[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/master] bug933 - Match against super-domains in MapAddress
commit c6d8c6baaa983aecd6a5121ec6ed8e2d9a2a24be
Author: Robert Hogan <robert@xxxxxxxxxx>
Date: Mon Aug 2 20:09:37 2010 +0100
bug933 - Match against super-domains in MapAddress
Allow MapAddress to handle directives such as:
MapAddress .torproject.org .torserver.exit
MapAddress .org 1.1.1.1
Add tests for addressmap_rewrite.
---
changes/bug933 | 4 ++
doc/tor.1.txt | 7 ++-
src/or/connection_edge.c | 41 ++++++++++++++-
src/test/Makefile.am | 1 +
src/test/test.c | 2 +
src/test/test_config.c | 127 ++++++++++++++++++++++++++++++++++++++++++++++
6 files changed, 178 insertions(+), 4 deletions(-)
diff --git a/changes/bug933 b/changes/bug933
new file mode 100644
index 0000000..b646858
--- /dev/null
+++ b/changes/bug933
@@ -0,0 +1,4 @@
+ o Minor features:
+ - Allow MapAddress directives to specify matches against super-domains,
+ as in 'MapAddress *.torproject.org *.torproject.org.torserver.exit'.
+ Implements issue 933.
diff --git a/doc/tor.1.txt b/doc/tor.1.txt
index 4edee80..4d4ad9f 100644
--- a/doc/tor.1.txt
+++ b/doc/tor.1.txt
@@ -659,7 +659,12 @@ The following options are useful only for clients (that is, if
before processing it. For example, if you always want connections to
www.indymedia.org to exit via __torserver__ (where __torserver__ is the
nickname of the server), use "MapAddress www.indymedia.org
- www.indymedia.org.torserver.exit".
+ www.indymedia.org.torserver.exit". If the value is prepended with a \'.\',
+ it is treated as matching an entire domain.For example, if you always
+ want connections to any sub-domain of indymedia.org to exit via
+ __torserver__ (where __torserver__ is the nickname of the server), use
+ "MapAddress .indymedia.org .torserver.exit". (Note the leading '.' in
+ each part of the directive.)
**NewCircuitPeriod** __NUM__::
Every NUM seconds consider whether to build a new circuit. (Default: 30
diff --git a/src/or/connection_edge.c b/src/or/connection_edge.c
index f59f44c..4bb49c8 100644
--- a/src/or/connection_edge.c
+++ b/src/or/connection_edge.c
@@ -1037,6 +1037,29 @@ addressmap_free_all(void)
virtaddress_reversemap = NULL;
}
+/** Try to find a match for AddressMap directives that use
+ * domain notation such as '.torproject.org .exitnode.exit'.
+ */
+static addressmap_entry_t *
+addressmap_match_superdomains(char *address)
+{
+ strmap_iter_t *iter;
+ const char *key;
+ void *_val;
+ addressmap_entry_t *val;
+
+ for (iter = strmap_iter_init(addressmap); !strmap_iter_done(iter); ) {
+ strmap_iter_get(iter, &key, &_val);
+ val = _val;
+ if (key[0] == '.') { /* match end */
+ if (!strcasecmpend(address, key) || !strcasecmp(address, &key[1]))
+ return val;
+ }
+ iter = strmap_iter_next(addressmap,iter);
+ }
+ return 0;
+}
+
/** Look at address, and rewrite it until it doesn't want any
* more rewrites; but don't get into an infinite loop.
* Don't write more than maxlen chars into address. Return true if the
@@ -1050,24 +1073,36 @@ addressmap_rewrite(char *address, size_t maxlen, time_t *expires_out)
addressmap_entry_t *ent;
int rewrites;
char *cp;
+ char *s;
time_t expires = TIME_MAX;
for (rewrites = 0; rewrites < 16; rewrites++) {
ent = strmap_get(addressmap, address);
+ if (!ent || !ent->new_address)
+ ent = addressmap_match_superdomains(address);
+
if (!ent || !ent->new_address) {
if (expires_out)
*expires_out = expires;
return (rewrites > 0); /* done, no rewrite needed */
}
- cp = tor_strdup(escaped_safe_str_client(ent->new_address));
+ cp = tor_strdup(escaped_safe_str_client(address));
+ /* If the address to rewrite to is in the form '.exitnode.exit'
+ then append it to the given address */
+ s = strrchr(ent->new_address,'.');
+ if (ent->new_address[0] == '.' && !strcmp(s+1,"exit"))
+ strlcpy(address + strlen(address), ent->new_address,
+ (maxlen - strlen(address)));
+ else
+ strlcpy(address, ent->new_address, maxlen);
+
log_info(LD_APP, "Addressmap: rewriting %s to %s",
- escaped_safe_str_client(address), cp);
+ cp, escaped_safe_str_client(address));
if (ent->expires > 1 && ent->expires < expires)
expires = ent->expires;
tor_free(cp);
- strlcpy(address, ent->new_address, maxlen);
}
log_warn(LD_CONFIG,
"Loop detected: we've rewritten %s 16 times! Using it as-is.",
diff --git a/src/test/Makefile.am b/src/test/Makefile.am
index 8527150..e675431 100644
--- a/src/test/Makefile.am
+++ b/src/test/Makefile.am
@@ -20,6 +20,7 @@ test_SOURCES = \
test_dir.c \
test_microdesc.c \
test_util.c \
+ test_config.c \
tinytest.c
test_LDFLAGS = @TOR_LDFLAGS_zlib@ @TOR_LDFLAGS_openssl@ \
diff --git a/src/test/test.c b/src/test/test.c
index 605e44c..76644a7 100644
--- a/src/test/test.c
+++ b/src/test/test.c
@@ -1941,6 +1941,7 @@ extern struct testcase_t container_tests[];
extern struct testcase_t util_tests[];
extern struct testcase_t dir_tests[];
extern struct testcase_t microdesc_tests[];
+extern struct testcase_t config_tests[];
static struct testgroup_t testgroups[] = {
{ "", test_array },
@@ -1951,6 +1952,7 @@ static struct testgroup_t testgroups[] = {
{ "util/", util_tests },
{ "dir/", dir_tests },
{ "dir/md/", microdesc_tests },
+ { "config/", config_tests },
END_OF_GROUPS
};
diff --git a/src/test/test_config.c b/src/test/test_config.c
new file mode 100644
index 0000000..f39a9ef
--- /dev/null
+++ b/src/test/test_config.c
@@ -0,0 +1,127 @@
+/* Copyright (c) 2001-2004, Roger Dingledine.
+ * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
+ * Copyright (c) 2007-2010, The Tor Project, Inc. */
+/* See LICENSE for licensing information */
+
+#include "orconfig.h"
+#include "or.h"
+#include "config.h"
+#include "connection_edge.h"
+#include "test.h"
+
+static void
+test_config_addressmap(void)
+{
+ char buf[1024];
+ char address[256];
+ time_t expires = TIME_MAX;
+ strlcpy(buf, "MapAddress .google.com .torserver.exit\n"
+ "MapAddress www.torproject.org 1.1.1.1\n"
+ "MapAddress other.torproject.org "
+ "this.torproject.org.otherserver.exit\n"
+ "MapAddress test.torproject.org 2.2.2.2\n"
+ "MapAddress www.google.com 3.3.3.3\n"
+ "MapAddress www.example.org 4.4.4.4\n"
+ "MapAddress 4.4.4.4 5.5.5.5\n"
+ "MapAddress www.infiniteloop.org 6.6.6.6\n"
+ "MapAddress 6.6.6.6 www.infiniteloop.org\n"
+ , sizeof(buf));
+
+ config_get_lines(buf, &(get_options()->AddressMap));
+ config_register_addressmaps(get_options());
+
+ /* Where no mapping for FQDN match on top-level domain */
+ strlcpy(address, "reader.google.com", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "reader.google.com.torserver.exit");
+
+ /* Where mapping for FQDN match on FQDN */
+ strlcpy(address, "www.google.com", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "3.3.3.3");
+
+ strlcpy(address, "www.torproject.org", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "1.1.1.1");
+
+ strlcpy(address, "other.torproject.org", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "this.torproject.org.otherserver.exit");
+
+ strlcpy(address, "test.torproject.org", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "2.2.2.2");
+
+ /* Test a chain of address mappings */
+ strlcpy(address, "www.example.org", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "5.5.5.5");
+
+ /* Test infinite address mapping results in no change */
+ strlcpy(address, "www.infiniteloop.org", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "www.infiniteloop.org");
+
+ /* Test we don't find false positives */
+ strlcpy(address, "www.example.com", sizeof(address));
+ test_assert(!addressmap_rewrite(address, sizeof(address), &expires));
+
+ /* Test top-level-domain matching a bit harder */
+ addressmap_clear_configured();
+ strlcpy(buf, "MapAddress .com .torserver.exit\n"
+ "MapAddress .torproject.org 1.1.1.1\n"
+ "MapAddress .net 2.2.2.2\n"
+ , sizeof(buf));
+ config_get_lines(buf, &(get_options()->AddressMap));
+ config_register_addressmaps(get_options());
+
+ strlcpy(address, "www.abc.com", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "www.abc.com.torserver.exit");
+
+ strlcpy(address, "www.def.com", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "www.def.com.torserver.exit");
+
+ strlcpy(address, "www.torproject.org", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "1.1.1.1");
+
+ strlcpy(address, "test.torproject.org", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "1.1.1.1");
+
+ strlcpy(address, "torproject.net", sizeof(address));
+ test_assert(addressmap_rewrite(address, sizeof(address), &expires));
+ test_streq(address, "2.2.2.2");
+
+ /* We don't support '.' as a mapping directive */
+ addressmap_clear_configured();
+ strlcpy(buf, "MapAddress . .torserver.exit\n", sizeof(buf));
+ config_get_lines(buf, &(get_options()->AddressMap));
+ config_register_addressmaps(get_options());
+
+ strlcpy(address, "www.abc.com", sizeof(address));
+ test_assert(!addressmap_rewrite(address, sizeof(address), &expires));
+
+ strlcpy(address, "www.def.net", sizeof(address));
+ test_assert(!addressmap_rewrite(address, sizeof(address), &expires));
+
+ strlcpy(address, "www.torproject.org", sizeof(address));
+ test_assert(!addressmap_rewrite(address, sizeof(address), &expires));
+
+done:
+ ;
+}
+
+#define CONFIG_LEGACY(name) \
+ { #name, legacy_test_helper, 0, &legacy_setup, test_config_ ## name }
+
+#define CONFIG_TEST(name, flags) \
+ { #name, test_config_ ## name, flags, NULL, NULL }
+
+struct testcase_t config_tests[] = {
+ CONFIG_LEGACY(addressmap),
+ END_OF_TESTCASES
+};
+
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits