123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308 |
- /* Copyright (c) 2001 Matej Pfajfar.
- * Copyright (c) 2001-2004, Roger Dingledine.
- * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
- * Copyright (c) 2007-2019, The Tor Project, Inc. */
- /* See LICENSE for licensing information */
- /**
- * @file relay_periodic.c
- * @brief Periodic functions for the relay subsytem
- **/
- #include "orconfig.h"
- #include "core/or/or.h"
- #include "core/mainloop/periodic.h"
- #include "core/mainloop/cpuworker.h" // XXXX use a pubsub event.
- #include "core/mainloop/mainloop.h"
- #include "core/mainloop/netstatus.h"
- #include "core/or/circuituse.h" // XXXX move have_performed_bandwidth_test
- #include "feature/relay/dns.h"
- #include "feature/relay/relay_periodic.h"
- #include "feature/relay/router.h"
- #include "feature/relay/routerkeys.h"
- #include "feature/relay/routermode.h"
- #include "feature/relay/selftest.h"
- #include "feature/stats/predict_ports.h"
- #include "lib/crypt_ops/crypto_rand.h"
- #include "feature/nodelist/routerinfo_st.h"
- #include "feature/control/control_events.h"
- #define DECLARE_EVENT(name, roles, flags) \
- static periodic_event_item_t name ## _event = \
- PERIODIC_EVENT(name, \
- PERIODIC_EVENT_ROLE_##roles, \
- flags)
- #define FL(name) (PERIODIC_EVENT_FLAG_##name)
- /**
- * Periodic callback: If we're a server and initializing dns failed, retry.
- */
- static int
- retry_dns_callback(time_t now, const or_options_t *options)
- {
- (void)now;
- #define RETRY_DNS_INTERVAL (10*60)
- if (server_mode(options) && has_dns_init_failed())
- dns_init();
- return RETRY_DNS_INTERVAL;
- }
- DECLARE_EVENT(retry_dns, ROUTER, 0);
- static int dns_honesty_first_time = 1;
- /**
- * Periodic event: if we're an exit, see if our DNS server is telling us
- * obvious lies.
- */
- static int
- check_dns_honesty_callback(time_t now, const or_options_t *options)
- {
- (void)now;
- /* 9. and if we're an exit node, check whether our DNS is telling stories
- * to us. */
- if (net_is_disabled() ||
- ! public_server_mode(options) ||
- router_my_exit_policy_is_reject_star())
- return PERIODIC_EVENT_NO_UPDATE;
- if (dns_honesty_first_time) {
- /* Don't launch right when we start */
- dns_honesty_first_time = 0;
- return crypto_rand_int_range(60, 180);
- }
- dns_launch_correctness_checks();
- return 12*3600 + crypto_rand_int(12*3600);
- }
- DECLARE_EVENT(check_dns_honesty, RELAY, FL(NEED_NET));
- /* Periodic callback: rotate the onion keys after the period defined by the
- * "onion-key-rotation-days" consensus parameter, shut down and restart all
- * cpuworkers, and update our descriptor if necessary.
- */
- static int
- rotate_onion_key_callback(time_t now, const or_options_t *options)
- {
- if (server_mode(options)) {
- int onion_key_lifetime = get_onion_key_lifetime();
- time_t rotation_time = get_onion_key_set_at()+onion_key_lifetime;
- if (rotation_time > now) {
- return ONION_KEY_CONSENSUS_CHECK_INTERVAL;
- }
- log_info(LD_GENERAL,"Rotating onion key.");
- rotate_onion_key();
- cpuworkers_rotate_keyinfo();
- if (router_rebuild_descriptor(1)<0) {
- log_info(LD_CONFIG, "Couldn't rebuild router descriptor");
- }
- if (advertised_server_mode() && !net_is_disabled())
- router_upload_dir_desc_to_dirservers(0);
- return ONION_KEY_CONSENSUS_CHECK_INTERVAL;
- }
- return PERIODIC_EVENT_NO_UPDATE;
- }
- DECLARE_EVENT(rotate_onion_key, ROUTER, 0);
- /** Periodic callback: consider rebuilding or and re-uploading our descriptor
- * (if we've passed our internal checks). */
- static int
- check_descriptor_callback(time_t now, const or_options_t *options)
- {
- /** How often do we check whether part of our router info has changed in a
- * way that would require an upload? That includes checking whether our IP
- * address has changed. */
- #define CHECK_DESCRIPTOR_INTERVAL (60)
- (void)options;
- /* 2b. Once per minute, regenerate and upload the descriptor if the old
- * one is inaccurate. */
- if (!net_is_disabled()) {
- check_descriptor_bandwidth_changed(now);
- check_descriptor_ipaddress_changed(now);
- mark_my_descriptor_dirty_if_too_old(now);
- consider_publishable_server(0);
- }
- return CHECK_DESCRIPTOR_INTERVAL;
- }
- DECLARE_EVENT(check_descriptor, ROUTER, FL(NEED_NET));
- static int dirport_reachability_count = 0;
- /**
- * Periodic callback: check whether we're reachable (as a relay), and
- * whether our bandwidth has changed enough that we need to
- * publish a new descriptor.
