ext_orport.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622
  1. /* Copyright (c) 2012, The Tor Project, Inc. */
  2. /* See LICENSE for licensing information */
  3. /**
  4. * \file ext_orport.c
  5. * \brief Code implementing the Extended ORPort.
  6. */
  7. #define EXT_ORPORT_PRIVATE
  8. #include "or.h"
  9. #include "connection.h"
  10. #include "connection_or.h"
  11. #include "ext_orport.h"
  12. #include "control.h"
  13. #include "config.h"
  14. #include "util.h"
  15. #include "main.h"
  16. /** Allocate and return a structure capable of holding an Extended
  17. * ORPort message of body length <b>len</b>. */
  18. ext_or_cmd_t *
  19. ext_or_cmd_new(uint16_t len)
  20. {
  21. size_t size = STRUCT_OFFSET(ext_or_cmd_t, body) + len;
  22. ext_or_cmd_t *cmd = tor_malloc(size);
  23. cmd->len = len;
  24. return cmd;
  25. }
  26. /** Deallocate the Extended ORPort message in <b>cmd</b>. */
  27. void
  28. ext_or_cmd_free(ext_or_cmd_t *cmd)
  29. {
  30. tor_free(cmd);
  31. }
  32. /** Get an Extended ORPort message from <b>conn</b>, and place it in
  33. * <b>out</b>. Return -1 on fail, 0 if we need more data, and 1 if we
  34. * successfully extracted an Extended ORPort command from the
  35. * buffer. */
  36. static int
  37. connection_fetch_ext_or_cmd_from_buf(connection_t *conn, ext_or_cmd_t **out)
  38. {
  39. IF_HAS_BUFFEREVENT(conn, {
  40. struct evbuffer *input = bufferevent_get_input(conn->bufev);
  41. return fetch_ext_or_command_from_evbuffer(input, out);
  42. }) ELSE_IF_NO_BUFFEREVENT {
  43. return fetch_ext_or_command_from_buf(conn->inbuf, out);
  44. }
  45. }
  46. /** Write an Extended ORPort message to <b>conn</b>. Use
  47. * <b>command</b> as the command type, <b>bodylen</b> as the body
  48. * length, and <b>body</b>, if it's present, as the body of the
  49. * message. */
  50. STATIC int
  51. connection_write_ext_or_command(connection_t *conn,
  52. uint16_t command,
  53. const char *body,
  54. size_t bodylen)
  55. {
  56. char header[4];
  57. if (bodylen > UINT16_MAX)
  58. return -1;
  59. set_uint16(header, htons(command));
  60. set_uint16(header+2, htons(bodylen));
  61. connection_write_to_buf(header, 4, conn);
  62. if (bodylen) {
  63. tor_assert(body);
  64. connection_write_to_buf(body, bodylen, conn);
  65. }
  66. return 0;
  67. }
  68. /** Transition from an Extended ORPort which accepts Extended ORPort
  69. * messages, to an Extended ORport which accepts OR traffic. */
  70. static void
  71. connection_ext_or_transition(or_connection_t *conn)
  72. {
  73. tor_assert(conn->base_.type == CONN_TYPE_EXT_OR);
  74. conn->base_.type = CONN_TYPE_OR;
  75. control_event_or_conn_status(conn, OR_CONN_EVENT_NEW, 0);
  76. connection_tls_start_handshake(conn, 1);
  77. }
  78. /** Length of authentication cookie. */
  79. #define EXT_OR_PORT_AUTH_COOKIE_LEN 32
  80. /** Length of the header of the cookie file. */
  81. #define EXT_OR_PORT_AUTH_COOKIE_HEADER_LEN 32
  82. /** Total length of the cookie file. */
  83. #define EXT_OR_PORT_AUTH_COOKIE_FILE_LEN \
  84. EXT_OR_PORT_AUTH_COOKIE_LEN+EXT_OR_PORT_AUTH_COOKIE_HEADER_LEN
  85. /** Static cookie file header. */
