aboutsummaryrefslogtreecommitdiff
path: root/src/or/dirserv.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2003-09-27 21:30:10 +0000
committerNick Mathewson <nickm@torproject.org>2003-09-27 21:30:10 +0000
commit0e0169d6fa280f94f5e3f38a8d67b1cdb6452517 (patch)
tree381a2c736df86b2c2d6bfba2e213b105d381316c /src/or/dirserv.c
parentcb8212bfcb56980893993db5bd4098944735b38a (diff)
downloadtor-0e0169d6fa280f94f5e3f38a8d67b1cdb6452517.tar
tor-0e0169d6fa280f94f5e3f38a8d67b1cdb6452517.tar.gz
Write necessary backends for online directory generation. I think.
svn:r503
Diffstat (limited to 'src/or/dirserv.c')
-rw-r--r--src/or/dirserv.c387
1 files changed, 387 insertions, 0 deletions
diff --git a/src/or/dirserv.c b/src/or/dirserv.c
new file mode 100644
index 000000000..901d2e945
--- /dev/null
+++ b/src/or/dirserv.c
@@ -0,0 +1,387 @@
+/* Copyright 2001,2002,2003 Roger Dingledine, Matej Pfajfar. */
+/* See LICENSE for licensing information */
+/* $Id$ */
+
+#include "or.h"
+
+static int the_directory_is_dirty = 1;
+static char *the_directory = NULL;
+static int the_directory_len = -1;
+
+/*
+ * Fingerprint handling code.
+ */
+typedef struct fingerprint_entry_t {
+ char *nickname;
+ char *fingerprint;
+} fingerprint_entry_t;
+
+static fingerprint_entry_t fingerprint_list[MAX_ROUTERS_IN_DIR];
+static int n_fingerprints = 0;
+
+/* return 0 on success, -1 on failure */
+int
+dirserv_parse_fingerprint_file(const char *fname)
+{
+ FILE *file;
+#define BUF_LEN (FINGERPRINT_LEN+MAX_NICKNAME_LEN+20)
+ char buf[BUF_LEN+1];
+ char *cp, *nickname, *fingerprint;
+ fingerprint_entry_t fingerprint_list_tmp[MAX_ROUTERS_IN_DIR];
+ int n_fingerprints_tmp = 0;
+ int lineno=0;
+ int i;
+ if (!(file = fopen(fname, "r"))) {
+ log(LOG_WARNING, "Cannot open fingerprint file %s", fname);
+ goto err;
+ }
+ while (1) {
+ cp = fgets(buf, BUF_LEN, file);
+ ++lineno;
+ if (!cp) {
+ if (feof(file))
+ break;
+ else {
+ log(LOG_WARNING, "Error reading from fingerprint file");
+ goto err;
+ }
+ }
+ buf[BUF_LEN]='\0';
+ cp = buf;
+ while (isspace(*cp))
+ ++cp;
+ if (*cp == '#' || *cp == '\0')
+ continue;
+ nickname = cp;
+ cp = strchr(cp, ' ');
+ if (!cp) {
+ log(LOG_WARNING, "Bad line %d of fingerprint file", lineno);
+ goto err;
+ }
+ *cp++ = '\0';
+ while (isspace(*cp))
+ ++cp;
+ if (strlen(cp) < FINGERPRINT_LEN) {
+ log(LOG_WARNING, "Bad line %d of fingerprint file", lineno);
+ goto err;
+ }
+ fingerprint = cp;
+ cp[FINGERPRINT_LEN] = '\0';
+ if (strlen(nickname) > MAX_NICKNAME_LEN) {
+ log(LOG_WARNING, "Nickname too long on line %d of fingerprint file",
+ lineno);
+ goto err;
+ }
+ if (!crypto_pk_check_fingerprint_syntax(fingerprint)) {
+ log(LOG_WARNING, "Invalid fingerprint on line %d of fingerprint file",
+ lineno);
+ goto err;
+ }
+ for (i = 0; i < n_fingerprints_tmp; ++i) {
+ if (0==strcasecmp(fingerprint_list_tmp[i].nickname, nickname)) {
+ log(LOG_WARNING, "Duplicate nickname on line %d of fingerprint file", lineno);
+ goto err;
+ }
+ }
+ fingerprint_list_tmp[n_fingerprints_tmp].nickname = strdup(nickname);
+ fingerprint_list_tmp[n_fingerprints_tmp].fingerprint = strdup(fingerprint);
+ ++n_fingerprints_tmp;
+ }
+ /* replace the global fingerprints list. */
+ dirserv_free_fingerprint_list();
+ memcpy(fingerprint_list, fingerprint_list_tmp,
+ sizeof(fingerprint_entry_t)*n_fingerprints_tmp);
+ n_fingerprints = n_fingerprints_tmp;
+ return 0;
+
+ err:
+ for (i = 0; i < n_fingerprints_tmp; ++i) {
+ free(fingerprint_list_tmp[i].nickname);
