2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
TC: A Tor control protocol (Version 1)
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
0. Scope
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
This document describes an implementation-specific protocol that is used
|
|
|
|
for other programs (such as frontend user-interfaces) to communicate with a
|
|
|
|
locally running Tor process. It is not part of the Tor onion routing
|
|
|
|
protocol.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
This protocol replaces version 0 of TC, which is now deprecated. For
|
|
|
|
reference, TC is described in "control-spec-v0.txt". Implementors are
|
|
|
|
recommended to avoid using TC directly, but instead to use a library that
|
2006-03-05 05:13:57 +00:00
|
|
|
can easily be updated to use the newer protocol. (Version 0 is used by Tor
|
|
|
|
versions 0.1.0.x; the protocol in this document only works with Tor
|
|
|
|
versions in the 0.1.1.x series and later.)
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2010-06-25 18:58:25 +00:00
|
|
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
|
|
|
|
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
|
|
|
|
"OPTIONAL" in this document are to be interpreted as described in
|
|
|
|
RFC 2119.
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
1. Protocol outline
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
TC is a bidirectional message-based protocol. It assumes an underlying
|
2005-06-18 01:34:28 +00:00
|
|
|
stream for communication between a controlling process (the "client"
|
|
|
|
or "controller") and a Tor process (or "server"). The stream may be
|
2011-05-10 02:32:55 +00:00
|
|
|
implemented via TCP, TLS-over-TCP, a Unix-domain socket, or so on,
|
2005-06-18 01:34:28 +00:00
|
|
|
but it must provide reliable in-order delivery. For security, the
|
2005-06-17 18:49:04 +00:00
|
|
|
stream should not be accessible by untrusted parties.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
In TC, the client and server send typed messages to each other over the
|
|
|
|
underlying stream. The client sends "commands" and the server sends
|
|
|
|
"replies".
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
By default, all messages from the server are in response to messages from
|
|
|
|
the client. Some client requests, however, will cause the server to send
|
|
|
|
messages to the client indefinitely far into the future. Such
|
2005-06-18 01:34:28 +00:00
|
|
|
"asynchronous" replies are marked as such.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Servers respond to messages in the order messages are received.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2011-06-29 22:04:16 +00:00
|
|
|
1.1. Forward-compatibility
|
|
|
|
|
|
|
|
This is an evolving protocol; new client and server behavior will be
|
|
|
|
allowed in future versions. To allow new backward-compatible client
|
|
|
|
on behalf of the client, we may add new commands and allow existing
|
|
|
|
commands to take new arguments in future versions. To allow new
|
|
|
|
backward-compatible server behavior, we note various places below
|
|
|
|
where servers speaking a future versions of this protocol may insert
|
|
|
|
new data, and note that clients should/must "tolerate" unexpected
|
|
|
|
elements in these places. There are two ways that we do this:
|
|
|
|
|
|
|
|
* Adding a new field to a message:
|
|
|
|
|
|
|
|
For example, we might say "This message has three space-separated
|
|
|
|
fields; clients MUST tolerate more fields." This means that a
|
|
|
|
client MUST NOT crash or otherwise fail to parse the message or
|
|
|
|
other subsequent messages when there are more than three fields, and
|
|
|
|
that it SHOULD function at least as well when more fields are
|
|
|
|
provided as it does when it only gets the fields it accepts. The
|
|
|
|
most obvious way to do this is by ignoring additional fields; the
|
|
|
|
next-most-obvious way is to report additional fields verbatim to the
|
|
|
|
user, perhaps as part of an expert UI.
|
|
|
|
|
|
|
|
* Adding a new possible value to a list of alternatives:
|
|
|
|
|
|
|
|
For example, we might say "This field will be OPEN, CLOSED, or
|
|
|
|
CONNECTED. Clients MUST tolerate unexpected values." This means
|
|
|
|
that a client MUST NOT crash or otherwise fail to parse the message
|
|
|
|
or other subsequent when there are unexpected values, and that the
|
|
|
|
client SHOULD try to handle the rest of the message as well as it
|
|
|
|
can. The most obvious way to do this is by pretending that each
|
|
|
|
list of alternatives has an additional "unrecognized value" element,
|
|
|
|
and mapping any unrecognized values to that element; the
|
|
|
|
next-most-obvious way is to create a separate "unrecognized value"
|
|
|
|
element for each unrecognized value.
|
|
|
|
|
|
|
|
Clients SHOULD NOT "tolerate" unrecognized alternatives by
|
|
|
|
pretending that the message containing them is absent. For example,
|
|
|
|
a stream closed for an unrecognized reason is nevertheless closed,
|
|
|
|
and should be reported as such.
|
|
|
|
|
2012-11-23 16:27:46 +00:00
|
|
|
(If some list of alternatives is given, and there isn't an explicit
|
|
|
|
statement that clients must tolerate unexpected values, clients still
|
|
|
|
must tolerate unexpected values. The only exception would be if there
|
|
|
|
were an explicit statement that no future values will ever be added.)
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
2. Message format
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
2.1. Description format
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2006-10-23 10:16:43 +00:00
|
|
|
The message formats listed below use ABNF as described in RFC 2234.
|
2005-06-17 18:49:04 +00:00
|
|
|
The protocol itself is loosely based on SMTP (see RFC 2821).
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2006-10-23 10:16:43 +00:00
|
|
|
We use the following nonterminals from RFC 2822: atom, qcontent
|
2005-02-18 18:34:37 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
We define the following general-use nonterminals:
|
2005-02-18 18:34:37 +00:00
|
|
|
|
2012-11-23 16:56:09 +00:00
|
|
|
QuotedString = DQUOTE *qcontent DQUOTE
|
2005-02-18 18:34:37 +00:00
|
|
|
|
2012-11-23 16:56:09 +00:00
|
|
|
There are explicitly no limits on line length. All 8-bit characters
|
|
|
|
are permitted unless explicitly disallowed. In QuotedStrings,
|
|
|
|
backslashes and quotes must be escaped; other characters need not be
|
|
|
|
escaped.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2007-08-29 19:02:33 +00:00
|
|
|
Wherever CRLF is specified to be accepted from the controller, Tor MAY also
|
|
|
|
accept LF. Tor, however, MUST NOT generate LF instead of CRLF.
|
|
|
|
Controllers SHOULD always send CRLF.
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
2.2. Commands from controller to Tor
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2011-08-28 23:37:49 +00:00
|
|
|
Command = Keyword OptArguments CRLF / "+" Keyword OptArguments CRLF CmdData
|
2005-06-17 18:49:04 +00:00
|
|
|
Keyword = 1*ALPHA
|
2011-08-28 23:37:49 +00:00
|
|
|
OptArguments = [ SP *(SP / VCHAR) ]
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2011-08-28 23:35:39 +00:00
|
|
|
A command is either a single line containing a Keyword and arguments, or a
|
|
|
|
multiline command whose initial keyword begins with +, and whose data
|
|
|
|
section ends with a single "." on a line of its own. (We use a special
|
|
|
|
character to distinguish multiline commands so that Tor can correctly parse
|
|
|
|
multi-line commands that it does not recognize.) Specific commands and
|
|
|
|
their arguments are described below in section 3.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
2.3. Replies from Tor to the controller
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2007-07-25 22:56:58 +00:00
|
|
|
Reply = SyncReply / AsyncReply
|
|
|
|
SyncReply = *(MidReplyLine / DataReplyLine) EndReplyLine
|
2007-07-29 04:03:25 +00:00
|
|
|
AsyncReply = *(MidReplyLine / DataReplyLine) EndReplyLine
|
2007-07-25 22:56:58 +00:00
|
|
|
|
|
|
|
MidReplyLine = StatusCode "-" ReplyLine
|
2012-10-01 15:24:15 +00:00
|
|
|
DataReplyLine = StatusCode "+" ReplyLine CmdData
|
2007-07-25 22:56:58 +00:00
|
|
|
EndReplyLine = StatusCode SP ReplyLine
|
|
|
|
ReplyLine = [ReplyText] CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
ReplyText = XXXX
|
2007-07-25 22:56:58 +00:00
|
|
|
StatusCode = 3DIGIT
|
2004-11-07 22:58:35 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Specific replies are mentioned below in section 3, and described more fully
|
|
|
|
in section 4.
|
2004-11-07 22:58:35 +00:00
|
|
|
|
2007-07-29 04:10:05 +00:00
|
|
|
[Compatibility note: versions of Tor before 0.2.0.3-alpha sometimes
|
|
|
|
generate AsyncReplies of the form "*(MidReplyLine / DataReplyLine)".
|
|
|
|
This is incorrect, but controllers that need to work with these
|
|
|
|
versions of Tor should be prepared to get multi-line AsyncReplies with
|
|
|
|
the final line (usually "650 OK") omitted.]
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
2.4. General-use tokens
|
2004-11-07 22:58:35 +00:00
|
|
|
|
2010-07-27 06:35:25 +00:00
|
|
|
; CRLF means, "the ASCII Carriage Return character (decimal value 13)
|
2010-03-05 22:00:13 +00:00
|
|
|
; followed by the ASCII Linefeed character (decimal value 10)."
|
|
|
|
CRLF = CR LF
|
|
|
|
|
2006-10-03 18:59:57 +00:00
|
|
|
; How a controller tells Tor about a particular OR. There are four
|
|
|
|
; possible formats:
|
2010-12-01 11:24:33 +00:00
|
|
|
; $Fingerprint -- The router whose identity key hashes to the fingerprint.
|
2006-10-03 18:59:57 +00:00
|
|
|
; This is the preferred way to refer to an OR.
|
2010-12-01 11:24:33 +00:00
|
|
|
; $Fingerprint~Nickname -- The router whose identity key hashes to the
|
|
|
|
; given fingerprint, but only if the router has the given nickname.
|
|
|
|
; $Fingerprint=Nickname -- The router whose identity key hashes to the
|
|
|
|
; given fingerprint, but only if the router is Named and has the given
|
2006-10-03 18:59:57 +00:00
|
|
|
; nickname.
|
2010-12-01 11:24:33 +00:00
|
|
|
; Nickname -- The Named router with the given nickname, or, if no such
|
2006-10-03 18:59:57 +00:00
|
|
|
; router exists, any router whose nickname matches the one given.
|
|
|
|
; This is not a safe way to refer to routers, since Named status
|
|
|
|
; could under some circumstances change over time.
|
2010-12-01 11:24:33 +00:00
|
|
|
;
|
|
|
|
; The tokens that implement the above follow:
|
|
|
|
|
2006-10-03 18:59:57 +00:00
|
|
|
ServerSpec = LongName / Nickname
|
2010-12-01 11:24:33 +00:00
|
|
|
LongName = Fingerprint [ ( "=" / "~" ) Nickname ]
|
|
|
|
|
|
|
|
Fingerprint = "$" 40*HEXDIG
|
|
|
|
NicknameChar = "a"-"z" / "A"-"Z" / "0" - "9"
|
|
|
|
Nickname = 1*19 NicknameChar
|
|
|
|
|
|
|
|
; What follows is an outdated way to refer to ORs.
|
|
|
|
; Feature VERBOSE_NAMES replaces ServerID with LongName in events and
|
|
|
|
; GETINFO results. VERBOSE_NAMES can be enabled starting in Tor version
|
|
|
|
; 0.1.2.2-alpha and it is always-on in 0.2.2.1-alpha and later.
|
|
|
|
ServerID = Nickname / Fingerprint
|
|
|
|
|
2006-10-03 18:59:57 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
; Unique identifiers for streams or circuits. Currently, Tor only
|
|
|
|
; uses digits, but this may change
|
|
|
|
StreamID = 1*16 IDChar
|
|
|
|
CircuitID = 1*16 IDChar
|
|
|
|
IDChar = ALPHA / DIGIT
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Address = ip4-address / ip6-address / hostname (XXXX Define these)
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2011-08-28 23:35:39 +00:00
|
|
|
; A "CmdData" section is a sequence of octets concluded by the terminating
|
2005-06-17 18:49:04 +00:00
|
|
|
; sequence CRLF "." CRLF. The terminating sequence may not appear in the
|
|
|
|
; body of the data. Leading periods on lines in the data are escaped with
|
2006-10-23 10:16:43 +00:00
|
|
|
; an additional leading period as in RFC 2821 section 4.5.2.
|
2011-08-28 23:35:39 +00:00
|
|
|
CmdData = *DataLine "." CRLF
|
2005-09-08 03:18:51 +00:00
|
|
|
DataLine = CRLF / "." 1*LineItem CRLF / NonDotItem *LineItem CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
LineItem = NonCR / 1*CR NonCRLF
|
|
|
|
NonDotItem = NonDotCR / 1*CR NonCRLF
|
2005-03-19 06:05:55 +00:00
|
|
|
|
2012-01-11 17:20:01 +00:00
|
|
|
; ISOTime, ISOTime2, and ISOTime2Frac are time formats as specified in
|
|
|
|
; ISO8601.
|
|
|
|
; example ISOTime: "2012-01-11 12:15:33"
|
|
|
|
; example ISOTime2: "2012-01-11T12:15:33"
|
|
|
|
; example ISOTime2Frac: "2012-01-11T12:15:33.51"
|
|
|
|
IsoDatePart = 4*DIGIT "-" 2*DIGIT "-" 2*DIGIT
|
|
|
|
IsoTimePart = 2*DIGIT ":" 2*DIGIT ":" 2*DIGIT
|
|
|
|
ISOTime = IsoDatePart " " IsoTimePart
|
|
|
|
ISOTime2 = IsoDatePart "T" IsoTimePart
|
|
|
|
ISOTime2Frac = IsoTime2 [ "." 1*DIGIT ]
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
3. Commands
|
2005-03-12 04:22:01 +00:00
|
|
|
|
2007-10-24 07:22:33 +00:00
|
|
|
All commands are case-insensitive, but most keywords are case-sensitive.
|
2004-11-03 01:32:26 +00:00
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
3.1. SETCONF
|
2004-11-07 22:58:35 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Change the value of one or more configuration variables. The syntax is:
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2008-01-07 18:54:55 +00:00
|
|
|
"SETCONF" 1*(SP keyword ["=" value]) CRLF
|
|
|
|
value = String / QuotedString
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Tor behaves as though it had just read each of the key-value pairs
|
|
|
|
from its configuration file. Keywords with no corresponding values have
|
2005-09-13 22:43:41 +00:00
|
|
|
their configuration values reset to 0 or NULL (use RESETCONF if you want
|
2005-09-13 22:36:11 +00:00
|
|
|
to set it back to its default). SETCONF is all-or-nothing: if there
|
|
|
|
is an error in any of the configuration settings, Tor sets none of them.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Tor responds with a "250 configuration values set" reply on success.
|
2005-11-17 22:01:24 +00:00
|
|
|
If some of the listed keywords can't be found, Tor replies with a
|
|
|
|
"552 Unrecognized option" message. Otherwise, Tor responds with a
|
|
|
|
"513 syntax error in configuration values" reply on syntax error, or a
|
|
|
|
"553 impossible configuration setting" reply on a semantic error.
|
2004-11-04 22:30:14 +00:00
|
|
|
|
2012-06-23 07:46:32 +00:00
|
|
|
Some configuration options (e.g. "Bridge") take multiple values. Also,
|
|
|
|
some configuration keys (e.g. for hidden services and for entry
|
|
|
|
guard lists) form a context-sensitive group where order matters (see
|
|
|
|
GETCONF below). In these cases, setting _any_ of the options in a
|
|
|
|
SETCONF command is taken to reset all of the others. For example,
|
2012-06-23 19:30:33 +00:00
|
|
|
if two ORListenAddress values are configured, and a SETCONF command
|
|
|
|
arrives containing a single ORListenAddress value, the new command's
|
2012-06-23 07:46:32 +00:00
|
|
|
value replaces the two old values.
|
2004-11-04 22:30:14 +00:00
|
|
|
|
2009-01-28 00:03:47 +00:00
|
|
|
Sometimes it is not possible to change configuration options solely by
|
2008-02-12 20:42:40 +00:00
|
|
|
issuing a series of SETCONF commands, because the value of one of the
|
|
|
|
configuration options depends on the value of another which has not yet
|
|
|
|
been set. Such situations can be overcome by setting multiple configuration
|
|
|
|
options with a single SETCONF command (e.g. SETCONF ORPort=443
|
|
|
|
ORListenAddress=9001).
|
|
|
|
|
2005-09-08 03:18:51 +00:00
|
|
|
3.2. RESETCONF
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-09-14 02:46:16 +00:00
|
|
|
Remove all settings for a given configuration option entirely, assign
|
|
|
|
its default value (if any), and then assign the String provided.
|
|
|
|
Typically the String is left empty, to simply set an option back to
|
|
|
|
its default. The syntax is:
|
2005-09-08 03:18:51 +00:00
|
|
|
|
2005-09-14 02:46:16 +00:00
|
|
|
"RESETCONF" 1*(SP keyword ["=" String]) CRLF
|
2005-09-08 03:18:51 +00:00
|
|
|
|
|
|
|
Otherwise it behaves like SETCONF above.
|
|
|
|
|
|
|
|
3.3. GETCONF
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
Request the value of a configuration variable. The syntax is:
|
|
|
|
|
|
|
|
"GETCONF" 1*(SP keyword) CRLF
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
If all of the listed keywords exist in the Tor configuration, Tor replies
|
|
|
|
with a series of reply lines of the form:
|
|
|
|
250 keyword=value
|
2005-06-19 23:22:34 +00:00
|
|
|
If any option is set to a 'default' value semantically different from an
|
|
|
|
empty string, Tor may reply with a reply line of the form:
|
|
|
|
250 keyword
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2008-01-07 18:54:55 +00:00
|
|
|
Value may be a raw value or a quoted string. Tor will try to use
|
|
|
|
unquoted values except when the value could be misinterpreted through
|
|
|
|
not being quoted.
|
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
If some of the listed keywords can't be found, Tor replies with a
|
2005-11-17 22:01:24 +00:00
|
|
|
"552 unknown configuration keyword" message.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2004-11-04 22:30:14 +00:00
|
|
|
If an option appears multiple times in the configuration, all of its
|
|
|
|
key-value pairs are returned in order.
|
|
|
|
|
|
|
|
Some options are context-sensitive, and depend on other options with
|
2004-11-07 22:36:43 +00:00
|
|
|
different keywords. These cannot be fetched directly. Currently there
|
|
|
|
is only one such option: clients should use the "HiddenServiceOptions"
|
|
|
|
virtual keyword to get all HiddenServiceDir, HiddenServicePort,
|
2011-05-24 15:11:32 +00:00
|
|
|
HiddenServiceVersion, and HiddenserviceAuthorizeClient option settings.
|
2004-11-04 22:30:14 +00:00
|
|
|
|
2005-09-08 03:18:51 +00:00
|
|
|
3.4. SETEVENTS
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Request the server to inform the client about interesting events. The
|
|
|
|
syntax is:
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-10-12 13:49:13 +00:00
|
|
|
"SETEVENTS" [SP "EXTENDED"] *(SP EventCode) CRLF
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
EventCode = "CIRC" / "STREAM" / "ORCONN" / "BW" / "DEBUG" /
|
2005-11-19 18:35:43 +00:00
|
|
|
"INFO" / "NOTICE" / "WARN" / "ERR" / "NEWDESC" / "ADDRMAP" /
|
2006-10-15 07:52:58 +00:00
|
|
|
"AUTHDIR_NEWDESCS" / "DESCCHANGED" / "STATUS_GENERAL" /
|
2009-01-21 03:24:27 +00:00
|
|
|
"STATUS_CLIENT" / "STATUS_SERVER" / "GUARD" / "NS" / "STREAM_BW" /
|
2011-06-26 14:32:51 +00:00
|
|
|
"CLIENTS_SEEN" / "NEWCONSENSUS" / "BUILDTIMEOUT_SET" / "SIGNAL" /
|
2012-01-11 17:20:29 +00:00
|
|
|
"CONF_CHANGED" / "CIRC_MINOR"
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Any events *not* listed in the SETEVENTS line are turned off; thus, sending
|
|
|
|
SETEVENTS with an empty body turns off all event reporting.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
The server responds with a "250 OK" reply on success, and a "552
|
|
|
|
Unrecognized event" reply if one of the event codes isn't recognized. (On
|
|
|
|
error, the list of active event codes isn't changed.)