  86. #define EXT_OR_PORT_AUTH_COOKIE_HEADER "! Extended ORPort Auth Cookie !\x0a"
  87. /** Length of safe-cookie protocol hashes. */
  88. #define EXT_OR_PORT_AUTH_HASH_LEN DIGEST256_LEN
  89. /** Length of safe-cookie protocol nonces. */
  90. #define EXT_OR_PORT_AUTH_NONCE_LEN 32
  91. /** Safe-cookie protocol constants. */
  92. #define EXT_OR_PORT_AUTH_SERVER_TO_CLIENT_CONST \
  93. "ExtORPort authentication server-to-client hash"
  94. #define EXT_OR_PORT_AUTH_CLIENT_TO_SERVER_CONST \
  95. "ExtORPort authentication client-to-server hash"
  96. /** If true, we've set ext_or_auth_cookie to a secret code and stored
  97. * it to disk. */
  98. static int ext_or_auth_cookie_is_set = 0;
  99. /** If ext_or_auth_cookie_is_set, a secret cookie that we've stored to disk
  100. * and which we're using to authenticate controllers. (If the controller can
  101. * read it off disk, it has permission to connect.) */
  102. static char ext_or_auth_cookie[EXT_OR_PORT_AUTH_COOKIE_LEN] = {0};
  103. /** Helper: Return a newly allocated string containing a path to the
  104. * file where we store our authentication cookie. */
  105. char *
  106. get_ext_or_auth_cookie_file_name(void)
  107. {
  108. const or_options_t *options = get_options();
  109. if (options->ExtORPortCookieAuthFile &&
  110. strlen(options->ExtORPortCookieAuthFile)) {
  111. return tor_strdup(options->ExtORPortCookieAuthFile);
  112. } else {
  113. return get_datadir_fname("extended_orport_auth_cookie");
  114. }
  115. }
  116. /** Choose a random authentication cookie and write it to disk.
  117. * Anybody who can read the cookie from disk will be considered
  118. * authorized to use the control connection. Return -1 if we can't
  119. * write the file, or 0 on success. */
  120. int
  121. init_ext_or_cookie_authentication(int is_enabled)
  122. {
  123. char *fname;
  124. char cookie_file_string[EXT_OR_PORT_AUTH_COOKIE_FILE_LEN];
  125. if (!is_enabled) {
  126. ext_or_auth_cookie_is_set = 0;
  127. return 0;
  128. }
  129. /* We don't want to generate a new cookie every time we call
  130. * options_act(). One should be enough. */
  131. if (ext_or_auth_cookie_is_set)
  132. return 0; /* all set */
  133. if (crypto_rand(ext_or_auth_cookie, EXT_OR_PORT_AUTH_COOKIE_LEN) < 0)
  134. return -1;
  135. ext_or_auth_cookie_is_set = 1;
  136. memcpy(cookie_file_string, EXT_OR_PORT_AUTH_COOKIE_HEADER,
  137. EXT_OR_PORT_AUTH_COOKIE_HEADER_LEN);
  138. memcpy(cookie_file_string+EXT_OR_PORT_AUTH_COOKIE_HEADER_LEN,
  139. ext_or_auth_cookie, EXT_OR_PORT_AUTH_COOKIE_LEN);
  140. fname = get_ext_or_auth_cookie_file_name();
  141. if (write_bytes_to_file(fname, cookie_file_string,
  142. EXT_OR_PORT_AUTH_COOKIE_FILE_LEN, 1)) {
  143. log_warn(LD_FS,"Error writing authentication cookie to %s.",
  144. escaped(fname));
  145. tor_free(fname);
  146. return -1;
  147. }
  148. log_info(LD_GENERAL, "Generated Extended ORPort cookie file in '%s'.",
  149. fname);
  150. memwipe(cookie_file_string, 0, sizeof(cookie_file_string));
  151. tor_free(fname);
  152. return 0;
  153. }
  154. /** Read data from <b>conn</b> and see if the client sent us the
  155. * authentication type that she prefers to use in this session.
