control-spec.txt 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398
  1. $Id$
  2. TC: A Tor control protocol
  3. 0. Scope
  4. This document describes an implementation-specific protocol that is used
  5. for other programs (such as frontend user-interfaces) to communicate
  6. with a locally running Tor process. It is not part of the Tor onion
  7. routing protocol.
  8. We're trying to be pretty extensible here, but not infinitely
  9. forward-compatible.
  10. 1. Protocol outline
  11. TC is a bidirectional message-based protocol. It assumes an underlying
  12. stream for communication between a controlling process (the "client") and
  13. a Tor process (the "server"). The stream may be implemented via TCP,
  14. TLS-over-TCP, a Unix-domain socket, or so on, but it must provide
  15. reliable in-order delivery. For security, the stream should not be
  16. accessible by untrusted parties.
  17. In TC, the client and server send typed variable-length messages to each
  18. other over the underlying stream. By default, all messages from the server
  19. are in response to messages from the client. Some client requests, however,
  20. will cause the server to send messages to the client indefinitely far into
  21. the future.
  22. Servers respond to messages in the order they're received.
  23. 2. Message format
  24. The messages take the following format:
  25. Length [2 octets; big-endian]
  26. Type [2 octets; big-endian]
  27. Body [Length octets]
  28. Upon encountering a recognized Type, implementations behave as described in
  29. section 3 below. If the type is not recognized, servers respond with a
  30. "STAT" message (code UNRECOGNIZED; see 3.1 below), and clients simply ignore
  31. the message.
  32. 3. Message types
  33. 3.1. ERROR (Type 0x0000)
  34. Sent in response to a message that could not be processed as requested.
  35. The body of the message begins with a 2-byte error code. The following
  36. values are defined:
  37. 0x0000 Unspecified error
  38. []
  39. 0x0001 Internal error
  40. [Something went wrong inside Tor, so that the client's
  41. request couldn't be fulfilled.]
  42. 0x0002 Unrecognized message type
  43. [The client sent a message type we don't understand.]
  44. 0x0003 Syntax error
  45. [The client sent a message body in a format we can't parse.]
  46. 0x0004 Unrecognized configuration key
  47. [The client tried to get or set a configuration option we don't
  48. recognize.]
  49. 0x0005 Invalid configuration value
  50. [The client tried to set a configuration option to an
  51. incorrect, ill-formed, or impossible value.]
  52. 0x0006 Unrecognized byte code
  53. [The client tried to set a byte code (in the body) that
  54. we don't recognize.]
  55. 0x0007 Unauthorized.
  56. [The client tried to send a command that requires
  57. authorization, but it hasn't sent a valid AUTHENTICATE
  58. message.]
  59. 0x0008 Failed authentication attempt
  60. [The client sent a well-formed authorization message.]
  61. 0x0009 Resource exhausted
  62. [The server didn't have enough of a given resource to
  63. fulfill a given request.]
  64. The rest of the body should be a human-readable description of the error.
  65. In general, new error codes should only be added when they don't fall under
  66. one of the existing error codes.
  67. 3.2. DONE (Type 0x0001)
  68. Sent from server to client in response to a request that was successfully
  69. completed, with no more information needed. The body is usually empty but
  70. may contain a message.
  71. 3.3. SETCONF (Type 0x0002)
  72. Change the value of a configuration variable. The body contains a list of
  73. newline-terminated key-value configuration lines.
  74. The server behaves as though it had just read the key-value pair in its
  75. configuration file.
  76. The server responds with a DONE message on success, or an ERROR message on
  77. failure.
  78. When a configuration options takes multiple values, or when multiple
  79. configuration keys form a context-sensitive group (see below), then
  80. setting _any_ of the options in a SETCONF command is taken to reset all of
  81. the others. For example, if two ORBindAddress values are configured,
  82. and a SETCONF command arrives containing a single ORBindAddress value, the
  83. new command's value replaces the two old values.
  84. To _remove_ all settings for a given option entirely (and go back to its
  85. default value), send a single line containing the key and no value.
  86. 3.4. GETCONF (Type 0x0003)
  87. Request the value of a configuration variable. The body contains one or
  88. more NL-terminated strings for configuration keys. The server replies
  89. with a CONFVALUE message.
  90. If an option appears multiple times in the configuration, all of its
  91. key-value pairs are returned in order.
  92. Some options are context-sensitive, and depend on other options with
  93. different keywords. These cannot be fetched directly. Currently there
  94. is only one such option: clients should use the "HiddenServiceOptions"
  95. virtual keyword to get all HiddenServiceDir, HiddenServicePort,
  96. HiddenServiceNodes, and HiddenServiceExcludeNodes option settings.
  97. As another exception, the controller can getconf the "version" string,
  98. and Tor will return a string describing its version number. Setconf on
  99. "version" will not work.
  100. 3.5. CONFVALUE (Type 0x0004)
  101. Sent in response to a GETCONF message; contains a list of "Key Value\n"
  102. (A non-whitespace keyword, a single space, a non-NL value, a NL)
  103. strings.
