tor_netdir/
params.rs

1//! Implements a usable view of Tor network parameters.
2//!
3//! The Tor consensus document contains a number of 'network
4//! parameters', which are integer-valued items voted on by the
5//! directory authorities.  They are used to tune the behavior of
6//! numerous aspects of the network.
7//! A set of Tor network parameters
8//!
9//! The Tor consensus document contains a number of 'network
10//! parameters', which are integer-valued items voted on by the
11//! directory authorities.  These parameters are used to tune the
12//! behavior of numerous aspects of the network.
13//!
14//! This type differs from
15//! [`NetParams`](tor_netdoc::doc::netstatus::NetParams) in that it
16//! only exposes a set of parameters recognized by arti.  In return
17//! for this restriction, it makes sure that the values it gives are
18//! in range, and provides default values for any parameters that are
19//! missing.
20
21use tor_units::{
22    BoundedInt32, IntegerDays, IntegerMilliseconds, IntegerMinutes, IntegerSeconds, Percentage,
23    SendMeVersion,
24};
25
26/// Upper limit for channel padding timeouts
27///
28/// This is just a safety catch which might help prevent integer overflow,
29/// and also might prevent a client getting permanently stuck in a state
30/// where it ought to send padding but never does.
31///
32/// The actual value is stolen from C Tor as per
33///   <https://gitlab.torproject.org/tpo/core/arti/-/merge_requests/586#note_2813638>
34/// pending an update to the specifications
35///   <https://gitlab.torproject.org/tpo/core/torspec/-/issues/120>
36pub const CHANNEL_PADDING_TIMEOUT_UPPER_BOUND: i32 = 60_000;
37
38/// An object that can be constructed from an i32, with saturating semantics.
39pub trait FromInt32Saturating {
40    /// Construct an instance of this object from `val`.
41    ///
42    /// If `val` is too low, treat it as the lowest value that would be
43    /// valid.  If `val` is too high, treat it as the highest value that
44    /// would be valid.
45    fn from_saturating(val: i32) -> Self;
46
47    /// Try to construct an instance of this object from `val`.
48    ///
49    /// If `val` is out of range, return an error instead.
50    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
51    where
52        Self: Sized;
53}
54
55impl FromInt32Saturating for i32 {
56    fn from_saturating(val: i32) -> Self {
57        val
58    }
59
60    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
61    where
62        Self: Sized,
63    {
64        Ok(val)
65    }
66}
67impl<const L: i32, const H: i32> FromInt32Saturating for BoundedInt32<L, H> {
68    fn from_saturating(val: i32) -> Self {
69        Self::saturating_new(val)
70    }
71
72    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
73    where
74        Self: Sized,
75    {
76        Self::checked_new(val)
77    }
78}
79impl<T: Copy + Into<f64> + FromInt32Saturating> FromInt32Saturating for Percentage<T> {
80    fn from_saturating(val: i32) -> Self {
81        Self::new(T::from_saturating(val))
82    }
83
84    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
85    where
86        Self: Sized,
87    {
88        Ok(Self::new(T::from_checked(val)?))
89    }
90}
91impl<T: FromInt32Saturating + TryInto<u64>> FromInt32Saturating for IntegerMilliseconds<T> {
92    fn from_saturating(val: i32) -> Self {
93        Self::new(T::from_saturating(val))
94    }
95
96    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
97    where
98        Self: Sized,
99    {
100        Ok(Self::new(T::from_checked(val)?))
101    }
102}
103impl<T: FromInt32Saturating + TryInto<u64>> FromInt32Saturating for IntegerSeconds<T> {
