aboutsummaryrefslogtreecommitdiff
path: root/pt-spec.txt
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2023-10-12 12:27:58 -0400
committerNick Mathewson <nickm@torproject.org>2023-10-12 12:27:58 -0400
commite4e0d93d56ee8c1aec4c2efaa7046b651f0fe55c (patch)
tree15a085da265ae3b2b70f29a70f910a5371059a78 /pt-spec.txt
parentb719a373934d3e79ef833446c6aeeb19be485510 (diff)
downloadtorspec-e4e0d93d56ee8c1aec4c2efaa7046b651f0fe55c.tar.gz
torspec-e4e0d93d56ee8c1aec4c2efaa7046b651f0fe55c.zip
Move all text-only specifications into the OLD_TXT directory.
Diffstat (limited to 'pt-spec.txt')
-rw-r--r--pt-spec.txt828
1 files changed, 0 insertions, 828 deletions
diff --git a/pt-spec.txt b/pt-spec.txt
deleted file mode 100644
index 45b4c31..0000000
--- a/pt-spec.txt
+++ /dev/null
@@ -1,828 +0,0 @@
- Pluggable Transport Specification (Version 1)
-
-Abstract
-
- Pluggable Transports (PTs) are a generic mechanism for the rapid
- development and deployment of censorship circumvention,
- based around the idea of modular sub-processes that transform
- traffic to defeat censors.
-
- This document specifies the sub-process startup, shutdown,
- and inter-process communication mechanisms required to utilize
- PTs.
-
-Table of Contents
-
- 1. Introduction
- 1.1. Requirements Notation
- 2. Architecture Overview
- 3. Specification
- 3.1. Pluggable Transport Naming
- 3.2. Pluggable Transport Configuration Environment Variables
- 3.2.1. Common Environment Variables
- 3.2.2. Pluggable Transport Client Environment Variables
- 3.2.3. Pluggable Transport Server Environment Variables
- 3.3. Pluggable Transport To Parent Process Communication
- 3.3.1. Common Messages
- 3.3.2. Pluggable Transport Client Messages
- 3.3.3. Pluggable Transport Server Messages
- 3.4. Pluggable Transport Shutdown
- 3.5. Pluggable Transport Client Per-Connection Arguments
- 4. Anonymity Considerations
- 5 References
- 6. Acknowledgments
- Appendix A. Example Client Pluggable Transport Session
- Appendix B. Example Server Pluggable Transport Session
-
-1. Introduction
-
- This specification describes a way to decouple protocol-level
- obfuscation from an application's client/server code, in a manner
- that promotes rapid development of obfuscation/circumvention
- tools and promotes reuse beyond the scope of the Tor Project's
- efforts in that area.
-
- This is accomplished by utilizing helper sub-processes that
- implement the necessary forward/reverse proxy servers that handle
- the censorship circumvention, with a well defined and
- standardized configuration and management interface.
-
- Any application code that implements the interfaces as specified
- in this document will be able to use all spec compliant Pluggable
- Transports.
-
-1.1. Requirements Notation
-
- The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
- NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
- "OPTIONAL" in this document are to be interpreted as described in
- [RFC2119].
-
-2. Architecture Overview
-
- +------------+ +---------------------------+
- | Client App +-- Local Loopback --+ PT Client (SOCKS Proxy) +--+
- +------------+ +---------------------------+ |
- |
- Public Internet (Obfuscated/Transformed traffic) ==> |
- |
- +------------+ +---------------------------+ |
- | Server App +-- Local Loopback --+ PT Server (Reverse Proxy) +--+
- +------------+ +---------------------------+
-
- On the client's host, the PT Client software exposes a SOCKS proxy
- [RFC1928] to the client application, and obfuscates or otherwise
- transforms traffic before forwarding it to the server's host.