  104. 3.6. SETEVENTS (Type 0x0005)
  105. Request the server to inform the client about interesting events.
  106. The body contains a list of 2-byte event codes (see "event" below).
  107. Sending SETEVENTS with an empty body turns off all event reporting.
  108. The server responds with a DONE message on success, and an ERROR message
  109. if one of the event codes isn't recognized. (On error, the list of active
  110. event codes isn't changed.)
  111. 3.7. EVENT (Type 0x0006)
  112. Sent from the server to the client when an event has occurred and the
  113. client has requested that kind of event. The body contains a 2-byte
  114. event code followed by additional event-dependent information. Event
  115. codes are:
  116. 0x0001 -- Circuit status changed
  117. Status [1 octet]
  118. (Launched=0,Built=1,Extended=2,Failed=3,Closed=4)
  119. Circuit ID [4 octets]
  120. (Must be unique to Tor process/time)
  121. Path [NUL-terminated comma-separated string]
  122. (For extended/failed, is the portion of the path that is
  123. built)
  124. 0x0002 -- Stream status changed
  125. Status [1 octet]
  126. (Sent connect=0,sent resolve=1,succeeded=2,failed=3,
  127. closed=4, new=5)
  128. Stream ID [4 octets]
  129. (Must be unique to Tor process/time)
  130. Target (NUL-terminated address-port string]
  131. 0x0003 -- OR Connection status changed
  132. Status [1 octet]
  133. (Launched=0,connected=1,failed=2,closed=3)
  134. OR nickname/identity [NUL-terminated]
  135. 0x0004 -- Bandwidth used in the last second
  136. Bytes read [4 octets]
  137. Bytes written [4 octets]
  138. 0x0005 -- Notice/warning/error occurred
  139. Message [NUL-terminated]
  140. 0x0006 -- New descriptors available
  141. OR List [NUL-terminated, comma-delimited list of
  142. OR nickname/identity]
  143. 3.8. AUTHENTICATE (Type 0x0007)
  144. Sent from the client to the server. Contains a 'magic cookie' to prove
  145. that client is really the admin for this Tor process. The server responds
  146. with DONE or ERROR.
  147. 3.9. SAVECONF (Type 0x0008)
  148. Sent from the client to the server. Instructs the server to write out
  149. its config options into its torrc. Server returns DONE if successful, or
  150. ERROR if it can't write the file or some other error occurs.
  151. 3.10. SIGNAL (Type 0x0009)
  152. Sent from the client to the server. The body contains one byte that
  153. indicates the action the client wishes the server to take.
  154. 0x01 -- Reload: reload config items, refetch directory.
  155. 0x02 -- Controlled shutdown: if server is an OP, exit immediately.
  156. If it's an OR, close listeners and exit after 30 seconds.
  157. 0x10 -- Dump stats: log information about open connections and
  158. circuits.
  159. 0x12 -- Debug: switch all open logs to loglevel debug.
  160. 0x15 -- Immediate shutdown: clean up and exit now.
  161. The server responds with DONE if the signal is recognized (or simply
  162. closes the socket if it was asked to close immediately), else ERROR.
  163. 3.11. MAPADDRESS (Type 0x000A)
  164. [Proposal; not finalized]
  165. Sent from the client to the server. The body contains:
  166. Original address type [1 octet]
  167. Original address [Variable length]
  168. Replacement address type [1 octet]
  169. Replacement address [Variable length]
  170. Addresses types can be:
  171. [0x01] for an IPv4 address (4 octets)
  172. [0x02] for an IPv6 address (16 octets)
  173. [0x03] for a hostname (variable-length, NUL-terminated)
  174. The client sends this message to the server in order to tell it that future
  175. SOCKS requests for connections to the original address should be replaced
  176. with connections to the specified replacement address. If the addresses
  177. are well-formed, and the server is able to fulfill the request, the server
  178. replies with a single ADDRESSMAPPED message containing the source and
  179. destination addresses. If request is malformed, the server replies with
  180. a syntax error message. The server can't fulfill the request, it replies
  181. with an internal ERROR message.
  182. The client may decline to provide a body for the original address, and
  183. instead send a special null address (0.0.0.0 for IPv4, ::0 for IPv6, or
  184. "." for hostname). This signifies that the server should choose the
  185. original address itself, and return that address in the ADDRESSMAPPED
  186. message. The server should ensure that an element of address space
  187. that is unlikely to be in actual use. If there is already an address
  188. mapped to the destination address, the server may reuse that mapping.
  189. If the original address is already mapped to a different address, the old
  190. mapping is removed. If the original address and the destination address
  191. are the same, the server removes any mapping in place for the original
  192. address.
  193. {Note: This feature is designed to be used to help Tor-ify applications
  194. that need to use SOCKS4 or hostname-less SOCKS5. There are three
  195. approaches to doing this:
  196. 1. Somehow make them use SOCKS4a or SOCKS5-with-hostnames instead.
