Crate tor_hsservice

source ·
Expand description

§tor-hsservice

Provide an onion service on the Tor network.

§Overview

This crate is part of Arti, a project to implement Tor in Rust.

It provides a service-side implementation of the onion service protocol, which enables Tor clients to provide a responder-anonymous service on the network. Other parties can connect to an onion service without learning where it is hosted.

This crate provides a low-level implementation of the onion service protocol that may not be suitable for typical users. Most users will instead want to use the arti binary to run an onion service proxy, or use the TorClient::launch_onion_service API in the arti-client crate.

§Limitations

This crate is a work in progress.

As of February 2024, there are some features missing that are necessary for running a secure, private onion service. Notably these include:

  • Resistance to denial of service attacks
    • Support for proof-of-work checking and validation
    • Detection and response to out-of-memory conditions
  • Vanguard relays for resistance to path discovery
  • Descriptor encryption keys, so that only certain clients to connect to the service.
  • Removal of old keys and state information. (Currently, the on-disk state will grow slowly but without bound, with sensitive information retained indefinitely.)

§Reference

You can learn more about the protocols here as part of the onion services Specification.

LICENSE: MIT OR Apache-2.0

Re-exports§

Modules§

  • anon_level 🔒
    Define the Anonymity type to indicate a level of anonymity.
  • Configuration information for onion services.
  • err 🔒
    Declare an error type for the tor-hsservice crate.
  • helpers 🔒
    Functions to help working with onion services.
  • Imports used internally within this crate
  • IPT Establisher
  • ipt_lid 🔒
  • ipt_mgr 🔒
    IPT Manager
  • ipt_set 🔒
    IPT set - the principal API between the IPT manager and publisher
  • keys 🔒
    KeySpecifier implementations for hidden service keys.
  • netdir 🔒
    Helpers for obtaining NetDirs.
  • nickname 🔒
    HsNickname module itself is private, but HsNickname etc. are re-exported
  • publish 🔒
    Publish and maintain onion service descriptors
  • Implementation for the introduce-and-rendezvous handshake.
  • replay 🔒
    Facility for detecting and preventing replays on introduction requests.
  • req 🔒
    Request objects used to implement onion services.
  • Support for reporting the status of an onion service.
  • time_store 🔒
    Saving/loading timestamps to disk
  • Utilities to track and compare times and timeouts

Structs§

Enums§

  • The level of anonymity that an onion service should try to run with.
  • An error which occurs trying to communicate with a particular client.
  • An error that occurs while trying to upload a descriptor.
  • An error produced while trying to connect to a rendezvous point and open a session with a client.
  • An error which means we cannot continue to try to operate an onion service.
  • An error produced while trying to process an introduction request we have received from a client via an introduction point.
  • An error caused by a faulty IPT.
  • Return value from one call to the main loop iteration
  • An error which occurs trying to create and start up an onion service

Traits§

  • Launchable 🔒
    Private trait used to type-erase ForLaunch<R>, so that we don’t need to parameterize OnionService on <R>.

Functions§

Type Aliases§

  • LinkSpecs 🔒
    Convenience alias for link specifiers of an intro point
  • Convenient type alias for an ntor public key