config.c 199 KB
Newer Older
Roger Dingledine's avatar
Roger Dingledine committed
1
2
/* Copyright (c) 2001 Matej Pfajfar.
 * Copyright (c) 2001-2004, Roger Dingledine.
3
 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
4
 * Copyright (c) 2007-2012, The Tor Project, Inc. */
5
/* See LICENSE for licensing information */
6

Nick Mathewson's avatar
Nick Mathewson committed
7
/**
8
9
 * \file config.c
 * \brief Code to parse and interpret configuration files.
Nick Mathewson's avatar
Nick Mathewson committed
10
11
 **/

12
13
#define CONFIG_PRIVATE

Roger Dingledine's avatar
Roger Dingledine committed
14
#include "or.h"
15
#include "addressmap.h"
16
#include "channel.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
17
#include "circuitbuild.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
18
#include "circuitlist.h"
19
20
#include "circuitmux.h"
#include "circuitmux_ewma.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
21
#include "config.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
22
#include "connection.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
23
#include "connection_edge.h"
24
#include "connection_or.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
25
#include "control.h"
26
#include "confparse.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
27
#include "cpuworker.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
28
#include "dirserv.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
29
#include "dirvote.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
30
#include "dns.h"
31
#include "entrynodes.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
32
#include "geoip.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
33
#include "hibernate.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
34
#include "main.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
35
#include "networkstatus.h"
36
#include "nodelist.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
37
#include "policies.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
38
#include "relay.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
39
#include "rendclient.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
40
#include "rendservice.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
41
#include "rephist.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
42
#include "router.h"
43
#include "util.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
44
#include "routerlist.h"
45
#include "routerset.h"
46
#include "statefile.h"
47
#include "transports.h"
48
#ifdef _WIN32
49
50
#include <shlobj.h>
#endif
Roger Dingledine's avatar
Roger Dingledine committed
51

52
53
54
55
56
#include "procmon.h"

/* From main.c */
extern int quiet_level;

57
58
/** A list of abbreviations and aliases to map command-line options, obsolete
 * option names, or alternative option names, to their current values. */
59
static config_abbrev_t option_abbrevs_[] = {
60
61
62
63
  PLURAL(AuthDirBadDirCC),
  PLURAL(AuthDirBadExitCC),
  PLURAL(AuthDirInvalidCC),
  PLURAL(AuthDirRejectCC),
64
  PLURAL(ExitNode),
65
  PLURAL(EntryNode),
66
67
  PLURAL(ExcludeNode),
  PLURAL(FirewallPort),
68
  PLURAL(LongLivedPort),
69
70
  PLURAL(HiddenServiceNode),
  PLURAL(HiddenServiceExcludeNode),
71
  PLURAL(NumCPU),
72
73
  PLURAL(RendNode),
  PLURAL(RendExcludeNode),
74
75
  PLURAL(StrictEntryNode),
  PLURAL(StrictExitNode),
76
  PLURAL(StrictNode),
77
  { "l", "Log", 1, 0},
78
  { "AllowUnverifiedNodes", "AllowInvalidNodes", 0, 0},
79
80
  { "AutomapHostSuffixes", "AutomapHostsSuffixes", 0, 0},
  { "AutomapHostOnResolve", "AutomapHostsOnResolve", 0, 0},
81
82
83
84
  { "BandwidthRateBytes", "BandwidthRate", 0, 0},
  { "BandwidthBurstBytes", "BandwidthBurst", 0, 0},
  { "DirFetchPostPeriod", "StatusFetchPeriod", 0, 0},
  { "MaxConn", "ConnLimit", 0, 1},
85
86
87
  { "ORBindAddress", "ORListenAddress", 0, 0},
  { "DirBindAddress", "DirListenAddress", 0, 0},
  { "SocksBindAddress", "SocksListenAddress", 0, 0},
88
89
90
91
  { "UseHelperNodes", "UseEntryGuards", 0, 0},
  { "NumHelperNodes", "NumEntryGuards", 0, 0},
  { "UseEntryNodes", "UseEntryGuards", 0, 0},
  { "NumEntryNodes", "NumEntryGuards", 0, 0},
92
93
  { "ResolvConf", "ServerDNSResolvConfFile", 0, 1},
  { "SearchDomains", "ServerDNSSearchDomains", 0, 1},
94
  { "ServerDNSAllowBrokenResolvConf", "ServerDNSAllowBrokenConfig", 0, 0},
95
  { "PreferTunnelledDirConns", "PreferTunneledDirConns", 0, 0},
96
  { "BridgeAuthoritativeDirectory", "BridgeAuthoritativeDir", 0, 0},
97
  { "HashedControlPassword", "__HashedControlSessionPassword", 1, 0},
98
99
  { "StrictEntryNodes", "StrictNodes", 0, 1},
  { "StrictExitNodes", "StrictNodes", 0, 1},
100
  { "_UseFilteringSSLBufferevents", "UseFilteringSSLBufferevents", 0, 1},
101
102
  { NULL, NULL, 0, 0},
};
103