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-10-12 13:49:13 +00:00
|
|
|
If the flag string "EXTENDED" is provided, Tor may provide extra
|
|
|
|
information with events for this connection; see 4.1 for more information.
|
|
|
|
NOTE: All events on a given connection will be provided in extended format,
|
|
|
|
or none.
|
2011-06-29 22:04:16 +00:00
|
|
|
NOTE: "EXTENDED" was first supported in Tor 0.1.1.9-alpha; it is
|
|
|
|
always-on in Tor 0.2.2.1-alpha and later.
|
2005-10-12 13:49:13 +00:00
|
|
|
|
2006-10-08 23:24:26 +00:00
|
|
|
Each event is described in more detail in Section 4.1.
|
2006-09-15 06:06:09 +00:00
|
|
|
|
2005-09-08 03:18:51 +00:00
|
|
|
3.5. AUTHENTICATE
|
2005-04-05 22:56:17 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The syntax is:
|
2011-08-10 17:07:25 +00:00
|
|
|
"AUTHENTICATE" [ SP 1*HEXDIG / QuotedString ] CRLF
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
The server responds with "250 OK" on success or "515 Bad authentication" if
|
2007-08-02 21:04:00 +00:00
|
|
|
the authentication cookie is incorrect. Tor closes the connection on an
|
|
|
|
authentication failure.
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2011-08-10 16:58:42 +00:00
|
|
|
The authentication token can be specified as either a quoted ASCII string,
|
|
|
|
or as an unquoted hexadecimal encoding of that same string (to avoid escaping
|
|
|
|
issues).
|
|
|
|
|
|
|
|
For information on how the implementation securely stores authentication
|
|
|
|
information on disk, see section 5.1.
|
2005-04-05 22:56:17 +00:00
|
|
|
|
2012-02-05 12:02:23 +00:00
|
|
|
Before the client has authenticated, no command other than
|
|
|
|
PROTOCOLINFO, AUTHCHALLENGE, AUTHENTICATE, or QUIT is valid. If the
|
|
|
|
controller sends any other command, or sends a malformed command, or
|
|
|
|
sends an unsuccessful AUTHENTICATE command, or sends PROTOCOLINFO or
|
|
|
|
AUTHCHALLENGE more than once, Tor sends an error reply and closes
|
|
|
|
the connection.
|
2007-08-02 21:04:00 +00:00
|
|
|
|
2009-01-08 14:07:05 +00:00
|
|
|
To prevent some cross-protocol attacks, the AUTHENTICATE command is still
|
|
|
|
required even if all authentication methods in Tor are disabled. In this
|
|
|
|
case, the controller should just send "AUTHENTICATE" CRLF.
|
|
|
|
|
2007-08-02 21:04:00 +00:00
|
|
|
(Versions of Tor before 0.1.2.16 and 0.2.0.4-alpha did not close the
|
|
|
|
connection after an authentication failure.)
|
2005-04-05 22:56:17 +00:00
|
|
|
|
2005-09-08 03:18:51 +00:00
|
|
|
3.6. SAVECONF
|
2005-04-05 22:56:17 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The syntax is:
|
|
|
|
"SAVECONF" CRLF
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Instructs the server to write out its config options into its torrc. Server
|
2005-06-18 01:34:28 +00:00
|
|
|
returns "250 OK" if successful, or "551 Unable to write configuration
|
|
|
|
to disk" if it can't write the file or some other error occurs.
|
2005-06-05 14:10:48 +00:00
|
|
|
|
2009-12-14 00:21:06 +00:00
|
|
|
See also the "getinfo config-text" command, if the controller wants
|
|
|
|
to write the torrc file itself.
|
|
|
|
|
2005-09-08 03:18:51 +00:00
|
|
|
3.7. SIGNAL
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The syntax is:
|
2004-11-07 22:36:43 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
"SIGNAL" SP Signal CRLF
|
2004-11-07 22:36:43 +00:00
|
|
|
|
2005-06-18 01:49:03 +00:00
|
|
|
Signal = "RELOAD" / "SHUTDOWN" / "DUMP" / "DEBUG" / "HALT" /
|
2006-10-25 21:46:21 +00:00
|
|
|
"HUP" / "INT" / "USR1" / "USR2" / "TERM" / "NEWNYM" /
|
|
|
|
"CLEARDNSCACHE"
|
2004-12-17 22:14:58 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
The meaning of the signals are:
|
2004-12-17 22:14:58 +00:00
|
|
|
|
2011-09-20 15:01:10 +00:00
|
|
|
RELOAD -- Reload: reload config items. (like HUP)
|
2005-06-17 18:49:04 +00:00
|
|
|
SHUTDOWN -- Controlled shutdown: if server is an OP, exit immediately.
|
2011-09-20 15:01:10 +00:00
|
|
|
If it's an OR, close listeners and exit after
|
|
|
|
ShutdownWaitLength seconds. (like INT)
|
2005-06-17 18:49:04 +00:00
|
|
|
DUMP -- Dump stats: log information about open connections and
|
2005-06-18 01:34:28 +00:00
|
|
|
circuits. (like USR1)
|
|
|
|
DEBUG -- Debug: switch all open logs to loglevel debug. (like USR2)
|
2005-06-18 01:49:03 +00:00
|
|
|
HALT -- Immediate shutdown: clean up and exit now. (like TERM)
|
2006-10-25 21:46:21 +00:00
|
|
|
CLEARDNSCACHE -- Forget the client-side cached IPs for all hostnames.
|
2006-03-09 00:16:44 +00:00
|
|
|
NEWNYM -- Switch to clean circuits, so new application requests
|
2006-10-25 21:46:21 +00:00
|
|
|
don't share any circuits with old ones. Also clears
|
2007-02-22 06:21:19 +00:00
|
|
|
the client-side DNS cache. (Tor MAY rate-limit its
|
|
|
|
response to this signal.)
|
2004-12-17 22:14:58 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
The server responds with "250 OK" if the signal is recognized (or simply
|
|
|
|
closes the socket if it was asked to close immediately), or "552
|
|
|
|
Unrecognized signal" if the signal is unrecognized.
|
2004-12-17 22:14:58 +00:00
|
|
|
|
2005-09-08 03:18:51 +00:00
|
|
|
3.8. MAPADDRESS
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The syntax is:
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
"MAPADDRESS" 1*(Address "=" Address SP) CRLF
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
The first address in each pair is an "original" address; the second is a
|
|
|
|
"replacement" address. The client sends this message to the server in
|
|
|
|
order to tell it that future SOCKS requests for connections to the original
|
|
|
|
address should be replaced with connections to the specified replacement
|
|
|
|
address. If the addresses are well-formed, and the server is able to
|
|
|
|
fulfill the request, the server replies with a 250 message:
|
|
|
|
250-OldAddress1=NewAddress1
|
|
|
|
250 OldAddress2=NewAddress2
|
|
|
|
|
2006-02-09 03:44:49 +00:00
|
|
|
containing the source and destination addresses. If request is
|
|
|
|
malformed, the server replies with "512 syntax error in command
|
|
|
|
argument". If the server can't fulfill the request, it replies with
|
2006-04-03 02:36:47 +00:00
|
|
|
"451 resource exhausted".
|
2005-01-06 02:02:18 +00:00
|
|
|
|
|
|
|
The client may decline to provide a body for the original address, and
|
2005-02-23 06:58:18 +00:00
|
|
|
instead send a special null address ("0.0.0.0" for IPv4, "::0" for IPv6, or
|
|
|
|
"." for hostname), signifying that the server should choose the original
|
2005-06-17 18:49:04 +00:00
|
|
|
address itself, and return that address in the reply. The server
|
2005-02-23 06:58:18 +00:00
|
|
|
should ensure that it returns an element of address space that is unlikely
|
|
|
|
to be in actual use. If there is already an address mapped to the
|
|
|
|
destination address, the server may reuse that mapping.
|
2005-01-06 02:02:18 +00:00
|
|
|
|
|
|
|
If the original address is already mapped to a different address, the old
|
|
|
|
mapping is removed. If the original address and the destination address
|
|
|
|
are the same, the server removes any mapping in place for the original
|
|
|
|
address.
|
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Example:
|
2007-10-29 01:08:22 +00:00
|
|
|
C: MAPADDRESS 0.0.0.0=torproject.org 1.2.3.4=tor.freehaven.net
|
|
|
|
S: 250-127.192.10.10=torproject.org
|
2005-06-17 18:49:04 +00:00
|
|
|
S: 250 1.2.3.4=tor.freehaven.net
|
|
|
|
|
2005-01-06 02:02:18 +00:00
|
|
|
{Note: This feature is designed to be used to help Tor-ify applications
|
|
|
|
that need to use SOCKS4 or hostname-less SOCKS5. There are three
|
|
|
|
approaches to doing this:
|
|
|
|
1. Somehow make them use SOCKS4a or SOCKS5-with-hostnames instead.
|
|
|
|
2. Use tor-resolve (or another interface to Tor's resolve-over-SOCKS
|
|
|
|
feature) to resolve the hostname remotely. This doesn't work
|
|
|
|
with special addresses like x.onion or x.y.exit.
|
|
|
|
3. Use MAPADDRESS to map an IP address to the desired hostname, and then
|
|
|
|
arrange to fool the application into thinking that the hostname
|
|
|
|
has resolved to that IP.
|
|
|
|
This functionality is designed to help implement the 3rd approach.}
|
|
|
|
|
2005-06-18 01:34:28 +00:00
|
|
|
Mappings set by the controller last until the Tor process exits:
|
|
|
|
they never expire. If the controller wants the mapping to last only
|
|
|
|
a certain time, then it must explicitly un-map the address when that
|
|
|
|
time has elapsed.
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2005-09-08 03:18:51 +00:00
|
|
|
3.9. GETINFO
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The syntax is as for GETCONF:
|
|
|
|
"GETINFO" 1*(SP keyword) CRLF
|
2005-02-18 18:34:37 +00:00
|
|
|
one or more NL-terminated strings. The server replies with an INFOVALUE
|
2006-04-02 07:54:34 +00:00
|
|
|
message, or a 551 or 552 error.
|
2005-02-18 18:34:37 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Unlike GETCONF, this message is used for data that are not stored in the Tor
|
|
|
|
configuration file, and that may be longer than a single line. On success,
|
|
|
|
one ReplyLine is sent for each requested value, followed by a final 250 OK
|
|
|
|
ReplyLine. If a value fits on a single line, the format is:
|
|
|
|
250-keyword=value
|
2005-08-22 20:05:41 +00:00
|
|
|
If a value must be split over multiple lines, the format is:
|
2005-06-17 18:49:04 +00:00
|
|
|
250+keyword=
|
|
|
|
value
|
|
|
|
.
|
2005-08-22 20:05:41 +00:00
|
|
|
Recognized keys and their values include:
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2005-02-18 18:34:37 +00:00
|
|
|
"version" -- The version of the server's software, including the name
|
|
|
|
of the software. (example: "Tor 0.0.9.4")
|
|
|
|
|
2005-08-10 18:05:20 +00:00
|
|
|
"config-file" -- The location of Tor's configuration file ("torrc").
|
|
|
|
|
2012-11-23 17:08:55 +00:00
|
|
|
"config-defaults-file" -- The location of Tor's configuration
|
|
|
|
defaults file ("torrc.defaults"). This file gets parsed before
|
|
|
|
torrc, and is typically used to replace Tor's default
|
|
|
|
configuration values.
|
|
|
|
|
2009-12-14 00:21:06 +00:00
|
|
|
"config-text" -- The contents that Tor would write if you send it
|
|
|
|
a SAVECONF command, so the controller can write the file to
|
|
|
|
disk itself. [First implemented in 0.2.2.7-alpha.]
|
|
|
|
|
2006-06-13 09:16:09 +00:00
|
|
|
["exit-policy/prepend" -- The default exit policy lines that Tor will
|
|
|
|
*prepend* to the ExitPolicy config option.
|
|
|
|
-- Never implemented. Useful?]
|
|
|
|
|
|
|
|
"exit-policy/default" -- The default exit policy lines that Tor will
|
|
|
|
*append* to the ExitPolicy config option.
|
|
|
|
|
2006-04-09 23:48:12 +00:00
|
|
|
"desc/id/<OR identity>" or "desc/name/<OR nickname>" -- the latest
|
2012-11-23 15:39:07 +00:00
|
|
|
server descriptor for a given OR. (Note that modern Tor clients
|
|
|
|
do not download server descriptors by default, but download
|
|
|
|
microdescriptors instead. If microdescriptors are enabled, you'll
|
|
|
|
need to use md/* instead.)
|
2005-02-18 18:34:37 +00:00
|
|
|
|
2011-11-08 18:58:12 +00:00
|
|
|
"md/id/<OR identity>" or "md/name/<OR nickname>" -- the latest
|
|
|
|
microdescriptor for a given OR. [First implemented in
|
|
|
|
0.2.3.8-alpha.]
|
|
|
|
|
2012-05-30 20:47:35 +00:00
|
|
|
"dormant" -- A nonnegative integer: zero if Tor is currently active and
|
|
|
|
building circuits, and nonzero if Tor has gone idle due to lack of use
|
|
|
|
or some similar reason. [First implemented in 0.2.3.16-alpha]
|
|
|
|
|
2007-12-06 07:15:06 +00:00
|
|
|
"desc-annotations/id/<OR identity>" -- outputs the annotations string
|
|
|
|
(source, timestamp of arrival, purpose, etc) for the corresponding
|
|
|
|
descriptor. [First implemented in 0.2.0.13-alpha.]
|
|
|
|
|
2007-08-24 14:41:15 +00:00
|
|
|
"extra-info/digest/<digest>" -- the extrainfo document whose digest (in
|
|
|
|
hex) is <digest>. Only available if we're downloading extra-info
|
|
|
|
documents.
|
|
|
|
|
2007-12-18 22:39:15 +00:00
|
|
|
"ns/id/<OR identity>" or "ns/name/<OR nickname>" -- the latest router
|
|
|
|
status info (v2 directory style) for a given OR. Router status
|
|
|
|
info is as given in
|
2006-10-20 14:58:29 +00:00
|
|
|
dir-spec.txt, and reflects the current beliefs of this Tor about the
|
2006-10-20 19:11:12 +00:00
|
|
|
router in question. Like directory clients, controllers MUST
|
|
|
|
tolerate unrecognized flags and lines. The published date and
|
|
|
|
descriptor digest are those believed to be best by this Tor,
|
|
|
|
not necessarily those for a descriptor that Tor currently has.
|
|
|
|
[First implemented in 0.1.2.3-alpha.]
|
2006-10-20 14:58:29 +00:00
|
|
|
|
2007-12-18 22:39:15 +00:00
|
|
|
"ns/all" -- Router status info (v2 directory style) for all ORs we
|
2007-05-04 07:22:11 +00:00
|
|
|
have an opinion about, joined by newlines. [First implemented
|
|
|
|
in 0.1.2.3-alpha.]
|
2006-10-20 14:58:29 +00:00
|
|
|
|
2007-12-18 22:39:15 +00:00
|
|
|
"ns/purpose/<purpose>" -- Router status info (v2 directory style)
|
|
|
|
for all ORs of this purpose. Mostly designed for /ns/purpose/bridge
|
|
|
|
queries. [First implemented in 0.2.0.13-alpha.]
|
|
|
|
|
2006-01-10 20:08:56 +00:00
|
|
|
"desc/all-recent" -- the latest server descriptor for every router that
|
2012-11-23 15:39:07 +00:00
|
|
|
Tor knows about. (See note about desc/id/* and desc/name/* above.)
|
2006-01-10 20:08:56 +00:00
|
|
|
|
2007-05-04 07:22:11 +00:00
|
|
|
"network-status" -- a space-separated list (v1 directory style)
|
|
|
|
of all known OR identities. This is in the same format as the
|
|
|
|
router-status line in v1 directories; see dir-spec-v1.txt section
|
|
|
|
3 for details. (If VERBOSE_NAMES is enabled, the output will
|
|
|
|
not conform to dir-spec-v1.txt; instead, the result will be a
|
|
|
|
space-separated list of LongName, each preceded by a "!" if it is
|
2007-12-18 22:39:15 +00:00
|
|
|
believed to be not running.) This option is deprecated; use
|
|
|
|
"ns/all" instead.
|
2005-02-18 18:34:37 +00:00
|
|
|
|
2007-07-16 16:58:11 +00:00
|
|
|
"address-mappings/all"
|
|
|
|
"address-mappings/config"
|
|
|
|
"address-mappings/cache"
|
|
|
|
"address-mappings/control" -- a \r\n-separated list of address
|
|
|
|
mappings, each in the form of "from-address to-address expiry".
|
2006-02-09 03:44:49 +00:00
|
|
|
The 'config' key returns those address mappings set in the
|
|
|
|
configuration; the 'cache' key returns the mappings in the
|
|
|
|
client-side DNS cache; the 'control' key returns the mappings set
|
|
|
|
via the control interface; the 'all' target returns the mappings
|
|
|
|
set through any mechanism.
|
2007-07-25 22:56:54 +00:00
|
|
|
Expiry is formatted as with ADDRMAP events, except that "expiry" is
|
2012-11-23 14:57:09 +00:00
|
|
|
always a time in UTC or the string "NEVER"; see section 4.1.7.
|
2007-07-16 16:58:11 +00:00
|
|
|
First introduced in 0.2.0.3-alpha.
|
|
|
|
|
|
|
|
"addr-mappings/*" -- as for address-mappings/*, but without the
|
|
|
|
expiry portion of the value. Use of this value is deprecated
|
|
|
|
since 0.2.0.3-alpha; use address-mappings instead.
|
2005-03-02 20:54:09 +00:00
|
|
|
|
2006-09-09 03:18:39 +00:00
|
|
|
"address" -- the best guess at our external IP address. If we
|
2006-09-25 05:59:13 +00:00
|
|
|
have no guess, return a 551 error. (Added in 0.1.2.2-alpha)
|
2006-09-09 03:18:39 +00:00
|
|
|
|
2006-10-14 03:32:33 +00:00
|
|
|
"fingerprint" -- the contents of the fingerprint file that Tor
|
2011-05-09 14:36:59 +00:00
|
|
|
writes as a relay, or a 551 if we're not a relay currently.
|
2006-10-14 03:32:33 +00:00
|
|
|
(Added in 0.1.2.3-alpha)
|
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
"circuit-status"
|
2006-02-09 03:44:49 +00:00
|
|
|
A series of lines as for a circuit status event. Each line is of
|
2011-06-29 22:04:16 +00:00
|
|
|
the form described in section 4.1.1, omitting the initial
|
|
|
|
"650 CIRC ". Note that clients must be ready to accept additional
|
|
|
|
arguments as described in section 4.1.
