tor_socksproto/
err.rs

1//! Declare an error type for tor_socksproto
2use std::borrow::Cow;
3
4use thiserror::Error;
5
6use tor_error::{ErrorKind, HasKind};
7
8/// An error that occurs while negotiating a SOCKS handshake.
9#[derive(Clone, Error, Debug)]
10#[non_exhaustive]
11pub enum Error {
12    /// The SOCKS client didn't implement SOCKS correctly.
13    ///
14    /// (Or, more likely, we didn't account for its behavior.)
15    #[error("SOCKS protocol syntax violation")]
16    Syntax,
17
18    /// Failed to decode a SOCKS message.
19    #[error("Error decoding SOCKS message")]
20    Decode(#[from] tor_bytes::Error),
21
22    /// The SOCKS client declared a SOCKS version number that isn't
23    /// one we support.
24    ///
25    /// In all likelihood, this is somebody trying to use the port for
26    /// some protocol other than SOCKS.
27    #[error("Unrecognized SOCKS protocol version {0}")]
28    BadProtocol(u8),
29
30    /// The SOCKS client tried to use a SOCKS feature that we don't
31    /// support at all.
32    #[error("SOCKS feature ({0}) not implemented")]
33    NotImplemented(Cow<'static, str>),
34
35    /// Tried to progress the SOCKS handshake when it was already
36    /// finished.  This is a programming error.
37    #[error("SOCKS handshake was finished; no need to call this again")]
38    AlreadyFinished(tor_error::Bug),
39
40    /// The SOCKS proxy refused our authentication.
41    #[error("SOCKS Authentication failed")]
42    AuthRejected,
43
44    /// During the protocol exchange, we needed to handle a handshake bigger than our buffer
45    #[error("SOCKS protocol message size limit {limit} exceeded")]
46    MessageTooLong {
47        /// The limit in bytes
48        limit: usize,
49    },
50
51    /// Peer closed connection during SOCKS handshake
52    #[error("peer closed connection during SOCKS handshake")]
53    UnexpectedEof,
54
55    /// The peer sent payload data too early
56    ///
57    /// The peer sent data after its part of the protocol exchange,
58    /// without waiting for our side of it to complete,
59    /// in circumstances where we consider that a protocol violation by the peer.
60    ///
61    /// Returned only by
62    /// [`Finished::into_output_forbid_pipelining`](crate::Finished::into_output_forbid_pipelining).
63    #[error("SOCKS peer inappropriately pipelined (optimistically sent) payload data")]
64    ForbiddenPipelining,
65
66    /// The program (perhaps this module, perhaps Arti, perhaps the caller) is buggy
67    #[error("Bug while handling SOCKS handshake")]
68    Bug(#[from] tor_error::Bug),
69}
70
71// Note: at present, tor-socksproto isn't used in any settings where ErrorKind
72// is used.  This is provided for future-proofing, since someday we'll want to
73// have SOCKS protocol support internally as well as in the `arti` proxy.
74impl HasKind for Error {
75    fn kind(&self) -> ErrorKind {
76        use Error as E;
77        use ErrorKind as EK;
78        match self {
79            E::Decode(tor_bytes::Error::Incomplete { .. }) => {
80                // This variant should always get converted before a user can
81                // see it.
82                EK::Internal
83            }
84            E::Syntax | E::Decode(_) | E::BadProtocol(_) => EK::LocalProtocolViolation,
85            E::NotImplemented(_) => EK::NotImplemented,
86            E::AuthRejected => EK::LocalProtocolViolation,
87            E::UnexpectedEof => EK::LocalProtocolViolation,
88            E::ForbiddenPipelining => EK::LocalProtocolViolation,
89            E::MessageTooLong { .. } => EK::Internal, // We should select a buffer big enough!
90            E::AlreadyFinished(e) => e.kind(),
91            E::Bug(e) => e.kind(),
92        }
93    }
94}