  156. *
  157. * Return -1 if we received corrupted data or if we don't support the
  158. * authentication type. Return 0 if we need more data in
  159. * <b>conn</b>. Return 1 if the authentication type negotiation was
  160. * successful. */
  161. static int
  162. connection_ext_or_auth_neg_auth_type(connection_t *conn)
  163. {
  164. char authtype[1] = {0};
  165. if (connection_get_inbuf_len(conn) < 1)
  166. return 0;
  167. if (connection_fetch_from_buf(authtype, 1, conn) < 0)
  168. return -1;
  169. log_debug(LD_GENERAL, "Client wants us to use %d auth type", authtype[0]);
  170. if (authtype[0] != 1) /* '1' is the only auth type supported atm */
  171. return -1;
  172. conn->state = EXT_OR_CONN_STATE_AUTH_WAIT_CLIENT_NONCE;
  173. return 1;
  174. }
  175. /** Read the client's nonce out of <b>conn</b>, setup the safe-cookie
  176. * crypto, and then send our own hash and nonce to the client
  177. *
  178. * Return -1 if there was an error; return 0 if we need more data in
  179. * <b>conn</b>, and return 1 if we successfully retrieved the
  180. * client's nonce and sent our own. */
  181. static int
  182. connection_ext_or_auth_handle_client_nonce(connection_t *conn)
  183. {
  184. char server_hash[EXT_OR_PORT_AUTH_HASH_LEN] = {0};
  185. char client_nonce[EXT_OR_PORT_AUTH_NONCE_LEN] = {0};
  186. char server_nonce[EXT_OR_PORT_AUTH_NONCE_LEN] = {0};
  187. char reply[EXT_OR_PORT_AUTH_COOKIE_LEN+EXT_OR_PORT_AUTH_NONCE_LEN] = {0};
  188. if (!ext_or_auth_cookie_is_set) { /* this should not happen */
  189. log_warn(LD_BUG, "Extended ORPort authentication cookie was not set. "
  190. "That's weird since we should have done that on startup. "
  191. "This might be a Tor bug, please file a bug report. ");
  192. return -1;
  193. }
  194. if (connection_get_inbuf_len(conn) < EXT_OR_PORT_AUTH_NONCE_LEN)
  195. return 0;
  196. if (connection_fetch_from_buf(client_nonce,
  197. EXT_OR_PORT_AUTH_NONCE_LEN, conn) < 0)
  198. return -1;
  199. /* We extract the ClientNonce from the received data, and use it to
  200. calculate ServerHash and ServerNonce according to proposal 217.
  201. We also calculate our own ClientHash value and save it in the
  202. connection state. We validate it later against the ClientHash
  203. sent by the client. */
  204. /* Get our nonce */
  205. if (crypto_rand(server_nonce, EXT_OR_PORT_AUTH_NONCE_LEN) < 0)
  206. return -1;
  207. { /* set up macs */
  208. size_t hmac_s_msg_len = strlen(EXT_OR_PORT_AUTH_SERVER_TO_CLIENT_CONST) +
  209. 2*EXT_OR_PORT_AUTH_NONCE_LEN;
  210. size_t hmac_c_msg_len = strlen(EXT_OR_PORT_AUTH_CLIENT_TO_SERVER_CONST) +
  211. 2*EXT_OR_PORT_AUTH_NONCE_LEN;
  212. char *hmac_s_msg = tor_malloc_zero(hmac_s_msg_len);
  213. char *hmac_c_msg = tor_malloc_zero(hmac_c_msg_len);
  214. char *correct_client_hash = tor_malloc_zero(EXT_OR_PORT_AUTH_HASH_LEN);
  215. memcpy(hmac_s_msg,
  216. EXT_OR_PORT_AUTH_SERVER_TO_CLIENT_CONST,
  217. strlen(EXT_OR_PORT_AUTH_SERVER_TO_CLIENT_CONST));
  218. memcpy(hmac_s_msg + strlen(EXT_OR_PORT_AUTH_SERVER_TO_CLIENT_CONST),
  219. client_nonce, EXT_OR_PORT_AUTH_NONCE_LEN);
  220. memcpy(hmac_s_msg + strlen(EXT_OR_PORT_AUTH_SERVER_TO_CLIENT_CONST) +
  221. EXT_OR_PORT_AUTH_NONCE_LEN,
  222. server_nonce, EXT_OR_PORT_AUTH_NONCE_LEN);
  223. memcpy(hmac_c_msg,