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
"stream-status"
|
|
|
|
A series of lines as for a stream status event. Each is of the form:
|
2005-06-19 20:40:41 +00:00
|
|
|
StreamID SP StreamStatus SP CircID SP Target CRLF
|
2005-02-18 18:34:37 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
"orconn-status"
|
2010-12-01 11:25:17 +00:00
|
|
|
A series of lines as for an OR connection status event. In Tor
|
|
|
|
0.1.2.2-alpha with feature VERBOSE_NAMES enabled and in Tor
|
|
|
|
0.2.2.1-alpha and later by default, each line is of the form:
|
|
|
|
LongName SP ORStatus CRLF
|
|
|
|
|
2011-11-26 02:57:54 +00:00
|
|
|
In Tor versions 0.1.2.2-alpha through 0.2.2.1-alpha with feature
|
2010-12-01 17:19:26 +00:00
|
|
|
VERBOSE_NAMES turned off and before version 0.1.2.2-alpha, each line
|
|
|
|
is of the form:
|
2005-06-17 18:49:04 +00:00
|
|
|
ServerID SP ORStatus CRLF
|
2005-02-18 18:34:37 +00:00
|
|
|
|
2006-01-10 22:26:21 +00:00
|
|
|
"entry-guards"
|
|
|
|
A series of lines listing the currently chosen entry guards, if any.
|
2010-12-01 11:25:17 +00:00
|
|
|
In Tor 0.1.2.2-alpha with feature VERBOSE_NAMES enabled and in Tor
|
|
|
|
0.2.2.1-alpha and later by default, each line is of the form:
|
|
|
|
LongName SP Status [SP ISOTime] CRLF
|
2007-08-15 20:47:42 +00:00
|
|
|
|
2011-11-26 02:57:54 +00:00
|
|
|
In Tor versions 0.1.2.2-alpha through 0.2.2.1-alpha with feature
|
2010-12-01 17:19:26 +00:00
|
|
|
VERBOSE_NAMES turned off and before version 0.1.2.2-alpha, each line
|
|
|
|
is of the form:
|
2010-12-01 11:25:17 +00:00
|
|
|
ServerID2 SP Status [SP ISOTime] CRLF
|
2007-08-15 20:47:42 +00:00
|
|
|
ServerID2 = Nickname / 40*HEXDIG
|
2005-08-04 19:56:41 +00:00
|
|
|
|
2010-12-01 11:25:17 +00:00
|
|
|
The definition of Status is the same for both:
|
|
|
|
Status = "up" / "never-connected" / "down" /
|
|
|
|
"unusable" / "unlisted"
|
2005-12-28 09:11:14 +00:00
|
|
|
|
2010-12-01 11:26:05 +00:00
|
|
|
[From 0.1.1.4-alpha to 0.1.1.10-alpha, entry-guards was called
|
|
|
|
"helper-nodes". Tor still supports calling "helper-nodes", but it
|
|
|
|
is deprecated and should not be used.]
|
2011-05-09 14:36:59 +00:00
|
|
|
|
2007-08-15 20:47:42 +00:00
|
|
|
[Older versions of Tor (before 0.1.2.x-final) generated 'down' instead
|
|
|
|
of unlisted/unusable. Current Tors never generate 'down'.]
|
|
|
|
|
|
|
|
[XXXX ServerID2 differs from ServerID in not prefixing fingerprints
|
|
|
|
with a $. This is an implementation error. It would be nice to add
|
|
|
|
the $ back in if we can do so without breaking compatibility.]
|
|
|
|
|
2011-01-07 05:53:48 +00:00
|
|
|
"traffic/read" -- Total bytes read (downloaded).
|
|
|
|
|
|
|
|
"traffic/written" -- Total bytes written (uploaded).
|
|
|
|
|
2005-08-04 19:56:41 +00:00
|
|
|
"accounting/enabled"
|
|
|
|
"accounting/hibernating"
|
|
|
|
"accounting/bytes"
|
|
|
|
"accounting/bytes-left"
|
|
|
|
"accounting/interval-start"
|
|
|
|
"accounting/interval-wake"
|
|
|
|
"accounting/interval-end"
|
|
|
|
Information about accounting status. If accounting is enabled,
|
|
|
|
"enabled" is 1; otherwise it is 0. The "hibernating" field is "hard"
|
|
|
|
if we are accepting no data; "soft" if we're accepting no new
|
|
|
|
connections, and "awake" if we're not hibernating at all. The "bytes"
|
|
|
|
and "bytes-left" fields contain (read-bytes SP write-bytes), for the
|
|
|
|
start and the rest of the interval respectively. The 'interval-start'
|
|
|
|
and 'interval-end' fields are the borders of the current interval; the
|
|
|
|
'interval-wake' field is the time within the current interval (if any)
|
2012-11-23 14:57:09 +00:00
|
|
|
where we plan[ned] to start being active. The times are UTC.
|
2005-08-04 19:56:41 +00:00
|
|
|
|
|
|
|
"config/names"
|
|
|
|
A series of lines listing the available configuration options. Each is
|
|
|
|
of the form:
|
|
|
|
OptionName SP OptionType [ SP Documentation ] CRLF
|
|
|
|
OptionName = Keyword
|
2010-08-27 06:13:54 +00:00
|
|
|
OptionType = "Integer" / "TimeInterval" / "TimeMsecInterval" /
|
|
|
|
"DataSize" / "Float" / "Boolean" / "Time" / "CommaList" /
|
|
|
|
"Dependant" / "Virtual" / "String" / "LineList"
|
2005-08-04 19:56:41 +00:00
|
|
|
Documentation = Text
|
|
|
|
|
2012-04-07 03:35:47 +00:00
|
|
|
"config/defaults"
|
|
|
|
A series of lines listing default values for each configuration
|
|
|
|
option. Options which don't have a valid default don't show up
|
2012-06-28 19:17:45 +00:00
|
|
|
in the list. Introduced in Tor 0.2.4.1-alpha.
|
2012-04-07 03:35:47 +00:00
|
|
|
OptionName SP OptionValue CRLF
|
|
|
|
OptionName = Keyword
|
|
|
|
OptionValue = Text
|
|
|
|
|
2005-08-04 19:56:41 +00:00
|
|
|
"info/names"
|
|
|
|
A series of lines listing the available GETINFO options. Each is of
|
2005-08-22 20:05:41 +00:00
|
|
|
one of these forms:
|
2005-08-04 19:56:41 +00:00
|
|
|
OptionName SP Documentation CRLF
|
|
|
|
OptionPrefix SP Documentation CRLF
|
|
|
|
OptionPrefix = OptionName "/*"
|
2012-11-23 15:28:13 +00:00
|
|
|
The OptionPrefix form indicates a number of options beginning with the
|
|
|
|
prefix. So if "config/*" is listed, other options beginning with
|
|
|
|
"config/" will work, but "config/*" itself is not an option.
|
2005-08-04 19:56:41 +00:00
|
|
|
|
2006-10-24 02:58:03 +00:00
|
|
|
"events/names"
|
|
|
|
A space-separated list of all the events supported by this version of
|
|
|
|
Tor's SETEVENTS.
|
|
|
|
|
|
|
|
"features/names"
|
2012-11-09 00:18:26 +00:00
|
|
|
A space-separated list of all the features supported by this version
|
|
|
|
of Tor's USEFEATURE.
|
2006-10-24 02:58:03 +00:00
|
|
|
|
2012-11-23 17:08:55 +00:00
|
|
|
"signal/names"
|
|
|
|
A space-separated list of all the values supported by the SIGNAL
|
|
|
|
command.
|
|
|
|
|
2008-03-29 05:43:02 +00:00
|
|
|
"ip-to-country/*"
|
|
|
|
Maps IP addresses to 2-letter country codes. For example,
|
|
|
|
"GETINFO ip-to-country/18.0.0.1" should give "US".
|
|
|
|
|
2006-12-02 22:47:46 +00:00
|
|
|
"next-circuit/IP:port"
|
|
|
|
XXX todo.
|
|
|
|
|
2010-12-22 17:15:24 +00:00
|
|
|
"process/pid" -- Process id belonging to the main tor process.
|
|
|
|
"process/uid" -- User id running the tor process, -1 if unknown (this is
|
|
|
|
unimplemented on Windows, returning -1).
|
|
|
|
"process/user" -- Username under which the tor process is running,
|
|
|
|
providing an empty string if none exists (this is unimplemented on
|
|
|
|
Windows, returning an empty string).
|
|
|
|
"process/descriptor-limit" -- Upper bound on the file descriptor limit, -1
|
|
|
|
if unknown.
|
|
|
|
|
2008-09-14 04:07:29 +00:00
|
|
|
"dir/status-vote/current/consensus" [added in Tor 0.2.1.6-alpha]
|
2006-03-08 00:13:54 +00:00
|
|
|
"dir/status/authority"
|
|
|
|
"dir/status/fp/<F>"
|
|
|
|
"dir/status/fp/<F1>+<F2>+<F3>"
|
|
|
|
"dir/status/all"
|
|
|
|
"dir/server/fp/<F>"
|
|
|
|
"dir/server/fp/<F1>+<F2>+<F3>"
|
|
|
|
"dir/server/d/<D>"
|
|
|
|
"dir/server/d/<D1>+<D2>+<D3>"
|
|
|
|
"dir/server/authority"
|
|
|
|
"dir/server/all"
|
2006-09-29 18:13:16 +00:00
|
|
|
A series of lines listing directory contents, provided according to the
|
|
|
|
specification for the URLs listed in Section 4.4 of dir-spec.txt. Note
|
|
|
|
that Tor MUST NOT provide private information, such as descriptors for
|
|
|
|
routers not marked as general-purpose. When asked for 'authority'
|
|
|
|
information for which this Tor is not authoritative, Tor replies with
|
|
|
|
an empty string.
|
2006-03-07 16:00:40 +00:00
|
|
|
|
2006-10-16 22:41:31 +00:00
|
|
|
"status/circuit-established"
|
2007-07-10 17:14:55 +00:00
|
|
|
"status/enough-dir-info"
|
2007-09-18 15:53:55 +00:00
|
|
|
"status/good-server-descriptor"
|
2009-08-31 22:37:25 +00:00
|
|
|
"status/accepted-server-descriptor"
|
2006-10-16 22:41:31 +00:00
|
|
|
"status/..."
|
2006-10-14 03:32:33 +00:00
|
|
|
These provide the current internal Tor values for various Tor
|
|
|
|
states. See Section 4.1.10 for explanations. (Only a few of the
|
|
|
|
status events are available as getinfo's currently. Let us know if
|
2008-02-21 06:06:45 +00:00
|
|
|
you want more exposed.)
|
2009-07-30 07:41:02 +00:00
|
|
|
"status/reachability-succeeded/or"
|
2007-09-18 15:53:55 +00:00
|
|
|
0 or 1, depending on whether we've found our ORPort reachable.
|
2009-07-30 07:41:02 +00:00
|
|
|
"status/reachability-succeeded/dir"
|
2007-09-18 15:53:55 +00:00
|
|
|
0 or 1, depending on whether we've found our DirPort reachable.
|
2009-07-30 07:41:02 +00:00
|
|
|
"status/reachability-succeeded"
|
2007-09-18 15:53:55 +00:00
|
|
|
"OR=" ("0"/"1") SP "DIR=" ("0"/"1")
|
2009-07-30 07:41:02 +00:00
|
|
|
Combines status/reachability-succeeded/*; controllers MUST ignore
|
|
|
|
unrecognized elements in this entry.
|
2008-08-03 15:34:28 +00:00
|
|
|
"status/bootstrap-phase"
|
|
|
|
Returns the most recent bootstrap phase status event
|
|
|
|
sent. Specifically, it returns a string starting with either
|
|
|
|
"NOTICE BOOTSTRAP ..." or "WARN BOOTSTRAP ...". Controllers should
|
|
|
|
use this getinfo when they connect or attach to Tor to learn its
|
|
|
|
current bootstrap state.
|
|
|
|
"status/version/recommended"
|
|
|
|
List of currently recommended versions.
|
|
|
|
"status/version/current"
|
|
|
|
Status of the current version. One of: new, old, unrecommended,
|
2010-03-09 05:08:38 +00:00
|
|
|
recommended, new in series, obsolete, unknown.
|
2012-11-23 15:28:13 +00:00
|
|
|
"status/version/num-concurring"
|
|
|
|
"status/version/num-versioning"
|
|
|
|
These options are deprecated; they no longer give useful information.
|
2009-01-28 06:50:36 +00:00
|
|
|
"status/clients-seen"
|
|
|
|
A summary of which countries we've seen clients from recently,
|
|
|
|
formatted the same as the CLIENTS_SEEN status event described in
|
|
|
|
Section 4.1.14. This GETINFO option is currently available only
|
|
|
|
for bridge relays.
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2011-05-13 14:44:42 +00:00
|
|
|
"net/listeners/or"
|
|
|
|
"net/listeners/dir"
|
|
|
|
"net/listeners/socks"
|
|
|
|
"net/listeners/trans"
|
|
|
|
"net/listeners/natd"
|
|
|
|
"net/listeners/dns"
|
|
|
|
"net/listeners/control"
|
|
|
|
A space-separated list of the addresses at which Tor is listening for
|
2011-05-17 22:10:34 +00:00
|
|
|
connections of each specified type. [New in Tor 0.2.2.26-beta.]
|
2011-05-13 14:44:42 +00:00
|
|
|
|
2012-11-23 15:28:13 +00:00
|
|
|
"dir-usage"
|
|
|
|
A newline-separated list of how many bytes we've served to answer
|
|
|
|
each type of directory request. The format of each line is:
|
|
|
|
Keyword 1*SP Integer 1*SP Integer
|
|
|
|
where the first integer is the number of bytes written, and the second
|
|
|
|
is the number of requests answered.
|
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Examples:
|
|
|
|
C: GETINFO version desc/name/moria1
|
|
|
|
S: 250+desc/name/moria=
|
|
|
|
S: [Descriptor for moria]
|
|
|
|
S: .
|
|
|
|
S: 250-version=Tor 0.1.1.0-alpha-cvs
|
|
|
|
S: 250 OK
|
2005-01-06 02:02:18 +00:00
|
|
|
|
2005-09-08 03:18:51 +00:00
|
|
|
3.10. EXTENDCIRCUIT
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The format is:
|
2009-12-29 03:17:12 +00:00
|
|
|
"EXTENDCIRCUIT" SP CircuitID
|
2011-06-23 23:50:08 +00:00
|
|
|
[SP ServerSpec *("," ServerSpec)]
|
|
|
|
[SP "purpose=" Purpose] CRLF
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2006-02-23 06:51:09 +00:00
|
|
|
This request takes one of two forms: either the CircuitID is zero, in
|
2009-12-29 03:17:12 +00:00
|
|
|
which case it is a request for the server to build a new circuit,
|
|
|
|
or the CircuitID is nonzero, in which case it is a request for the
|
|
|
|
server to extend an existing circuit with that ID according to the
|
|
|
|
specified path.
|
|
|
|
|
|
|
|
If the CircuitID is 0, the controller has the option of providing
|
|
|
|
a path for Tor to use to build the circuit. If it does not provide
|
|
|
|
a path, Tor will select one automatically from high capacity nodes
|
|
|
|
according to path-spec.txt.
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2006-02-23 06:51:09 +00:00
|
|
|
If CircuitID is 0 and "purpose=" is specified, then the circuit's
|
|
|
|
purpose is set. Two choices are recognized: "general" and
|
|
|
|
"controller". If not specified, circuits are created as "general".
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2006-02-23 06:51:09 +00:00
|
|
|
If the request is successful, the server sends a reply containing a
|
|
|
|
message body consisting of the CircuitID of the (maybe newly created)
|
|
|
|
circuit. The syntax is "250" SP "EXTENDED" SP CircuitID CRLF.
|
|
|
|
|
|
|
|
3.11. SETCIRCUITPURPOSE
|
|
|
|
|
|
|
|
Sent from the client to the server. The format is:
|
2012-08-23 15:48:00 +00:00
|
|
|
"SETCIRCUITPURPOSE" SP CircuitID SP "purpose=" Purpose CRLF
|
2006-02-23 06:51:09 +00:00
|
|
|
|
|
|
|
This changes the circuit's purpose. See EXTENDCIRCUIT above for details.
|
|
|
|
|
2006-03-17 22:07:20 +00:00
|
|
|
3.12. SETROUTERPURPOSE
|
|
|
|
|
|
|
|
Sent from the client to the server. The format is:
|
|
|
|
"SETROUTERPURPOSE" SP NicknameOrKey SP Purpose CRLF
|
|
|
|
|
|
|
|
This changes the descriptor's purpose. See +POSTDESCRIPTOR below
|
|
|
|
for details.
|
|
|
|
|
2007-10-11 22:19:47 +00:00
|
|
|
NOTE: This command was disabled and made obsolete as of Tor
|
|
|
|
0.2.0.8-alpha. It doesn't exist anymore, and is listed here only for
|
|
|
|
historical interest.
|
|
|
|
|
2006-03-17 22:07:20 +00:00
|
|
|
3.13. ATTACHSTREAM
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The syntax is:
|
2007-04-30 14:09:11 +00:00
|
|
|
"ATTACHSTREAM" SP StreamID SP CircuitID [SP "HOP=" HopNum] CRLF
|
2005-02-16 19:49:39 +00:00
|
|
|
|
|
|
|
This message informs the server that the specified stream should be
|
|
|
|
associated with the specified circuit. Each stream may be associated with
|
|
|
|
at most one circuit, and multiple streams may share the same circuit.
|
2005-03-24 06:29:28 +00:00
|
|
|
Streams can only be attached to completed circuits (that is, circuits that
|
2005-06-18 01:49:03 +00:00
|
|
|
have sent a circuit status 'BUILT' event or are listed as built in a
|
2005-06-18 01:34:28 +00:00
|
|
|
GETINFO circuit-status request).
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2005-03-12 04:22:01 +00:00
|
|
|
If the circuit ID is 0, responsibility for attaching the given stream is
|
|
|
|
returned to Tor.
|
|
|
|
|
2007-04-30 11:10:45 +00:00
|
|
|
If HOP=HopNum is specified, Tor will choose the HopNumth hop in the
|
|
|
|
circuit as the exit node, rather than the last node in the circuit.
|
2007-04-30 14:09:11 +00:00
|
|
|
Hops are 1-indexed; generally, it is not permitted to attach to hop 1.
|
2007-04-30 11:10:45 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Tor responds with "250 OK" if it can attach the stream, 552 if the circuit
|
|
|
|
or stream didn't exist, or 551 if the stream couldn't be attached for
|
|
|
|
another reason.
|
|
|
|
|
2005-12-05 01:09:11 +00:00
|
|
|
{Implementation note: Tor will close unattached streams by itself,
|
|
|
|
roughly two minutes after they are born. Let the developers know if
|
|
|
|
that turns out to be a problem.}
|
|
|
|
|
2005-03-14 22:13:42 +00:00
|
|
|
{Implementation note: By default, Tor automatically attaches streams to
|
2005-03-27 06:42:27 +00:00
|
|
|
circuits itself, unless the configuration variable
|
|
|
|
"__LeaveStreamsUnattached" is set to "1". Attempting to attach streams
|
|
|
|
via TC when "__LeaveStreamsUnattached" is false may cause a race between
|
|
|
|
Tor and the controller, as both attempt to attach streams to circuits.}
|
2005-03-14 22:13:42 +00:00
|
|
|
|
2006-03-09 06:30:27 +00:00
|
|
|
{Implementation note: You can try to attachstream to a stream that
|
|
|
|
has already sent a connect or resolve request but hasn't succeeded
|
|
|
|
yet, in which case Tor will detach the stream from its current circuit
|
|
|
|
before proceeding with the new attach request.}
|
|
|
|
|
2006-03-17 22:07:20 +00:00
|
|
|
3.14. POSTDESCRIPTOR
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The syntax is:
|
2007-10-12 07:57:29 +00:00
|
|
|
"+POSTDESCRIPTOR" [SP "purpose=" Purpose] [SP "cache=" Cache]
|
|
|
|
CRLF Descriptor CRLF "." CRLF
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2006-03-17 22:07:20 +00:00
|
|
|
This message informs the server about a new descriptor. If Purpose is
|
2008-01-17 05:47:44 +00:00
|
|
|
specified, it must be either "general", "controller", or "bridge",
|
2008-08-03 15:34:28 +00:00
|
|
|
else we return a 552 error. The default is "general".
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2007-10-12 07:57:29 +00:00
|
|
|
If Cache is specified, it must be either "no" or "yes", else we
|
|
|
|
return a 552 error. If Cache is not specified, Tor will decide for
|
|
|
|
itself whether it wants to cache the descriptor, and controllers
|
|
|
|
must not rely on its choice.
|
|
|
|
|
2005-02-16 19:49:39 +00:00
|
|
|
The descriptor, when parsed, must contain a number of well-specified
|
|
|
|
fields, including fields for its nickname and identity.
|
|
|
|
|
2008-08-03 15:34:28 +00:00
|
|
|
If there is an error in parsing the descriptor, the server must send a
|
|
|
|
"554 Invalid descriptor" reply. If the descriptor is well-formed but
|
|
|
|
the server chooses not to add it, it must reply with a 251 message
|
|
|
|
whose body explains why the server was not added. If the descriptor
|
|
|
|
is added, Tor replies with "250 OK".
|
2005-02-16 19:49:39 +00:00
|
|
|
|
2006-03-17 22:07:20 +00:00
|
|
|
3.15. REDIRECTSTREAM
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
Sent from the client to the server. The syntax is:
|
2007-08-19 05:04:56 +00:00
|
|
|
"REDIRECTSTREAM" SP StreamID SP Address [SP Port] CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2005-11-18 11:17:24 +00:00
|
|
|
Tells the server to change the exit address on the specified stream. If
|
|
|
|
Port is specified, changes the destination port as well. No remapping
|
|
|
|
is performed on the new provided address.
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
To be sure that the modified address will be used, this event must be sent
|
|
|
|
after a new stream event is received, and before attaching this stream to
|
|
|
|
a circuit.
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Tor replies with "250 OK" on success.
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2006-03-17 22:07:20 +00:00
|
|
|
3.16. CLOSESTREAM
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Sent from the client to the server. The syntax is:
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
"CLOSESTREAM" SP StreamID SP Reason *(SP Flag) CRLF
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Tells the server to close the specified stream. The reason should be one
|
|
|
|
of the Tor RELAY_END reasons given in tor-spec.txt, as a decimal. Flags is
|
|
|
|
not used currently; Tor servers SHOULD ignore unrecognized flags. Tor may
|
|
|
|
hold the stream open for a while to flush any data that is pending.