+ free(fingerprint_list_tmp[i].fingerprint);
+ }
+ return -1;
+#undef BUF_LEN
+}
+
+/* return 1 if router's identity and nickname match. */
+int
+dirserv_router_fingerprint_is_known(const routerinfo_t *router)
+{
+ int i;
+ fingerprint_entry_t *ent =NULL;
+ char fp[FINGERPRINT_LEN+1];
+
+ for (i=0;i<n_fingerprints;++i) {
+ if (!strcasecmp(router->nickname,fingerprint_list[i].nickname)) {
+ ent = &fingerprint_list[i];
+ break;
+ }
+ }
+
+ if (!ent) {
+ /* No such server known */
+ return 0;
+ }
+ if (crypto_pk_get_fingerprint(router->identity_pkey, fp)) {
+ /* XXX Error computing fingerprint: log */
+ return 0;
+ }
+ if (0==strcasecmp(ent->fingerprint, fp)) {
+ /* Right fingerprint. */
+ return 1;
+ } else {
+ /* Wrong fingerprint. */
+ return 0;
+ }
+}
+
+void
+dirserv_free_fingerprint_list()
+{
+ int i;
+ for (i = 0; i < n_fingerprints; ++i) {
+ free(fingerprint_list[i].nickname);
+ free(fingerprint_list[i].fingerprint);
+ }
+ n_fingerprints = 0;
+}
+
+/*
+ * Descriptor list
+ */
+typedef struct descriptor_entry_t {
+ char *nickname;
+ time_t published;
+ size_t desc_len;
+ char *descriptor;
+} descriptor_entry_t;
+
+static descriptor_entry_t *descriptor_list[MAX_ROUTERS_IN_DIR];
+static int n_descriptors = 0;
+
+static void free_descriptor_entry(descriptor_entry_t *desc)
+{
+ if (desc->descriptor)
+ free(desc->descriptor);
+ if (desc->nickname)
+ free(desc->nickname);
+ free(desc);
+}
+
+void
+dirserv_free_descriptors()
+{
+ int i;
+ for (i = 0; i < n_descriptors; ++i) {
+ free_descriptor_entry(descriptor_list[i]);
+ }
+ n_descriptors = 0;
+}
+
+/* Return 0 if descriptor added; -1 if descriptor rejected. Updates *desc
+ * to point after the descriptor if the descriptor is OK.
+ */
+int
+dirserv_add_descriptor(const char **desc)
+{
+ descriptor_entry_t **desc_ent_ptr;
+ routerinfo_t *ri = NULL;
+ int i;
+ char *start, *end;
+ char *desc_tmp = NULL;
+ size_t desc_len;
+
+ start = strstr(*desc, "router ");
+ if (!start) {
+ log(LOG_WARNING, "no descriptor found.");
+ goto err;
+ }
+ end = strstr(start+6, "\nrouter ");
+ if (end) {
+ ++end; /* Include NL. */
+ } else {
+ end = start+strlen(start);
+ }
+ desc_len = end-start;
+ desc_tmp = tor_malloc(desc_len+1);
+ strncpy(desc_tmp, start, desc_len);
+ desc_tmp[desc_len]='\0';
+
+ /* Check: is the descriptor syntactically valid? */
+ ri = router_get_entry_from_string(&desc_tmp);
+ if (!ri) {
+ log(LOG_WARNING, "Couldn't parse descriptor");
+ goto err;
+ }
+ free(desc_tmp); desc_tmp = NULL;
+ /* Okay. Now check whether the fingerprint is recognized. */
+ if (!dirserv_router_fingerprint_is_known(ri)) {
+ log(LOG_WARNING, "Identity is unrecognized for descriptor");
+ goto err;
+ }
+ /* Do we already have an entry for this router? */
+ desc_ent_ptr = NULL;
+ for (i = 0; i < n_descriptors; ++i) {
+ if (!strcasecmp(ri->nickname, descriptor_list[i]->nickname)) {
+ desc_ent_ptr = &descriptor_list[i];
+ break;
+ }
+ }
+ if (desc_ent_ptr) {
+ /* if so, decide whether to update it. */
+ if ((*desc_ent_ptr)->published > ri->published_on) {
+ /* We already have a newer descriptor */
+ goto err;
+ }
+ /* We don't have a newer one; we'll update this one. */
+ free_descriptor_entry(*desc_ent_ptr);
+ } else {
+ /* Add this at the end. */
+ desc_ent_ptr = &descriptor_list[n_descriptors++];
+ }
+
+ (*desc_ent_ptr) = tor_malloc(sizeof(descriptor_entry_t));
+ (*desc_ent_ptr)->nickname = ri->nickname;
+ (*desc_ent_ptr)->published = ri->published_on;
+ (*desc_ent_ptr)->desc_len = desc_len;
+ (*desc_ent_ptr)->descriptor = tor_malloc(desc_len+1);
+ strncpy((*desc_ent_ptr)->descriptor, start, desc_len);
+ (*desc_ent_ptr)->descriptor[desc_len] = '\0';
+ *desc = end;
+ the_directory_is_dirty = 1;
+
+ routerinfo_free(ri);
+ return 0;
+ err:
+ if (desc_tmp)
+ free(desc_tmp);
+ if (ri)
+ routerinfo_free(ri);
+
+ return -1;
+}
+
+void
+directory_set_dirty()
+{
+ the_directory_is_dirty = 1;
+}
+
+int
+dirserv_init_from_directory_string(const char *dir)
+{
+ const char *cp = dir;
+ while(1) {
+ cp = strstr(cp, "\nrouter ");
+ if (!cp) break;
+ ++cp;
+ if (dirserv_add_descriptor(&cp)) {
+ return -1;
+ }
+ --cp; /*Back up to newline.*/
+ }
+ return 0;
+}
+
+int
+dirserv_dump_directory_to_string(char *s, int maxlen,
+ crypto_pk_env_t *private_key)
+{
+ char *cp, *eos;
+ char digest[20];
+ char signature[128];
+ char published[33];
+ time_t published_on;
+ int i;
+ eos = s+maxlen;
+
+ if (list_running_servers(&cp))
+ return -1;
+ published_on = time(NULL);
+ strftime(published, 32, "%Y-%m-%d %H:%M:%S", gmtime(&published_on));
+ snprintf(s, maxlen,
+ "signed-directory\n"
+ "published %s\n"
+ "recommended-software "RECOMMENDED_SOFTWARE_VERSIONS"\n"
+ "running-routers %s\n", published, cp);
+ free(cp);
+ i = strlen(s);
+ cp = s+i;
+
+ for (i = 0; i < n_descriptors; ++i) {
+ strncat(cp, descriptor_list[i]->descriptor, descriptor_list[i]->desc_len);
+ cp += descriptor_list[i]->desc_len;
+ assert(!cp);
+ }
+ /* These multiple strlen calls are inefficient, but dwarfed by the RSA
+ signature.
+ */
+ i = strlen(s);
+ strncat(s, "directory-signature\n", maxlen-i);
+ i = strlen(s);
+ cp = s + i;
+
+ if (crypto_SHA_digest(s, i, digest)) {
+ log_fn(LOG_WARNING,"couldn't compute digest");
+ return -1;
+ }
+ if (crypto_pk_private_sign(private_key, digest, 20, signature) < 0) {
+ log_fn(LOG_WARNING,"couldn't sign digest");
+ return -1;
+ }
+
+ strncpy(cp,
+ "-----BEGIN SIGNATURE-----\n", maxlen-i);
+
+ i = strlen(s);
+ cp = s+i;
+ if (base64_encode(cp, maxlen-i, signature, 128) < 0) {
+ log_fn(LOG_WARNING," couldn't base64-encode signature");
+ return -1;
+ }
+
+ i = strlen(s);
+ cp = s+i;
+ strncat(cp, "-----END SIGNATURE-----\n", maxlen-i);
+ i = strlen(s);
+ if (i == maxlen) {
+ log_fn(LOG_WARNING,"tried to exceed string length.");
+ return -1;
+ }
+
+ return 0;
+}
+
+size_t dirserv_get_directory(const char **directory)
+{
+ char *new_directory;
+ if (the_directory_is_dirty) {
+ new_directory = tor_malloc(MAX_DIR_SIZE);
+ if (dirserv_dump_directory_to_string(new_directory, MAX_DIR_SIZE,
+ get_identity_key())) {
+ log(LOG_WARNING, "Error creating directory.");
+ free(new_directory);
+ return 0;
+ }
+ if (the_directory)
+ free(the_directory);
+ the_directory = new_directory;
+ the_directory_len = strlen(the_directory);
+ log_fn(LOG_INFO,"New directory (size %d):\n%s",the_directory_len,
+ the_directory);
+ the_directory_is_dirty = 0;
+ /* Now read the directory we just made in order to update our own
+ * router lists. This does more signature checking than is strictly
+ * necessary, but safe is better than sorry. */
+ new_directory = strdup(*directory);
+ if (router_get_dir_from_string(new_directory, get_identity_key())) {
+ log_fn(LOG_ERR, "We just generated a directory we can't parse. Dying.");
+ exit(0);
+ }
+ free(new_directory);
+ } else {
+ log(LOG_INFO,"Directory still clean, reusing.");
+ }
+ *directory = the_directory;
+ return the_directory_len;
+}