Nick Mathewson's avatar
Nick Mathewson committed
104
105
106
107
/** An entry for config_vars: "The option <b>name</b> has type
 * CONFIG_TYPE_<b>conftype</b>, and corresponds to
 * or_options_t.<b>member</b>"
 */
108
109
#define VAR(name,conftype,member,initvalue)                             \
  { name, CONFIG_TYPE_ ## conftype, STRUCT_OFFSET(or_options_t, member), \
110
      initvalue }
111
112
113
/** As VAR, but the option name and member name are the same. */
#define V(member,conftype,initvalue)                                    \
  VAR(#member, conftype, member, initvalue)
Nick Mathewson's avatar
Nick Mathewson committed
114
/** An entry for config_vars: "The option <b>name</b> is obsolete." */
115
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL }
116

117
118
119
#define VPORT(member,conftype,initvalue)                                    \
  VAR(#member, conftype, member ## _lines, initvalue)

Nick Mathewson's avatar
Nick Mathewson committed
120
121
122
123
/** Array of configuration options.  Until we disallow nonstandard
 * abbreviations, order is significant, since the first matching option will
 * be chosen first.
 */
124
static config_var_t option_vars_[] = {
125
  OBSOLETE("AccountingMaxKB"),
126
127
128
  V(AccountingMax,               MEMUNIT,  "0 bytes"),
  V(AccountingStart,             STRING,   NULL),
  V(Address,                     STRING,   NULL),
129
  V(AllowDotExit,                BOOL,     "0"),
130
131
  V(AllowInvalidNodes,           CSV,      "middle,rendezvous"),
  V(AllowNonRFC953Hostnames,     BOOL,     "0"),
132
133
  V(AllowSingleHopCircuits,      BOOL,     "0"),
  V(AllowSingleHopExits,         BOOL,     "0"),
134
135
136
  V(AlternateBridgeAuthority,    LINELIST, NULL),
  V(AlternateDirAuthority,       LINELIST, NULL),
  V(AlternateHSAuthority,        LINELIST, NULL),
137
  V(AssumeReachable,             BOOL,     "0"),
138
  V(AuthDirBadDir,               LINELIST, NULL),
139
  V(AuthDirBadDirCCs,            CSV,      ""),
140
  V(AuthDirBadExit,              LINELIST, NULL),
141
  V(AuthDirBadExitCCs,           CSV,      ""),
142
  V(AuthDirInvalid,              LINELIST, NULL),
143
  V(AuthDirInvalidCCs,           CSV,      ""),
144
  V(AuthDirFastGuarantee,        MEMUNIT,  "100 KB"),
145
  V(AuthDirGuardBWGuarantee,     MEMUNIT,  "250 KB"),
146
  V(AuthDirReject,               LINELIST, NULL),
147
  V(AuthDirRejectCCs,            CSV,      ""),
148
  V(AuthDirRejectUnlisted,       BOOL,     "0"),
149
  V(AuthDirListBadDirs,          BOOL,     "0"),
150
  V(AuthDirListBadExits,         BOOL,     "0"),
151
152
  V(AuthDirMaxServersPerAddr,    UINT,     "2"),
  V(AuthDirMaxServersPerAuthAddr,UINT,     "5"),
153
  V(AuthDirHasIPv6Connectivity,  BOOL,     "0"),
154
155
156
157
  VAR("AuthoritativeDirectory",  BOOL, AuthoritativeDir,    "0"),
  V(AutomapHostsOnResolve,       BOOL,     "0"),
  V(AutomapHostsSuffixes,        CSV,      ".onion,.exit"),
  V(AvoidDiskWrites,             BOOL,     "0"),
158
159
  V(BandwidthBurst,              MEMUNIT,  "1 GB"),
  V(BandwidthRate,               MEMUNIT,  "1 GB"),
160
161
  V(BridgeAuthoritativeDir,      BOOL,     "0"),
  VAR("Bridge",                  LINELIST, Bridges,    NULL),
162
  V(BridgePassword,              STRING,   NULL),
163
  V(BridgeRecordUsageByCountry,  BOOL,     "1"),
164
  V(BridgeRelay,                 BOOL,     "0"),
165
  V(CellStatistics,              BOOL,     "0"),