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2005-11-18 11:17:24 +00:00
|
|
|
Tor replies with "250 OK" on success, or a 512 if there aren't enough
|
|
|
|
arguments, or a 552 if it doesn't recognize the StreamID or reason.
|
|
|
|
|
2006-03-17 22:07:20 +00:00
|
|
|
3.17. CLOSECIRCUIT
|
2005-03-02 20:22:10 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
The syntax is:
|
2011-05-22 06:30:25 +00:00
|
|
|
"CLOSECIRCUIT" SP CircuitID *(SP Flag) CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
Flag = "IfUnused"
|
2005-03-17 12:38:37 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Tells the server to close the specified circuit. If "IfUnused" is
|
|
|
|
provided, do not close the circuit unless it is unused.
|
2005-03-19 06:05:55 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Other flags may be defined in the future; Tor SHOULD ignore unrecognized
|
|
|
|
flags.
|
2005-03-19 06:05:55 +00:00
|
|
|
|
2005-11-18 11:17:24 +00:00
|
|
|
Tor replies with "250 OK" on success, or a 512 if there aren't enough
|
|
|
|
arguments, or a 552 if it doesn't recognize the CircuitID.
|
|
|
|
|
2006-03-17 22:07:20 +00:00
|
|
|
3.18. QUIT
|
2005-08-13 02:22:11 +00:00
|
|
|
|
|
|
|
Tells the server to hang up on this controller connection. This command
|
|
|
|
can be used before authenticating.
|
|
|
|
|
2006-10-03 18:59:57 +00:00
|
|
|
3.19. USEFEATURE
|
|
|
|
|
2010-12-01 11:21:34 +00:00
|
|
|
Adding additional features to the control protocol sometimes will break
|
|
|
|
backwards compatibility. Initially such features are added into Tor and
|
|
|
|
disabled by default. USEFEATURE can enable these additional features.
|
|
|
|
|
2006-10-03 18:59:57 +00:00
|
|
|
The syntax is:
|
|
|
|
|
|
|
|
"USEFEATURE" *(SP FeatureName) CRLF
|
|
|
|
FeatureName = 1*(ALPHA / DIGIT / "_" / "-")
|
|
|
|
|
2010-12-01 11:21:34 +00:00
|
|
|
Feature names are case-insensitive.
|
2006-10-03 18:59:57 +00:00
|
|
|
|
2010-12-01 11:21:34 +00:00
|
|
|
Once enabled, a feature stays enabled for the duration of the connection
|
|
|
|
to the controller. A new connection to the controller must be opened to
|
|
|
|
disable an enabled feature.
|
2006-10-03 18:59:57 +00:00
|
|
|
|
2010-12-01 11:21:34 +00:00
|
|
|
Features are a forward-compatibility mechanism; each feature will eventually
|
|
|
|
become a standard part of the control protocol. Once a feature becomes part
|
|
|
|
of the protocol, it is always-on. Each feature documents the version it was
|
|
|
|
introduced as a feature and the version in which it became part of the
|
|
|
|
protocol.
|
|
|
|
|
|
|
|
Tor will ignore a request to use any feature that is always-on. Tor will give
|
|
|
|
a 552 error in response to an unrecognized feature.
|
2006-10-03 18:59:57 +00:00
|
|
|
|
|
|
|
EXTENDED_EVENTS
|
|
|
|
|
|
|
|
Same as passing 'EXTENDED' to SETEVENTS; this is the preferred way to
|
|
|
|
request the extended event syntax.
|
|
|
|
|
2010-12-01 11:21:34 +00:00
|
|
|
This feature was first introduced in 0.1.2.3-alpha. It is always-on
|
|
|
|
and part of the protocol in Tor 0.2.2.1-alpha and later.
|
2006-10-03 18:59:57 +00:00
|
|
|
|
|
|
|
VERBOSE_NAMES
|
|
|
|
|
2010-12-01 11:21:34 +00:00
|
|
|
Replaces ServerID with LongName in events and GETINFO results. LongName
|
|
|
|
provides a Fingerprint for all routers, an indication of Named status,
|
|
|
|
and a Nickname if one is known. LongName is strictly more informative
|
|
|
|
than ServerID, which only provides either a Fingerprint or a Nickname.
|
2006-10-03 18:59:57 +00:00
|
|
|
|
2010-12-01 11:21:34 +00:00
|
|
|
This feature was first introduced in 0.1.2.2-alpha. It is always-on and
|
|
|
|
part of the protocol in Tor 0.2.2.1-alpha and later.
|
2006-10-03 19:00:01 +00:00
|
|
|
|
2007-07-10 17:14:51 +00:00
|
|
|
3.20. RESOLVE
|
|
|
|
|
|
|
|
The syntax is
|
|
|
|
"RESOLVE" *Option *Address CRLF
|
|
|
|
Option = "mode=reverse"
|
|
|
|
Address = a hostname or IPv4 address
|
|
|
|
|
|
|
|
This command launches a remote hostname lookup request for every specified
|
|
|
|
request (or reverse lookup if "mode=reverse" is specified). Note that the
|
|
|
|
request is done in the background: to see the answers, your controller will
|
|
|
|
need to listen for ADDRMAP events; see 4.1.7 below.
|
|
|
|
|
2007-07-10 17:14:55 +00:00
|
|
|
[Added in Tor 0.2.0.3-alpha]
|
|
|
|
|
2007-08-16 17:31:23 +00:00
|
|
|
3.21. PROTOCOLINFO
|
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"PROTOCOLINFO" *(SP PIVERSION) CRLF
|
|
|
|
|
|
|
|
The server reply format is:
|
2007-08-22 07:57:10 +00:00
|
|
|
"250-PROTOCOLINFO" SP PIVERSION CRLF *InfoLine "250 OK" CRLF
|
2007-08-16 17:31:23 +00:00
|
|
|
|
|
|
|
InfoLine = AuthLine / VersionLine / OtherLine
|
|
|
|
|
2011-04-20 00:16:02 +00:00
|
|
|
AuthLine = "250-AUTH" SP "METHODS=" AuthMethod *("," AuthMethod)
|
2007-08-16 17:31:23 +00:00
|
|
|
*(SP "COOKIEFILE=" AuthCookieFile) CRLF
|
2011-08-28 23:37:49 +00:00
|
|
|
VersionLine = "250-VERSION" SP "Tor=" TorVersion OptArguments CRLF
|
2007-08-16 17:31:23 +00:00
|
|
|
|
|
|
|
AuthMethod =
|
|
|
|
"NULL" / ; No authentication is required
|
|
|
|
"HASHEDPASSWORD" / ; A controller must supply the original password
|
|
|
|
"COOKIE" / ; A controller must supply the contents of a cookie
|
2012-02-05 12:02:23 +00:00
|
|
|
"SAFECOOKIE" ; A controller must prove knowledge of a cookie
|
2007-08-16 17:31:23 +00:00
|
|
|
|
|
|
|
AuthCookieFile = QuotedString
|
|
|
|
TorVersion = QuotedString
|
|
|
|
|
2011-08-28 23:37:49 +00:00
|
|
|
OtherLine = "250-" Keyword OptArguments CRLF
|
2007-08-16 17:31:23 +00:00
|
|
|
|
|
|
|
PIVERSION: 1*DIGIT
|
|
|
|
|
|
|
|
Tor MAY give its InfoLines in any order; controllers MUST ignore InfoLines
|
2007-08-19 04:58:55 +00:00
|
|
|
with keywords they do not recognize. Controllers MUST ignore extraneous
|
2007-08-16 17:31:23 +00:00
|
|
|
data on any InfoLine.
|
|
|
|
|
|
|
|
PIVERSION is there in case we drastically change the syntax one day. For
|
2007-08-17 20:44:51 +00:00
|
|
|
now it should always be "1". Controllers MAY provide a list of the
|
|
|
|
protocolinfo versions they support; Tor MAY select a version that the
|
|
|
|
controller does not support.
|
2007-08-16 17:31:23 +00:00
|
|
|
|
|
|
|
AuthMethod is used to specify one or more control authentication
|
|
|
|
methods that Tor currently accepts.
|
|
|
|
|
|
|
|
AuthCookieFile specifies the absolute path and filename of the
|
2012-02-05 12:02:23 +00:00
|
|
|
authentication cookie that Tor is expecting and is provided iff the
|
|
|
|
METHODS field contains the method "COOKIE" and/or "SAFECOOKIE".
|
|
|
|
Controllers MUST handle escape sequences inside this string.
|
|
|
|
|
|
|
|
All authentication cookies are 32 bytes long. Controllers MUST NOT
|
|
|
|
use the contents of a non-32-byte-long file as an authentication
|
|
|
|
cookie.
|
|
|
|
|
|
|
|
If the METHODS field contains the method "SAFECOOKIE", every
|
|
|
|
AuthCookieFile must contain the same authentication cookie.
|
2007-08-16 17:31:23 +00:00
|
|
|
|
2012-02-20 16:47:50 +00:00
|
|
|
The COOKIE authentication method exposes the user running a
|
|
|
|
controller to an unintended information disclosure attack whenever
|
|
|
|
the controller has greater filesystem read access than the process
|
|
|
|
that it has connected to. (Note that a controller may connect to a
|
|
|
|
process other than Tor.) It is almost never safe to use, even if
|
|
|
|
the controller's user has explicitly specified which filename to
|
|
|
|
read an authentication cookie from. For this reason, the COOKIE
|
|
|
|
authentication method has been deprecated and will be removed from
|
2012-03-26 18:15:10 +00:00
|
|
|
a future version of Tor.
|
2012-02-20 16:47:50 +00:00
|
|
|
|
2007-08-16 17:31:23 +00:00
|
|
|
The VERSION line contains the Tor version.
|
|
|
|
|
|
|
|
[Unlike other commands besides AUTHENTICATE, PROTOCOLINFO may be used (but
|
|
|
|
only once!) before AUTHENTICATE.]
|
|
|
|
|
|
|
|
[PROTOCOLINFO was not supported before Tor 0.2.0.5-alpha.]
|
|
|
|
|
2011-05-22 06:30:46 +00:00
|
|
|
3.22. LOADCONF
|
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"+LOADCONF" CRLF ConfigText CRLF "." CRLF
|
|
|
|
|
|
|
|
This command allows a controller to upload the text of a config file
|
|
|
|
to Tor over the control port. This config file is then loaded as if
|
|
|
|
it had been read from disk.
|
|
|
|
|
|
|
|
[LOADCONF was added in Tor 0.2.1.1-alpha.]
|
|
|
|
|
2011-05-22 21:18:45 +00:00
|
|
|
3.23. TAKEOWNERSHIP
|
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"TAKEOWNERSHIP" CRLF
|
|
|
|
|
|
|
|
This command instructs Tor to shut down (as if it had received
|
|
|
|
SIGINT or a "SIGNAL INT" controller command) when this control
|
2011-05-23 04:46:20 +00:00
|
|
|
connection is closed. This command affects each control connection
|
|
|
|
that sends it independently; if multiple control connections send
|
|
|
|
the TAKEOWNERSHIP command to a Tor instance, Tor will shut down when
|
|
|
|
any of those connections closes.
|
|
|
|
|
|
|
|
This command is intended to be used with the
|
|
|
|
__OwningControllerProcess configuration option. A controller that
|
|
|
|
starts a Tor process which the user cannot easily control or stop
|
|
|
|
should 'own' that Tor process:
|
|
|
|
|
|
|
|
* When starting Tor, the controller should specify its PID in an
|
|
|
|
__OwningControllerProcess on Tor's command line. This will
|
|
|
|
cause Tor to poll for the existence of a process with that PID,
|
|
|
|
and exit if it does not find such a process. (This is not a
|
|
|
|
completely reliable way to detect whether the 'owning
|
|
|
|
controller' is still running, but it should work well enough in
|
|
|
|
most cases.)
|
|
|
|
|
|
|
|
* Once the controller has connected to Tor's control port, it
|
|
|
|
should send the TAKEOWNERSHIP command along its control
|
|
|
|
connection. At this point, *both* the TAKEOWNERSHIP command and
|
|
|
|
the __OwningControllerProcess option are in effect: Tor will
|
|
|
|
exit when the control connection ends *and* Tor will exit if it
|
|
|
|
detects that there is no process with the PID specified in the
|
|
|
|
__OwningControllerProcess option.
|
|
|
|
|
|
|
|
* After the controller has sent the TAKEOWNERSHIP command, it
|
|
|
|
should send "RESETCONF __OwningControllerProcess" along its
|
|
|
|
control connection. This will cause Tor to stop polling for the
|
|
|
|
existence of a process with its owning controller's PID; Tor
|
|
|
|
will still exit when the control connection ends.
|
2011-05-22 21:18:45 +00:00
|
|
|
|
|
|
|
[TAKEOWNERSHIP was added in Tor 0.2.2.28-beta.]
|
|
|
|
|
2012-02-05 12:02:23 +00:00
|
|
|
3.24. AUTHCHALLENGE
|
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"AUTHCHALLENGE" SP "SAFECOOKIE"
|
|
|
|
SP ClientNonce
|
|
|
|
CRLF
|
|
|
|
|
|
|
|
ClientNonce = 2*HEXDIG / QuotedString
|
|
|
|
|
|
|
|
If the server accepts the command, the server reply format is:
|
|
|
|
"250 AUTHCHALLENGE"
|
|
|
|
SP "SERVERHASH=" ServerHash
|
|
|
|
SP "SERVERNONCE=" ServerNonce
|
|
|
|
CRLF
|
|
|
|
|
|
|
|
ServerHash = 64*64HEXDIG
|
|
|
|
ServerNonce = 64*64HEXDIG
|
|
|
|
|
|
|
|
The ClientNonce, ServerHash, and ServerNonce values are
|
|
|
|
encoded/decoded in the same way as the argument passed to the
|
|
|
|
AUTHENTICATE command. ServerNonce MUST be 32 bytes long.
|
|
|
|
|
|
|
|
ServerHash is computed as:
|
|
|
|
HMAC-SHA256("Tor safe cookie authentication server-to-controller hash",
|
|
|
|
CookieString | ClientNonce | ServerNonce)
|
|
|
|
(with the HMAC key as its first argument)
|
|
|
|
|
|
|
|
After a controller sends a successful AUTHCHALLENGE command, the
|
|
|
|
next command sent on the connection must be an AUTHENTICATE command,
|
|
|
|
and the only authentication string which that AUTHENTICATE command
|
|
|
|
will accept is:
|
|
|
|
HMAC-SHA256("Tor safe cookie authentication controller-to-server hash",
|
|
|
|
CookieString | ClientNonce | ServerNonce)
|
|
|
|
|
|
|
|
[Unlike other commands besides AUTHENTICATE, AUTHCHALLENGE may be
|
|
|
|
used (but only once!) before AUTHENTICATE.]
|
|
|
|
|
|
|
|
[AUTHCHALLENGE was added in Tor FIXME.]
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
4. Replies
|
2005-03-19 06:05:55 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
Reply codes follow the same 3-character format as used by SMTP, with the
|
|
|
|
first character defining a status, the second character defining a
|
2005-06-18 01:34:28 +00:00
|
|
|
subsystem, and the third designating fine-grained information.
|
2005-03-17 12:38:37 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
The TC protocol currently uses the following first characters:
|
2005-03-22 19:36:38 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
2yz Positive Completion Reply
|
|
|
|
The command was successful; a new request can be started.
|
2005-03-22 19:36:38 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
4yz Temporary Negative Completion reply
|
|
|
|
The command was unsuccessful but might be reattempted later.
|
2005-03-22 19:36:38 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
5yz Permanent Negative Completion Reply
|
|
|
|
The command was unsuccessful; the client should not try exactly
|
|
|
|
that sequence of commands again.
|
2005-03-22 19:36:38 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
6yz Asynchronous Reply
|
|
|
|
Sent out-of-order in response to an earlier SETEVENTS command.
|
2005-03-22 19:36:38 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
The following second characters are used:
|
2005-03-22 19:36:38 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
x0z Syntax
|
|
|
|
Sent in response to ill-formed or nonsensical commands.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
x1z Protocol
|
|
|
|
Refers to operations of the Tor Control protocol.
|
|
|
|
|
2005-06-18 01:34:28 +00:00
|
|
|
x5z Tor
|
2005-06-17 18:49:04 +00:00
|
|
|
Refers to actual operations of Tor system.
|
|
|
|
|
|
|
|
The following codes are defined:
|
|
|
|
|
|
|
|
250 OK
|
|
|
|
251 Operation was unnecessary
|
|
|
|
[Tor has declined to perform the operation, but no harm was done.]
|
|
|
|
|
|
|
|
451 Resource exhausted
|
|
|
|
|
|
|
|
500 Syntax error: protocol
|
|
|
|
|
|
|
|
510 Unrecognized command
|
|
|
|
511 Unimplemented command
|
|
|
|
512 Syntax error in command argument
|
|
|
|
513 Unrecognized command argument
|
|
|
|
514 Authentication required
|
|
|
|
515 Bad authentication
|
|
|
|
|
|
|
|
550 Unspecified Tor error
|
|
|
|
|
|
|
|
551 Internal error
|
|
|
|
[Something went wrong inside Tor, so that the client's
|
|
|
|
request couldn't be fulfilled.]
|
|
|
|
|
|
|
|
552 Unrecognized entity
|
|
|
|
[A configuration key, a stream ID, circuit ID, event,
|
|
|
|
mentioned in the command did not actually exist.]
|
|
|
|
|
|
|
|
553 Invalid configuration value
|
|
|
|
[The client tried to set a configuration option to an
|
|
|
|
incorrect, ill-formed, or impossible value.]
|
|
|
|
|
2005-06-18 01:49:03 +00:00
|
|
|
554 Invalid descriptor
|
|
|
|
|
2005-06-19 20:40:41 +00:00
|
|
|
555 Unmanaged entity
|
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
650 Asynchronous event notification
|
|
|
|
|
2005-06-18 01:49:03 +00:00
|
|
|
Unless specified to have specific contents, the human-readable messages
|
|
|
|
in error replies should not be relied upon to match those in this document.