104    fn from_saturating(val: i32) -> Self {
105        Self::new(T::from_saturating(val))
106    }
107
108    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
109    where
110        Self: Sized,
111    {
112        Ok(Self::new(T::from_checked(val)?))
113    }
114}
115impl<T: FromInt32Saturating + TryInto<u64>> FromInt32Saturating for IntegerMinutes<T> {
116    fn from_saturating(val: i32) -> Self {
117        Self::new(T::from_saturating(val))
118    }
119
120    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
121    where
122        Self: Sized,
123    {
124        Ok(Self::new(T::from_checked(val)?))
125    }
126}
127impl<T: FromInt32Saturating + TryInto<u64>> FromInt32Saturating for IntegerDays<T> {
128    fn from_saturating(val: i32) -> Self {
129        Self::new(T::from_saturating(val))
130    }
131
132    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
133    where
134        Self: Sized,
135    {
136        Ok(Self::new(T::from_checked(val)?))
137    }
138}
139impl FromInt32Saturating for SendMeVersion {
140    fn from_saturating(val: i32) -> Self {
141        Self::new(val.clamp(0, 255) as u8)
142    }
143
144    fn from_checked(val: i32) -> Result<Self, tor_units::Error>
145    where
146        Self: Sized,
147    {
148        let val = BoundedInt32::<0, 255>::checked_new(val)?;
149        Ok(Self::new(val.get() as u8))
150    }
151}
152
153/// A macro to help us declare the net parameters object.  It lets us
154/// put the information about each parameter in just one place, even
155/// though it will later get split between the struct declaration, the
156/// Default implementation, and the implementation of
157/// `saturating_update_override`.
158macro_rules! declare_net_parameters {
159    {
160        $(#[$s_meta:meta])* $s_v:vis struct $s_name:ident {
161            $(
162                $(#[$p_meta:meta])* $p_v:vis
163                    $p_name:ident : $p_type:ty
164                    = ($p_dflt:expr) from $p_string:literal
165            ),*
166            $( , )?
167        }
168    } =>
169    {
170        $(#[$s_meta])* $s_v struct $s_name {
171            $(
172                $(#[$p_meta])* $p_v $p_name : $p_type
173            ),*
174        }
175
176        impl $s_name {
177            /// Try to construct an instance of with its default values.
178            ///
179            /// (This should always succeed, unless one of the default values
180            /// is out-of-bounds for the type.)
181            fn default_values() -> Result<Self, tor_units::Error> {
182                Ok(Self {
183                    $( $p_name : $p_dflt.try_into()? ),*
184                })
185            }
186            /// Replace the current value for the parameter identified in the
187            /// consensus with `key` with a new value `val`.
188            ///
189            /// Uses saturating semantics if the new value is out-of-range.
190            ///
191            /// Returns true if the key was recognized, and false otherwise.
192            fn set_saturating(&mut self, key: &str, val: i32) -> bool {
193                match key {
194                    $( $p_string => self.$p_name = {
195                        type T = $p_type;
196                        match T::from_checked(val) {
197                            Ok(v) => v,
198                            Err(e) => {
199                                tracing::warn!("For key {key}, clamping out of range value: {e:?}");
200                                T::from_saturating(val)
201                            }
202                        }
203                    }, )*
204                    _ => return false,
205                }
206                true
207            }
208        }
209    }
210}
211
212declare_net_parameters! {
213
214/// This structure holds recognized configuration parameters. All values are type-safe,
215/// and where applicable clamped to be within range.
216#[derive(Clone, Debug)]
217#[non_exhaustive]
218pub struct NetParameters {
219    /// A weighting factor for bandwidth calculations
220    pub bw_weight_scale: BoundedInt32<1, { i32::MAX }> = (10_000)
221        from "bwweightscale",
222    /// If true, do not attempt to learn circuit-build timeouts at all.
223    pub cbt_learning_disabled: BoundedInt32<0, 1> = (0)
224        from "cbtdisabled",
225    /// Number of histograms bins to consider when estimating Xm for a
226    /// Pareto-based circuit timeout estimator.