166
  V(LearnCircuitBuildTimeout,    BOOL,     "1"),
167
  V(CircuitBuildTimeout,         INTERVAL, "0"),
168
  V(CircuitIdleTimeout,          INTERVAL, "1 hour"),
169
  V(CircuitStreamTimeout,        INTERVAL, "0"),
170
  V(CircuitPriorityHalflife,     DOUBLE,  "-100.0"), /*negative:'Use default'*/
171
172
  V(ClientDNSRejectInternalAddresses, BOOL,"1"),
  V(ClientOnly,                  BOOL,     "0"),
173
  V(ClientPreferIPv6ORPort,      BOOL,     "0"),
174
  V(ClientRejectInternalAddresses, BOOL,   "1"),
175
  V(ClientTransportPlugin,       LINELIST, NULL),
176
  V(ClientUseIPv6,               BOOL,     "0"),
177
  V(ConsensusParams,             STRING,   NULL),
178
  V(ConnLimit,                   UINT,     "1000"),
179
  V(ConnDirectionStatistics,     BOOL,     "0"),
180
181
182
183
  V(ConstrainedSockets,          BOOL,     "0"),
  V(ConstrainedSockSize,         MEMUNIT,  "8192"),
  V(ContactInfo,                 STRING,   NULL),
  V(ControlListenAddress,        LINELIST, NULL),
184
  VPORT(ControlPort,                 LINELIST, NULL),
185
  V(ControlPortFileGroupReadable,BOOL,     "0"),
186
  V(ControlPortWriteToFile,      FILENAME, NULL),
187
  V(ControlSocket,               LINELIST, NULL),
188
  V(ControlSocketsGroupWritable, BOOL,     "0"),
189
190
191
  V(CookieAuthentication,        BOOL,     "0"),
  V(CookieAuthFileGroupReadable, BOOL,     "0"),
  V(CookieAuthFile,              STRING,   NULL),
192
  V(CountPrivateBandwidth,       BOOL,     "0"),
193
  V(DataDirectory,               FILENAME, NULL),
194
  OBSOLETE("DebugLogFile"),
195
  V(DisableNetwork,              BOOL,     "0"),
196
  V(DirAllowPrivateAddresses,    BOOL,     "0"),
197
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "30 minutes"),
198
  V(DirListenAddress,            LINELIST, NULL),
199
  OBSOLETE("DirFetchPeriod"),
200
  V(DirPolicy,                   LINELIST, NULL),
201
  VPORT(DirPort,                     LINELIST, NULL),
202
  V(DirPortFrontPage,            FILENAME, NULL),
203
  OBSOLETE("DirPostPeriod"),
204
205
206
207
  OBSOLETE("DirRecordUsageByCountry"),
  OBSOLETE("DirRecordUsageGranularity"),
  OBSOLETE("DirRecordUsageRetainIPs"),
  OBSOLETE("DirRecordUsageSaveInterval"),
208
  V(DirReqStatistics,            BOOL,     "1"),
209
  VAR("DirServer",               LINELIST, DirServers, NULL),
210
  V(DisableAllSwap,              BOOL,     "0"),
211
  V(DisableDebuggerAttachment,   BOOL,     "1"),
212
  V(DisableIOCP,                 BOOL,     "1"),
213
  V(DynamicDHGroups,             BOOL,     "0"),
214
  VPORT(DNSPort,                     LINELIST, NULL),
215
216
217
  V(DNSListenAddress,            LINELIST, NULL),
  V(DownloadExtraInfo,           BOOL,     "0"),
  V(EnforceDistinctSubnets,      BOOL,     "1"),
218
  V(EntryNodes,                  ROUTERSET,   NULL),
219
  V(EntryStatistics,             BOOL,     "0"),
220
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "10 minutes"),
221
222
  V(ExcludeNodes,                ROUTERSET, NULL),
  V(ExcludeExitNodes,            ROUTERSET, NULL),
223
  V(ExcludeSingleHopRelays,      BOOL,     "1"),
224
  V(ExitNodes,                   ROUTERSET, NULL),
225
226
  V(ExitPolicy,                  LINELIST, NULL),
  V(ExitPolicyRejectPrivate,     BOOL,     "1"),
227
  V(ExitPortStatistics,          BOOL,     "0"),
228
  V(ExtendAllowPrivateAddresses, BOOL,     "0"),
229
  V(ExtraInfoStatistics,         BOOL,     "1"),
230