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
4.1. Asynchronous events
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
These replies can be sent after a corresponding SETEVENTS command has been
|
|
|
|
received. They will not be interleaved with other Reply elements, but they
|
|
|
|
can appear between a command and its corresponding reply. For example,
|
|
|
|
this sequence is possible:
|
|
|
|
|
|
|
|
C: SETEVENTS CIRC
|
|
|
|
S: 250 OK
|
2005-07-17 22:39:21 +00:00
|
|
|
C: GETCONF SOCKSPORT ORPORT
|
2005-06-17 18:49:04 +00:00
|
|
|
S: 650 CIRC 1000 EXTENDED moria1,moria2
|
|
|
|
S: 250-SOCKSPORT=9050
|
|
|
|
S: 250 ORPORT=0
|
|
|
|
|
|
|
|
But this sequence is disallowed:
|
|
|
|
C: SETEVENTS CIRC
|
|
|
|
S: 250 OK
|
2005-07-17 22:39:21 +00:00
|
|
|
C: GETCONF SOCKSPORT ORPORT
|
2005-06-17 18:49:04 +00:00
|
|
|
S: 250-SOCKSPORT=9050
|
|
|
|
S: 650 CIRC 1000 EXTENDED moria1,moria2
|
|
|
|
S: 250 ORPORT=0
|
|
|
|
|
2011-06-29 22:04:16 +00:00
|
|
|
Clients MUST tolerate more arguments in an asynchronous reply than
|
2007-01-10 16:33:56 +00:00
|
|
|
expected, and MUST tolerate more lines in an asynchronous reply than
|
2005-06-19 23:22:34 +00:00
|
|
|
expected. For instance, a client that expects a CIRC message like:
|
|
|
|
650 CIRC 1000 EXTENDED moria1,moria2
|
2007-01-22 06:11:56 +00:00
|
|
|
must tolerate:
|
2005-10-12 13:49:13 +00:00
|
|
|
650-CIRC 1000 EXTENDED moria1,moria2 0xBEEF
|
2005-06-19 23:22:34 +00:00
|
|
|
650-EXTRAMAGIC=99
|
|
|
|
650 ANONYMITY=high
|
|
|
|
|
2011-06-29 22:04:16 +00:00
|
|
|
If clients receives extended events (selected by USEFEATUERE
|
|
|
|
EXTENDED_EVENTS in Tor 0.1.2.2-alpha..Tor-0.2.1.x, and always-on in
|
|
|
|
Tor 0.2.2.x and later), then each event line as specified below may be
|
|
|
|
followed by additional arguments and additional lines. Additional
|
|
|
|
lines will be of the form:
|
2005-10-12 13:49:13 +00:00
|
|
|
"650" ("-"/" ") KEYWORD ["=" ARGUMENTS] CRLF
|
|
|
|
Additional arguments will be of the form
|
2005-11-01 06:27:43 +00:00
|
|
|
SP KEYWORD ["=" ( QuotedString / * NonSpDquote ) ]
|
2011-06-29 22:04:16 +00:00
|
|
|
|
|
|
|
Clients MUST tolerate events with arguments and keywords they do not
|
|
|
|
recognize, and SHOULD process those events as if any unrecognized
|
|
|
|
arguments and keywords were not present.
|
|
|
|
|
2012-11-09 00:18:26 +00:00
|
|
|
Clients SHOULD NOT depend on the order of keyword=value arguments,
|
2011-06-29 22:04:16 +00:00
|
|
|
and SHOULD NOT depend on there being no new keyword=value arguments
|
|
|
|
appearing between existing keyword=value arguments, though as of this
|
|
|
|
writing (Jun 2011) some do. Thus, extensions to this protocol should
|
|
|
|
add new keywords only after the existing keywords, until all
|
|
|
|
controllers have been fixed. At some point this "SHOULD NOT" might
|
|
|
|
become a "MUST NOT".
|
2005-10-12 13:49:13 +00:00
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
4.1.1. Circuit status changed
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
|
2006-10-09 15:47:50 +00:00
|
|
|
"650" SP "CIRC" SP CircuitID SP CircStatus [SP Path]
|
2011-06-24 20:58:02 +00:00
|
|
|
[SP "BUILD_FLAGS=" BuildFlags] [SP "PURPOSE=" Purpose]
|
|
|
|
[SP "HS_STATE=" HSState] [SP "REND_QUERY=" HSAddress]
|
2011-06-27 22:44:32 +00:00
|
|
|
[SP "TIME_CREATED=" TimeCreated]
|
2006-10-19 23:04:49 +00:00
|
|
|
[SP "REASON=" Reason [SP "REMOTE_REASON=" Reason]] CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
CircStatus =
|
|
|
|
"LAUNCHED" / ; circuit ID assigned to new circuit
|
|
|
|
"BUILT" / ; all hops finished, can now accept streams
|
|
|
|
"EXTENDED" / ; one more hop has been completed
|
|
|
|
"FAILED" / ; circuit closed (was not built)
|
|
|
|
"CLOSED" ; circuit closed (was built)
|
|
|
|
|
2010-12-01 11:25:17 +00:00
|
|
|
Path = LongName *("," LongName)
|
|
|
|
; In Tor versions 0.1.2.2-alpha through 0.2.2.1-alpha with feature
|
|
|
|
; VERBOSE_NAMES turned off and before version 0.1.2.2-alpha, Path
|
|
|
|
; is as follows:
|
2011-06-16 07:29:31 +00:00
|
|
|
; Path = ServerID *("," ServerID)
|
|
|
|
|
2011-06-24 20:58:02 +00:00
|
|
|
BuildFlags = BuildFlag *("," BuildFlag)
|
|
|
|
BuildFlag = "ONEHOP_TUNNEL" / "IS_INTERNAL" /
|
|
|
|
"NEED_CAPACITY" / "NEED_UPTIME"
|
|
|
|
|
2011-06-16 07:29:31 +00:00
|
|
|
Purpose = "GENERAL" / "HS_CLIENT_INTRO" / "HS_CLIENT_REND" /
|
|
|
|
"HS_SERVICE_INTRO" / "HS_SERVICE_REND" / "TESTING" /
|
|
|
|
"CONTROLLER"
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2011-06-24 20:58:02 +00:00
|
|
|
HSState = "HSCI_CONNECTING" / "HSCI_INTRO_SENT" / "HSCI_DONE" /
|
|
|
|
"HSCR_CONNECTING" / "HSCR_ESTABLISHED_IDLE" /
|
|
|
|
"HSCR_ESTABLISHED_WAITING" / "HSCR_JOINED" /
|
|
|
|
"HSSI_CONNECTING" / "HSSI_ESTABLISHED" /
|
|
|
|
"HSSR_CONNECTING" / "HSSR_JOINED"
|
|
|
|
|
|
|
|
HSAddress = 16*Base32Character
|
|
|
|
Base32Character = ALPHA / "2" / "3" / "4" / "5" / "6" / "7"
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2012-01-11 17:20:01 +00:00
|
|
|
TimeCreated = ISOTime2Frac
|
2011-06-27 22:44:32 +00:00
|
|
|
Seconds = 1*DIGIT
|
|
|
|
Microseconds = 1*DIGIT
|
|
|
|
|
2006-10-09 15:47:50 +00:00
|
|
|
Reason = "NONE" / "TORPROTOCOL" / "INTERNAL" / "REQUESTED" /
|
2006-10-09 15:47:27 +00:00
|
|
|
"HIBERNATING" / "RESOURCELIMIT" / "CONNECTFAILED" /
|
2006-10-17 15:20:00 +00:00
|
|
|
"OR_IDENTITY" / "OR_CONN_CLOSED" / "TIMEOUT" /
|
2010-07-24 16:19:20 +00:00
|
|
|
"FINISHED" / "DESTROYED" / "NOPATH" / "NOSUCHSERVICE" /
|
|
|
|
"MEASUREMENT_EXPIRED"
|
2006-10-09 15:47:27 +00:00
|
|
|
|
2006-05-21 20:01:13 +00:00
|
|
|
The path is provided only when the circuit has been extended at least one
|
|
|
|
hop.
|
|
|
|
|
2012-01-16 21:52:51 +00:00
|
|
|
The "BUILD_FLAGS" field is provided only in versions 0.2.3.11-alpha
|
2011-06-24 20:58:02 +00:00
|
|
|
and later. Clients MUST accept build flags not listed above.
|
|
|
|
Build flags are defined as follows:
|
|
|
|
|
|
|
|
ONEHOP_TUNNEL (one-hop circuit, used for tunneled directory conns)
|
|
|
|
IS_INTERNAL (internal circuit, not to be used for exiting streams)
|
|
|
|
NEED_CAPACITY (this circuit must use only high-capacity nodes)
|
|
|
|
NEED_UPTIME (this circuit must use only high-uptime nodes)
|
|
|
|
|
2011-06-16 07:29:31 +00:00
|
|
|
The "PURPOSE" field is provided only in versions 0.2.1.6-alpha and
|
|
|
|
later, and only if extended events are enabled (see 3.19). Clients
|
|
|
|
MUST accept purposes not listed above. Purposes are defined as
|
|
|
|
follows:
|
|
|
|
|
|
|
|
GENERAL (circuit for AP and/or directory request streams)
|
|
|
|
HS_CLIENT_INTRO (HS client-side introduction-point circuit)
|
|
|
|
HS_CLIENT_REND (HS client-side rendezvous circuit; carries AP streams)
|
|
|
|
HS_SERVICE_INTRO (HS service-side introduction-point circuit)
|
|
|
|
HS_SERVICE_REND (HS service-side rendezvous circuit)
|
|
|
|
TESTING (reachability-testing circuit; carries no traffic)
|
|
|
|
CONTROLLER (circuit built by a controller)
|
|
|
|
|
2011-06-24 20:58:02 +00:00
|
|
|
The "HS_STATE" field is provided only for hidden-service circuits,
|
2012-01-16 21:52:51 +00:00
|
|
|
and only in versions 0.2.3.11-alpha and later. Clients MUST accept
|
2011-06-24 20:58:02 +00:00
|
|
|
hidden-service circuit states not listed above. Hidden-service
|
|
|
|
circuit states are defined as follows:
|
|
|
|
|
|
|
|
HSCI_* (client-side introduction-point circuit states)
|
|
|
|
HSCI_CONNECTING (connecting to intro point)
|
|
|
|
HSCI_INTRO_SENT (sent INTRODUCE1; waiting for reply from IP)
|
|
|
|
HSCI_DONE (received reply from IP relay; closing)
|
|
|
|
|
|
|
|
HSCR_* (client-side rendezvous-point circuit states)
|
|
|
|
HSCR_CONNECTING (connecting to or waiting for reply from RP)
|
|
|
|
HSCR_ESTABLISHED_IDLE (established RP; waiting for introduction)
|
|
|
|
HSCR_ESTABLISHED_WAITING (introduction sent to HS; waiting for rend)
|
|
|
|
HSCR_JOINED (connected to HS)
|
|
|
|
|
|
|
|
HSSI_* (service-side introduction-point circuit states)
|
|
|
|
HSSI_CONNECTING (connecting to intro point)
|
|
|
|
HSSI_ESTABLISHED (established intro point)
|
|
|
|
|
|
|
|
HSSR_* (service-side rendezvous-point circuit states)
|
|
|
|
HSSR_CONNECTING (connecting to client's rend point)
|
|
|
|
HSSR_JOINED (connected to client's RP circuit)
|
|
|
|
|
|
|
|
The "REND_QUERY" field is provided only for hidden-service-related
|
2012-01-16 21:52:51 +00:00
|
|
|
circuits, and only in versions 0.2.3.11-alpha and later. Clients
|
2011-06-24 20:58:02 +00:00
|
|
|
MUST accept hidden service addresses in formats other than that
|
|
|
|
specified above.
|
|
|
|
|
2012-01-11 17:20:01 +00:00
|
|
|
The "TIME_CREATED" field is provided only in versions 0.2.3.11-alpha and
|
|
|
|
later. TIME_CREATED is the time at which the circuit was created or
|
|
|
|
cannibalized.
|
2011-06-27 22:44:32 +00:00
|
|
|
|
2006-10-09 15:47:50 +00:00
|
|
|
The "REASON" field is provided only for FAILED and CLOSED events, and only
|
|
|
|
if extended events are enabled (see 3.19). Clients MUST accept reasons
|
2006-10-17 15:20:00 +00:00
|
|
|
not listed above. Reasons are as given in tor-spec.txt, except for:
|
2006-10-09 15:47:50 +00:00
|
|
|
|
2012-11-23 15:36:24 +00:00
|
|
|
NOPATH (Not enough nodes to make circuit)
|
|
|
|
MEASUREMENT_EXPIRED (As "TIMEOUT", except that we had left the circuit
|
|
|
|
open for measurement purposes to see how long it
|
|
|
|
would take to finish.)
|
2006-10-09 15:47:27 +00:00
|
|
|
|
2006-10-19 23:04:49 +00:00
|
|
|
The "REMOTE_REASON" field is provided only when we receive a DESTROY or
|
|
|
|
TRUNCATE cell, and only if extended events are enabled. It contains the
|
|
|
|
actual reason given by the remote OR for closing the circuit. Clients MUST
|
|
|
|
accept reasons not listed above. Reasons are as listed in tor-spec.txt.
|
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
4.1.2. Stream status changed
|
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
|
2006-02-04 00:26:12 +00:00
|
|
|
"650" SP "STREAM" SP StreamID SP StreamStatus SP CircID SP Target
|
2007-02-23 20:13:02 +00:00
|
|
|
[SP "REASON=" Reason [ SP "REMOTE_REASON=" Reason ]]
|
2007-06-17 15:10:51 +00:00
|
|
|
[SP "SOURCE=" Source] [ SP "SOURCE_ADDR=" Address ":" Port ]
|
2008-05-27 21:02:36 +00:00
|
|
|
[SP "PURPOSE=" Purpose]
|
2007-06-17 15:10:51 +00:00
|
|
|
CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
StreamStatus =
|
|
|
|
"NEW" / ; New request to connect
|
2005-07-12 18:20:54 +00:00
|
|
|
"NEWRESOLVE" / ; New request to resolve an address
|
2007-02-05 19:15:13 +00:00
|
|
|
"REMAP" / ; Address re-mapped to another
|
2005-07-12 18:20:54 +00:00
|
|
|
"SENTCONNECT" / ; Sent a connect cell along a circuit
|
|
|
|
"SENTRESOLVE" / ; Sent a resolve cell along a circuit
|
2005-06-19 20:40:41 +00:00
|
|
|
"SUCCEEDED" / ; Received a reply; stream established
|
2006-03-08 22:26:36 +00:00
|
|
|
"FAILED" / ; Stream failed and not retriable
|
2005-06-17 18:49:04 +00:00
|
|
|
"CLOSED" / ; Stream closed
|
2006-03-08 22:26:36 +00:00
|
|
|
"DETACHED" ; Detached from circuit; still retriable
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
Target = Address ":" Port
|
|
|
|
|
2005-06-19 20:40:41 +00:00
|
|
|
The circuit ID designates which circuit this stream is attached to. If
|
|
|
|
the stream is unattached, the circuit ID "0" is given.
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2006-10-20 17:54:36 +00:00
|
|
|
Reason = "MISC" / "RESOLVEFAILED" / "CONNECTREFUSED" /
|
|
|
|
"EXITPOLICY" / "DESTROY" / "DONE" / "TIMEOUT" /
|
2010-08-03 22:51:39 +00:00
|
|
|
"NOROUTE" / "HIBERNATING" / "INTERNAL"/ "RESOURCELIMIT" /
|
2011-01-26 01:39:44 +00:00
|
|
|
"CONNRESET" / "TORPROTOCOL" / "NOTDIRECTORY" / "END" /
|
|
|
|
"PRIVATE_ADDR"
|
2006-10-20 17:54:36 +00:00
|
|
|
|
|
|
|
The "REASON" field is provided only for FAILED, CLOSED, and DETACHED
|
|
|
|
events, and only if extended events are enabled (see 3.19). Clients MUST
|
|
|
|
accept reasons not listed above. Reasons are as given in tor-spec.txt,
|
|
|
|
except for:
|
|
|
|
|
2008-08-03 15:34:28 +00:00
|
|
|
END (We received a RELAY_END cell from the other side of this
|
2006-10-20 17:54:36 +00:00
|
|
|
stream.)
|
2011-01-26 01:39:44 +00:00
|
|
|
PRIVATE_ADDR (The client tried to connect to a private address like
|
|
|
|
127.0.0.1 or 10.0.0.1 over Tor.)
|
2008-08-03 15:34:28 +00:00
|
|
|
[XXXX document more. -NM]
|
2006-10-20 17:54:36 +00:00
|
|
|
|
|
|
|
The "REMOTE_REASON" field is provided only when we receive a RELAY_END
|
|
|
|
cell, and only if extended events are enabled. It contains the actual
|
|
|
|
reason given by the remote OR for closing the stream. Clients MUST accept
|
|
|
|
reasons not listed above. Reasons are as listed in tor-spec.txt.
|
|
|
|
|
2007-02-23 20:13:02 +00:00
|
|
|
"REMAP" events include a Source if extended events are enabled:
|
|
|
|
Source = "CACHE" / "EXIT"
|
|
|
|
Clients MUST accept sources not listed above. "CACHE" is given if
|
|
|
|
the Tor client decided to remap the address because of a cached
|
|
|
|
answer, and "EXIT" is given if the remote node we queried gave us
|
|
|
|
the new address as a response.
|
|
|
|
|
2007-06-17 15:10:51 +00:00
|
|
|
The "SOURCE_ADDR" field is included with NEW and NEWRESOLVE events if
|
2007-07-02 22:07:53 +00:00
|
|
|
extended events are enabled. It indicates the address and port
|
|
|
|
that requested the connection, and can be (e.g.) used to look up the
|
|
|
|
requesting program.
|
2007-06-17 15:10:51 +00:00
|
|
|
|
2012-11-23 20:03:33 +00:00
|
|
|
Purpose = "DIR_FETCH" / "DIR_UPLOAD" / "DNS_REQUEST" /
|
2011-06-16 07:30:18 +00:00
|
|
|
"USER" / "DIRPORT_TEST"
|
2008-05-27 21:02:36 +00:00
|
|
|
|
|
|
|
The "PURPOSE" field is provided only for NEW and NEWRESOLVE events, and
|
|
|
|
only if extended events are enabled (see 3.19). Clients MUST accept
|
2012-11-23 16:04:25 +00:00
|
|
|
purposes not listed above. The purposes above are defined as:
|
|
|
|
|
|
|
|
"DIR_FETCH" -- This stream is generated internally to Tor for
|
|
|
|
fetching directory information.
|
|
|
|
"DIR_UPLOAD" -- An internal stream for uploading information to
|
|
|
|
a directory authority.
|
|
|
|
"DIRPORT_TEST" -- A stream we're using to test our own directory
|
|
|
|
port to make sure it's reachable.
|
|
|
|
"DNS_REQUEST" -- A user-initiated DNS request.
|
|
|
|
"USER" -- This stream is handling user traffic, OR it's internal
|
|
|
|
to Tor, but it doesn't match one of the purposes above.
|
2008-05-27 21:02:36 +00:00
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
4.1.3. OR Connection status changed
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
The syntax is:
|
2010-12-01 11:25:17 +00:00
|
|
|
|
|
|
|
"650" SP "ORCONN" SP (LongName / Target) SP ORStatus [ SP "REASON="
|
2007-08-19 05:04:56 +00:00
|
|
|
Reason ] [ SP "NCIRCS=" NumCircuits ] CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2006-03-08 22:26:36 +00:00
|
|
|
ORStatus = "NEW" / "LAUNCHED" / "CONNECTED" / "FAILED" / "CLOSED"
|
|
|
|
|
2010-12-01 11:25:17 +00:00
|
|
|
; In Tor versions 0.1.2.2-alpha through 0.2.2.1-alpha with feature
|
|
|
|
; VERBOSE_NAMES turned off and before version 0.1.2.2-alpha, OR
|
|
|
|
; Connection is as follows:
|
|
|
|
"650" SP "ORCONN" SP (ServerID / Target) SP ORStatus [ SP "REASON="
|
|
|
|
Reason ] [ SP "NCIRCS=" NumCircuits ] CRLF
|
|
|
|
|
2006-03-08 22:26:36 +00:00
|
|
|
NEW is for incoming connections, and LAUNCHED is for outgoing
|
|
|
|
connections. CONNECTED means the TLS handshake has finished (in
|
|
|
|
either direction). FAILED means a connection is being closed that
|
|
|
|
hasn't finished its handshake, and CLOSED is for connections that
|
|
|
|
have handshaked.
|
|
|
|
|
2010-12-01 11:25:17 +00:00
|
|
|
A LongName or ServerID is specified unless it's a NEW connection, in
|
|
|
|
which case we don't know what server it is yet, so we use Address:Port.
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2007-01-15 21:13:37 +00:00
|
|
|
If extended events are enabled (see 3.19), optional reason and
|
|
|
|
circuit counting information is provided for CLOSED and FAILED
|
2007-07-25 22:56:54 +00:00
|
|
|
events.
|
2007-01-15 21:13:37 +00:00
|
|
|
|
|
|
|
Reason = "MISC" / "DONE" / "CONNECTREFUSED" /
|
|
|
|
"IDENTITY" / "CONNECTRESET" / "TIMEOUT" / "NOROUTE" /
|
2008-06-11 01:14:23 +00:00
|
|
|
"IOERROR" / "RESOURCELIMIT"
|
2007-01-15 21:13:37 +00:00
|
|
|
|
|
|
|
NumCircuits counts both established and pending circuits.
|
|
|
|
|
2012-11-23 16:18:38 +00:00
|
|
|
The ORStatus values are as follows:
|
|
|
|
NEW -- We have received a new incoming OR connection, and are starting
|
|
|
|
the server-side handshake.
|
|
|
|
LAUNCHED -- We have launched a new outgoing OR connection, and are
|
|
|
|
starting the client-side handshake.
|
|
|
|
CONNECTED -- The OR connection has been connected and the handshake is
|
|
|
|
done.
|
|
|
|
FAILED -- Our attempt to open the OR connection failed.
|
|
|
|
CLOSED -- The OR connection closed in an unremarkable way.
|
|
|
|
|
|
|
|
The Reason values for closed/failed OR connections are:
|
|
|
|
DONE -- The OR connection has shut down cleanly.
|
|
|
|
CONNECTREFUSED -- We got an ECONNREFUSED while connecting to the target
|
|
|
|
OR.
|
|
|
|
IDENTITY -- We connected to the OR, but found that its identity was
|
|
|
|
not what we expected.
|
|
|
|
CONNECTRESET -- We got an ECONNRESET or similar IO error from the
|
|
|
|
connection with the OR.
|
|
|
|
TIMEOUT -- We got an ETIMEOUT or similar IO error from the connection
|
|
|
|
with the OR, or we're closing the connection for being idle for too
|
|
|
|
long.
|
|
|
|
NOROUTE -- We got an ENOTCONN, ENETUNREACH, ENETDOWN, EHOSTUNREACH, or
|
|
|
|
similar error while connecting to the OR.
|
|
|
|
IOERROR -- We got some other IO error on our connection to the OR.
|
|
|
|
RESOURCELIMIT -- We don't have enough operating system resources (file
|
|
|
|
descriptors, buffers, etc) to connect to the OR.
|
|
|
|
MISC -- The OR connection closed for some other reason.
|
|
|
|
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
4.1.4. Bandwidth used in the last second
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
The syntax is:
|
2007-08-19 05:04:56 +00:00
|
|
|
"650" SP "BW" SP BytesRead SP BytesWritten *(SP Type "=" Num) CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
BytesRead = 1*DIGIT
|
|
|
|
BytesWritten = 1*DIGIT
|
2007-01-22 06:11:56 +00:00
|
|
|
Type = "DIR" / "OR" / "EXIT" / "APP" / ...
|
|
|
|
Num = 1*DIGIT
|
|
|
|
|
2008-08-03 15:34:28 +00:00
|
|
|
BytesRead and BytesWritten are the totals. [In a future Tor version,
|
|
|
|
we may also include a breakdown of the connection types that used
|
|
|
|
bandwidth this second (not implemented yet).]