-
- On the server's host, the PT Server software exposes a reverse proxy
- that accepts connections from PT Clients, and handles reversing the
- obfuscation/transformation applied to traffic, before forwarding it
- to the actual server software. An optional lightweight protocol
- exists to facilitate communicating connection meta-data that would
- otherwise be lost such as the source IP address and port
- [EXTORPORT].
-
- All PT instances are configured by the respective parent process via
- a set of standardized environment variables (3.2) that are set at
- launch time, and report status information back to the parent via
- writing output in a standardized format to stdout (3.3).
-
- Each invocation of a PT MUST be either a client OR a server.
-
- All PT client forward proxies MUST support either SOCKS 4 or SOCKS 5,
- and SHOULD prefer SOCKS 5 over SOCKS 4.
-
-3. Specification
-
- Pluggable Transport proxies follow the following workflow
- throughout their lifespan.
-
- 1) Parent process sets the required environment values (3.2)
- and launches the PT proxy as a sub-process (fork()/exec()).
-
- 2) The PT Proxy determines the versions of the PT specification
- supported by the parent"TOR_PT_MANAGED_TRANSPORT_VER" (3.2.1)
-
- 2.1) If there are no compatible versions, the PT proxy
- writes a "VERSION-ERROR" message (3.3.1) to stdout and
- terminates.
-
- 2.2) If there is a compatible version, the PT proxy writes
- a "VERSION" message (3.3.1) to stdout.
-
- 3) The PT Proxy parses the rest of the environment values.
-
- 3.1) If the environment values are malformed, or otherwise
- invalid, the PT proxy writes a "ENV-ERROR" message
- (3.3.1) to stdout and terminates.
-
- 3.2) Determining if it is a client side forward proxy or
- a server side reverse proxy can be done via examining
- the "TOR_PT_CLIENT_TRANSPORTS" and "TOR_PT_SERVER_TRANSPORTS"
- environment variables.
-
- 4) (Client only) If there is an upstream proxy specified via
- "TOR_PT_PROXY" (3.2.2), the PT proxy validates the URI
- provided.
-
- 4.1) If the upstream proxy is unusable, the PT proxy writes
- a "PROXY-ERROR" message (3.3.2) to stdout and
- terminates.
-
- 4.2) If there is a supported and well-formed upstream proxy
- the PT proxy writes a "PROXY DONE" message (3.3.2) to
- stdout.
-
- 5) The PT Proxy initializes the transports and reports the
- status via stdout (3.3.2, 3.3.3)
-
- 6) The PT Proxy forwards and transforms traffic as appropriate.
-
- 7) Upon being signaled to terminate by the parent process (3.4),
- the PT Proxy gracefully shuts down.
-
-3.1. Pluggable Transport Naming
-
- Pluggable Transport names serve as unique identifiers, and every
- PT MUST have a unique name.
-
- PT names MUST be valid C identifiers. PT names MUST begin with
- a letter or underscore, and the remaining characters MUST be
- ASCII letters, numbers or underscores. No length limit is
- imposted.
-
- PT names MUST satisfy the regular expression "[a-zA-Z_][a-zA-Z0-9_]*".
-
-3.2. Pluggable Transport Configuration Environment Variables
-
- All Pluggable Transport proxy instances are configured by their
- parent process at launch time via a set of well defined
- environment variables.
-
- The "TOR_PT_" prefix is used for namespacing reasons and does not
- indicate any relations to Tor, except for the origins of this
- specification.
-
-3.2.1. Common Environment Variables
-
- When launching either a client or server Pluggable Transport proxy,
- the following common environment variables MUST be set.
-
- "TOR_PT_MANAGED_TRANSPORT_VER"
-
- Specifies the versions of the Pluggable Transport specification
- the parent process supports, delimited by commas. All PTs MUST
- accept any well-formed list, as long as a compatible version is
- present.
-
- Valid versions MUST consist entirely of non-whitespace,
- non-comma printable ASCII characters.
-
- The version of the Pluggable Transport specification as of this
- document is "1".