- */
- static int
- check_for_reachability_bw_callback(time_t now, const or_options_t *options)
- {
- /* XXXX This whole thing was stuck in the middle of what is now
- * XXXX check_descriptor_callback. I'm not sure it's right. */
- /* also, check religiously for reachability, if it's within the first
- * 20 minutes of our uptime. */
- if (server_mode(options) &&
- (have_completed_a_circuit() || !any_predicted_circuits(now)) &&
- !net_is_disabled()) {
- if (get_uptime() < TIMEOUT_UNTIL_UNREACHABILITY_COMPLAINT) {
- router_do_reachability_checks(1, dirport_reachability_count==0);
- if (++dirport_reachability_count > 5)
- dirport_reachability_count = 0;
- return 1;
- } else {
- /* If we haven't checked for 12 hours and our bandwidth estimate is
- * low, do another bandwidth test. This is especially important for
- * bridges, since they might go long periods without much use. */
- const routerinfo_t *me = router_get_my_routerinfo();
- static int first_time = 1;
- if (!first_time && me &&
- me->bandwidthcapacity < me->bandwidthrate &&
- me->bandwidthcapacity < 51200) {
- reset_bandwidth_test();
- }
- first_time = 0;
- #define BANDWIDTH_RECHECK_INTERVAL (12*60*60)
- return BANDWIDTH_RECHECK_INTERVAL;
- }
- }
- return CHECK_DESCRIPTOR_INTERVAL;
- }
- DECLARE_EVENT(check_for_reachability_bw, ROUTER, FL(NEED_NET));
- /**
- * Callback: Send warnings if Tor doesn't find its ports reachable.
- */
- static int
- reachability_warnings_callback(time_t now, const or_options_t *options)
- {
- (void) now;
- if (get_uptime() < TIMEOUT_UNTIL_UNREACHABILITY_COMPLAINT) {
- return (int)(TIMEOUT_UNTIL_UNREACHABILITY_COMPLAINT - get_uptime());
- }
- if (server_mode(options) &&
- !net_is_disabled() &&
- have_completed_a_circuit()) {
- /* every 20 minutes, check and complain if necessary */
- const routerinfo_t *me = router_get_my_routerinfo();
- if (me && !check_whether_orport_reachable(options)) {
- char *address = tor_dup_ip(me->addr);
- log_warn(LD_CONFIG,"Your server (%s:%d) has not managed to confirm that "
- "its ORPort is reachable. Relays do not publish descriptors "
- "until their ORPort and DirPort are reachable. Please check "
- "your firewalls, ports, address, /etc/hosts file, etc.",
- address, me->or_port);
- control_event_server_status(LOG_WARN,
- "REACHABILITY_FAILED ORADDRESS=%s:%d",
- address, me->or_port);
- tor_free(address);
- }
- if (me && !check_whether_dirport_reachable(options)) {
- char *address = tor_dup_ip(me->addr);
- log_warn(LD_CONFIG,
- "Your server (%s:%d) has not managed to confirm that its "
- "DirPort is reachable. Relays do not publish descriptors "
- "until their ORPort and DirPort are reachable. Please check "
- "your firewalls, ports, address, /etc/hosts file, etc.",
- address, me->dir_port);
- control_event_server_status(LOG_WARN,
- "REACHABILITY_FAILED DIRADDRESS=%s:%d",
- address, me->dir_port);
- tor_free(address);
- }
- }
- return TIMEOUT_UNTIL_UNREACHABILITY_COMPLAINT;
- }
- DECLARE_EVENT(reachability_warnings, ROUTER, FL(NEED_NET));
- /* Periodic callback: Every 30 seconds, check whether it's time to make new
- * Ed25519 subkeys.
- */
- static int
- check_ed_keys_callback(time_t now, const or_options_t *options)
- {
- if (server_mode(options)) {
- if (should_make_new_ed_keys(options, now)) {
- int new_signing_key = load_ed_keys(options, now);
- if (new_signing_key < 0 ||
- generate_ed_link_cert(options, now, new_signing_key > 0)) {
- log_err(LD_OR, "Unable to update Ed25519 keys! Exiting.");
- tor_shutdown_event_loop_and_exit(1);
- }
- }
- return 30;
- }
- return PERIODIC_EVENT_NO_UPDATE;
- }
- DECLARE_EVENT(check_ed_keys, ROUTER, 0);
- /* Period callback: Check if our old onion keys are still valid after the
- * period of time defined by the consensus parameter
- * "onion-key-grace-period-days", otherwise expire them by setting them to
- * NULL.
- */
- static int
- check_onion_keys_expiry_time_callback(time_t now, const or_options_t *options)
- {
- if (server_mode(options)) {
- int onion_key_grace_period = get_onion_key_grace_period();
- time_t expiry_time = get_onion_key_set_at()+onion_key_grace_period;
- if (expiry_time > now) {
- return ONION_KEY_CONSENSUS_CHECK_INTERVAL;
- }
- log_info(LD_GENERAL, "Expiring old onion keys.");
- expire_old_onion_keys();
- cpuworkers_rotate_keyinfo();
- return ONION_KEY_CONSENSUS_CHECK_INTERVAL;
- }
- return PERIODIC_EVENT_NO_UPDATE;
- }
- DECLARE_EVENT(check_onion_keys_expiry_time, ROUTER, 0);
- void
- relay_register_periodic_events(void)
- {
- periodic_events_register(&retry_dns_event);
- periodic_events_register(&check_dns_honesty_event);
- periodic_events_register(&rotate_onion_key_event);
- periodic_events_register(&check_descriptor_event);
- periodic_events_register(&check_for_reachability_bw_event);
- periodic_events_register(&reachability_warnings_event);
- periodic_events_register(&check_ed_keys_event);
- periodic_events_register(&check_onion_keys_expiry_time_event);
- dns_honesty_first_time = 1;
- dirport_reachability_count = 0;
- }
- /**
- * Update our schedule so that we'll check whether we need to update our
- * descriptor immediately, rather than after up to CHECK_DESCRIPTOR_INTERVAL
- * seconds.
- */
- void
- reschedule_descriptor_update_check(void)
- {
- periodic_event_reschedule(&check_descriptor_event);
- }
|