valerino's avatar
valerino committed
231
232
233
#if defined (WINCE)
  V(FallbackNetworkstatusFile,   FILENAME, "fallback-consensus"),
#else
234
  V(FallbackNetworkstatusFile,   FILENAME,
235
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "fallback-consensus"),
valerino's avatar
valerino committed
236
#endif
237
238
239
  V(FascistFirewall,             BOOL,     "0"),
  V(FirewallPorts,               CSV,      ""),
  V(FastFirstHopPK,              BOOL,     "1"),
240
  V(FetchDirInfoEarly,           BOOL,     "0"),
241
  V(FetchDirInfoExtraEarly,      BOOL,     "0"),
242
243
244
  V(FetchServerDescriptors,      BOOL,     "1"),
  V(FetchHidServDescriptors,     BOOL,     "1"),
  V(FetchUselessDescriptors,     BOOL,     "0"),
245
  V(FetchV2Networkstatus,        BOOL,     "0"),
246
#ifdef _WIN32
247
  V(GeoIPFile,                   FILENAME, "<default>"),
nils's avatar
nils committed
248
  V(GeoIPv6File,                 FILENAME, "<default>"),
249
#else
250
251
  V(GeoIPFile,                   FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip"),
nils's avatar
nils committed
252
253
  V(GeoIPv6File,                 FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip6"),
254
#endif
255
  OBSOLETE("GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays"),
256
  OBSOLETE("Group"),
257
  V(HardwareAccel,               BOOL,     "0"),
258
  V(HeartbeatPeriod,             INTERVAL, "6 hours"),
259
260
  V(AccelName,                   STRING,   NULL),
  V(AccelDir,                    FILENAME, NULL),
261
  V(HashedControlPassword,       LINELIST, NULL),
262
  V(HidServDirectoryV2,          BOOL,     "1"),
Nick Mathewson's avatar
Nick Mathewson committed
263
  VAR("HiddenServiceDir",    LINELIST_S, RendConfigLines,    NULL),
264
265
  OBSOLETE("HiddenServiceExcludeNodes"),
  OBSOLETE("HiddenServiceNodes"),
Nick Mathewson's avatar
Nick Mathewson committed
266
267
  VAR("HiddenServiceOptions",LINELIST_V, RendConfigLines,    NULL),
  VAR("HiddenServicePort",   LINELIST_S, RendConfigLines,    NULL),
268
  VAR("HiddenServiceVersion",LINELIST_S, RendConfigLines,    NULL),
269
  VAR("HiddenServiceAuthorizeClient",LINELIST_S,RendConfigLines, NULL),
270
  V(HidServAuth,                 LINELIST, NULL),
271
  V(HSAuthoritativeDir,          BOOL,     "0"),
272
  OBSOLETE("HSAuthorityRecordStats"),
273
  V(CloseHSClientCircuitsImmediatelyOnTimeout, BOOL, "0"),
274
  V(CloseHSServiceRendCircuitsImmediatelyOnTimeout, BOOL, "0"),
275
276
277
278
  V(HTTPProxy,                   STRING,   NULL),
  V(HTTPProxyAuthenticator,      STRING,   NULL),
  V(HTTPSProxy,                  STRING,   NULL),
  V(HTTPSProxyAuthenticator,     STRING,   NULL),
279
  V(IPv6Exit,                    BOOL,     "0"),
280
  VAR("ServerTransportPlugin",   LINELIST, ServerTransportPlugin,  NULL),
281
  V(ServerTransportListenAddr,   LINELIST, NULL),
282
283
284
285
  V(Socks4Proxy,                 STRING,   NULL),
  V(Socks5Proxy,                 STRING,   NULL),
  V(Socks5ProxyUsername,         STRING,   NULL),
  V(Socks5ProxyPassword,         STRING,   NULL),
286
  OBSOLETE("IgnoreVersion"),
287
288
  V(KeepalivePeriod,             INTERVAL, "5 minutes"),
  VAR("Log",                     LINELIST, Logs,             NULL),
289
  V(LogMessageDomains,           BOOL,     "0"),
290
  OBSOLETE("LinkPadding"),
291
292
  OBSOLETE("LogLevel"),
  OBSOLETE("LogFile"),
293
  V(LogTimeGranularity,          MSEC_INTERVAL, "1 second"),
294
  V(LongLivedPorts,              CSV,
Nick Mathewson's avatar
Nick Mathewson committed
295
        "21,22,706,1863,5050,5190,5222,5223,6523,6667,6697,8300"),
296
297
298
  VAR("MapAddress",              LINELIST, AddressMap,           NULL),
  V(MaxAdvertisedBandwidth,      MEMUNIT,  "1 GB"),
  V(MaxCircuitDirtiness,         INTERVAL, "10 minutes"),
299
  V(MaxClientCircuitsPending,    UINT,     "32"),
300
  V(MaxOnionsPending,            UINT,     "100"),
301
  OBSOLETE("MonthlyAccountingStart"),
302
303
  V(MyFamily,                    STRING,   NULL),
  V(NewCircuitPeriod,            INTERVAL, "30 seconds"),
304
  VAR("NamingAuthoritativeDirectory",BOOL, NamingAuthoritativeDir, "0"),
305
  V(NATDListenAddress,           LINELIST, NULL),
306
  VPORT(NATDPort,                    LINELIST, NULL),
307
  V(Nickname,                    STRING,   NULL),
308
  V(WarnUnsafeSocks,              BOOL,     "1"),
Sebastian Hahn's avatar
Sebastian Hahn committed
309
  OBSOLETE("NoPublish"),
310
  VAR("NodeFamily",              LINELIST, NodeFamilies,         NULL),
311
  V(NumCPUs,                     UINT,     "0"),
312
313
  V(NumEntryGuards,              UINT,     "3"),
  V(ORListenAddress,             LINELIST, NULL),
314
  VPORT(ORPort,                      LINELIST, NULL),
315
  V(OutboundBindAddress,         LINELIST,   NULL),
316
317
318