-
- Example:
-
- TOR_PT_MANAGED_TRANSPORT_VER=1,1a,2b,this_is_a_valid_ver
-
- "TOR_PT_STATE_LOCATION"
-
- Specifies an absolute path to a directory where the PT is
- allowed to store state that will be persisted across
- invocations. The directory is not required to exist when
- the PT is launched, however PT implementations SHOULD be
- able to create it as required.
-
- PTs MUST only store files in the path provided, and MUST NOT
- create or modify files elsewhere on the system.
-
- Example:
-
- TOR_PT_STATE_LOCATION=/var/lib/tor/pt_state/
-
- "TOR_PT_EXIT_ON_STDIN_CLOSE"
-
- Specifies that the parent process will close the PT proxy's
- standard input (stdin) stream to indicate that the PT proxy
- should gracefully exit.
-
- PTs MUST NOT treat a closed stdin as a signal to terminate
- unless this environment variable is set to "1".
-
- PTs SHOULD treat stdin being closed as a signal to gracefully
- terminate if this environment variable is set to "1".
-
- Example:
-
- TOR_PT_EXIT_ON_STDIN_CLOSE=1
-
- "TOR_PT_OUTBOUND_BIND_ADDRESS_V4"
-
- Specifies an IPv4 IP address that the PT proxy SHOULD use as source address for
- outgoing IPv4 IP packets. This feature allows people with multiple network
- interfaces to specify explicitly which interface they prefer the PT proxy to
- use.
-
- If this value is unset or empty, the PT proxy MUST use the default source
- address for outgoing connections.
-
- This setting MUST be ignored for connections to
- loopback addresses (127.0.0.0/8).
-
- Example:
-
- TOR_PT_OUTBOUND_BIND_ADDRESS_V4=203.0.113.4
-
- "TOR_PT_OUTBOUND_BIND_ADDRESS_V6"
-
- Specifies an IPv6 IP address that the PT proxy SHOULD use as source address for
- outgoing IPv6 IP packets. This feature allows people with multiple network
- interfaces to specify explicitly which interface they prefer the PT proxy to
- use.
-
- If this value is unset or empty, the PT proxy MUST use the default source
- address for outgoing connections.
-
- This setting MUST be ignored for connections to the loopback address ([::1]).
-
- IPv6 addresses MUST always be wrapped in square brackets.
-
- Example::
-
- TOR_PT_OUTBOUND_BIND_ADDRESS_V6=[2001:db8::4]
-
-3.2.2. Pluggable Transport Client Environment Variables
-
- Client-side Pluggable Transport forward proxies are configured
- via the following environment variables.
-
- "TOR_PT_CLIENT_TRANSPORTS"
-
- Specifies the PT protocols the client proxy should initialize,
- as a comma separated list of PT names.
-
- PTs SHOULD ignore PT names that it does not recognize.
-
- Parent processes MUST set this environment variable when
- launching a client-side PT proxy instance.
-
- Example:
-
- TOR_PT_CLIENT_TRANSPORTS=obfs2,obfs3,obfs4
-
- "TOR_PT_PROXY"
-
- Specifies an upstream proxy that the PT MUST use when making
- outgoing network connections. It is a URI [RFC3986] of the
- format:
-
- <proxy_type>://[<user_name>[:<password>][@]<ip>:<port>.
-
- The "TOR_PT_PROXY" environment variable is OPTIONAL and
- MUST be omitted if there is no need to connect via an
- upstream proxy.
-
- Examples:
-
- TOR_PT_PROXY=socks5://tor:test1234@198.51.100.1:8000
- TOR_PT_PROXY=socks4a://198.51.100.2:8001
- TOR_PT_PROXY=http://198.51.100.3:443
-
-3.2.3. Pluggable Transport Server Environment Variables
-
- Server-side Pluggable Transport reverse proxies are configured
- via the following environment variables.
-
- "TOR_PT_SERVER_TRANSPORTS"
-
- Specifies the PT protocols the server proxy should initialize,
- as a comma separated list of PT names.