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2006-10-08 23:24:26 +00:00
|
|
|
4.1.5. Log messages
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
The syntax is:
|
2007-08-19 05:04:56 +00:00
|
|
|
"650" SP Severity SP ReplyText CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
or
|
2007-07-29 04:03:25 +00:00
|
|
|
"650+" Severity CRLF Data 650 SP "OK" CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
Severity = "DEBUG" / "INFO" / "NOTICE" / "WARN"/ "ERR"
|
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
4.1.6. New descriptors available
|
2005-06-17 18:49:04 +00:00
|
|
|
|
|
|
|
Syntax:
|
2010-12-01 11:25:17 +00:00
|
|
|
"650" SP "NEWDESC" 1*(SP LongName) CRLF
|
|
|
|
; In Tor versions 0.1.2.2-alpha through 0.2.2.1-alpha with feature
|
|
|
|
; VERBOSE_NAMES turned off and before version 0.1.2.2-alpha, it
|
|
|
|
; is as follows:
|
|
|
|
"650" SP "NEWDESC" 1*(SP ServerID) CRLF
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2005-08-29 04:49:44 +00:00
|
|
|
4.1.7. New Address mapping
|
2005-06-19 20:40:41 +00:00
|
|
|
|
2012-11-23 16:38:44 +00:00
|
|
|
These events are generated when a new address mapping is entered in
|
|
|
|
Tor's address map cache, or when the answer for a RESOLVE command is
|
|
|
|
found. Entries can be created by a successful or failed DNS lookup,
|
|
|
|
a successful or failed connection attempt, a RESOLVE command,
|
2012-11-23 16:40:04 +00:00
|
|
|
a MAPADDRESS command, the AutomapHostsOnResolve feature, or the
|
|
|
|
TrackHostExits feature.
|
2012-11-23 16:38:44 +00:00
|
|
|
|
2005-06-19 20:40:41 +00:00
|
|
|
Syntax:
|
2007-08-19 04:58:55 +00:00
|
|
|
"650" SP "ADDRMAP" SP Address SP NewAddress SP Expiry
|
2012-11-23 16:38:44 +00:00
|
|
|
[SP "error=" ErrorCode] [SP "EXPIRES=" UTCExpiry] CRLF
|
2007-08-19 04:58:55 +00:00
|
|
|
|
|
|
|
NewAddress = Address / "<error>"
|
2007-01-22 06:11:56 +00:00
|
|
|
Expiry = DQUOTE ISOTime DQUOTE / "NEVER"
|
2005-06-19 20:40:41 +00:00
|
|
|
|
2012-11-23 16:38:44 +00:00
|
|
|
ErrorCode = "yes" / "internal" / "Unable to launch resolve request"
|
|
|
|
UTCExpiry = DQUOTE IsoTime DQUOTE
|
2007-07-25 22:56:54 +00:00
|
|
|
|
2012-11-23 14:57:09 +00:00
|
|
|
Error and UTCExpiry are only provided if extended events are enabled.
|
2012-11-23 16:38:44 +00:00
|
|
|
The values for Error are mostly useless. Future values will be
|
|
|
|
chosen to match 1*(ALNUM / "_"); the "Unable to launch resolve request"
|
|
|
|
value is a bug in Tor before 0.2.4.7-alpha.
|
2007-07-25 22:56:54 +00:00
|
|
|
|
2012-11-23 14:57:09 +00:00
|
|
|
Expiry is expressed as the local time (rather than UTC). This is a bug,
|
|
|
|
left in for backward compatibility; new code should look at UTCExpiry
|
2012-11-23 16:24:09 +00:00
|
|
|
instead. (If Expiry is "NEVER", UTCExpiry is omitted.)
|
2006-12-14 23:39:14 +00:00
|
|
|
|
2005-11-19 18:35:43 +00:00
|
|
|
4.1.8. Descriptors uploaded to us in our role as authoritative dirserver
|
|
|
|
|
2012-11-23 16:45:11 +00:00
|
|
|
Tor generates this event when it's an directory authority, and
|
|
|
|
somebody has just uploaded a router descriptor.
|
|
|
|
|
2005-11-19 18:35:43 +00:00
|
|
|
Syntax:
|
2006-02-09 03:44:49 +00:00
|
|
|
"650" "+" "AUTHDIR_NEWDESCS" CRLF Action CRLF Message CRLF
|
2007-07-29 04:03:25 +00:00
|
|
|
Descriptor CRLF "." CRLF "650" SP "OK" CRLF
|
2005-11-19 18:35:43 +00:00
|
|
|
Action = "ACCEPTED" / "DROPPED" / "REJECTED"
|
|
|
|
Message = Text
|
|
|
|
|
2012-11-23 16:45:11 +00:00
|
|
|
The Descriptor field is the text of the router descriptor; the Action
|
|
|
|
field is "ACCEPTED" if we're accepting the descriptor as the new
|
|
|
|
best valid descriptor for its router, "REJECTED" if we aren't taking
|
|
|
|
the descriptor and we're complaining to the uploading relay about
|
|
|
|
it, and "DROPPED" if we decide to drop the descriptor without
|
|
|
|
complaining. The Message field is a human-readable string
|
|
|
|
explaining why we chose the Action. (It doesn't contain newlines.)
|
|
|
|
|
2006-09-29 18:13:16 +00:00
|
|
|
4.1.9. Our descriptor changed
|
|
|
|
|
|
|
|
Syntax:
|
2007-08-19 05:04:56 +00:00
|
|
|
"650" SP "DESCCHANGED" CRLF
|
2006-09-29 18:13:16 +00:00
|
|
|
|
|
|
|
[First added in 0.1.2.2-alpha.]
|
|
|
|
|
2006-10-12 09:40:36 +00:00
|
|
|
4.1.10. Status events
|
2006-10-08 23:24:26 +00:00
|
|
|
|
2007-01-10 16:33:56 +00:00
|
|
|
Status events (STATUS_GENERAL, STATUS_CLIENT, and STATUS_SERVER) are sent
|
|
|
|
based on occurrences in the Tor process pertaining to the general state of
|
|
|
|
the program. Generally, they correspond to log messages of severity Notice
|
|
|
|
or higher. They differ from log messages in that their format is a
|
|
|
|
specified interface.
|
|
|
|
|
2006-10-08 23:24:26 +00:00
|
|
|
Syntax:
|
2007-01-10 16:33:56 +00:00
|
|
|
"650" SP StatusType SP StatusSeverity SP StatusAction
|
|
|
|
[SP StatusArguments] CRLF
|
|
|
|
|
|
|
|
StatusType = "STATUS_GENERAL" / "STATUS_CLIENT" / "STATUS_SERVER"
|
|
|
|
StatusSeverity = "NOTICE" / "WARN" / "ERR"
|
|
|
|
StatusAction = 1*ALPHA
|
|
|
|
StatusArguments = StatusArgument *(SP StatusArgument)
|
|
|
|
StatusArgument = StatusKeyword '=' StatusValue
|
|
|
|
StatusKeyword = 1*(ALNUM / "_")
|
|
|
|
StatusValue = 1*(ALNUM / '_') / QuotedString
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2011-08-28 23:37:49 +00:00
|
|
|
StatusAction is a string, and StatusArguments is a series of
|
|
|
|
keyword=value pairs on the same line. Values may be space-terminated
|
|
|
|
strings, or quoted strings.
|
2006-10-08 23:24:26 +00:00
|
|
|
|
2006-10-29 07:41:25 +00:00
|
|
|
These events are always produced with EXTENDED_EVENTS and
|
|
|
|
VERBOSE_NAMES; see the explanations in the USEFEATURE section
|
|
|
|
for details.
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
Controllers MUST tolerate unrecognized actions, MUST tolerate
|
|
|
|
unrecognized arguments, MUST tolerate missing arguments, and MUST
|
|
|
|
tolerate arguments that arrive in any order.
|
|
|
|
|
|
|
|
Each event description below is accompanied by a recommendation for
|
|
|
|
controllers. These recommendations are suggestions only; no controller
|
|
|
|
is required to implement them.
|
2007-01-10 16:33:56 +00:00
|
|
|
|
2008-08-03 15:34:28 +00:00
|
|
|
Compatibility note: versions of Tor before 0.2.0.22-rc incorrectly
|
2008-03-11 04:30:14 +00:00
|
|
|
generated "STATUS_SERVER" as "STATUS_SEVER". To be compatible with those
|
|
|
|
versions, tools should accept both.
|
|
|
|
|
2006-10-30 02:54:44 +00:00
|
|
|
Actions for STATUS_GENERAL events can be as follows:
|
2006-10-16 22:41:31 +00:00
|
|
|
|
2006-10-14 03:32:33 +00:00
|
|
|
CLOCK_JUMPED
|
2007-01-06 05:42:31 +00:00
|
|
|
"TIME=NUM"
|
2006-10-14 03:32:33 +00:00
|
|
|
Tor spent enough time without CPU cycles that it has closed all
|
2006-12-12 20:19:54 +00:00
|
|
|
its circuits and will establish them anew. This typically
|
2006-10-14 03:32:33 +00:00
|
|
|
happens when a laptop goes to sleep and then wakes up again. It
|
|
|
|
also happens when the system is swapping so heavily that Tor is
|
2006-12-12 20:19:54 +00:00
|
|
|
starving. The "time" argument specifies the number of seconds Tor
|
2007-01-22 19:20:33 +00:00
|
|
|
thinks it was unconscious for (or alternatively, the number of
|
|
|
|
seconds it went back in time).
|
2007-01-19 21:25:32 +00:00
|
|
|
|
2006-10-30 02:54:44 +00:00
|
|
|
This status event is sent as NOTICE severity normally, but WARN
|
|
|
|
severity if Tor is acting as a server currently.
|
2006-10-23 10:16:43 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Recommendation for controller: ignore it, since we don't really
|
|
|
|
know what the user should do anyway. Hm.}
|
2006-10-23 10:16:43 +00:00
|
|
|
|
|
|
|
DANGEROUS_VERSION
|
2007-01-06 05:42:31 +00:00
|
|
|
"CURRENT=version"
|
2007-12-05 19:32:58 +00:00
|
|
|
"REASON=NEW/OBSOLETE/UNRECOMMENDED"
|
2007-01-06 05:42:31 +00:00
|
|
|
"RECOMMENDED=\"version, version, ...\""
|
2007-01-10 16:33:56 +00:00
|
|
|
Tor has found that directory servers don't recommend its version of
|
|
|
|
the Tor software. RECOMMENDED is a comma-and-space-separated string
|
|
|
|
of Tor versions that are recommended. REASON is NEW if this version
|
2007-12-05 19:32:58 +00:00
|
|
|
of Tor is newer than any recommended version, OBSOLETE if
|
|
|
|
this version of Tor is older than any recommended version, and
|
|
|
|
UNRECOMMENDED if some recommended versions of Tor are newer and
|
|
|
|
some are older than this version. (The "OBSOLETE" reason was called
|
|
|
|
"OLD" from Tor 0.1.2.3-alpha up to and including 0.2.0.12-alpha.)
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to suggest that the user upgrade OLD or
|
|
|
|
UNRECOMMENDED versions. NEW versions may be known-insecure, or may
|
|
|
|
simply be development versions.}
|
|
|
|
|
2006-10-14 03:32:33 +00:00
|
|
|
TOO_MANY_CONNECTIONS
|
2007-01-06 05:42:31 +00:00
|
|
|
"CURRENT=NUM"
|
2007-01-19 21:25:32 +00:00
|
|
|
Tor has reached its ulimit -n or whatever the native limit is on file
|
|
|
|
descriptors or sockets. CURRENT is the number of sockets Tor
|
|
|
|
currently has open. The user should really do something about
|
|
|
|
this. The "current" argument shows the number of connections currently
|
|
|
|
open.
|
|
|
|
|
|
|
|
{Controllers may recommend that the user increase the limit, or
|
|
|
|
increase it for them. Recommendations should be phrased in an
|
|
|
|
OS-appropriate way and automated when possible.}
|
2006-10-14 03:32:33 +00:00
|
|
|
|
|
|
|
BUG
|
2007-01-06 05:42:31 +00:00
|
|
|
"REASON=STRING"
|
2006-10-14 03:32:33 +00:00
|
|
|
Tor has encountered a situation that its developers never expected,
|
|
|
|
and the developers would like to learn that it happened. Perhaps
|
|
|
|
the controller can explain this to the user and encourage her to
|
|
|
|
file a bug report?
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers should log bugs, but shouldn't annoy the user in case a
|
|
|
|
bug appears frequently.}
|
2006-10-15 07:52:58 +00:00
|
|
|
|
2007-09-24 15:41:20 +00:00
|
|
|
CLOCK_SKEW
|
2007-01-06 05:42:31 +00:00
|
|
|
SKEW="+" / "-" SECONDS
|
2007-10-30 15:17:07 +00:00
|
|
|
MIN_SKEW="+" / "-" SECONDS.
|
2009-08-28 07:42:09 +00:00
|
|
|
SOURCE="DIRSERV:" IP ":" Port /
|
|
|
|
"NETWORKSTATUS:" IP ":" Port /
|
|
|
|
"OR:" IP ":" Port /
|
|
|
|
"CONSENSUS"
|
2007-01-06 05:42:31 +00:00
|
|
|
If "SKEW" is present, it's an estimate of how far we are from the
|
2007-10-30 15:17:07 +00:00
|
|
|
time declared in the source. (In other words, if we're an hour in
|
|
|
|
the past, the value is -3600.) "MIN_SKEW" is present, it's a lower
|
|
|
|
bound. If the source is a DIRSERV, we got the current time from a
|
|
|
|
connection to a dirserver. If the source is a NETWORKSTATUS, we
|
|
|
|
decided we're skewed because we got a v2 networkstatus from far in
|
2009-08-28 07:42:09 +00:00
|
|
|
the future. If the source is OR, the skew comes from a NETINFO
|
|
|
|
cell from a connection to another relay. If the source is
|
|
|
|
CONSENSUS, we decided we're skewed because we got a networkstatus
|
|
|
|
consensus from the future.
|
|
|
|
|
|
|
|
{Tor should send this message to controllers when it thinks the
|
|
|
|
skew is so high that it will interfere with proper Tor operation.
|
|
|
|
Controllers shouldn't blindly adjust the clock, since the more
|
|
|
|
accurate source of skew info (DIRSERV) is currently
|
|
|
|
unauthenticated.}
|
2007-01-19 21:25:32 +00:00
|
|
|
|
2007-01-06 07:34:02 +00:00
|
|
|
BAD_LIBEVENT
|
|
|
|
"METHOD=" libevent method
|
|
|
|
"VERSION=" libevent version
|
|
|
|
"BADNESS=" "BROKEN" / "BUGGY" / "SLOW"
|
|
|
|
"RECOVERED=" "NO" / "YES"
|
|
|
|
Tor knows about bugs in using the configured event method in this
|
|
|
|
version of libevent. "BROKEN" libevents won't work at all;
|
|
|
|
"BUGGY" libevents might work okay; "SLOW" libevents will work
|
|
|
|
fine, but not quickly. If "RECOVERED" is YES, Tor managed to
|
|
|
|
switch to a more reliable (but probably slower!) libevent method.
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to warn the user if this event occurs, though
|
|
|
|
generally it's the fault of whoever built the Tor binary and there's
|
|
|
|
not much the user can do besides upgrade libevent or upgrade the
|
|
|
|
binary.}
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2007-01-02 20:58:30 +00:00
|
|
|
DIR_ALL_UNREACHABLE
|
2006-10-18 04:33:58 +00:00
|
|
|
Tor believes that none of the known directory servers are
|
|
|
|
reachable -- this is most likely because the local network is
|
|
|
|
down or otherwise not working, and might help to explain for the
|
|
|
|
user why Tor appears to be broken.
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to warn the user if this event occurs; further
|
|
|
|
action is generally not possible.}
|
|
|
|
|
2008-12-27 06:50:07 +00:00
|
|
|
CONSENSUS_ARRIVED
|
2008-12-09 18:17:07 +00:00
|
|
|
Tor has received and validated a new consensus networkstatus.
|
|
|
|
(This event can be delayed a little while after the consensus
|
|
|
|
is received, if Tor needs to fetch certificates.)
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
Actions for STATUS_CLIENT events can be as follows:
|
2006-10-23 10:16:43 +00:00
|
|
|
|
2008-08-03 15:34:28 +00:00
|
|
|
BOOTSTRAP
|
|
|
|
"PROGRESS=" num
|
|
|
|
"TAG=" Keyword
|
|
|
|
"SUMMARY=" String
|
|
|
|
["WARNING=" String
|
|
|
|
"REASON=" Keyword
|
|
|
|
"COUNT=" num
|
|
|
|
"RECOMMENDATION=" Keyword
|
|
|
|
]
|
|
|
|
|
|
|
|
Tor has made some progress at establishing a connection to the
|
|
|
|
Tor network, fetching directory information, or making its first
|
|
|
|
circuit; or it has encountered a problem while bootstrapping. This
|
|
|
|
status event is especially useful for users with slow connections
|
|
|
|
or with connectivity problems.
|
|
|
|
|
|
|
|
"Progress" gives a number between 0 and 100 for how far through
|
|
|
|
the bootstrapping process we are. "Summary" is a string that can
|
|
|
|
be displayed to the user to describe the *next* task that Tor
|
|
|
|
will tackle, i.e., the task it is working on after sending the
|
|
|
|
status event. "Tag" is a string that controllers can use to
|
|
|
|
recognize bootstrap phases, if they want to do something smarter
|
|
|
|
than just blindly displaying the summary string; see Section 5
|
|
|
|
for the current tags that Tor issues.
|
|
|
|
|
|
|
|
The StatusSeverity describes whether this is a normal bootstrap
|
|
|
|
phase (severity notice) or an indication of a bootstrapping
|
|
|
|
problem (severity warn).
|
|
|
|
|
|
|
|
For bootstrap problems, we include the same progress, tag, and
|
|
|
|
summary values as we would for a normal bootstrap event, but we
|
|
|
|
also include "warning", "reason", "count", and "recommendation"
|
|
|
|
key/value combos. The "count" number tells how many bootstrap
|
|
|
|
problems there have been so far at this phase. The "reason"
|
|
|
|
string lists one of the reasons allowed in the ORCONN event. The
|
|
|
|
"warning" argument string with any hints Tor has to offer about
|
|
|
|
why it's having troubles bootstrapping.
|
|
|
|
|
|
|
|
The "reason" values are long-term-stable controller-facing tags to
|
|
|
|
identify particular issues in a bootstrapping step. The warning
|
|
|
|
strings, on the other hand, are human-readable. Controllers
|
|
|
|
SHOULD NOT rely on the format of any warning string. Currently
|
|
|
|
the possible values for "recommendation" are either "ignore" or
|
|
|
|
"warn" -- if ignore, the controller can accumulate the string in
|
|
|
|
a pile of problems to show the user if the user asks; if warn,
|
|
|
|
the controller should alert the user that Tor is pretty sure
|
|
|
|
there's a bootstrapping problem.
|
|
|
|
|
|
|
|
Currently Tor uses recommendation=ignore for the first
|
|
|
|
nine bootstrap problem reports for a given phase, and then
|
|
|
|
uses recommendation=warn for subsequent problems at that
|
|
|
|
phase. Hopefully this is a good balance between tolerating
|
|
|
|
occasional errors and reporting serious problems quickly.
|
|
|
|
|
2006-10-23 10:16:43 +00:00
|
|
|
ENOUGH_DIR_INFO
|
|
|
|
Tor now knows enough network-status documents and enough server
|
|
|
|
descriptors that it's going to start trying to build circuits now.
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to use this event to decide when to indicate
|
|
|
|
progress to their users, but should not interrupt the user's browsing
|
|
|
|
to tell them so.}
|
|
|
|
|
2006-10-23 10:16:43 +00:00
|
|
|
NOT_ENOUGH_DIR_INFO
|
|
|
|
We discarded expired statuses and router descriptors to fall
|
|
|
|
below the desired threshold of directory information. We won't
|
|
|
|
try to build any circuits until ENOUGH_DIR_INFO occurs again.