  V(PathBiasCircThreshold,       INT,      "-1"),
  V(PathBiasNoticeRate,          DOUBLE,   "-1"),
319
320
  V(PathBiasWarnRate,            DOUBLE,   "-1"),
  V(PathBiasCritRate,            DOUBLE,   "-1"),
321
322
  V(PathBiasScaleThreshold,      INT,      "-1"),
  V(PathBiasScaleFactor,         INT,      "-1"),
323
324
  V(PathBiasMultFactor,          INT,      "-1"),
  V(PathBiasDropGuards,          BOOL,      "0"),
325

326
  OBSOLETE("PathlenCoinWeight"),
327
328
  V(PerConnBWBurst,              MEMUNIT,  "0"),
  V(PerConnBWRate,               MEMUNIT,  "0"),
329
  V(PidFile,                     STRING,   NULL),
330
  V(TestingTorNetwork,           BOOL,     "0"),
331
  V(OptimisticData,              AUTOBOOL, "auto"),
332
333
  V(PortForwarding,              BOOL,     "0"),
  V(PortForwardingHelper,        FILENAME, "tor-fw-helper"),
Roger Dingledine's avatar
Roger Dingledine committed
334
  V(PreferTunneledDirConns,      BOOL,     "1"),
335
  V(ProtocolWarnings,            BOOL,     "0"),
336
  V(PublishServerDescriptor,     CSV,      "1"),
337
338
339
340
341
342
343
  V(PublishHidServDescriptors,   BOOL,     "1"),
  V(ReachableAddresses,          LINELIST, NULL),
  V(ReachableDirAddresses,       LINELIST, NULL),
  V(ReachableORAddresses,        LINELIST, NULL),
  V(RecommendedVersions,         LINELIST, NULL),
  V(RecommendedClientVersions,   LINELIST, NULL),
  V(RecommendedServerVersions,   LINELIST, NULL),
344
  OBSOLETE("RedirectExit"),
345
  V(RefuseUnknownExits,          AUTOBOOL, "auto"),
346
  V(RejectPlaintextPorts,        CSV,      ""),
347
348
  V(RelayBandwidthBurst,         MEMUNIT,  "0"),
  V(RelayBandwidthRate,          MEMUNIT,  "0"),
349
350
  OBSOLETE("RendExcludeNodes"),
  OBSOLETE("RendNodes"),
351
352
  V(RendPostPeriod,              INTERVAL, "1 hour"),
  V(RephistTrackTime,            INTERVAL, "24 hours"),
353
  OBSOLETE("RouterFile"),
354
  V(RunAsDaemon,                 BOOL,     "0"),
355
356
//  V(RunTesting,                  BOOL,     "0"),
  OBSOLETE("RunTesting"), // currently unused
357
  V(SafeLogging,                 STRING,   "1"),
358
  V(SafeSocks,                   BOOL,     "0"),
359
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
360
361
  V(ServerDNSAllowNonRFC953Hostnames, BOOL,"0"),
  V(ServerDNSDetectHijacking,    BOOL,     "1"),
362
  V(ServerDNSRandomizeCase,      BOOL,     "1"),
363
364
365
  V(ServerDNSResolvConfFile,     STRING,   NULL),
  V(ServerDNSSearchDomains,      BOOL,     "0"),
  V(ServerDNSTestAddresses,      CSV,
366
      "www.google.com,www.mit.edu,www.yahoo.com,www.slashdot.org"),
367
368
369
  V(ShutdownWaitLength,          INTERVAL, "30 seconds"),
  V(SocksListenAddress,          LINELIST, NULL),
  V(SocksPolicy,                 LINELIST, NULL),
370
  VPORT(SocksPort,                   LINELIST, NULL),
371
  V(SocksTimeout,                INTERVAL, "2 minutes"),
372
  OBSOLETE("StatusFetchPeriod"),
373
  V(StrictNodes,                 BOOL,     "0"),
374
  OBSOLETE("SysLog"),
375
  V(TestSocks,                   BOOL,     "0"),
376
  OBSOLETE("TestVia"),
377
  V(TokenBucketRefillInterval,   MSEC_INTERVAL, "100 msec"),
378
  V(Tor2webMode,                 BOOL,     "0"),
379
380
  V(TrackHostExits,              CSV,      NULL),
  V(TrackHostExitsExpire,        INTERVAL, "30 minutes"),
381
  OBSOLETE("TrafficShaping"),
382
  V(TransListenAddress,          LINELIST, NULL),
383
  VPORT(TransPort,                   LINELIST, NULL),
Roger Dingledine's avatar
Roger Dingledine committed
384
  V(TunnelDirConns,              BOOL,     "1"),
385
  V(UpdateBridgesFromAuthority,  BOOL,     "0"),
386
  V(UseBridges,                  BOOL,     "0"),
387
  V(UseEntryGuards,              BOOL,     "1"),
388
  V(UseMicrodescriptors,         AUTOBOOL, "auto"),
389
  V(User,                        STRING,   NULL),
390
  V(UserspaceIOCPBuffers,        BOOL,     "0"),
391
  VAR("V1AuthoritativeDirectory",BOOL, V1AuthoritativeDir,   "0"),
392
  VAR("V2AuthoritativeDirectory",BOOL, V2AuthoritativeDir,   "0"),
393
  VAR("V3AuthoritativeDirectory",BOOL, V3AuthoritativeDir,   "0"),
394
395
396
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "30 minutes"),
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "5 minutes"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "5 minutes"),
397
398
399
400
  V(V3AuthVotingInterval,        INTERVAL, "1 hour"),
  V(V3AuthVoteDelay,             INTERVAL, "5 minutes"),
  V(V3AuthDistDelay,             INTERVAL, "5 minutes"),
  V(V3AuthNIntervalsValid,       UINT,     "3"),
401
  V(V3AuthUseLegacyKey,          BOOL,     "0"),
402
  V(V3BandwidthsFile,            FILENAME, NULL),
403
  VAR("VersioningAuthoritativeDirectory",BOOL,VersioningAuthoritativeDir, "0"),
404
  V(VirtualAddrNetwork,          STRING,   "127.192.0.0/10"),
405
  V(WarnPlaintextPorts,          CSV,      "23,109,110,143"),
406
  V(UseFilteringSSLBufferevents, BOOL,    "0"),
407
  VAR("__ReloadTorrcOnSIGHUP",   BOOL,  ReloadTorrcOnSIGHUP,      "1"),
408
409
410
  VAR("__AllDirActionsPrivate",  BOOL,  AllDirActionsPrivate,     "0"),
  VAR("__DisablePredictedCircuits",BOOL,DisablePredictedCircuits, "0"),
  VAR("__LeaveStreamsUnattached",BOOL,  LeaveStreamsUnattached,   "0"),
411
412
  VAR("__HashedControlSessionPassword", LINELIST, HashedControlSessionPassword,
      NULL),
413
  VAR("__OwningControllerProcess",STRING,OwningControllerProcess, NULL),
414
  V(MinUptimeHidServDirectoryV2, INTERVAL, "25 hours"),
415
  V(VoteOnHidServDirectoriesV2,  BOOL,     "1"),
416
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "0"),
417