-
- PTs SHOULD ignore PT names that it does not recognize.
-
- Parent processes MUST set this environment variable when
- launching a server-side PT reverse proxy instance.
-
- Example:
-
- TOR_PT_SERVER_TRANSPORTS=obfs3,scramblesuit
-
- "TOR_PT_SERVER_TRANSPORT_OPTIONS"
-
- Specifies per-PT protocol configuration directives, as a
- semicolon-separated list of <key>:<value> pairs, where <key>
- is a PT name and <value> is a k=v string value with options
- that are to be passed to the transport.
-
- Colons, semicolons, and backslashes MUST be
- escaped with a backslash.
-
- If there are no arguments that need to be passed to any of
- PT transport protocols, "TOR_PT_SERVER_TRANSPORT_OPTIONS"
- MAY be omitted.
-
- Example:
-
- TOR_PT_SERVER_TRANSPORT_OPTIONS=scramblesuit:key=banana;automata:rule=110;automata:depth=3
-
- Will pass to 'scramblesuit' the parameter 'key=banana' and to
- 'automata' the arguments 'rule=110' and 'depth=3'.
-
- "TOR_PT_SERVER_BINDADDR"
-
- A comma separated list of <key>-<value> pairs, where <key> is
- a PT name and <value> is the <address>:<port> on which it
- should listen for incoming client connections.
-
- The keys holding transport names MUST be in the same order as
- they appear in "TOR_PT_SERVER_TRANSPORTS".
-
- The <address> MAY be a locally scoped address as long as port
- forwarding is done externally.
-
- The <address>:<port> combination MUST be an IP address
- supported by `bind()`, and MUST NOT be a host name.
-
- Applications MUST NOT set more than one <address>:<port> pair
- per PT name.
-
- If there is no specific <address>:<port> combination to be
- configured for any transports, "TOR_PT_SERVER_BINDADDR" MAY
- be omitted.
-
- Example:
-
- TOR_PT_SERVER_BINDADDR=obfs3-198.51.100.1:1984,scramblesuit-127.0.0.1:4891
-
- "TOR_PT_ORPORT"
-
- Specifies the destination that the PT reverse proxy should forward
- traffic to after transforming it as appropriate, as an
- <address>:<port>.
-
- Connections to the destination specified via "TOR_PT_ORPORT"
- MUST only contain application payload. If the parent process
- requires the actual source IP address of client connections
- (or other metadata), it should set "TOR_PT_EXTENDED_SERVER_PORT"
- instead.
-
- Example:
-
- TOR_PT_ORPORT=127.0.0.1:9001
-
- "TOR_PT_EXTENDED_SERVER_PORT"
-
- Specifies the destination that the PT reverse proxy should
- forward traffic to, via the Extended ORPort protocol [EXTORPORT]
- as an <address>:<port>.
-
- The Extended ORPort protocol allows the PT reverse proxy to
- communicate per-connection metadata such as the PT name and
- client IP address/port to the parent process.
-
- If the parent process does not support the ExtORPort protocol,
- it MUST set "TOR_PT_EXTENDED_SERVER_PORT" to an empty string.
-
- Example:
-
- TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200
-
- "TOR_PT_AUTH_COOKIE_FILE"
-
- Specifies an absolute filesystem path to the Extended ORPort
- authentication cookie, required to communicate with the
- Extended ORPort specified via "TOR_PT_EXTENDED_SERVER_PORT".
-
- If the parent process is not using the ExtORPort protocol for
- incoming traffic, "TOR_PT_AUTH_COOKIE_FILE" MUST be omitted.