  197. 2. Use tor-resolve (or another interface to Tor's resolve-over-SOCKS
  198. feature) to resolve the hostname remotely. This doesn't work
  199. with special addresses like x.onion or x.y.exit.
  200. 3. Use MAPADDRESS to map an IP address to the desired hostname, and then
  201. arrange to fool the application into thinking that the hostname
  202. has resolved to that IP.
  203. This functionality is designed to help implement the 3rd approach.}
  204. [XXXX When, if ever, can mappings expire? Should they expire?]
  205. [XXXX What addresses, if any, are safe to use?]
  206. 3.12 ADDRESSMAPPED (Type 0x000B)
  207. [Proposal; not finalized]
  208. Same format as MAPADDRESS.
  209. This message is sent from the server to the client in response to a
  210. MAPADDRESS or GETALLMAPPINGS message.
  211. 3.13 GETALLMAPPINGS (Type 0x000C)
  212. [Proposal; not finalized]
  213. Sent from the client to the server. The server replies by sending an
  214. ADDRESSMAPPED message for each current address mapping set by MAPADDRESS or
  215. otherwise, followed by a DONE message.
  216. 3.14 EXTENDCIRCUIT (Type 0x000D)
  217. [Proposal; not finalized]
  218. Sent from the client to the server. The message body contains two fields:
  219. Circuit ID [4 octets]
  220. Path [NUL-terminated, comma-delimited string of OR nickname/identity]
  221. This request takes one of two forms: either the Circuit ID is zero, in
  222. which case it is a request for the server to build a new circuit according
  223. to the specified path, or the Circuit ID is nonzero, in which case it is a
  224. request for the server to extend an existing circuit with that ID according
  225. to the specified path.
  226. If the request for a NEW circuit is successful, then the resultant DONE
  227. message will contain a message body consisting of the four-octet Circuit ID
  228. of the newly created circuit.
  229. 3.15 ATTACHSTREAM (Type 0x000E)
  230. [Proposal; not finalized]
  231. Sent from the client to the server. The message body contains two fields:
  232. Stream ID [4 octets]
  233. Circuit ID [4 octets]
  234. This message informs the server that the specified stream should be
  235. associated with the specified circuit. Each stream may be associated with
  236. at most one circuit, and multiple streams may share the same circuit.
  237. 3.16 GETDESCRIPTOR (Type 0x000F)
  238. [Proposal; not finalized]
  239. Sent from the client to the server. The message body contains one field:
  240. OR nickname/identity [NUL-terminated]
  241. This message informs the server that it should send to the client a
  242. complete descriptor corresponding to the specified router. If the router
  243. field is non-empty, and the server has a descriptor for the router
  244. specified, then the server should return the descriptor in the body of its
  245. DONE message:
  246. Descriptor [NUL-terminated string]
  247. (If the server does not have a descriptor for the router specified, then
  248. it should return an error.)
  249. If the GETDESCRIPTOR message contains an empty body, then the server
  250. should interpret the message as a request to send its list of descriptors.
  251. The server then provides this list in the body of its DONE message:
  252. OR List [NUL-terminated, comma-delimited list of OR nickname/identity]
  253. 4.16 POSTDESCRIPTOR (Type 0x0010)
  254. [Proposal; not finalized]
  255. Sent from the client to the server. The message body contains one field:
  256. Descriptor [NUL-terminated string]
  257. This message informs the server about a new descriptor.
  258. The descriptor, when parsed, must contain a number of well-specified
  259. fields, including fields for its nickname and identity.
  260. If there is an error in parsing the descriptor, or if the server rejects
  261. the descriptor for any reason, the server should send an appropriate error
  262. message.
  263. 4. Implementation notes
  264. 4.1. There are four ways we could authenticate, for now:
  265. 1) Listen on 127.0.0.1; trust all local users.
  266. 2) Write a named socket in tor's data-directory or in some other location;
  267. rely on the OS to ensure that only authorized users can open it. (NOTE:
  268. the Linux unix(7) man page suggests that some BSDs don't enforce
  269. authorization.) If the OS has named sockets, and implements
  270. authentication, trust all users who can read Tor's data directory.
  271. 3) Write a random magic cookie to the FS in Tor's data-directory; use that
  272. magic cookie for authentication. Trust all users who can read Tor's data
  273. directory.
  274. 4) Store a salted-and-hashed passphrase in Tor's configuration. Use the
  275. passphrase for authentication. Trust all users who know the passphrase.
  276. On Win32, our only options are 1, 3, and 4. Since the semantics for 2
  277. and 3 are so similar, we chose to not support 2, and just always bind
  278. on 127.0.0.1. We've implemented 1, 3, and 4.
  279. By default, the Tor client accepts authentication approach #1. If
  280. the controller wants Tor to demand more authentication, it should use
  281. setconf and saveconf to configure Tor to demand more next time.
  282. 4.2. Don't let the buffer get too big.
  283. If you ask for lots of events, and 16MB of them queue up on the buffer,
  284. the Tor process will close the socket.