Bitcoin ABC 0.30.5
P2P Digital Currency
|
#include <torcontrol.h>
#include <chainparams.h>
#include <chainparamsbase.h>
#include <common/args.h>
#include <compat.h>
#include <crypto/hmac_sha256.h>
#include <logging.h>
#include <net.h>
#include <netaddress.h>
#include <netbase.h>
#include <util/readwritefile.h>
#include <util/strencodings.h>
#include <util/string.h>
#include <util/thread.h>
#include <util/time.h>
#include <boost/signals2/signal.hpp>
#include <event2/buffer.h>
#include <event2/bufferevent.h>
#include <event2/event.h>
#include <event2/thread.h>
#include <event2/util.h>
#include <cstdlib>
#include <deque>
#include <functional>
#include <set>
#include <vector>
Go to the source code of this file.
Classes | |
class | TorControlReply |
Reply from Tor, can be single or multi-line. More... | |
class | TorControlConnection |
Low-level handling for Tor control connection. More... | |
class | TorController |
Controller that connects to Tor control socket, authenticate, then create and maintain an ephemeral onion service. More... | |
Functions | |
std::pair< std::string, std::string > | SplitTorReplyLine (const std::string &s) |
std::map< std::string, std::string > | ParseTorReplyMapping (const std::string &s) |
Parse reply arguments in the form 'METHODS=COOKIE,SAFECOOKIE COOKIEFILE=".../control_auth_cookie"'. More... | |
static std::vector< uint8_t > | ComputeResponse (const std::string &key, const std::vector< uint8_t > &cookie, const std::vector< uint8_t > &clientNonce, const std::vector< uint8_t > &serverNonce) |
Compute Tor SAFECOOKIE response. More... | |
static void | TorControlThread (CService onion_service_target) |
void | StartTorControl (CService onion_service_target) |
void | InterruptTorControl () |
void | StopTorControl () |
CService | DefaultOnionServiceTarget () |
Variables | |
const std::string | DEFAULT_TOR_CONTROL = "127.0.0.1:9051" |
Default control port. More... | |
static const int | TOR_COOKIE_SIZE = 32 |
Tor cookie size (from control-spec.txt) More... | |
static const int | TOR_NONCE_SIZE = 32 |
Size of client/server nonce for SAFECOOKIE. More... | |
static const std::string | TOR_SAFE_SERVERKEY |
For computing serverHash in SAFECOOKIE. More... | |
static const std::string | TOR_SAFE_CLIENTKEY |
For computing clientHash in SAFECOOKIE. More... | |
static const float | RECONNECT_TIMEOUT_START = 1.0 |
Exponential backoff configuration - initial timeout in seconds. More... | |
static const float | RECONNECT_TIMEOUT_EXP = 1.5 |
Exponential backoff configuration - growth factor. More... | |
static const int | MAX_LINE_LENGTH = 100000 |
Maximum length for lines received on TorControlConnection. More... | |
static struct event_base * | gBase |
static std::thread | torControlThread |
|
static |
Compute Tor SAFECOOKIE response.
ServerHash is computed as: HMAC-SHA256("Tor safe cookie authentication server-to-controller hash", CookieString | ClientNonce | ServerNonce) (with the HMAC key as its first argument)
After a controller sends a successful AUTHCHALLENGE command, the next command sent on the connection must be an AUTHENTICATE command, and the only authentication string which that AUTHENTICATE command will accept is:
HMAC-SHA256("Tor safe cookie authentication controller-to-server hash", CookieString | ClientNonce | ServerNonce)
Definition at line 596 of file torcontrol.cpp.
CService DefaultOnionServiceTarget | ( | ) |
Definition at line 871 of file torcontrol.cpp.
void InterruptTorControl | ( | ) |
std::map< std::string, std::string > ParseTorReplyMapping | ( | const std::string & | s | ) |
Parse reply arguments in the form 'METHODS=COOKIE,SAFECOOKIE COOKIEFILE=".../control_auth_cookie"'.
Returns a map of keys to values, or an empty map if there was an error. Grammar is implicitly defined in https://spec.torproject.org/control-spec by the server reply formats for PROTOCOLINFO (S3.21), AUTHCHALLENGE (S3.24), and ADD_ONION (S3.27). See also sections 2.1 and 2.3.
Unescape value. Per https://spec.torproject.org/control-spec section 2.1.1:
For future-proofing, controller implementors MAY use the following rules to be compatible with buggy Tor implementations and with future ones that implement the spec as intended:
Read
\t \r and \0 ... \377 as C escapes. Treat a backslash followed by any other character as that character.
Definition at line 304 of file torcontrol.cpp.
std::pair< std::string, std::string > SplitTorReplyLine | ( | const std::string & | s | ) |
void StartTorControl | ( | CService | onion_service_target | ) |
Definition at line 834 of file torcontrol.cpp.
void StopTorControl | ( | ) |
|
static |
Definition at line 827 of file torcontrol.cpp.
const std::string DEFAULT_TOR_CONTROL = "127.0.0.1:9051" |
Default control port.
Definition at line 38 of file torcontrol.cpp.
|
static |
Definition at line 824 of file torcontrol.cpp.
|
static |
Maximum length for lines received on TorControlConnection.
tor-control-spec.txt mentions that there is explicitly no limit defined to line length, this is belt-and-suspenders sanity limit to prevent memory exhaustion.
Definition at line 59 of file torcontrol.cpp.
|
static |
Exponential backoff configuration - growth factor.
Definition at line 52 of file torcontrol.cpp.
|
static |
Exponential backoff configuration - initial timeout in seconds.
Definition at line 50 of file torcontrol.cpp.
|
static |
Tor cookie size (from control-spec.txt)
Definition at line 40 of file torcontrol.cpp.
|
static |
Size of client/server nonce for SAFECOOKIE.
Definition at line 42 of file torcontrol.cpp.
|
static |
For computing clientHash in SAFECOOKIE.
Definition at line 47 of file torcontrol.cpp.
|
static |
For computing serverHash in SAFECOOKIE.
Definition at line 44 of file torcontrol.cpp.
|
static |
Definition at line 825 of file torcontrol.cpp.