-
- Example:
-
- TOR_PT_AUTH_COOKIE_FILE=/var/lib/tor/extended_orport_auth_cookie
-
-3.3. Pluggable Transport To Parent Process Communication
-
- All Pluggable Transport Proxies communicate to the parent process
- via writing NL-terminated lines to stdout. The line metaformat is:
-
- <Line> ::= <Keyword> <OptArgs> <NL>
- <Keyword> ::= <KeywordChar> | <Keyword> <KeywordChar>
- <KeywordChar> ::= <any US-ASCII alphanumeric, dash, and underscore>
- <OptArgs> ::= <Args>*
- <Args> ::= <SP> <ArgChar> | <Args> <ArgChar>
- <ArgChar> ::= <any US-ASCII character but NUL or NL>
- <SP> ::= <US-ASCII whitespace symbol (32)>
- <NL> ::= <US-ASCII newline (line feed) character (10)>
-
- The parent process MUST ignore lines received from PT proxies with
- unknown keywords.
-
-3.3.1. Common Messages
-
- When a PT proxy first starts up, it must determine which version
- of the Pluggable Transports Specification to use to configure
- itself.
-
- It does this via the "TOR_PT_MANAGED_TRANSPORT_VER" (3.2.1)
- environment variable which contains all of the versions supported
- by the application.
-
- Upon determining the version to use, or lack thereof, the PT
- proxy responds with one of two messages.
-
- VERSION-ERROR <ErrorMessage>
-
- The "VERSION-ERROR" message is used to signal that there was
- no compatible Pluggable Transport Specification version
- present in the "TOR_PT_MANAGED_TRANSPORT_VER" list.
-
- The <ErrorMessage> SHOULD be set to "no-version" for
- historical reasons but MAY be set to a useful error message
- instead.
-
- PT proxies MUST terminate after outputting a "VERSION-ERROR"
- message.
-
- Example:
-
- VERSION-ERROR no-version
-
- VERSION <ProtocolVersion>
-
- The "VERSION" message is used to signal the Pluggable Transport
- Specification version (as in "TOR_PT_MANAGED_TRANSPORT_VER")
- that the PT proxy will use to configure its transports and
- communicate with the parent process.
-
- The version for the environment values and reply messages
- specified by this document is "1".
-
- PT proxies MUST either report an error and terminate, or output
- a "VERSION" message before moving on to client/server proxy
- initialization and configuration.
-
- Example:
-
- VERSION 1
-
- After version negotiation has been completed the PT proxy must
- then validate that all of the required environment variables are
- provided, and that all of the configuration values supplied are
- well formed.
-
- At any point, if there is an error encountered related to
- configuration supplied via the environment variables, it MAY
- respond with an error message and terminate.
-
- ENV-ERROR <ErrorMessage>
-
- The "ENV-ERROR" message is used to signal the PT proxy's
- failure to parse the configuration environment variables (3.2).
-
- The <ErrorMessage> SHOULD consist of a useful error message
- that can be used to diagnose and correct the root cause of
- the failure.
-
- PT proxies MUST terminate after outputting a "ENV-ERROR"
- message.
-
- Example:
-
- ENV-ERROR No TOR_PT_AUTH_COOKIE_FILE when TOR_PT_EXTENDED_SERVER_PORT set
-
-3.3.2. Pluggable Transport Client Messages
-
- After negotiating the Pluggable Transport Specification version,
- PT client proxies MUST first validate "TOR_PT_PROXY" (3.2.2) if
- it is set, before initializing any transports.
-
- Assuming that an upstream proxy is provided, PT client proxies
- MUST respond with a message indicating that the proxy is valid,
- supported, and will be used OR a failure message.
-
- PROXY DONE
-
- The "PROXY DONE" message is used to signal the PT proxy's
- acceptance of the upstream proxy specified by "TOR_PT_PROXY".
-
- PROXY-ERROR <ErrorMessage>
-
- The "PROXY-ERROR" message is used to signal that the upstream
- proxy is malformed/unsupported or otherwise unusable.
-
- PT proxies MUST terminate immediately after outputting a
- "PROXY-ERROR" message.
-
- Example:
-
- PROXY-ERROR SOCKS 4 upstream proxies unsupported.