227    pub cbt_num_xm_modes: BoundedInt32<1, 20> = (10)
228        from "cbtnummodes",
229    /// How many recent circuit success/timeout statuses do we remember
230    /// when trying to tell if our circuit timeouts are too low?
231    pub cbt_success_count: BoundedInt32<3, 1_000> = (20)
232        from "cbtrecentcount",
233    /// How many timeouts (in the last `cbt_success_count` observations)
234    /// indicates that our circuit timeouts are too low?
235    pub cbt_max_timeouts: BoundedInt32<3, 10_000> = (18)
236        from "cbtmaxtimeouts",
237    /// Smallest number of circuit build times we have to view in order to use
238    /// our Pareto-based circuit timeout estimator.
239    pub cbt_min_circs_for_estimate: BoundedInt32<1, 10_000> = (100)
240        from "cbtmincircs",
241    /// Quantile to use when determining the correct circuit timeout value
242    /// with our Pareto estimator.
243    ///
244    /// (We continue building circuits after this timeout, but only
245    /// for build-time measurement purposes.)
246    pub cbt_timeout_quantile: Percentage<BoundedInt32<10, 99>> = (80)
247        from "cbtquantile",
248    /// Quantile to use when determining when to abandon circuits completely
249    /// with our Pareto estimator.
250    pub cbt_abandon_quantile: Percentage<BoundedInt32<10, 99>> = (99)
251        from "cbtclosequantile",
252    /// Lowest permissible timeout value for Pareto timeout estimator.
253    pub cbt_min_timeout: IntegerMilliseconds<BoundedInt32<10, { i32::MAX }>> = (10)
254        from "cbtmintimeout",
255    /// Timeout value to use for our Pareto timeout estimator when we have
256    /// no initial estimate.
257    pub cbt_initial_timeout: IntegerMilliseconds<BoundedInt32<10, { i32::MAX }>> = (60_000)
258        from "cbtinitialtimeout",
259    /// When we don't have a good build-time estimate yet, how long
260    /// (in seconds) do we wait between trying to launch build-time
261    /// testing circuits through the network?
262    pub cbt_testing_delay: IntegerSeconds<BoundedInt32<1, { i32::MAX }>> = (10)
263        from "cbttestfreq",
264    /// How many circuits can be open before we will no longer
265    /// consider launching testing circuits to learn average build
266    /// times?
267    pub cbt_max_open_circuits_for_testing: BoundedInt32<0, 14> = (10)
268        from "cbtmaxopencircs",
269
270    /// Specifies which congestion control algorithm clients should use.
271    /// Current values are 0 for the fixed window algorithm and 2 for Vegas.
272    pub cc_alg: BoundedInt32<0, 2> = (2)
273        from "cc_alg",
274
275    /// Vegas only. This parameter defines the integer number of 'cc_sendme_inc' multiples
276    /// of gap allowed between inflight and cwnd, to still declare the cwnd full.
277    pub cc_cwnd_full_gap: BoundedInt32<0, { i16::MAX as i32 }> = (4444)
278        from "cc_cwnd_full_gap",
279    /// Vegas only. This parameter defines a low watermark in percent.
280    pub cc_cwnd_full_minpct: Percentage<BoundedInt32<0, 100>> = (25)
281        from "cc_cwnd_full_minpct",
282    /// Vegas only. This parameter governs how often a cwnd must be full.
283    pub cc_cwnd_full_per_cwnd: BoundedInt32<0, 1> = (1)
284        from "cc_cwnd_full_per_cwnd",
285
286    /// Initial congestion window for new congestion control Tor clients.
287    pub cc_cwnd_init: BoundedInt32<31, 10_000> = (4 * 31)
288        from "cc_cwnd_init",
289    /// Percentage of the current congestion window to increment by during slow start,
290    /// every congestion window.
291    pub cc_cwnd_inc_pct_ss: Percentage<BoundedInt32<1, 500>> = (50)
292        from "cc_cwnd_inc_pct_ss",
293    /// How much to increment the congestion window by during steady state,
294    /// every congestion window.
