[or-cvs] r16554: {tor} Add exitpolicy summaries to the consensus (in tor/trunk: doc/spec/proposals src/or)
weasel at seul.org
weasel at seul.org
Thu Aug 14 23:01:32 UTC 2008
Author: weasel
Date: 2008-08-14 19:01:31 -0400 (Thu, 14 Aug 2008)
New Revision: 16554
Modified:
tor/trunk/doc/spec/proposals/141-jit-sd-downloads.txt
tor/trunk/src/or/dirvote.c
Log:
Add exitpolicy summaries to the consensus
Modified: tor/trunk/doc/spec/proposals/141-jit-sd-downloads.txt
===================================================================
--- tor/trunk/doc/spec/proposals/141-jit-sd-downloads.txt 2008-08-14 23:01:21 UTC (rev 16553)
+++ tor/trunk/doc/spec/proposals/141-jit-sd-downloads.txt 2008-08-14 23:01:31 UTC (rev 16554)
@@ -259,12 +259,33 @@
use an accept-style summary and list as much of the port list as is
possible within these 1000 bytes.
- Similarly to IP address, ports, and timestamp a consensus should list
- the exit policy matching the descriptor digest referenced in the
- consensus document (See dir-spec section 3.4).
+3.4.1 Consensus selection
-3.4.1 Client behaviour
+ When building a consensus, authorities have to agree on a digest of
+ the server descriptor to list in the router line for each router.
+ This is documented in dir-spec section 3.4.
+ All authorities that listed that agreed upon descriptor digest in
+ their vote should also list the same exit policy summary - or list
+ none at all if the authority has not been upgraded to list that
+ information in their vote.
+
+ If we have votes with matching server descriptor digest of which at
+ least one of them has an exit policy then we differ between two cases:
+ a) all authorities agree (or abstained) on the policy summary, and we
+ use the exit policy summary that they all listed in their vote,
+ b) something went wrong (or some authority is playing foul) and we
+ have different policy summaries. In that case we pick the one
+ that is most commonly listed in votes with the matching
+ descriptor. We break ties in favour of the lexigraphically larger
+ vote.
+
+ If none one of the votes with a matching server descriptor digest has
+ an exit policy summary we use the most commonly listed one in all
+ votes, breaking ties like in case b above.
+
+3.4.2 Client behaviour
+
When choosing an exit node for a specific request a Tor client will
choose from the list of nodes that exit to the requested port as given
by the consensus document. If a client has additional knowledge (like
Modified: tor/trunk/src/or/dirvote.c
===================================================================
--- tor/trunk/src/or/dirvote.c 2008-08-14 23:01:21 UTC (rev 16553)
+++ tor/trunk/src/or/dirvote.c 2008-08-14 23:01:31 UTC (rev 16554)
@@ -688,6 +688,7 @@
smartlist_t *matching_descs = smartlist_create();
smartlist_t *chosen_flags = smartlist_create();
smartlist_t *versions = smartlist_create();
+ smartlist_t *exitsummaries = smartlist_create();
uint32_t *bandwidths = tor_malloc(sizeof(uint32_t) * smartlist_len(votes));
int num_bandwidths;
@@ -799,6 +800,7 @@
const char *lowest_id = NULL;
const char *chosen_version;
const char *chosen_name = NULL;
+ int exitsummary_disagreement = 0;
int is_named = 0, is_unnamed = 0, is_running = 0;
int naming_conflict = 0;
int n_listing = 0;
@@ -935,6 +937,85 @@
rs_out.bandwidth = median_uint32(bandwidths, num_bandwidths);
}
+ /* Ok, we already picked a descriptor digest we want to list
+ * previously. Now we want to use the exit policy summary from
+ * that descriptor. If everybody plays nice all the voters who
+ * listed that descriptor will have the same summary. If not then
+ * something is fishy and we'll use the most common one (breaking
+ * ties in favor of lexigraphically larger one (only because it
+ * lets me reuse more existing code.
+ *
+ * The other case that can happen is that no authority that voted
+ * for that descriptor has an exit policy summary. That's
+ * probably quite unlikely but can happen. In that case we use
+ * the policy that was most often listed in votes, again breaking
+ * ties like in the previous case.
