Changeset a099b92 in trunk
- Timestamp:
- 2016-08-28T23:30:31Z (9 years ago)
- Branches:
- master
- Children:
- 0951201
- Parents:
- bc079a7
- git-author:
- Brian Warner <warner@…> (2016-08-28 23:28:01)
- git-committer:
- Brian Warner <warner@…> (2016-08-28 23:30:31)
- Files:
-
- 4 edited
Legend:
- Unmodified
- Added
- Removed
-
TabularUnified docs/configuration.rst ¶
rbc079a7 ra099b92 403 403 means the node will use Tor, if necessary, and if possible. 404 404 405 ``socks.port = (string, optional, PORT, defaults to empty)``405 ``socks.port = (string, optional, endpoint specification string, defaults to empty)`` 406 406 407 407 This tells the node that Tor connections should be routed to a SOCKS 408 proxy listening on the given port. The default (of an empty value) will409 cause the node to first try localhost port 9050, then if that fails, try410 localhost port 9150. These are the default listening ports of the408 proxy listening on the given endpoint. The default (of an empty value) 409 will cause the node to first try localhost port 9050, then if that fails, 410 try localhost port 9150. These are the default listening ports of the 411 411 standard Tor daemon, and the Tor Browser Bundle, respectively. 412 413 While this nominally accepts an arbitrary endpoint string, internal 414 limitations prevent it from accepting anything but ``tcp:HOST:PORT`` 415 (unfortunately, unix-domain sockets are not yet supported). See ticket 416 #2813 for details. Also note that using a HOST of anything other than 417 localhost is discouraged, because you would be revealing your IP address 418 to external (and possibly hostile) machines. 412 419 413 420 ``control.port = (string, optional, endpoint specification string)`` … … 435 442 * 1: ``(empty)``: use SOCKS on port 9050/9150 436 443 * 2: ``launch = true``: launch a new Tor 437 * 3: ``socks.port = HOST:PORT``: use an existing Tor on the given SOCKS port438 * 4: ``control.port = PORT``: use an existing Tor at the given control port444 * 3: ``socks.port = tcp:HOST:PORT``: use an existing Tor on the given SOCKS port 445 * 4: ``control.port = ENDPOINT``: use an existing Tor at the given control port 439 446 * 5: ``enable = false``: no Tor at all 440 447 -
TabularUnified src/allmydata/_auto_deps.py ¶
rbc079a7 ra099b92 40 40 # rather than 1024-bit RSA-with-MD5. This also allows us to work 41 41 # with a FIPS build of OpenSSL. 42 "foolscap >= 0.10.1", 42 # * foolscap >= 0.12.2 provides tcp/tor/i2p connection handlers we need 43 "foolscap >= 0.12.2", 43 44 44 45 # Needed for SFTP. -
TabularUnified src/allmydata/node.py ¶
rbc079a7 ra099b92 188 188 socksport = self.get_config("tor", "socks.port", None) 189 189 if socksport: 190 # foolscap.connections.tor.socks_port() in Foolscap-0.12.1 only 191 # allows the use of SOCKS port on localhost, to discourage unsafe 192 # connections to remote SOCKS ports. Allow the HOST:PORT syntax, 193 # but refuse to use anything other than 127.0.0.1 . Also accept 194 # just PORT. 195 if ":" in socksport: 196 host, port = socksport.split(":") 197 if host != "127.0.0.1": 198 raise ValueError("'tahoe.cfg [tor] socks.port' = " 199 "must be '127.0.0.1:PORT' or just PORT, " 200 "not '%s'" % (socksport,)) 201 else: 202 port = socksport 190 # this is nominally and endpoint string, but txtorcon requires 191 # TCP host and port. So parse it now, and reject non-TCP 192 # endpoints. 193 194 pieces = socksport.split(":") 195 if pieces[0] != "tcp" or len(pieces) != 3: 196 raise ValueError("'tahoe.cfg [tor] socks.port' = " 197 "is currently limited to 'tcp:HOST:PORT', " 198 "not '%s'" % (socksport,)) 199 host = pieces[1] 203 200 try: 204 port = int(p ort)201 port = int(pieces[2]) 205 202 except ValueError: 206 203 raise ValueError("'tahoe.cfg [tor] socks.port' used " 207 "non-numeric PORT value '%s'" % (p ort,))208 return tor.socks_port( port)204 "non-numeric PORT value '%s'" % (pieces[2],)) 205 return tor.socks_port(host, port) 209 206 210 207 controlport = self.get_config("tor", "control.port", None) -
TabularUnified src/allmydata/test/test_connections.py ¶
rbc079a7 ra099b92 66 66 67 67 def test_socksport(self): 68 n = FakeNode(BASECONFIG+"[tor]\nsocks.port = 1234\n")68 n = FakeNode(BASECONFIG+"[tor]\nsocks.port = tcp:127.0.0.1:1234\n") 69 69 h1 = mock.Mock() 70 70 with mock.patch("foolscap.connections.tor.socks_port", 71 71 return_value=h1) as f: 72 72 h = n._make_tor_handler() 73 self.assertEqual(f.mock_calls, [mock.call( 1234)])74 self.assertIdentical(h, h1) 75 76 def test_socksport_ localhost(self):77 n = FakeNode(BASECONFIG+"[tor]\nsocks.port = 127.0.0.1:1234\n")73 self.assertEqual(f.mock_calls, [mock.call("127.0.0.1", 1234)]) 74 self.assertIdentical(h, h1) 75 76 def test_socksport_otherhost(self): 77 n = FakeNode(BASECONFIG+"[tor]\nsocks.port = tcp:otherhost:1234\n") 78 78 h1 = mock.Mock() 79 79 with mock.patch("foolscap.connections.tor.socks_port", 80 80 return_value=h1) as f: 81 81 h = n._make_tor_handler() 82 self.assertEqual(f.mock_calls, [mock.call( 1234)])83 self.assertIdentical(h, h1) 84 85 def test_socksport_bad_ host(self):86 n = FakeNode(BASECONFIG+"[tor]\nsocks.port = example.com:1234\n")82 self.assertEqual(f.mock_calls, [mock.call("otherhost", 1234)]) 83 self.assertIdentical(h, h1) 84 85 def test_socksport_bad_endpoint(self): 86 n = FakeNode(BASECONFIG+"[tor]\nsocks.port = unix:unsupported\n") 87 87 e = self.assertRaises(ValueError, n._make_tor_handler) 88 self.assertIn(" must be '127.0.0.1:PORT'", str(e))88 self.assertIn("is currently limited to 'tcp:HOST:PORT'", str(e)) 89 89 90 90 def test_socksport_not_integer(self): 91 n = FakeNode(BASECONFIG+"[tor]\nsocks.port = kumquat\n")91 n = FakeNode(BASECONFIG+"[tor]\nsocks.port = tcp:localhost:kumquat\n") 92 92 e = self.assertRaises(ValueError, n._make_tor_handler) 93 93 self.assertIn("used non-numeric PORT value", str(e))
Note: See TracChangeset
for help on using the changeset viewer.