  224. EXT_OR_PORT_AUTH_CLIENT_TO_SERVER_CONST,
  225. strlen(EXT_OR_PORT_AUTH_CLIENT_TO_SERVER_CONST));
  226. memcpy(hmac_c_msg + strlen(EXT_OR_PORT_AUTH_CLIENT_TO_SERVER_CONST),
  227. client_nonce, EXT_OR_PORT_AUTH_NONCE_LEN);
  228. memcpy(hmac_c_msg + strlen(EXT_OR_PORT_AUTH_CLIENT_TO_SERVER_CONST) +
  229. EXT_OR_PORT_AUTH_NONCE_LEN,
  230. server_nonce, EXT_OR_PORT_AUTH_NONCE_LEN);
  231. crypto_hmac_sha256(server_hash,
  232. ext_or_auth_cookie,
  233. EXT_OR_PORT_AUTH_COOKIE_LEN,
  234. hmac_s_msg,
  235. hmac_s_msg_len);
  236. crypto_hmac_sha256(correct_client_hash,
  237. ext_or_auth_cookie,
  238. EXT_OR_PORT_AUTH_COOKIE_LEN,
  239. hmac_c_msg,
  240. hmac_c_msg_len);
  241. /* Store the client hash we generated. We will need to compare it
  242. with the hash sent by the client. */
  243. TO_OR_CONN(conn)->ext_or_auth_correct_client_hash = correct_client_hash;
  244. memwipe(hmac_s_msg, 0, hmac_s_msg_len);
  245. memwipe(hmac_c_msg, 0, hmac_c_msg_len);
  246. tor_free(hmac_s_msg);
  247. tor_free(hmac_c_msg);
  248. }
  249. { /* debug logging */ /* XXX disable this codepath if not logging on debug?*/
  250. char server_hash_encoded[(2*EXT_OR_PORT_AUTH_HASH_LEN) + 1];
  251. char server_nonce_encoded[(2*EXT_OR_PORT_AUTH_NONCE_LEN) + 1];
  252. char client_nonce_encoded[(2*EXT_OR_PORT_AUTH_NONCE_LEN) + 1];
  253. base16_encode(server_hash_encoded, sizeof(server_hash_encoded),
  254. server_hash, sizeof(server_hash));
  255. base16_encode(server_nonce_encoded, sizeof(server_nonce_encoded),
  256. server_nonce, sizeof(server_nonce));
  257. base16_encode(client_nonce_encoded, sizeof(client_nonce_encoded),
  258. client_nonce, sizeof(client_nonce));
  259. log_debug(LD_GENERAL,
  260. "server_hash: '%s'\nserver_nonce: '%s'\nclient_nonce: '%s'",
  261. server_hash_encoded, server_nonce_encoded, client_nonce_encoded);
  262. memwipe(server_hash_encoded, 0, sizeof(server_hash_encoded));
  263. memwipe(server_nonce_encoded, 0, sizeof(server_nonce_encoded));
  264. memwipe(client_nonce_encoded, 0, sizeof(client_nonce_encoded));
  265. }
  266. { /* write reply: (server_hash, server_nonce) */
  267. memcpy(reply, server_hash, EXT_OR_PORT_AUTH_HASH_LEN);
  268. memcpy(reply + EXT_OR_PORT_AUTH_HASH_LEN, server_nonce,
  269. EXT_OR_PORT_AUTH_NONCE_LEN);
  270. connection_write_to_buf(reply, sizeof(reply), conn);
  271. memwipe(reply, 0, sizeof(reply));
  272. }
  273. log_debug(LD_GENERAL, "Got client nonce, and sent our own nonce and hash.");
  274. conn->state = EXT_OR_CONN_STATE_AUTH_WAIT_CLIENT_HASH;
  275. return 1;
  276. }
  277. #define connection_ext_or_auth_send_result_success(c) \
  278. connection_ext_or_auth_send_result(c, 1)
  279. #define connection_ext_or_auth_send_result_fail(c) \
  280. connection_ext_or_auth_send_result(c, 0)
  281. /** Send authentication results to <b>conn</b>. Successful results if
  282. * <b>success</b> is set; failure results otherwise. */
  283. static void
  284. connection_ext_or_auth_send_result(connection_t *conn, int success)
  285. {
  286. if (success)
  287. connection_write_to_buf("\x01", 1, conn);
  288. else
  289. connection_write_to_buf("\x00", 1, conn);
  290. }
  291. /** Receive the client's hash from <b>conn</b>, validate that it's
  292. * correct, and then send the authentication results to the client.