+ */
+ if (consensus_method >= 5) {
+ /* Okay, go through all the votes for this router. We prepared
+ * that list previously */
+ const char *chosen_exitsummary = NULL;
+ smartlist_clear(exitsummaries);
+ SMARTLIST_FOREACH(matching_descs, vote_routerstatus_t *, vsr, {
+ /* Check if the vote where this status comes from had the
+ * proper descriptor */
+ tor_assert(!memcmp(rs_out.identity_digest, vsr->status.identity_digest, DIGEST_LEN));
+ if (vsr->status.has_exitsummary &&
+ !memcmp(rs_out.descriptor_digest, vsr->status.descriptor_digest, DIGEST_LEN)) {
+ tor_assert(vsr->status.exitsummary);
+ smartlist_add(exitsummaries, vsr->status.exitsummary);
+ if (!chosen_exitsummary) {
+ chosen_exitsummary = vsr->status.exitsummary;
+ } else if (strcmp(chosen_exitsummary, vsr->status.exitsummary)) {
+ /* Great. There's disagreement among the voters. That
+ * really shouldn't be */
+ exitsummary_disagreement = 1;
+ }
+ }
+ });
+
+ if (exitsummary_disagreement) {
+ char id[HEX_DIGEST_LEN+1];
+ char dd[HEX_DIGEST_LEN+1];
+ base16_encode(id, sizeof(dd), rs_out.identity_digest, DIGEST_LEN);
+ base16_encode(dd, sizeof(dd), rs_out.descriptor_digest, DIGEST_LEN);
+ log_warn(LD_DIR, "The voters disgreed on the exit policy summary for"
+ " router %s with descriptor %s. This really shouldn't"
+ " have happened.", id, dd);
+
+ smartlist_sort_strings(exitsummaries);
+ chosen_exitsummary = get_most_frequent_member(exitsummaries);
+ } else if (!chosen_exitsummary) {
+ char id[HEX_DIGEST_LEN+1];
+ char dd[HEX_DIGEST_LEN+1];
+ base16_encode(id, sizeof(dd), rs_out.identity_digest, DIGEST_LEN);
+ base16_encode(dd, sizeof(dd), rs_out.descriptor_digest, DIGEST_LEN);
+ log_warn(LD_DIR, "Not one of the voters that made us select"
+ "descriptor %s for router %s had an exit policy"
+ "summary", dd, id);
+
+ /* Ok, none of those voting for the digest we chose had an
+ * exit policy for us. Well, that kinda sucks.
+ */
+ smartlist_clear(exitsummaries);
+ SMARTLIST_FOREACH(matching_descs, vote_routerstatus_t *, vsr, {
+ if (vsr->status.has_exitsummary)
+ smartlist_add(exitsummaries, vsr->status.exitsummary);
+ });
+ smartlist_sort_strings(exitsummaries);
+ chosen_exitsummary = get_most_frequent_member(exitsummaries);
+
+ if (!chosen_exitsummary)
+ log_warn(LD_DIR, "Wow, not one of the voters had an exit "
+ "policy summary for %s. Wow.", id);
+ }
+
+ if (chosen_exitsummary) {
+ rs_out.has_exitsummary = 1;
+ rs_out.exitsummary = (char *)chosen_exitsummary; /* yea, discards the const */
+ }
+ }
+
/* Okay!! Now we can write the descriptor... */
/* First line goes into "buf". */
routerstatus_format_entry(buf, sizeof(buf), &rs_out, NULL, 1, 0);
@@ -957,6 +1038,15 @@
}
smartlist_add(chunks, tor_strdup(buf));
};
+ /* Now the exitpolicy summary line. */
+ if (rs_out.has_exitsummary) {
+ int r = tor_snprintf(buf, sizeof(buf), "p %s\n", rs_out.exitsummary);
+ if (r<0) {
+ log_warn(LD_BUG, "Not enough space in buffer for exitpolicy line.");
+ *buf = '\0';
+ }
+ smartlist_add(chunks, tor_strdup(buf));
+ };
/* And the loop is over and we move on to the next router */
}
@@ -975,6 +1065,7 @@
smartlist_free(matching_descs);
smartlist_free(chosen_flags);
smartlist_free(versions);
+ smartlist_free(exitsummaries);
}
/* Add a signature. */
More information about the tor-commits
mailing list