418
  { NULL, CONFIG_TYPE_OBSOLETE, 0, NULL }
419
};
420

421
422
/** Override default values with these if the user sets the TestingTorNetwork
 * option. */
423
static const config_var_t testing_tor_network_defaults[] = {
424
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
425
426
427
428
429
430
  V(DirAllowPrivateAddresses,    BOOL,     "1"),
  V(EnforceDistinctSubnets,      BOOL,     "0"),
  V(AssumeReachable,             BOOL,     "1"),
  V(AuthDirMaxServersPerAddr,    UINT,     "0"),
  V(AuthDirMaxServersPerAuthAddr,UINT,     "0"),
  V(ClientDNSRejectInternalAddresses, BOOL,"0"),
431
  V(ClientRejectInternalAddresses, BOOL,   "0"),
432
  V(CountPrivateBandwidth,       BOOL,     "1"),
433
  V(ExitPolicyRejectPrivate,     BOOL,     "0"),
434
  V(ExtendAllowPrivateAddresses, BOOL,     "1"),
435
436
437
  V(V3AuthVotingInterval,        INTERVAL, "5 minutes"),
  V(V3AuthVoteDelay,             INTERVAL, "20 seconds"),
  V(V3AuthDistDelay,             INTERVAL, "20 seconds"),
438
439
440
441
442
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "5 minutes"),
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "20 seconds"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "20 seconds"),
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "0 minutes"),
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "0 minutes"),
443
  V(MinUptimeHidServDirectoryV2, INTERVAL, "0 minutes"),
444
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "1"),
445

446
447
  { NULL, CONFIG_TYPE_OBSOLETE, 0, NULL }
};
448

449
#undef VAR
450
#undef V
451
452
#undef OBSOLETE

453
#ifdef _WIN32
454
455
static char *get_windows_conf_root(void);
#endif
456
457
static int options_validate(or_options_t *old_options,
                            or_options_t *options,
458
                            int from_setconf, char **msg);
459
460
461
462
static int options_act_reversible(const or_options_t *old_options, char **msg);
static int options_act(const or_options_t *old_options);
static int options_transition_allowed(const or_options_t *old,
                                      const or_options_t *new,
463
                                      char **msg);
464
465
466
467
static int options_transition_affects_workers(
      const or_options_t *old_options, const or_options_t *new_options);
static int options_transition_affects_descriptor(
      const or_options_t *old_options, const or_options_t *new_options);
468
static int check_nickname_list(const char *lst, const char *name, char **msg);
469

470
static int parse_bridge_line(const char *line, int validate_only);
George Kadianakis's avatar
George Kadianakis committed
471
static int parse_client_transport_line(const char *line, int validate_only);
472
473

static int parse_server_transport_line(const char *line, int validate_only);
474
475
476
static char *get_bindaddr_from_transport_listen_line(const char *line,
                                                     const char *transport);

477
static int parse_dir_server_line(const char *line,
478
                                 dirinfo_type_t required_type,
479
                                 int validate_only);
480
static void port_cfg_free(port_cfg_t *port);
481
static int parse_ports(or_options_t *options, int validate_only,
482
                              char **msg_out, int *n_ports_out);
483
484
485
static int check_server_ports(const smartlist_t *ports,
                              const or_options_t *options);