  293. *
  294. * Return -1 if there was an error during validation; return 0 if we
  295. * need more data in <b>conn</b>, and return 1 if we successfully
  296. * validated the client's hash and sent a happy authentication
  297. * result. */
  298. static int
  299. connection_ext_or_auth_handle_client_hash(connection_t *conn)
  300. {
  301. char provided_client_hash[EXT_OR_PORT_AUTH_HASH_LEN] = {0};
  302. if (connection_get_inbuf_len(conn) < EXT_OR_PORT_AUTH_HASH_LEN)
  303. return 0;
  304. if (connection_fetch_from_buf(provided_client_hash,
  305. EXT_OR_PORT_AUTH_HASH_LEN, conn) < 0)
  306. return -1;
  307. if (tor_memneq(TO_OR_CONN(conn)->ext_or_auth_correct_client_hash,
  308. provided_client_hash, EXT_OR_PORT_AUTH_HASH_LEN)) {
  309. log_warn(LD_GENERAL, "Incorrect client hash. Authentication failed.");
  310. connection_ext_or_auth_send_result_fail(conn);
  311. return -1;
  312. }
  313. log_debug(LD_GENERAL, "Got client's hash and it was legit.");
  314. /* send positive auth result */
  315. connection_ext_or_auth_send_result_success(conn);
  316. conn->state = EXT_OR_CONN_STATE_OPEN;
  317. return 1;
  318. }
  319. /** Handle data from <b>or_conn</b> received on Extended ORPort.
  320. * Return -1 on error. 0 on unsufficient data. 1 on correct. */
  321. static int
  322. connection_ext_or_auth_process_inbuf(or_connection_t *or_conn)
  323. {
  324. connection_t *conn = TO_CONN(or_conn);
  325. /* State transitions of the Extended ORPort authentication protocol:
  326. EXT_OR_CONN_STATE_AUTH_WAIT_AUTH_TYPE (start state) ->
  327. EXT_OR_CONN_STATE_AUTH_WAIT_CLIENT_NONCE ->
  328. EXT_OR_CONN_STATE_AUTH_WAIT_CLIENT_HASH ->
  329. EXT_OR_CONN_STATE_OPEN
  330. During EXT_OR_CONN_STATE_OPEN, data is handled by
  331. connection_ext_or_process_inbuf().
  332. */
  333. switch (conn->state) { /* Functionify */
  334. case EXT_OR_CONN_STATE_AUTH_WAIT_AUTH_TYPE:
  335. return connection_ext_or_auth_neg_auth_type(conn);
  336. case EXT_OR_CONN_STATE_AUTH_WAIT_CLIENT_NONCE:
  337. return connection_ext_or_auth_handle_client_nonce(conn);
  338. case EXT_OR_CONN_STATE_AUTH_WAIT_CLIENT_HASH:
  339. return connection_ext_or_auth_handle_client_hash(conn);
  340. default:
  341. log_warn(LD_BUG, "Encountered unexpected connection state %d while trying "
  342. "to process Extended ORPort authentication data.", conn->state);
  343. return -1;
  344. }
  345. }
  346. /** Extended ORPort commands (Transport-to-Bridge) */
  347. #define EXT_OR_CMD_TB_DONE 0x0000
  348. #define EXT_OR_CMD_TB_USERADDR 0x0001
  349. #define EXT_OR_CMD_TB_TRANSPORT 0x0002
  350. /** Extended ORPort commands (Bridge-to-Transport) */
  351. #define EXT_OR_CMD_BT_OKAY 0x1000
  352. #define EXT_OR_CMD_BT_DENY 0x1001
  353. #define EXT_OR_CMD_BT_CONTROL 0x1002
  354. /** Process a USERADDR command from the Extended
  355. * ORPort. <b>payload</b> is a payload of size <b>len</b>.