-
- After the upstream proxy (if any) is configured, PT clients then
- iterate over the requested transports in "TOR_PT_CLIENT_TRANSPORTS"
- and initialize the listeners.
-
- For each transport initialized, the PT proxy reports the listener
- status back to the parent via messages to stdout.
-
- CMETHOD <transport> <'socks4','socks5'> <address:port>
-
- The "CMETHOD" message is used to signal that a requested
- PT transport has been launched, the protocol which the parent
- should use to make outgoing connections, and the IP address
- and port that the PT transport's forward proxy is listening on.
-
- Example:
-
- CMETHOD trebuchet socks5 127.0.0.1:19999
-
- CMETHOD-ERROR <transport> <ErrorMessage>
-
- The "CMETHOD-ERROR" message is used to signal that
- requested PT transport was unable to be launched.
-
- Example:
-
- CMETHOD-ERROR trebuchet no rocks available
-
- Once all PT transports have been initialized (or have failed), the
- PT proxy MUST send a final message indicating that it has finished
- initializing.
-
- CMETHODS DONE
-
- The "CMETHODS DONE" message signals that the PT proxy has
- finished initializing all of the transports that it is capable
- of handling.
-
- Upon sending the "CMETHODS DONE" message, the PT proxy
- initialization is complete.
-
- Notes:
-
- - Unknown transports in "TOR_PT_CLIENT_TRANSPORTS" are ignored
- entirely, and MUST NOT result in a "CMETHOD-ERROR" message.
- Thus it is entirely possible for a given PT proxy to
- immediately output "CMETHODS DONE".
-
- - Parent processes MUST handle "CMETHOD"/"CMETHOD-ERROR"
- messages in any order, regardless of ordering in
- "TOR_PT_CLIENT_TRANSPORTS".
-
-3.3.3. Pluggable Transport Server Messages
-
- PT server reverse proxies iterate over the requested transports
- in "TOR_PT_CLIENT_TRANSPORTS" and initialize the listeners.
-
- For each transport initialized, the PT proxy reports the listener
- status back to the parent via messages to stdout.
-
- SMETHOD <transport> <address:port> [options]
-
- The "SMETHOD" message is used to signal that a requested
- PT transport has been launched, the protocol which will be
- used to handle incoming connections, and the IP address and
- port that clients should use to reach the reverse-proxy.
-
- If there is a specific <address:port> provided for a given
- PT transport via "TOR_PT_SERVER_BINDADDR", the transport
- MUST be initialized using that as the server address.
-
- The OPTIONAL 'options' field is used to pass additional
- per-transport information back to the parent process.
-
- The currently recognized 'options' are:
-
- ARGS:[<Key>=<Value>,]+[<Key>=<Value>]
-
- The "ARGS" option is used to pass additional key/value
- formatted information that clients will require to use
- the reverse proxy.
-
- Equal signs and commas MUST be escaped with a backslash.
-
- Tor: The ARGS are included in the transport line of the
- Bridge's extra-info document.
-
- Examples:
-
- SMETHOD trebuchet 198.51.100.1:19999
- SMETHOD rot_by_N 198.51.100.1:2323 ARGS:N=13
-
- SMETHOD-ERROR <transport> <ErrorMessage>
-
- The "SMETHOD-ERROR" message is used to signal that
- requested PT transport reverse proxy was unable to be
- launched.
-
- Example:
-
- SMETHOD-ERROR trebuchet no cows available
-
- Once all PT transports have been initialized (or have failed), the
- PT proxy MUST send a final message indicating that it has finished
- initializing.
-
- SMETHODS DONE
-
- The "SMETHODS DONE" message signals that the PT proxy has
- finished initializing all of the transports that it is capable
- of handling.
-
- Upon sending the "SMETHODS DONE" message, the PT proxy
- initialization is complete.
-
-3.3.4. Pluggable Transport Log Message
-
- This message is for a client or server PT to be able to signal back to the
- parent process via stdout or stderr any log messages.