295    pub cc_cwnd_inc: BoundedInt32<1, 1000> = (31)
296        from "cc_cwnd_inc",
297    /// How often we update our congestion window, per cwnd worth of packets.
298    /// (For example, if this is 2, we will update the window twice every window.)
299    pub cc_cwnd_inc_rate: BoundedInt32<1, 250> = (1)
300        from "cc_cwnd_inc_rate",
301    /// The minimum allowed congestion window.
302    pub cc_cwnd_min: BoundedInt32<31, 1000> = (31)
303        from "cc_cwnd_min",
304    /// The maximum allowed congestion window.
305    pub cc_cwnd_max: BoundedInt32<500, { i32::MAX }> = (i32::MAX)
306        from "cc_cwnd_max",
307
308    /// This specifies the N in N-EWMA smoothing of RTT and BDP estimation,
309    /// as a percent of the number of SENDME acks in a congestion window.
310    ///
311    /// A percentage over 100% indicates smoothing with more than one
312    /// congestion window's worth of SENDMEs.
313    pub cc_ewma_cwnd_pct: Percentage<BoundedInt32<1, 255>> = (50)
314        from "cc_ewma_cwnd_pct",
315    /// This specifies the max N in N_EWMA smoothing of RTT and BDP estimation.
316    pub cc_ewma_max: BoundedInt32<2, { i32::MAX }> = (10)
317        from "cc_ewma_max",
318    /// This specifies the N in N_EWMA smoothing of RTT during Slow Start.
319    pub cc_ewma_ss: BoundedInt32<2, { i32::MAX }> = (2)
320        from "cc_ewma_ss",
321    /// Describes a percentile average between RTT_min and RTT_current_ewma,
322    /// for use to reset RTT_min, when the congestion window hits cwnd_min.
323    pub cc_rtt_reset_pct: Percentage<BoundedInt32<0, 100>> = (100)
324        from "cc_rtt_reset_pct",
325    /// Specifies how many cells a SENDME acks.
326    pub cc_sendme_inc: BoundedInt32<1, 254> = (31)
327        from "cc_sendme_inc",
328    /// This parameter provides a hard-max on the congestion window in Slow Start.
329    pub cc_ss_max: BoundedInt32<500, { i32::MAX }> = (5000)
330        from "cc_ss_max",
331
332    /// Vegas alpha parameter for an Exit circuit.
333    pub cc_vegas_alpha_exit: BoundedInt32<0, 1000> = (3 * 62)
334        from "cc_vegas_alpha_exit",
335    /// Vegas beta parameter for an Exit circuit.
336    pub cc_vegas_beta_exit: BoundedInt32<0, 1000> = (4 * 62)
337        from "cc_vegas_beta_exit",
338    /// Vegas delta parameter for an Exit circuit.
339    pub cc_vegas_delta_exit: BoundedInt32<0, 1000> = (5 * 62)
340        from "cc_vegas_delta_exit",
341    /// Vegas gamma parameter for an Exit circuit.
342    pub cc_vegas_gamma_exit: BoundedInt32<0, 1000> = (3 * 62)
343        from "cc_vegas_gamma_exit",
344
345    /// Vegas alpha parameter for an Onion circuit.
346    pub cc_vegas_alpha_onion: BoundedInt32<0, 1000> = (3 * 62)
347        from "cc_vegas_alpha_onion",
348    /// Vegas beta parameter for an Onion circuit.
349    pub cc_vegas_beta_onion: BoundedInt32<0, 1000> = (6 * 62)
350        from "cc_vegas_beta_onion",
351    /// Vegas delta parameter for an Onion circuit.
352    pub cc_vegas_delta_onion: BoundedInt32<0, 1000> = (7 * 62)
353        from "cc_vegas_delta_onion",
354    /// Vegas gamma parameter for an Onion circuit.
