[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-115.10.0esr-13.5-1] fixup! Bug 40933: Add tor-launcher functionality
Pier Angelo Vendrame (@pierov)
git at gitlab.torproject.org
Wed Apr 24 12:25:38 UTC 2024
Pier Angelo Vendrame pushed to branch tor-browser-115.10.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
a5f43320 by Pier Angelo Vendrame at 2024-04-23T18:40:17+02:00
fixup! Bug 40933: Add tor-launcher functionality
Bug 42541: Bridges without fingerprint break the circuit display.
The circuit display backend relies on GETCONF bridges because we want
to know the pluggable transport for the circuit display and, as far as
I can tell, no GETINFO command includes this information.
However, when we get a circuit from tor, we get its fingerprint, which
is optional on the bridge lines.
Therefore, in some cases we did not have the data to display, and we
just hid the circuit display button.
With this commit, when we miss the fingerprint of a bridge, we try to
get it in another way. It might produce incorrect results (we rely on
the IP address the user passes on the bridge line), but at least it
will show the circuit display.
- - - - -
1 changed file:
- toolkit/components/tor-launcher/TorControlPort.sys.mjs
Changes:
=====================================
toolkit/components/tor-launcher/TorControlPort.sys.mjs
=====================================
@@ -795,7 +795,64 @@ export class TorController {
* @returns {Bridge[]} The configured bridges
*/
async getBridges() {
- return (await this.#getConf("BRIDGE")).map(TorParsers.parseBridgeLine);
+ let missingId = false;
+ const bridges = (await this.#getConf("BRIDGE")).map(line => {
+ const info = TorParsers.parseBridgeLine(line);
+ if (!info.id) {
+ missingId = true;
+ }
+ return info;
+ });
+
+ // tor-browser#42541: bridge lines are allowed not to have a fingerprint.
+ // If such a bridge is in use, we will fail to associate it to the circuits,
+ // and the circuit display will not be shown.
+ // Tor provides a couple of GETINFO commands we can try to use to get more
+ // data about bridges, in particular GETINFO ns/purpose/bridge.
+ // While it tells us the bridge's IP (as configured by the user, which might
+ // be different from the real one with some PTs such as Snowflake), it does
+ // not tell the pluggable transport.
+ // Therefore, we need to start from the configured bridge lines, and if we
+ // detect that a bridge does not have a fingerprint, we try to associate one
+ // through its IP address and port.
+ // However, users can set them directly, therefore we might end up setting
+ // a fingerprint to the wrong line (e.g., if the IP address is reused).
+ // Also, we are not sure about when the data of ns/purpose/bridge is
+ // populated.
+ // Usually, we are interested only in the data of currently active bridges
+ // for the circuit display. So, as a matter of fact, we expect to have
+ // entries and to expose only the correct and working data in the frontend.
+ if (missingId) {
+ // See https://spec.torproject.org/dir-spec/consensus-formats.html.
+ // r <name> <identity> <digest> <date> <time> <address> <orport> <dirport>
+ const info = (await this.#getInfo("ns/purpose/bridge")).matchAll(
+ /^r\s+\S+\s+(?<identity>\S+)\s+\S+\s+\S+\s+\S+\s+(?<address>\S+)\s+(?<orport>\d+)/gm
+ );
+ const b64ToHex = b64 => {
+ let hex = "";
+ const raw = atob(b64);
+ for (let i = 0; i < raw.length; i++) {
+ hex += raw.charCodeAt(i).toString(16).toUpperCase().padStart(2, "0");
+ }
+ return hex;
+ };
+ const knownBridges = new Map(
+ Array.from(info, m => [
+ `${m.groups.address}:${m.groups.orport}`,
+ b64ToHex(m.groups.identity),
+ ])
+ );
+ for (const b of bridges) {
+ if (!b.id) {
+ // We expect the addresses of these lines to be only IPv4, therefore
+ // we do not check for brackets, even though they might be matched by
+ // our regex.
+ b.id = knownBridges.get(b.addr) ?? "";
+ }
+ }
+ }
+
+ return bridges;
}
/**
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a5f433209e7d5b0376208e183203d3bf7148645c
--
This project does not include diff previews in email notifications.
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/a5f433209e7d5b0376208e183203d3bf7148645c
You're receiving this email because of your account on gitlab.torproject.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-commits/attachments/20240424/6bfd33f3/attachment-0001.htm>
More information about the tor-commits
mailing list