]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
DROPGUARDS controller command
authorNick Mathewson <nickm@torproject.org>
Mon, 21 Oct 2013 17:02:25 +0000 (13:02 -0400)
committerNick Mathewson <nickm@torproject.org>
Mon, 21 Oct 2013 17:02:25 +0000 (13:02 -0400)
Implements ticket 9934; patch from "ra"

changes/bug9934 [new file with mode: 0644]
src/or/control.c
src/or/entrynodes.c
src/or/entrynodes.h

diff --git a/changes/bug9934 b/changes/bug9934
new file mode 100644 (file)
index 0000000..2a636db
--- /dev/null
@@ -0,0 +1,4 @@
+  o Minor features (controller):
+    - New DROPGUARDS command to forget all current entry guards. Not
+      recommended for ordinary use, since replacing guards too frequently
+      makes several attacks easier. Resolves ticket #9934; patch from "ra".
index e97c18d892e4b2afbad455d1d0343685d27bcbc8..65c543a430b98685e18ddf3fee4dbe6c3829642e 100644 (file)
@@ -3141,6 +3141,30 @@ handle_control_usefeature(control_connection_t *conn,
   return 0;
 }
 
+/** Implementation for the DROPGUARDS command. */
+static int
+handle_control_dropguards(control_connection_t *conn,
+                          uint32_t len,
+                          const char *body)
+{
+  smartlist_t *args;
+  (void) len; /* body is nul-terminated; it's safe to ignore the length */
+  args = smartlist_new();
+  smartlist_split_string(args, body, " ",
+                         SPLIT_SKIP_SPACE|SPLIT_IGNORE_BLANK, 0);
+
+  if (smartlist_len(args)) {
+    connection_printf_to_buf(conn, "512 Too many arguments to DROPGUARDS\r\n");
+  } else {
+    remove_all_entry_guards();
+    send_control_done(conn);
+  }
+
+  SMARTLIST_FOREACH(args, char *, cp, tor_free(cp));
+  smartlist_free(args);
+  return 0;
+}
+
 /** Called when <b>conn</b> has no more bytes left on its outbuf. */
 int
 connection_control_finished_flushing(control_connection_t *conn)
@@ -3440,6 +3464,9 @@ connection_control_process_inbuf(control_connection_t *conn)
   } else if (!strcasecmp(conn->incoming_cmd, "AUTHCHALLENGE")) {
     if (handle_control_authchallenge(conn, cmd_data_len, args))
       return -1;
+  } else if (!strcasecmp(conn->incoming_cmd, "DROPGUARDS")) {
+    if (handle_control_dropguards(conn, cmd_data_len, args))
+      return -1;
   } else {
     connection_printf_to_buf(conn, "510 Unrecognized command \"%s\"\r\n",
                              conn->incoming_cmd);
index b97b2ea39ecc2c7970fd1607907556d125aa2494..59cc9a3fc374ca8c0847d2f18530e898d2e30184 100644 (file)
@@ -598,6 +598,25 @@ remove_dead_entry_guards(time_t now)
   return changed ? 1 : 0;
 }
 
+/** Remove all currently listed entry guards. So new ones will be chosen. */
+void
+remove_all_entry_guards(void)
+{
+  char dbuf[HEX_DIGEST_LEN+1];
+
+  while (smartlist_len(entry_guards)) {
+    entry_guard_t *entry = smartlist_get(entry_guards, 0);
+    base16_encode(dbuf, sizeof(dbuf), entry->identity, DIGEST_LEN);
+    log_info(LD_CIRC, "Entry guard '%s' (%s) has been dropped.",
+             entry->nickname, dbuf);
+    control_event_guard(entry->nickname, entry->identity, "DROPPED");
+    entry_guard_free(entry);
+    smartlist_del(entry_guards, 0);
+  }
+  log_entry_guards(LOG_INFO);
+  entry_guards_changed();
+}
+
 /** A new directory or router-status has arrived; update the down/listed
  * status of the entry guards.
  *
index 533f2027aa95be2d5020986a5bfd1550d3e26288..1f8cff75a2cdab7b93608316ae704dc0d7a021dd 100644 (file)
@@ -77,6 +77,8 @@ int num_live_entry_guards(int for_directory);
 
 #endif
 
+void remove_all_entry_guards(void);
+
 void entry_guards_compute_status(const or_options_t *options, time_t now);
 int entry_guard_register_connect_status(const char *digest, int succeeded,
                                         int mark_relay_status, time_t now);