  356. *
  357. * If the USERADDR command was well formed, change the address of
  358. * <b>conn</b> to the address on the USERADDR command.
  359. *
  360. * Return 0 on success and -1 on error. */
  361. static int
  362. connection_ext_or_handle_cmd_useraddr(connection_t *conn,
  363. const char *payload, uint16_t len)
  364. {
  365. /* Copy address string. */
  366. tor_addr_t addr;
  367. uint16_t port;
  368. char *addr_str;
  369. char *address_part=NULL;
  370. int res;
  371. if (memchr(payload, '\0', len)) {
  372. log_fn(LOG_PROTOCOL_WARN, LD_NET, "Unexpected NUL in ExtORPort UserAddr");
  373. return -1;
  374. }
  375. addr_str = tor_memdup_nulterm(payload, len);
  376. res = tor_addr_port_split(LOG_INFO, addr_str, &address_part, &port);
  377. tor_free(addr_str);
  378. if (res<0)
  379. return -1;
  380. res = tor_addr_parse(&addr, address_part);
  381. tor_free(address_part);
  382. if (res<0)
  383. return -1;
  384. { /* do some logging */
  385. char *old_address = tor_dup_addr(&conn->addr);
  386. char *new_address = tor_dup_addr(&addr);
  387. log_debug(LD_NET, "Received USERADDR."
  388. "We rewrite our address from '%s:%u' to '%s:%u'.",
  389. safe_str(old_address), conn->port, safe_str(new_address), port);
  390. tor_free(old_address);
  391. tor_free(new_address);
  392. }
  393. /* record the address */
  394. tor_addr_copy(&conn->addr, &addr);
  395. conn->port = port;
  396. return 0;
  397. }
  398. /** Process a TRANSPORT command from the Extended
  399. * ORPort. <b>payload</b> is a payload of size <b>len</b>.
  400. *
  401. * If the TRANSPORT command was well formed, register the name of the
  402. * transport on <b>conn</b>.
  403. *
  404. * Return 0 on success and -1 on error. */
  405. static int
  406. connection_ext_or_handle_cmd_transport(or_connection_t *conn,
  407. const char *payload, uint16_t len)
  408. {
  409. char *transport_str;
  410. if (memchr(payload, '\0', len)) {
  411. log_fn(LOG_PROTOCOL_WARN, LD_NET, "Unexpected NUL in ExtORPort Transport");
  412. return -1;
  413. }
  414. transport_str = tor_memdup_nulterm(payload, len);
  415. /* Transport names MUST be C-identifiers. */
  416. if (!string_is_C_identifier(transport_str)) {
  417. tor_free(transport_str);
  418. return -1;
  419. }
  420. /* If ext_or_transport is already occupied (because the PT sent two
  421. * TRANSPORT commands), deallocate the old name and keep the new
  422. * one */
  423. if (conn->ext_or_transport)
  424. tor_free(conn->ext_or_transport);
  425. conn->ext_or_transport = transport_str;
  426. return 0;
  427. }
  428. #define EXT_OR_CONN_STATE_IS_AUTHENTICATING(st) \
  429. ((st) <= EXT_OR_CONN_STATE_AUTH_MAX)
  430. /** Process Extended ORPort messages from <b>or_conn</b>. */
  431. int
  432. connection_ext_or_process_inbuf(or_connection_t *or_conn)
  433. {
  434. connection_t *conn = TO_CONN(or_conn);
  435. ext_or_cmd_t *command;
  436. int r;
  437. /* DOCDOC Document the state machine and transitions in this function */
  438. /* If we are still in the authentication stage, process traffic as
  439. authentication data: */
  440. while (EXT_OR_CONN_STATE_IS_AUTHENTICATING(conn->state)) {
