0 500 Internal Server Error\r\n\r\n"; - case END_STREAM_REASON_RESOLVEFAILED: - return "HTTP/1.0 404 Not Found (resolve failed)\r\n\r\n"; - case END_STREAM_REASON_NOROUTE: - return "HTTP/1.0 404 Not Found (no route)\r\n\r\n"; - case END_STREAM_REASON_CONNECTREFUSED: - return "HTTP/1.0 403 Forbidden (connection refused)\r\n\r\n"; - case END_STREAM_REASON_EXITPOLICY: - return "HTTP/1.0 403 Forbidden (exit policy)\r\n\r\n"; - case END_STREAM_REASON_DESTROY: - return "HTTP/1.0 502 Bad Gateway (destroy cell received)\r\n\r\n"; - case END_STREAM_REASON_DONE: - return "HTTP/1.0 502 Bad Gateway (unexpected close)\r\n\r\n"; - case END_STREAM_REASON_TIMEOUT: - return "HTTP/1.0 504 Gateway Timeout\r\n\r\n"; - case END_STREAM_REASON_HIBERNATING: - return "HTTP/1.0 502 Bad Gateway (hibernating server)\r\n\r\n"; - case END_STREAM_REASON_INTERNAL: - return "HTTP/1.0 502 Bad Gateway (internal error)\r\n\r\n"; - case END_STREAM_REASON_RESOURCELIMIT: - return "HTTP/1.0 502 Bad Gateway (resource limit)\r\n\r\n"; - case END_STREAM_REASON_CONNRESET: - return "HTTP/1.0 403 Forbidden (connection reset)\r\n\r\n"; - case END_STREAM_REASON_TORPROTOCOL: - return "HTTP/1.0 502 Bad Gateway (tor protocol violation)\r\n\r\n"; - case END_STREAM_REASON_ENTRYPOLICY: - return "HTTP/1.0 403 Forbidden (entry policy violation)\r\n\r\n"; - case END_STREAM_REASON_NOTDIRECTORY: /* Fall Through */ - default: - tor_assert_nonfatal_unreached(); - return "HTTP/1.0 500 Internal Server Error (weird end reason)\r\n\r\n"; - } -} |