Changeset a099b92 in trunk


Ignore:
Timestamp:
2016-08-28T23:30:31Z (9 years ago)
Author:
Brian Warner <warner@…>
Branches:
master
Children:
0951201
Parents:
bc079a7
git-author:
Brian Warner <warner@…> (2016-08-28 23:28:01)
git-committer:
Brian Warner <warner@…> (2016-08-28 23:30:31)
Message:

tor: socks.port is now a (restricted) endpoint string

Foolscap has limitations that prevent us from accepting anything but a
TCP endpoint, but that will change in the future, so make the tahoe.cfg
syntax accept an endpoint, but then reject non-TCP ones. See the ticket
for details: refs ticket:2813.

This depends upon the new `foolscap.connections.tor.socks_port(host,
port)` API in foolscap-0.12.2, so it bumps the dependency to that (the
previous commit depended upon 0.12.1, but I hadn't gotten around to
updating the dep before now).

Files:
4 edited

Legend:

Unmodified
Added
Removed
  • TabularUnified docs/configuration.rst

    rbc079a7 ra099b92  
    403403    means the node will use Tor, if necessary, and if possible.
    404404
    405 ``socks.port = (string, optional, PORT, defaults to empty)``
     405``socks.port = (string, optional, endpoint specification string, defaults to empty)``
    406406
    407407    This tells the node that Tor connections should be routed to a SOCKS
    408     proxy listening on the given port. The default (of an empty value) will
    409     cause the node to first try localhost port 9050, then if that fails, try
    410     localhost port 9150. These are the default listening ports of the
     408    proxy listening on the given endpoint. The default (of an empty value)
     409    will cause the node to first try localhost port 9050, then if that fails,
     410    try localhost port 9150. These are the default listening ports of the
    411411    standard Tor daemon, and the Tor Browser Bundle, respectively.
     412
     413    While this nominally accepts an arbitrary endpoint string, internal
     414    limitations prevent it from accepting anything but ``tcp:HOST:PORT``
     415    (unfortunately, unix-domain sockets are not yet supported). See ticket
     416    #2813 for details. Also note that using a HOST of anything other than
     417    localhost is discouraged, because you would be revealing your IP address
     418    to external (and possibly hostile) machines.
    412419
    413420``control.port = (string, optional, endpoint specification string)``
     
    435442* 1: ``(empty)``: use SOCKS on port 9050/9150
    436443* 2: ``launch = true``: launch a new Tor
    437 * 3: ``socks.port = HOST:PORT``: use an existing Tor on the given SOCKS port
    438 * 4: ``control.port = PORT``: use an existing Tor at the given control port
     444* 3: ``socks.port = tcp:HOST:PORT``: use an existing Tor on the given SOCKS port
     445* 4: ``control.port = ENDPOINT``: use an existing Tor at the given control port
    439446* 5: ``enable = false``: no Tor at all
    440447
  • TabularUnified src/allmydata/_auto_deps.py

    rbc079a7 ra099b92  
    4040    #   rather than 1024-bit RSA-with-MD5. This also allows us to work
    4141    #   with a FIPS build of OpenSSL.
    42     "foolscap >= 0.10.1",
     42    # * foolscap >= 0.12.2 provides tcp/tor/i2p connection handlers we need
     43    "foolscap >= 0.12.2",
    4344
    4445    # Needed for SFTP.
  • TabularUnified src/allmydata/node.py