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to use this event to decide when to indicate
|
|
|
|
progress to their users, but should not interrupt the user's browsing
|
|
|
|
to tell them so.}
|
|
|
|
|
2006-10-18 04:33:58 +00:00
|
|
|
CIRCUIT_ESTABLISHED
|
|
|
|
Tor is able to establish circuits for client use. This event will
|
|
|
|
only be sent if we just built a circuit that changed our mind --
|
|
|
|
that is, prior to this event we didn't know whether we could
|
|
|
|
establish circuits.
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Suggested use: controllers can notify their users that Tor is
|
2006-10-23 10:16:43 +00:00
|
|
|
ready for use as a client once they see this status event. [Perhaps
|
|
|
|
controllers should also have a timeout if too much time passes and
|
|
|
|
this event hasn't arrived, to give tips on how to troubleshoot.
|
|
|
|
On the other hand, hopefully Tor will send further status events
|
2007-01-19 21:25:32 +00:00
|
|
|
if it can identify the problem.]}
|
2006-10-23 10:16:43 +00:00
|
|
|
|
|
|
|
CIRCUIT_NOT_ESTABLISHED
|
2007-01-06 05:42:31 +00:00
|
|
|
"REASON=" "EXTERNAL_ADDRESS" / "DIR_ALL_UNREACHABLE" / "CLOCK_JUMPED"
|
2006-10-23 10:16:43 +00:00
|
|
|
We are no longer confident that we can build circuits. The "reason"
|
|
|
|
keyword provides an explanation: which other status event type caused
|
|
|
|
our lack of confidence.
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to use this event to decide when to indicate
|
|
|
|
progress to their users, but should not interrupt the user's browsing
|
|
|
|
to do so.}
|
2006-10-23 10:16:43 +00:00
|
|
|
[Note: only REASON=CLOCK_JUMPED is implemented currently.]
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2008-01-20 05:54:15 +00:00
|
|
|
DANGEROUS_PORT
|
|
|
|
"PORT=" port
|
|
|
|
"RESULT=" "REJECT" / "WARN"
|
|
|
|
A stream was initiated to a port that's commonly used for
|
|
|
|
vulnerable-plaintext protocols. If the Result is "reject", we
|
|
|
|
refused the connection; whereas if it's "warn", we allowed it.
|
|
|
|
|
|
|
|
{Controllers should warn their users when this occurs, unless they
|
|
|
|
happen to know that the application using Tor is in fact doing so
|
|
|
|
correctly (e.g., because it is part of a distributed bundle). They
|
|
|
|
might also want some sort of interface to let the user configure
|
|
|
|
their RejectPlaintextPorts and WarnPlaintextPorts config options.}
|
|
|
|
|
2006-10-14 03:32:33 +00:00
|
|
|
DANGEROUS_SOCKS
|
2008-01-20 05:54:15 +00:00
|
|
|
"PROTOCOL=" "SOCKS4" / "SOCKS5"
|
|
|
|
"ADDRESS=" IP:port
|
2007-01-09 05:14:34 +00:00
|
|
|
A connection was made to Tor's SOCKS port using one of the SOCKS
|
|
|
|
approaches that doesn't support hostnames -- only raw IP addresses.
|
|
|
|
If the client application got this address from gethostbyname(),
|
|
|
|
it may be leaking target addresses via DNS.
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers should warn their users when this occurs, unless they
|
|
|
|
happen to know that the application using Tor is in fact doing so
|
|
|
|
correctly (e.g., because it is part of a distributed bundle).}
|
|
|
|
|
2006-10-14 03:32:33 +00:00
|
|
|
SOCKS_UNKNOWN_PROTOCOL
|
2007-01-06 05:42:31 +00:00
|
|
|
"DATA=string"
|
2006-10-14 03:32:33 +00:00
|
|
|
A connection was made to Tor's SOCKS port that tried to use it
|
|
|
|
for something other than the SOCKS protocol. Perhaps the user is
|
2007-01-06 05:42:31 +00:00
|
|
|
using Tor as an HTTP proxy? The DATA is the first few characters
|
|
|
|
sent to Tor on the SOCKS port.
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to warn their users when this occurs: it
|
|
|
|
indicates a misconfigured application.}
|
2006-10-12 09:40:36 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
SOCKS_BAD_HOSTNAME
|
|
|
|
"HOSTNAME=QuotedString"
|
|
|
|
Some application gave us a funny-looking hostname. Perhaps
|
|
|
|
it is broken? In any case it won't work with Tor and the user
|
|
|
|
should know.
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to warn their users when this occurs: it
|
|
|
|
usually indicates a misconfigured application.}
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
Actions for STATUS_SERVER can be as follows:
|
2006-10-18 04:33:58 +00:00
|
|
|
|
|
|
|
EXTERNAL_ADDRESS
|
2007-01-06 05:42:31 +00:00
|
|
|
"ADDRESS=IP"
|
|
|
|
"HOSTNAME=NAME"
|
|
|
|
"METHOD=CONFIGURED/DIRSERV/RESOLVED/INTERFACE/GETHOSTNAME"
|
|
|
|
Our best idea for our externally visible IP has changed to 'IP'.
|
2007-01-09 05:14:34 +00:00
|
|
|
If 'HOSTNAME' is present, we got the new IP by resolving 'NAME'. If the
|
2007-01-06 05:42:31 +00:00
|
|
|
method is 'CONFIGURED', the IP was given verbatim as a configuration
|
|
|
|
option. If the method is 'RESOLVED', we resolved the Address
|
|
|
|
configuration option to get the IP. If the method is 'GETHOSTNAME',
|
|
|
|
we resolved our hostname to get the IP. If the method is 'INTERFACE',
|
|
|
|
we got the address of one of our network interfaces to get the IP. If
|
|
|
|
the method is 'DIRSERV', a directory server told us a guess for what
|
|
|
|
our IP might be.
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers may want to record this info and display it to the user.}
|
2006-10-18 04:33:58 +00:00
|
|
|
|
|
|
|
CHECKING_REACHABILITY
|
2007-01-06 05:42:31 +00:00
|
|
|
"ORADDRESS=IP:port"
|
|
|
|
"DIRADDRESS=IP:port"
|
|
|
|
We're going to start testing the reachability of our external OR port
|
|
|
|
or directory port.
|
|
|
|
|
2008-02-21 06:06:45 +00:00
|
|
|
{This event could affect the controller's idea of server status, but
|
2007-01-19 21:25:32 +00:00
|
|
|
the controller should not interrupt the user to tell them so.}
|
|
|
|
|
2007-01-06 05:42:31 +00:00
|
|
|
REACHABILITY_SUCCEEDED
|
|
|
|
"ORADDRESS=IP:port"
|
|
|
|
"DIRADDRESS=IP:port"
|
|
|
|
We successfully verified the reachability of our external OR port or
|
2007-09-18 15:53:55 +00:00
|
|
|
directory port (depending on which of ORADDRESS or DIRADDRESS is
|
|
|
|
given.)
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2008-02-21 06:06:45 +00:00
|
|
|
{This event could affect the controller's idea of server status, but
|
2007-01-19 21:25:32 +00:00
|
|
|
the controller should not interrupt the user to tell them so.}
|
|
|
|
|
2006-10-18 04:33:58 +00:00
|
|
|
GOOD_SERVER_DESCRIPTOR
|
2008-02-21 06:06:45 +00:00
|
|
|
We successfully uploaded our server descriptor to at least one
|
|
|
|
of the directory authorities, with no complaints.
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2009-08-31 22:37:25 +00:00
|
|
|
{Originally, the goal of this event was to declare "every authority
|
|
|
|
has accepted the descriptor, so there will be no complaints
|
|
|
|
about it." But since some authorities might be offline, it's
|
|
|
|
harder to get certainty than we had thought. As such, this event
|
|
|
|
is equivalent to ACCEPTED_SERVER_DESCRIPTOR below. Controllers
|
|
|
|
should just look at ACCEPTED_SERVER_DESCRIPTOR and should ignore
|
|
|
|
this event for now.}
|
2006-10-15 07:52:58 +00:00
|
|
|
|
2009-09-17 05:58:39 +00:00
|
|
|
SERVER_DESCRIPTOR_STATUS
|
|
|
|
"STATUS=" "LISTED" / "UNLISTED"
|
|
|
|
We just got a new networkstatus consensus, and whether we're in
|
|
|
|
it or not in it has changed. Specifically, status is "listed"
|
|
|
|
if we're listed in it but previous to this point we didn't know
|
|
|
|
we were listed in a consensus; and status is "unlisted" if we
|
|
|
|
thought we should have been listed in it (e.g. we were listed in
|
|
|
|
the last one), but we're not.
|
|
|
|
|
|
|
|
{Moving from listed to unlisted is not necessarily cause for
|
|
|
|
alarm. The relay might have failed a few reachability tests,
|
|
|
|
or the Internet might have had some routing problems. So this
|
|
|
|
feature is mainly to let relay operators know when their relay
|
|
|
|
has successfully been listed in the consensus.}
|
|
|
|
|
|
|
|
[Not implemented yet. We should do this in 0.2.2.x. -RD]
|
|
|
|
|
2007-01-06 07:34:07 +00:00
|
|
|
NAMESERVER_STATUS
|
|
|
|
"NS=addr"
|
|
|
|
"STATUS=" "UP" / "DOWN"
|
|
|
|
"ERR=" message
|
|
|
|
One of our nameservers has changed status.
|
|
|
|
|
2009-08-31 22:37:25 +00:00
|
|
|
{This event could affect the controller's idea of server status, but
|
|
|
|
the controller should not interrupt the user to tell them so.}
|
2007-01-19 21:25:32 +00:00
|
|
|
|
2007-01-06 07:34:07 +00:00
|
|
|
NAMESERVER_ALL_DOWN
|
|
|
|
All of our nameservers have gone down.
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{This is a problem; if it happens often without the nameservers
|
|
|
|
coming up again, the user needs to configure more or better
|
|
|
|
nameservers.}
|
|
|
|
|
2007-01-06 07:34:07 +00:00
|
|
|
DNS_HIJACKED
|
|
|
|
Our DNS provider is providing an address when it should be saying
|
|
|
|
"NOTFOUND"; Tor will treat the address as a synonym for "NOTFOUND".
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{This is an annoyance; controllers may want to tell admins that their
|
|
|
|
DNS provider is not to be trusted.}
|
|
|
|
|
2007-01-06 07:34:07 +00:00
|
|
|
DNS_USELESS
|
|
|
|
Our DNS provider is giving a hijacked address instead of well-known
|
|
|
|
websites; Tor will not try to be an exit node.
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2011-05-09 14:36:59 +00:00
|
|
|
{Controllers could warn the admin if the relay is running as an
|
|
|
|
exit node: the admin needs to configure a good DNS server.
|
2007-01-19 21:25:32 +00:00
|
|
|
Alternatively, this happens a lot in some restrictive environments
|
|
|
|
(hotels, universities, coffeeshops) when the user hasn't registered.}
|
|
|
|
|
2006-10-18 04:33:58 +00:00
|
|
|
BAD_SERVER_DESCRIPTOR
|
2007-01-06 05:42:31 +00:00
|
|
|
"DIRAUTH=addr:port"
|
|
|
|
"REASON=string"
|
|
|
|
A directory authority rejected our descriptor. Possible reasons
|
|
|
|
include malformed descriptors, incorrect keys, highly skewed clocks,
|
|
|
|
and so on.
|
|
|
|
|
2007-01-19 21:25:32 +00:00
|
|
|
{Controllers should warn the admin, and try to cope if they can.}
|
|
|
|
|
2007-01-06 05:42:31 +00:00
|
|
|
ACCEPTED_SERVER_DESCRIPTOR
|
|
|
|
"DIRAUTH=addr:port"
|
|
|
|
A single directory authority accepted our descriptor.
|
2007-01-09 05:14:34 +00:00
|
|
|
// actually notice
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2008-02-21 06:06:45 +00:00
|
|
|
{This event could affect the controller's idea of server status, but
|
2007-01-19 21:25:32 +00:00
|
|
|
the controller should not interrupt the user to tell them so.}
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2006-10-18 04:33:58 +00:00
|
|
|
REACHABILITY_FAILED
|
2007-01-06 05:42:31 +00:00
|
|
|
"ORADDRESS=IP:port"
|
|
|
|
"DIRADDRESS=IP:port"
|
|
|
|
We failed to connect to our external OR port or directory port
|
|
|
|
successfully.
|
2006-10-14 03:32:33 +00:00
|
|
|
|
2008-02-21 06:06:45 +00:00
|
|
|
{This event could affect the controller's idea of server status. The
|
2007-01-19 21:25:32 +00:00
|
|
|
controller should warn the admin and suggest reasonable steps to take.}
|
2006-10-08 23:24:26 +00:00
|
|
|
|
2006-10-18 04:33:58 +00:00
|
|
|
4.1.11. Our set of guard nodes has changed
|
|
|
|
|
|
|
|
Syntax:
|
2007-03-14 23:50:41 +00:00
|
|
|
"650" SP "GUARD" SP Type SP Name SP Status ... CRLF
|
2006-10-18 04:33:58 +00:00
|
|
|
Type = "ENTRY"
|
2007-01-03 10:30:26 +00:00
|
|
|
Name = The (possibly verbose) nickname of the guard affected.
|
2006-12-15 22:40:20 +00:00
|
|
|
Status = "NEW" | "UP" | "DOWN" | "BAD" | "GOOD" | "DROPPED"
|
|
|
|
|
|
|
|
[explain states. XXX]
|
2006-10-18 04:33:58 +00:00
|
|
|
|
2006-10-20 21:04:39 +00:00
|
|
|
4.1.12. Network status has changed
|
|
|
|
|
|
|
|
Syntax:
|
2009-02-16 06:18:03 +00:00
|
|
|
"650" "+" "NS" CRLF 1*NetworkStatus "." CRLF "650" SP "OK" CRLF
|
|
|
|
|
|
|
|
The event is used whenever our local view of a relay status changes.
|
|
|
|
This happens when we get a new v3 consensus (in which case the entries
|
|
|
|
we see are a duplicate of what we see in the NEWCONSENSUS event,
|
|
|
|
below), but it also happens when we decide to mark a relay as up or
|
|
|
|
down in our local status, for example based on connection attempts.
|
2006-10-20 21:04:39 +00:00
|
|
|
|
|
|
|
[First added in 0.1.2.3-alpha]
|
|
|
|
|
2007-02-14 16:46:55 +00:00
|
|
|
4.1.13. Bandwidth used on an application stream
|
2007-02-14 16:46:49 +00:00
|
|
|
|
|
|
|
The syntax is:
|
2009-10-10 19:07:37 +00:00
|
|
|
"650" SP "STREAM_BW" SP StreamID SP BytesWritten SP BytesRead CRLF
|
2007-02-14 16:46:49 +00:00
|
|
|
BytesWritten = 1*DIGIT
|
2009-10-10 19:07:37 +00:00
|
|
|
BytesRead = 1*DIGIT
|
|
|
|
|
|
|
|
BytesWritten and BytesRead are the number of bytes written and read
|
|
|
|
by the application since the last STREAM_BW event on this stream.
|
2007-02-14 16:46:49 +00:00
|
|
|
|
2009-10-10 19:07:37 +00:00
|
|
|
Note that from Tor's perspective, *reading* a byte on a stream means
|
|
|
|
that the application *wrote* the byte. That's why the order of "written"
|
|
|
|
vs "read" is opposite for stream_bw events compared to bw events.
|
2007-02-14 16:46:49 +00:00
|
|
|
|
2009-10-10 19:07:37 +00:00
|
|
|
These events are generated about once per second per stream; no events
|
|
|
|
are generated for streams that have not written or read. These events
|
|
|
|
apply only to streams entering Tor (such as on a SOCKSPort, TransPort,
|
|
|
|
or so on). They are not generated for exiting streams.
|
2007-02-14 16:46:49 +00:00
|
|
|
|
2008-12-27 06:50:07 +00:00
|
|
|
4.1.14. Per-country client stats
|
|
|
|
|
|
|
|
The syntax is:
|
2012-10-19 21:23:04 +00:00
|
|
|
"650" SP "CLIENTS_SEEN" SP TimeStarted SP CountrySummary SP
|
|
|
|
IPVersions CRLF
|
2008-12-27 06:50:07 +00:00
|
|
|
|
|
|
|
We just generated a new summary of which countries we've seen clients
|
|
|
|
from recently. The controller could display this for the user, e.g.
|
|
|
|
in their "relay" configuration window, to give them a sense that they
|
|
|
|
are actually being useful.
|
|
|
|
|
|
|
|
Currently only bridge relays will receive this event, but once we figure
|
|
|
|
out how to sufficiently aggregate and sanitize the client counts on
|
|
|
|
main relays, we might start sending these events in other cases too.
|
|
|
|
|
|
|
|
TimeStarted is a quoted string indicating when the reported summary
|
2012-11-23 14:57:09 +00:00
|
|
|
counts from (in UTCS).
|
2008-12-27 06:50:07 +00:00
|
|
|
|
2009-12-12 07:32:46 +00:00
|
|
|
The CountrySummary keyword has as its argument a comma-separated,
|
|
|
|
possibly empty set of "countrycode=count" pairs. For example (without
|
|
|
|
linebreak),
|
|
|
|
650-CLIENTS_SEEN TimeStarted="2008-12-25 23:50:43"
|
|
|
|
CountrySummary=us=16,de=8,uk=8
|
2009-02-16 06:18:03 +00:00
|
|
|
|
2012-10-19 21:23:04 +00:00
|
|
|
The IPVersions keyword has as its argument a comma-separated set of
|
|
|
|
"protocol-family=count" pairs. For example,
|
|
|
|
IPVersions=v4=16,v6=40
|
|
|
|
|
2011-08-28 23:38:31 +00:00
|
|
|
4.1.15. New consensus networkstatus has arrived
|
2009-02-16 06:18:03 +00:00
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"650" "+" "NEWCONSENSUS" CRLF 1*NetworkStatus "." CRLF "650" SP
|
|
|
|
"OK" CRLF
|
|
|
|
|
|
|
|
A new consensus networkstatus has arrived. We include NS-style lines for
|
|
|
|
every relay in the consensus. NEWCONSENSUS is a separate event from the
|
|
|
|
NS event, because the list here represents every usable relay: so any
|
|
|
|
relay *not* mentioned in this list is implicitly no longer recommended.
|
|
|
|
|
|
|
|
[First added in 0.2.1.13-alpha]
|
2008-12-27 06:50:07 +00:00
|
|
|
|
2011-08-28 23:38:31 +00:00
|
|
|
4.1.16. New circuit buildtime has been set
|
2009-12-25 11:42:35 +00:00
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"650" SP "BUILDTIMEOUT_SET" SP Type SP "TOTAL_TIMES=" Total SP
|
|
|
|
"TIMEOUT_MS=" Timeout SP "XM=" Xm SP "ALPHA=" Alpha SP
|
2010-06-16 01:02:19 +00:00
|
|
|
"CUTOFF_QUANTILE=" Quantile SP "TIMEOUT_RATE=" TimeoutRate SP
|
|
|
|
"CLOSE_MS=" CloseTimeout SP "CLOSE_RATE=" CloseRate
|
|
|
|
CRLF
|
2009-12-25 11:42:35 +00:00
|
|
|
Type = "COMPUTED" / "RESET" / "SUSPENDED" / "DISCARD" / "RESUME"
|
|
|
|
Total = Integer count of timeouts stored
|
|
|
|
Timeout = Integer timeout in milliseconds
|
|
|
|
Xm = Estimated integer Pareto parameter Xm in milliseconds
|
|
|
|
Alpha = Estimated floating point Paredo paremter alpha
|
|
|
|
Quantile = Floating point CDF quantile cutoff point for this timeout
|
2010-06-16 01:02:19 +00:00
|
|
|
TimeoutRate = Floating point ratio of circuits that timeout
|
|
|
|
CloseTimeout = How long to keep measurement circs in milliseconds
|
|
|
|
CloseRate = Floating point ratio of measurement circuits that are closed
|
2009-12-25 11:42:35 +00:00
|
|
|
|
|
|
|
A new circuit build timeout time has been set. If Type is "COMPUTED",
|
|
|
|
Tor has computed the value based on historical data. If Type is "RESET",
|
|
|
|
initialization or drastic network changes have caused Tor to reset
|
|
|
|
the timeout back to the default, to relearn again. If Type is
|
|
|
|
"SUSPENDED", Tor has detected a loss of network connectivity and has
|
|
|
|
temporarily changed the timeout value to the default until the network
|
|
|
|
recovers. If type is "DISCARD", Tor has decided to discard timeout
|
|
|
|
values that likely happened while the network was down. If type is
|
|
|
|
"RESUME", Tor has decided to resume timeout calculation.