486
static int validate_data_directory(or_options_t *options);
487
488
static int write_configuration_file(const char *fname,
                                    const or_options_t *options);
489
static int options_init_logs(or_options_t *options, int validate_only);
490

491
static void init_libevent(const or_options_t *options);
492
static int opt_streq(const char *s1, const char *s2);
493
494
static int parse_outbound_addresses(or_options_t *options, int validate_only,
                                    char **msg);
Linus Nordberg's avatar
Linus Nordberg committed
495
496
static void config_maybe_load_geoip_files_(const or_options_t *options,
                                           const or_options_t *old_options);
497

498
/** Magic value for or_options_t. */
499
500
#define OR_OPTIONS_MAGIC 9090909

501
/** Configuration format for or_options_t. */
502
static config_format_t options_format = {
503
504
  sizeof(or_options_t),
  OR_OPTIONS_MAGIC,
505
506
507
  STRUCT_OFFSET(or_options_t, magic_),
  option_abbrevs_,
  option_vars_,
508
  (validate_fn_t)options_validate,
509
  NULL
510
511
};

512
513
514
515
516
/*
 * Functions to read and write the global options pointer.
 */

/** Command-line and config-file options. */
517
static or_options_t *global_options = NULL;
518
519
/** The fallback options_t object; this is where we look for options not
 * in torrc before we fall back to Tor's defaults. */
520
static or_options_t *global_default_options = NULL;
Roger Dingledine's avatar
Roger Dingledine committed
521
/** Name of most recently read torrc file. */
522
static char *torrc_fname = NULL;
523
/** Name of the most recently read torrc-defaults file.*/
524
static char *torrc_defaults_fname;
525
526
/** Configuration Options set by command line. */
static config_line_t *global_cmdline_options = NULL;
Roger Dingledine's avatar
Roger Dingledine committed
527
/** Contents of most recently read DirPortFrontPage file. */
528
static char *global_dirfrontpagecontents = NULL;
529
530
/** List of port_cfg_t for all configured ports. */
static smartlist_t *configured_ports = NULL;
531
532
533
534
535
536
537

/** Return the contents of our frontpage string, or NULL if not configured. */
const char *
get_dirportfrontpage(void)
{
  return global_dirfrontpagecontents;
}
538

539
540
/** Return the currently configured options. */
or_options_t *
541
get_options_mutable(void)
542
{
543
544
545
  tor_assert(global_options);
  return global_options;
}
546

547
548
549
550
551
552
553
/** Returns the currently configured options */
const or_options_t *
get_options(void)
{
  return get_options_mutable();
}

554
555
/** Change the current global options to contain <b>new_val</b> instead of
 * their current value; take action based on the new value; free the old value
556
 * as necessary.  Returns 0 on success, -1 on failure.
557
 */
558
int
559
set_options(or_options_t *new_val, char **msg)
560
{
561
562
563
  int i;
  smartlist_t *elements;
  config_line_t *line;
564
  or_options_t *old_options = global_options;
565
  global_options = new_val;
566
567
  /* Note that we pass the *old* options below, for comparison. It
   * pulls the new options directly out of global_options. */
568
569
  if (options_act_reversible(old_options, msg)<0) {
    tor_assert(*msg);
570
571
572
    global_options = old_options;
    return -1;
  }
573
  if (options_act(old_options) < 0) { /* acting on the options failed. die. */
574
    log_err(LD_BUG,
Roger Dingledine's avatar
Roger Dingledine committed
575
            "Acting on config options left us in a broken state. Dying.");
576
577
    exit(1);
  }
578
579
  /* Issues a CONF_CHANGED event to notify controller of the change. If Tor is
   * just starting up then the old_options will be undefined. */
580
  if (old_options && old_options != global_options) {
581
    elements = smartlist_new();
582
    for (i=0; options_format.vars[i].name; ++i) {
583
584
      const config_var_t *var = &options_format.vars[i];
      const char *var_name = var->name;
585
586
587
588
      if (var->type == CONFIG_TYPE_LINELIST_S ||
          var->type == CONFIG_TYPE_OBSOLETE) {
        continue;
      }
589
590
591
      if (!config_is_same(&options_format, new_val, old_options, var_name)) {
        line = config_get_assigned_option(&options_format, new_val,
                                          var_name, 1);
592
593
594

        if (line) {
          for (; line; line = line->next) {
595
596
            smartlist_add(elements, line->key);
            smartlist_add(elements, line->value);
597
598
          }
        } else {
599
          smartlist_add(elements, (char*)options_format.vars[i].name);
600
          smartlist_add(elements, NULL);
601
602
603
        }
      }
    }
604
    control_event_conf_changed(elements);
605
606
    smartlist_free(elements);
  }
607
608
609

  if (old_options != global_options)
    config_free(&options_format, old_options);
610
611

  return 0;
612
613
}

614
extern const char tor_git_revision[]; /* from tor_main.c */
615

616
/** The version of this Tor process, as parsed. */
617
static char *the_tor_version = NULL;
Nick Mathewson's avatar
Nick Mathewson committed
618
619
/** A shorter version of this Tor process's version, for export in our router
 *  descriptor.  (Does not include the git version, if any.) */
620
static char *the_short_tor_version = NULL;
621