    rbc079a7 ra099b92  
    188188        socksport = self.get_config("tor", "socks.port", None)
    189189        if socksport:
    190             # foolscap.connections.tor.socks_port() in Foolscap-0.12.1 only
    191             # allows the use of SOCKS port on localhost, to discourage unsafe
    192             # connections to remote SOCKS ports. Allow the HOST:PORT syntax,
    193             # but refuse to use anything other than 127.0.0.1 . Also accept
    194             # just PORT.
    195             if ":" in socksport:
    196                 host, port = socksport.split(":")
    197                 if host != "127.0.0.1":
    198                     raise ValueError("'tahoe.cfg [tor] socks.port' = "
    199                                      "must be '127.0.0.1:PORT' or just PORT, "
    200                                      "not '%s'" % (socksport,))
    201             else:
    202                 port = socksport
     190            # this is nominally and endpoint string, but txtorcon requires
     191            # TCP host and port. So parse it now, and reject non-TCP
     192            # endpoints.
     193
     194            pieces = socksport.split(":")
     195            if pieces[0] != "tcp" or len(pieces) != 3:
     196                raise ValueError("'tahoe.cfg [tor] socks.port' = "
     197                                 "is currently limited to 'tcp:HOST:PORT', "
     198                                 "not '%s'" % (socksport,))
     199            host = pieces[1]
    203200            try:
    204                 port = int(port)
     201                port = int(pieces[2])
    205202            except ValueError:
    206203                raise ValueError("'tahoe.cfg [tor] socks.port' used "
    207                                  "non-numeric PORT value '%s'" % (port,))
    208             return tor.socks_port(port)
     204                                 "non-numeric PORT value '%s'" % (pieces[2],))
     205            return tor.socks_port(host, port)
    209206
    210207        controlport = self.get_config("tor", "control.port", None)
  • TabularUnified src/allmydata/test/test_connections.py

    rbc079a7 ra099b92  
    6666
    6767    def test_socksport(self):
    68         n = FakeNode(BASECONFIG+"[tor]\nsocks.port = 1234\n")
     68        n = FakeNode(BASECONFIG+"[tor]\nsocks.port = tcp:127.0.0.1:1234\n")
    6969        h1 = mock.Mock()
    7070        with mock.patch("foolscap.connections.tor.socks_port",
    7171                        return_value=h1) as f:
    7272            h = n._make_tor_handler()
    73             self.assertEqual(f.mock_calls, [mock.call(1234)])
    74             self.assertIdentical(h, h1)
    75 
    76     def test_socksport_localhost(self):
    77         n = FakeNode(BASECONFIG+"[tor]\nsocks.port = 127.0.0.1:1234\n")
     73            self.assertEqual(f.mock_calls, [mock.call("127.0.0.1", 1234)])
     74            self.assertIdentical(h, h1)
     75
     76    def test_socksport_otherhost(self):
     77        n = FakeNode(BASECONFIG+"[tor]\nsocks.port = tcp:otherhost:1234\n")
    7878        h1 = mock.Mock()
    7979        with mock.patch("foolscap.connections.tor.socks_port",
    8080                        return_value=h1) as f:
    8181            h = n._make_tor_handler()
    82             self.assertEqual(f.mock_calls, [mock.call(1234)])
    83             self.assertIdentical(h, h1)
    84 
    85     def test_socksport_bad_host(self):
    86         n = FakeNode(BASECONFIG+"[tor]\nsocks.port = example.com:1234\n")
     82            self.assertEqual(f.mock_calls, [mock.call("otherhost", 1234)])
     83            self.assertIdentical(h, h1)
     84
     85    def test_socksport_bad_endpoint(self):
     86        n = FakeNode(BASECONFIG+"[tor]\nsocks.port = unix:unsupported\n")
    8787        e = self.assertRaises(ValueError, n._make_tor_handler)
    88         self.assertIn("must be '127.0.0.1:PORT'", str(e))
     88        self.assertIn("is currently limited to 'tcp:HOST:PORT'", str(e))
    8989
    9090    def test_socksport_not_integer(self):
    91         n = FakeNode(BASECONFIG+"[tor]\nsocks.port = kumquat\n")
     91        n = FakeNode(BASECONFIG+"[tor]\nsocks.port = tcp:localhost:kumquat\n")
    9292        e = self.assertRaises(ValueError, n._make_tor_handler)
    9393        self.assertIn("used non-numeric PORT value", str(e))
Note: See TracChangeset for help on using the changeset viewer.