-
- A log message can be any kind of messages (human readable) that the PT
- sends back so the parent process can gather information about what is going
- on in the child process. It is not intended for the parent process to parse
- and act accordingly but rather a message used for plain logging.
-
- For example, the tor daemon logs those messages at the Severity level and
- sends them onto the control port using the PT_LOG (see control-spec.txt)
- event so any third party can pick them up for debugging.
-
- The format of the message:
-
- LOG SEVERITY=Severity MESSAGE=Message
-
- The SEVERITY value indicate at which logging level the message applies.
- The accepted values for <Severity> are: error, warning, notice, info, debug
-
- The MESSAGE value is a human readable string formatted by the PT. The
- <Message> contains the log message which can be a String or CString (see
- section 2 in control-spec.txt).
-
- Example:
-
- LOG SEVERITY=debug MESSAGE="Connected to bridge A"
-
-3.3.5. Pluggable Transport Status Message
-
- This message is for a client or server PT to be able to signal back to the
- parent process via stdout or stderr any status messages.
-
- The format of the message:
-
- STATUS TRANSPORT=Transport <K_1>=<V_1> [<K_2>=<V_2> ...]
-
- The TRANSPORT value indicates a hint on what the PT is such has the name or
- the protocol used for instance. As an example, obfs4proxy would use
- "obfs4". Thus, the Transport value can be anything the PT itself defines
- and it can be a String or CString (see section 2 in control-spec.txt).
-
- The <K_n>=<V_n> values are specific to the PT and there has to be at least
- one. They are messages that reflects the status that the PT wants to
- report. <V_n> can be a String or CString.
-
- Examples (fictional):
-
- STATUS TRANSPORT=obfs4 ADDRESS=198.51.100.123:1234 CONNECT=Success
- STATUS TRANSPORT=obfs4 ADDRESS=198.51.100.222:2222 CONNECT=Failed FINGERPRINT=<Fingerprint> ERRSTR="Connection refused"
- STATUS TRANSPORT=trebuchet ADDRESS=198.51.100.15:443 PERCENT=42
-
-3.4. Pluggable Transport Shutdown
-
- The recommended way for Pluggable Transport using applications and
- Pluggable Transports to handle graceful shutdown is as follows.
-
- - (Parent) Set "TOR_PT_EXIT_ON_STDIN_CLOSE" (3.2.1) when
- launching the PT proxy, to indicate that stdin will be used
- for graceful shutdown notification.
-
- - (Parent) When the time comes to terminate the PT proxy:
-
- 1. Close the PT proxy's stdin.
- 2. Wait for a "reasonable" amount of time for the PT to exit.
- 3. Attempt to use OS specific mechanisms to cause graceful
- PT shutdown (eg: 'SIGTERM')
- 4. Use OS specific mechanisms to force terminate the PT
- (eg: 'SIGKILL', 'ProccessTerminate()').
-
- - PT proxies SHOULD monitor stdin, and exit gracefully when
- it is closed, if the parent supports that behavior.
-
- - PT proxies SHOULD handle OS specific mechanisms to gracefully
- terminate (eg: Install a signal handler on 'SIGTERM' that
- causes cleanup and a graceful shutdown if able).
-
- - PT proxies SHOULD attempt to detect when the parent has
- terminated (eg: via detecting that its parent process ID has
- changed on U*IX systems), and gracefully terminate.
-
-3.5. Pluggable Transport Client Per-Connection Arguments
-
- Certain PT transport protocols require that the client provides
- per-connection arguments when making outgoing connections. On
- the server side, this is handled by the "ARGS" optional argument
- as part of the "SMETHOD" message.
-
- On the client side, arguments are passed via the authentication
- fields that are part of the SOCKS protocol.
-
- First the "<Key>=<Value>" formatted arguments MUST be escaped,
- such that all backslash, equal sign, and semicolon characters
- are escaped with a backslash.
-
- Second, all of the escaped are concatenated together.