622
/** Return the current Tor version. */
623
624
625
const char *
get_version(void)
{
626
  if (the_tor_version == NULL) {
627
    if (strlen(tor_git_revision)) {
628
629
      tor_asprintf(&the_tor_version, "%s (git-%s)", get_short_version(),
                   tor_git_revision);
630
    } else {
631
      the_tor_version = tor_strdup(get_short_version());
632
633
    }
  }
634
  return the_tor_version;
635
636
}

637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
/** Return the current Tor version, without any git tag. */
const char *
get_short_version(void)
{

  if (the_short_tor_version == NULL) {
#ifdef TOR_BUILD_TAG
    tor_asprintf(&the_short_tor_version, "%s (%s)", VERSION, TOR_BUILD_TAG);
#else
    the_short_tor_version = tor_strdup(VERSION);
#endif
  }
  return the_short_tor_version;
}

652
653
654
655
656
/** Release additional memory allocated in options
 */
static void
or_options_free(or_options_t *options)
{
657
658
659
  if (!options)
    return;

660
  routerset_free(options->ExcludeExitNodesUnion_);
661
662
663
664
665
  if (options->NodeFamilySets) {
    SMARTLIST_FOREACH(options->NodeFamilySets, routerset_t *,
                      rs, routerset_free(rs));
    smartlist_free(options->NodeFamilySets);
  }
666
  tor_free(options->BridgePassword_AuthDigest_);
667
668
669
  config_free(&options_format, options);
}

670
671
/** Release all memory and resources held by global configuration structures.
 */
672
673
674
void
config_free_all(void)
{
675
676
  or_options_free(global_options);
  global_options = NULL;
677
678
  or_options_free(global_default_options);
  global_default_options = NULL;
679
680
681
682

  config_free_lines(global_cmdline_options);
  global_cmdline_options = NULL;

683
684
  if (configured_ports) {
    SMARTLIST_FOREACH(configured_ports,
685
                      port_cfg_t *, p, tor_free(p));
686
687
    smartlist_free(configured_ports);
    configured_ports = NULL;
688
689
  }

690
  tor_free(torrc_fname);
691
  tor_free(torrc_defaults_fname);
692
  tor_free(the_tor_version);
693
  tor_free(global_dirfrontpagecontents);
694
695
696

  tor_free(the_short_tor_version);
  tor_free(the_tor_version);
697
698
}

699
700
701
702
703
/** Make <b>address</b> -- a piece of information related to our operation as
 * a client -- safe to log according to the settings in options->SafeLogging,
 * and return it.
 *
 * (We return "[scrubbed]" if SafeLogging is "1", and address otherwise.)
704
705
 */
const char *
706
safe_str_client(const char *address)
707
{
708
  tor_assert(address);
709
  if (get_options()->SafeLogging_ == SAFELOG_SCRUB_ALL)
710
711
712
713
714
    return "[scrubbed]";
  else
    return address;
}

715
716
717
718
719
720
/** Make <b>address</b> -- a piece of information of unspecified sensitivity
 * -- safe to log according to the settings in options->SafeLogging, and
 * return it.
 *
 * (We return "[scrubbed]" if SafeLogging is anything besides "0", and address
 * otherwise.)
721
722
 */
const char *
723
724
safe_str(const char *address)
{
725
  tor_assert(address);
726
  if (get_options()->SafeLogging_ != SAFELOG_SCRUB_NONE)
727
728
729
730
731
    return "[scrubbed]";
  else
    return address;
}

732
/** Equivalent to escaped(safe_str_client(address)).  See reentrancy note on
733
734
 * escaped(): don't use this outside the main thread, or twice in the same
 * log statement. */
735
const char *
736
escaped_safe_str_client(const char *address)
737
{
738
  if (get_options()->SafeLogging_ == SAFELOG_SCRUB_ALL)
739
740
741
742
743
    return "[scrubbed]";
  else
    return escaped(address);
}

744
/** Equivalent to escaped(safe_str(address)).  See reentrancy note on
745
746
 * escaped(): don't use this outside the main thread, or twice in the same
 * log statement. */
747
748
749
const char *
escaped_safe_str(const char *address)
{
750
  if (get_options()->SafeLogging_ != SAFELOG_SCRUB_NONE)
751
752
753
754
755
    return "[scrubbed]";
  else
    return escaped(address);
}

756
757
/** Add the default directory authorities directly into the trusted dir list,
 * but only add them insofar as they share bits with <b>type</b>. */
758
static void
759
add_default_trusted_dir_authorities(dirinfo_type_t type)
760