|
|
|
|
|
|
|
|
The Total value is the count of circuit build times Tor used in
|
|
|
|
computing this value. It is capped internally at the maximum number
|
|
|
|
of build times Tor stores (NCIRCUITS_TO_OBSERVE).
|
|
|
|
|
|
|
|
The Timeout itself is provided in milliseconds. Internally, Tor rounds
|
|
|
|
this value to the nearest second before using it.
|
|
|
|
|
|
|
|
[First added in 0.2.2.7-alpha]
|
|
|
|
|
2010-11-14 22:33:55 +00:00
|
|
|
4.1.17. Signal received
|
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
"650" SP "SIGNAL" SP Signal CRLF
|
|
|
|
|
|
|
|
Signal = "RELOAD" / "DUMP" / "DEBUG" / "NEWNYM" / "CLEARDNSCACHE"
|
|
|
|
|
|
|
|
A signal has been received and actions taken by Tor. The meaning of each
|
|
|
|
signal, and the mapping to Unix signals, is as defined in section 3.7.
|
2010-11-19 20:52:10 +00:00
|
|
|
Future versions of Tor MAY generate signals other than those listed here;
|
|
|
|
controllers MUST be able to accept them.
|
|
|
|
|
2010-11-14 22:33:55 +00:00
|
|
|
If Tor chose to ignore a signal (such as NEWNYM), this event will not be
|
2010-11-19 20:52:10 +00:00
|
|
|
sent. Note that some options (like ReloadTorrcOnSIGHUP) may affect the
|
|
|
|
semantics of the signals here.
|
2010-11-14 22:33:55 +00:00
|
|
|
|
|
|
|
Note that the HALT (SIGTERM) and SHUTDOWN (SIGINT) signals do not currently
|
|
|
|
generate any event.
|
|
|
|
|
2010-11-19 20:52:10 +00:00
|
|
|
[First added in 0.2.3.1-alpha]
|
2010-11-14 22:33:55 +00:00
|
|
|
|
2011-08-28 23:38:31 +00:00
|
|
|
4.1.18. Configuration changed
|
2011-08-09 02:38:02 +00:00
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
StartReplyLine *(MidReplyLine) EndReplyLine
|
|
|
|
|
|
|
|
StartReplyLine = "650-CONF_CHANGED" CRLF
|
|
|
|
MidReplyLine = "650-" KEYWORD ["=" VALUE] CRLF
|
2011-08-09 13:54:10 +00:00
|
|
|
EndReplyLine = "650 OK"
|
2011-08-09 02:38:02 +00:00
|
|
|
|
|
|
|
Tor configuration options have changed (such as via a SETCONF or RELOAD
|
|
|
|
signal). KEYWORD and VALUE specify the configuration option that was changed.
|
|
|
|
Undefined configuration options contain only the KEYWORD.
|
|
|
|
|
2012-01-11 17:13:15 +00:00
|
|
|
4.1.19. Circuit status changed slightly
|
2011-06-26 14:32:51 +00:00
|
|
|
|
|
|
|
The syntax is:
|
|
|
|
|
2012-01-11 17:13:15 +00:00
|
|
|
"650" SP "CIRC_MINOR" SP CircuitID SP CircEvent [SP Path]
|
2011-06-26 14:32:51 +00:00
|
|
|
[SP "BUILD_FLAGS=" BuildFlags] [SP "PURPOSE=" Purpose]
|
|
|
|
[SP "HS_STATE=" HSState] [SP "REND_QUERY=" HSAddress]
|
2011-06-27 22:44:32 +00:00
|
|
|
[SP "TIME_CREATED=" TimeCreated]
|
2011-06-26 14:32:51 +00:00
|
|
|
[SP "OLD_PURPOSE=" Purpose [SP "OLD_HS_STATE=" HSState]] CRLF
|
|
|
|
|
|
|
|
CircEvent =
|
|
|
|
"PURPOSE_CHANGED" / ; circuit purpose or HS-related state changed
|
|
|
|
"CANNIBALIZED" ; circuit cannibalized
|
|
|
|
|
2011-06-26 17:54:57 +00:00
|
|
|
Clients MUST accept circuit events not listed above.
|
|
|
|
|
2011-06-26 14:32:51 +00:00
|
|
|
The "OLD_PURPOSE" field is provided for both PURPOSE_CHANGED and
|
|
|
|
CANNIBALIZED events. The "OLD_HS_STATE" field is provided whenever
|
|
|
|
the "OLD_PURPOSE" field is provided and is a hidden-service-related
|
|
|
|
purpose.
|
|
|
|
|
|
|
|
Other fields are as specified in section 4.1.1 above.
|
|
|
|
|
2012-01-11 17:20:01 +00:00
|
|
|
[First added in 0.2.3.11-alpha]
|
2011-06-26 14:32:51 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
5. Implementation notes
|
|
|
|
|
|
|
|
5.1. Authentication
|
2005-06-05 14:10:48 +00:00
|
|
|
|
2009-01-08 14:07:05 +00:00
|
|
|
If the control port is open and no authentication operation is enabled, Tor
|
|
|
|
trusts any local user that connects to the control port. This is generally
|
|
|
|
a poor idea.
|
2005-06-05 14:10:48 +00:00
|
|
|
|
2012-02-20 16:49:16 +00:00
|
|
|
If the 'CookieAuthentication' option is true, Tor writes a "magic
|
|
|
|
cookie" file named "control_auth_cookie" into its data directory (or
|
|
|
|
to another file specified in the 'CookieAuthFile' option). To
|
2012-02-20 16:59:47 +00:00
|
|
|
authenticate, the controller must demonstrate that it can read the
|
|
|
|
contents of the cookie file:
|
|
|
|
|
2012-03-26 18:15:10 +00:00
|
|
|
* Current versions of Tor support cookie authentication
|
2012-02-20 16:59:47 +00:00
|
|
|
using the "COOKIE" authentication method: the controller sends the
|
|
|
|
contents of the cookie file, encoded in hexadecimal. This
|
|
|
|
authentication method exposes the user running a controller to an
|
|
|
|
unintended information disclosure attack whenever the controller
|
|
|
|
has greater filesystem read access than the process that it has
|
|
|
|
connected to. (Note that a controller may connect to a process
|
|
|
|
other than Tor.) It is almost never safe to use, even if the
|
|
|
|
controller's user has explicitly specified which filename to read
|
|
|
|
an authentication cookie from. For this reason, the COOKIE
|
|
|
|
authentication method has been deprecated and will be removed from
|
2012-03-26 18:15:10 +00:00
|
|
|
Tor before some future version of Tor.
|
2012-02-20 16:59:47 +00:00
|
|
|
|
2012-03-26 18:15:10 +00:00
|
|
|
* 0.2.2.x versions of Tor starting with 0.2.2.36, and all versions of
|
|
|
|
Tor after 0.2.3.12-alpha, support cookie authentication using the
|
2012-02-20 16:59:47 +00:00
|
|
|
"SAFECOOKIE" authentication method, which discloses much less
|
|
|
|
information about the contents of the cookie file.
|
2006-06-07 06:53:43 +00:00
|
|
|
|
2005-06-05 14:10:48 +00:00
|
|
|
If the 'HashedControlPassword' option is set, it must contain the salted
|
|
|
|
hash of a secret password. The salted hash is computed according to the
|
|
|
|
S2K algorithm in RFC 2440 (OpenPGP), and prefixed with the s2k specifier.
|
|
|
|
This is then encoded in hexadecimal, prefixed by the indicator sequence
|
|
|
|
"16:". Thus, for example, the password 'foo' could encode to:
|
|
|
|
16:660537E3E1CD49996044A3BF558097A981F539FEA2F9DA662B4626C1C2
|
|
|
|
++++++++++++++++**^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
salt hashed value
|
|
|
|
indicator
|
|
|
|
You can generate the salt of a password by calling
|
|
|
|
'tor --hash-password <password>'
|
|
|
|
or by using the example code in the Python and Java controller libraries.
|
|
|
|
To authenticate under this scheme, the controller sends Tor the original
|
2008-04-12 16:58:20 +00:00
|
|
|
secret that was used to generate the password, either as a quoted string
|
|
|
|
or encoded in hexadecimal.
|
2004-11-07 22:36:43 +00:00
|
|
|
|
2005-06-17 18:49:04 +00:00
|
|
|
5.2. Don't let the buffer get too big.
|
2004-11-03 19:57:43 +00:00
|
|
|
|
2004-11-07 22:36:43 +00:00
|
|
|
If you ask for lots of events, and 16MB of them queue up on the buffer,
|
|
|
|
the Tor process will close the socket.
|
2004-08-09 04:21:12 +00:00
|
|
|
|
2006-10-03 19:00:01 +00:00
|
|
|
5.3. Backward compatibility with v0 control protocol.
|
2005-06-17 18:49:04 +00:00
|
|
|
|
2008-08-03 15:34:28 +00:00
|
|
|
The 'version 0' control protocol was replaced in Tor 0.1.1.x. Support
|
|
|
|
was removed in Tor 0.2.0.x. Every non-obsolete version of Tor now
|
|
|
|
supports the version 1 control protocol.
|
2007-08-08 14:43:25 +00:00
|
|
|
|
2007-08-02 21:18:26 +00:00
|
|
|
For backward compatibility with the "version 0" control protocol,
|
|
|
|
Tor used to check whether the third octet of the first command is zero.
|
|
|
|
(If it was, Tor assumed that version 0 is in use.)
|
|
|
|
|
|
|
|
This compatibility was removed in Tor 0.1.2.16 and 0.2.0.4-alpha.
|
2006-02-09 03:44:49 +00:00
|
|
|
|
2008-08-03 15:34:28 +00:00
|
|
|
5.4. Tor config options for use by controllers
|
2007-05-03 17:43:49 +00:00
|
|
|
|
|
|
|
Tor provides a few special configuration options for use by controllers.
|
|
|
|
These options can be set and examined by the SETCONF and GETCONF commands,
|
|
|
|
but are not saved to disk by SAVECONF.
|
|
|
|
|
|
|
|
Generally, these options make Tor unusable by disabling a portion of Tor's
|
|
|
|
normal operations. Unless a controller provides replacement functionality
|
|
|
|
to fill this gap, Tor will not correctly handle user requests.
|
|
|
|
|
2011-04-15 01:20:11 +00:00
|
|
|
__AllDirActionsPrivate
|
2007-05-03 17:43:49 +00:00
|
|
|
|
|
|
|
If true, Tor will try to launch all directory operations through
|
|
|
|
anonymous connections. (Ordinarily, Tor only tries to anonymize
|
|
|
|
requests related to hidden services.) This option will slow down
|
|
|
|
directory access, and may stop Tor from working entirely if it does not
|
|
|
|
yet have enough directory information to build circuits.
|
|
|
|
|
|
|
|
(Boolean. Default: "0".)
|
|
|
|
|
|
|
|
__DisablePredictedCircuits
|
|
|
|
|
2008-05-21 20:22:43 +00:00
|
|
|
If true, Tor will not launch preemptive "general-purpose" circuits for
|
2007-05-03 17:43:49 +00:00
|
|
|
streams to attach to. (It will still launch circuits for testing and
|
|
|
|
for hidden services.)
|
|
|
|
|
|
|
|
(Boolean. Default: "0".)
|
|
|
|
|
|
|
|
__LeaveStreamsUnattached
|
|
|
|
|
|
|
|
If true, Tor will not automatically attach new streams to circuits;
|
|
|
|
instead, the controller must attach them with ATTACHSTREAM. If the
|
|
|
|
controller does not attach the streams, their data will never be routed.
|
|
|
|
|
|
|
|
(Boolean. Default: "0".)
|
|
|
|
|
2008-02-17 18:45:07 +00:00
|
|
|
__HashedControlSessionPassword
|
|
|
|
|
|
|
|
As HashedControlPassword, but is not saved to the torrc file by
|
|
|
|
SAVECONF. Added in Tor 0.2.0.20-rc.
|
2008-08-03 15:34:28 +00:00
|
|
|
|
2008-12-10 22:17:02 +00:00
|
|
|
__ReloadTorrcOnSIGHUP
|
|
|
|
|
|
|
|
If this option is true (the default), we reload the torrc from disk
|
|
|
|
every time we get a SIGHUP (from the controller or via a signal).
|
|
|
|
Otherwise, we don't. This option exists so that controllers can keep
|
|
|
|
their options from getting overwritten when a user sends Tor a HUP for
|
|
|
|
some other reason (for example, to rotate the logs).
|
|
|
|
|
|
|
|
(Boolean. Default: "1")
|
|
|
|
|
2011-05-22 21:18:34 +00:00
|
|
|
__OwningControllerProcess
|
|
|
|
|
|
|
|
If this option is set to a process ID, Tor will periodically check
|
|
|
|
whether a process with the specified PID exists, and exit if one
|
2011-05-23 04:46:20 +00:00
|
|
|
does not. Added in Tor 0.2.2.28-beta. This option's intended use
|
|
|
|
is documented in section 3.23 with the related TAKEOWNERSHIP
|
|
|
|
command.
|
|
|
|
|
|
|
|
Note that this option can only specify a single process ID, unlike
|
|
|
|
the TAKEOWNERSHIP command which can be sent along multiple control
|
|
|
|
connections.
|
2011-05-22 21:18:34 +00:00
|
|
|
|
|
|
|
(String. Default: unset.)
|
|
|
|
|
2008-08-03 15:34:28 +00:00
|
|
|
5.5. Phases from the Bootstrap status event.
|
|
|
|
|
|
|
|
This section describes the various bootstrap phases currently reported
|
|
|
|
by Tor. Controllers should not assume that the percentages and tags
|
|
|
|
listed here will continue to match up, or even that the tags will stay
|
|
|
|
in the same order. Some phases might also be skipped (not reported)
|
|
|
|
if the associated bootstrap step is already complete, or if the phase
|
|
|
|
no longer is necessary. Only "starting" and "done" are guaranteed to
|
|
|
|
exist in all future versions.
|
|
|
|
|
|
|
|
Current Tor versions enter these phases in order, monotonically.
|
|
|
|
Future Tors MAY revisit earlier stages.
|
|
|
|
|
|
|
|
Phase 0:
|
2009-01-28 06:46:14 +00:00
|
|
|
tag=starting summary="Starting"
|
2008-08-03 15:34:28 +00:00
|
|
|
|
|
|
|
Tor starts out in this phase.
|
|
|
|
|
|
|
|
Phase 5:
|
|
|
|
tag=conn_dir summary="Connecting to directory mirror"
|
|
|
|
|
|
|
|
Tor sends this event as soon as Tor has chosen a directory mirror --
|
|
|
|
e.g. one of the authorities if bootstrapping for the first time or
|
|
|
|
after a long downtime, or one of the relays listed in its cached
|
|
|
|
directory information otherwise.
|
|
|
|
|
|
|
|
Tor will stay at this phase until it has successfully established
|
|
|
|
a TCP connection with some directory mirror. Problems in this phase
|
|
|
|
generally happen because Tor doesn't have a network connection, or
|
|
|
|
because the local firewall is dropping SYN packets.
|
|
|
|
|
2009-01-28 06:46:14 +00:00
|
|
|
Phase 10:
|
2008-08-03 15:34:28 +00:00
|
|
|
tag=handshake_dir summary="Finishing handshake with directory mirror"
|
|
|
|
|
|
|
|
This event occurs when Tor establishes a TCP connection with a relay used
|
|
|
|
as a directory mirror (or its https proxy if it's using one). Tor remains
|
|
|
|
in this phase until the TLS handshake with the relay is finished.
|
|
|
|
|
|
|
|
Problems in this phase generally happen because Tor's firewall is
|
|
|
|
doing more sophisticated MITM attacks on it, or doing packet-level
|
|
|
|
keyword recognition of Tor's handshake.
|
|
|
|
|
|
|
|
Phase 15:
|
|
|
|
tag=onehop_create summary="Establishing one-hop circuit for dir info"
|
|
|
|
|
|
|
|
Once TLS is finished with a relay, Tor will send a CREATE_FAST cell
|
|
|
|
to establish a one-hop circuit for retrieving directory information.
|
|
|
|
It will remain in this phase until it receives the CREATED_FAST cell
|
|
|
|
back, indicating that the circuit is ready.
|
|
|
|
|
|
|
|
Phase 20:
|
|
|
|
tag=requesting_status summary="Asking for networkstatus consensus"
|
|
|
|
|
|
|
|
Once we've finished our one-hop circuit, we will start a new stream
|
|
|
|
for fetching the networkstatus consensus. We'll stay in this phase
|
|
|
|
until we get the 'connected' relay cell back, indicating that we've
|
|
|
|
established a directory connection.
|
|
|
|
|
|
|
|
Phase 25:
|
|
|
|
tag=loading_status summary="Loading networkstatus consensus"
|
|
|
|
|
|
|
|
Once we've established a directory connection, we will start fetching
|
|
|
|
the networkstatus consensus document. This could take a while; this
|
|
|
|
phase is a good opportunity for using the "progress" keyword to indicate
|
|
|
|
partial progress.
|
|
|
|
|
|
|
|
This phase could stall if the directory mirror we picked doesn't
|
|
|
|
have a copy of the networkstatus consensus so we have to ask another,
|
|
|
|
or it does give us a copy but we don't find it valid.
|
|
|
|
|
|
|
|
Phase 40:
|
|
|
|
tag=loading_keys summary="Loading authority key certs"
|
|
|
|
|
|
|
|
Sometimes when we've finished loading the networkstatus consensus,
|
|
|
|
we find that we don't have all the authority key certificates for the
|
|
|
|
keys that signed the consensus. At that point we put the consensus we
|
|
|
|
fetched on hold and fetch the keys so we can verify the signatures.
|
|
|
|
|
|
|
|
Phase 45
|
|
|
|
tag=requesting_descriptors summary="Asking for relay descriptors"
|
|
|
|
|
|
|
|
Once we have a valid networkstatus consensus and we've checked all
|
|
|
|
its signatures, we start asking for relay descriptors. We stay in this
|
|
|
|
phase until we have received a 'connected' relay cell in response to
|
|
|
|
a request for descriptors.
|
|
|
|
|
|
|
|
Phase 50:
|
|
|
|
tag=loading_descriptors summary="Loading relay descriptors"
|
|
|
|
|
|
|
|
We will ask for relay descriptors from several different locations,
|
|
|
|
so this step will probably make up the bulk of the bootstrapping,
|
|
|
|
especially for users with slow connections. We stay in this phase until
|
|
|
|
we have descriptors for at least 1/4 of the usable relays listed in
|
|
|
|
the networkstatus consensus. This phase is also a good opportunity to
|
|
|
|
use the "progress" keyword to indicate partial steps.
|
|
|
|
|
|
|
|
Phase 80:
|
|
|
|
tag=conn_or summary="Connecting to entry guard"
|
|
|
|
|
|
|
|
Once we have a valid consensus and enough relay descriptors, we choose
|
|
|
|
some entry guards and start trying to build some circuits. This step
|
|
|
|
is similar to the "conn_dir" phase above; the only difference is
|
|
|
|
the context.
|
|
|
|
|
|
|
|
If a Tor starts with enough recent cached directory information,
|
|
|
|
its first bootstrap status event will be for the conn_or phase.
|
|
|
|
|
|
|
|
Phase 85:
|
|
|
|
tag=handshake_or summary="Finishing handshake with entry guard"
|
|
|
|
|
|
|
|
This phase is similar to the "handshake_dir" phase, but it gets reached
|
|
|
|
if we finish a TCP connection to a Tor relay and we have already reached
|
|
|
|
the "conn_or" phase. We'll stay in this phase until we complete a TLS
|
|
|
|
handshake with a Tor relay.
|
|
|
|
|
|
|
|
Phase 90:
|
2009-01-28 06:46:14 +00:00
|
|
|
tag=circuit_create summary="Establishing circuits"
|
2008-08-03 15:34:28 +00:00
|
|
|
|
|
|
|
Once we've finished our TLS handshake with an entry guard, we will
|
|
|
|
set about trying to make some 3-hop circuits in case we need them soon.
|
|
|
|
|
|
|
|
Phase 100:
|
|
|
|
tag=done summary="Done"
|
|
|
|
|
|
|
|
A full 3-hop exit circuit has been established. Tor is ready to handle
|
|
|
|
application connections now.
|
|
|
|
|