-
- Example:
-
- shared-secret=rahasia;secrets-file=/tmp/blob
-
- Lastly the arguments are transmitted when making the outgoing
- connection using the authentication mechanism specific to the
- SOCKS protocol version.
-
- - In the case of SOCKS 4, the concatenated argument list is
- transmitted in the "USERID" field of the "CONNECT" request.
-
- - In the case of SOCKS 5, the parent process must negotiate
- "Username/Password" authentication [RFC1929], and transmit
- the arguments encoded in the "UNAME" and "PASSWD" fields.
-
- If the encoded argument list is less than 255 bytes in
- length, the "PLEN" field must be set to "1" and the "PASSWD"
- field must contain a single NUL character.
-
-4. Anonymity Considerations
-
- When designing and implementing a Pluggable Transport, care
- should be taken to preserve the privacy of clients and to avoid
- leaking personally identifying information.
-
- Examples of client related considerations are:
-
- - Not logging client IP addresses to disk.
-
- - Not leaking DNS addresses except when necessary.
-
- - Ensuring that "TOR_PT_PROXY"'s "fail closed" behavior is
- implemented correctly.
-
- Additionally, certain obfuscation mechanisms rely on information
- such as the server IP address/port being confidential, so clients
- also need to take care to preserve server side information
- confidential when applicable.
-
-5. References
-
- [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
- Requirement Levels", BCP 14, RFC 2119, March 1997.
-
- [RFC1928] Leech, M., Ganis, M., Lee, Y., Kuris, R.,
- Koblas, D., Jones, L., "SOCKS Protocol Version 5",
- RFC 1928, March 1996.
-
- [EXTORPORT] Kadianakis, G., Mathewson, N., "Extended ORPort and
- TransportControlPort", Tor Proposal 196, March 2012.
-
- [RFC3986] Berners-Lee, T., Fielding, R., Masinter, L., "Uniform
- Resource Identifier (URI): Generic Syntax", RFC 3986,
- January 2005.
-
- [RFC1929] Leech, M., "Username/Password Authentication for
- SOCKS V5", RFC 1929, March 1996.
-
-6. Acknowledgments
-
- This specification draws heavily from prior versions done by Jacob
- Appelbaum, Nick Mathewson, and George Kadianakis.
-
-Appendix A. Example Client Pluggable Transport Session
-
- Environment variables:
-
- TOR_PT_MANAGED_TRANSPORT_VER=1
- TOR_PT_STATE_LOCATION=/var/lib/tor/pt_state/
- TOR_PT_EXIT_ON_STDIN_CLOSE=1
- TOR_PT_PROXY=socks5://127.0.0.1:8001
- TOR_PT_CLIENT_TRANSPORTS=obfs3,obfs4
-
- Messages the PT Proxy writes to stdin:
-
- VERSION 1
- PROXY DONE
- CMETHOD obfs3 socks5 127.0.0.1:32525
- CMETHOD obfs4 socks5 127.0.0.1:37347
- CMETHODS DONE
-
-Appendix B. Example Server Pluggable Transport Session
-
- Environment variables:
-
- TOR_PT_MANAGED_TRANSPORT_VER=1
- TOR_PT_STATE_LOCATION=/var/lib/tor/pt_state
- TOR_PT_EXIT_ON_STDIN_CLOSE=1
- TOR_PT_SERVER_TRANSPORTS=obfs3,obfs4
- TOR_PT_SERVER_BINDADDR=obfs3-198.51.100.1:1984
-
- Messages the PT Proxy writes to stdin:
-
- VERSION 1
- SMETHOD obfs3 198.51.100.1:1984
- SMETHOD obfs4 198.51.100.1:43734 ARGS:cert=HszPy3vWfjsESCEOo9ZBkRv6zQ/1mGHzc8arF0y2SpwFr3WhsMu8rK0zyaoyERfbz3ddFw,iat-mode=0
- SMETHODS DONE