  441. log_debug(LD_GENERAL, "Got Extended ORPort authentication data (%u).",
  442. (unsigned int) connection_get_inbuf_len(conn));
  443. r = connection_ext_or_auth_process_inbuf(or_conn);
  444. if (r < 0) {
  445. connection_mark_for_close(conn);
  446. return -1;
  447. } else if (r == 0) {
  448. return 0;
  449. }
  450. /* if r > 0, loop and process more data (if any). */
  451. }
  452. while (1) {
  453. log_debug(LD_GENERAL, "Got Extended ORPort data.");
  454. command = NULL;
  455. r = connection_fetch_ext_or_cmd_from_buf(conn, &command);
  456. if (r < 0)
  457. goto err;
  458. else if (r == 0)
  459. return 0; /* need to wait for more data */
  460. /* Got a command! */
  461. tor_assert(command);
  462. if (command->cmd == EXT_OR_CMD_TB_DONE) {
  463. if (connection_get_inbuf_len(conn)) {
  464. /* The inbuf isn't empty; the client is misbehaving. */
  465. goto err;
  466. }
  467. log_debug(LD_NET, "Received DONE.");
  468. /* If the transport proxy did not use the TRANSPORT command to
  469. * specify the transport name, mark this as unknown transport. */
  470. if (!or_conn->ext_or_transport) {
  471. /* We write this string this way to avoid ??>, which is a C
  472. * trigraph. */
  473. or_conn->ext_or_transport = tor_strdup("<?" "?>");
  474. }
  475. connection_write_ext_or_command(conn, EXT_OR_CMD_BT_OKAY, NULL, 0);
  476. /* can't transition immediately; need to flush first. */
  477. conn->state = EXT_OR_CONN_STATE_FLUSHING;
  478. connection_stop_reading(conn);
  479. } else if (command->cmd == EXT_OR_CMD_TB_USERADDR) {
  480. if (connection_ext_or_handle_cmd_useraddr(conn,
  481. command->body, command->len) < 0)
  482. goto err;
  483. } else if (command->cmd == EXT_OR_CMD_TB_TRANSPORT) {
  484. if (connection_ext_or_handle_cmd_transport(or_conn,
  485. command->body, command->len) < 0)
  486. goto err;
  487. } else {
  488. log_notice(LD_NET,"Got Extended ORPort command we don't regognize (%u).",
  489. command->cmd);
  490. }
  491. ext_or_cmd_free(command);
  492. }
  493. return 0;
  494. err:
  495. ext_or_cmd_free(command);
  496. connection_mark_for_close(conn);
  497. return -1;
  498. }
  499. /** <b>conn</b> finished flushing Extended ORPort messages to the
  500. * network, and is now ready to accept OR traffic. This function
  501. * does the transition. */
  502. int
  503. connection_ext_or_finished_flushing(or_connection_t *conn)
  504. {
  505. if (conn->base_.state == EXT_OR_CONN_STATE_FLUSHING) {
  506. connection_start_reading(TO_CONN(conn));
  507. connection_ext_or_transition(conn);
  508. }
  509. return 0;
  510. }
  511. /** Initiate Extended ORPort authentication, by sending the list of
  512. * supported authentication types to the client. */
  513. int
  514. connection_ext_or_start_auth(or_connection_t *or_conn)
  515. {
  516. connection_t *conn = TO_CONN(or_conn);
  517. char authtypes[2] = "\x01\x00"; /* We only support authtype '1' for now. */
  518. log_debug(LD_GENERAL,
  519. "ExtORPort authentication: Sending supported authentication types");
  520. connection_write_to_buf(authtypes, sizeof(authtypes), conn);
  521. conn->state = EXT_OR_CONN_STATE_AUTH_WAIT_AUTH_TYPE;
  522. return 0;
  523. }