355    pub cc_vegas_gamma_onion: BoundedInt32<0, 1000> = (4 * 62)
356        from "cc_vegas_gamma_onion",
357
358    /// Parameter for Exit circuit that describe the the RFC3742 'cap', after which
359    /// congestion window increments are reduced. The MAX disables RFC3742.
360    pub cc_vegas_sscap_exit: BoundedInt32<100, { i32::MAX }> = (600)
361        from "cc_sscap_exit",
362    /// Parameter for Onion circuit that describe the the RFC3742 'cap', after which
363    /// congestion window increments are reduced. The MAX disables RFC3742.
364    pub cc_vegas_sscap_onion: BoundedInt32<100, { i32::MAX }> = (475)
365        from "cc_sscap_onion",
366
367    // Stream flow control parameters.
368    // TODO: There is a `circwindow` for circuit flow control, but is there a similar package window
369    // parameter for pre-cc stream flow control?
370
371    /// The outbuf length, in relay cell multiples, before we send an XOFF.
372    /// Used by clients (including onion services).
373    ///
374    /// See prop 324.
375    pub cc_xoff_client: BoundedInt32<1, 10_000> = (500)
376        from "cc_xoff_client",
377    /// The outbuf length, in relay cell multiples, before we send an XOFF.
378    /// Used by exits.
379    ///
380    /// See prop 324.
381    pub cc_xoff_exit: BoundedInt32<1, 10_000> = (500)
382        from "cc_xoff_exit",
383    /// Specifies how many full packed cells of bytes must arrive before we can compute a rate,
384    /// as well as how often we can send XONs.
385    ///
386    /// See prop 324.
387    pub cc_xon_rate: BoundedInt32<1, 5000> = (500)
388        from "cc_xon_rate",
389    /// Specifies how much the edge drain rate can change before we send another advisory cell.
390    ///
391    /// See prop 324.
392    pub cc_xon_change_pct: BoundedInt32<1, 99> = (25)
393        from "cc_xon_change_pct",
394    /// Specifies the `N` in the `N_EWMA` of rates.
395    ///
396    /// See prop 324.
397    pub cc_xon_ewma_cnt: BoundedInt32<2, 100> = (2)
398        from "cc_xon_ewma_cnt",
399
400    /// The maximum cell window size?
401    pub circuit_window: BoundedInt32<100, 1000> = (1_000)
402        from "circwindow",
403    /// The decay parameter for circuit priority
404    pub circuit_priority_half_life: IntegerMilliseconds<BoundedInt32<1, { i32::MAX }>> = (30_000)
405        from "CircuitPriorityHalflifeMsec",
406    /// Whether to perform circuit extensions by Ed25519 ID
407    pub extend_by_ed25519_id: BoundedInt32<0, 1> = (0)
408        from "ExtendByEd25519ID",
409
410    /// If we have excluded so many possible guards that the
411    /// available fraction is below this threshold, we should use a different
412    /// guard sample.
413    pub guard_meaningful_restriction: Percentage<BoundedInt32<1,100>> = (20)
414        from "guard-meaningful-restriction-percent",
415
416    /// We should warn the user if they have excluded so many guards
417    /// that the available fraction is below this threshold.
418    pub guard_extreme_restriction: Percentage<BoundedInt32<1,100>> = (1)
419        from "guard-extreme-restriction-percent",
420
421    /// How long should we keep an unconfirmed guard (one we have not
422    /// contacted) before removing it from the guard sample?
423    pub guard_lifetime_unconfirmed: IntegerDays<BoundedInt32<1, 3650>> = (120)
424        from "guard-lifetime-days",
425
426    /// How long should we keep a _confirmed_ guard (one we have contacted)
427    /// before removing it from the guard sample?
428    pub guard_lifetime_confirmed: IntegerDays<BoundedInt32<1, 3650>> = (60)
429        from "guard-confirmed-min-lifetime-days",
430
431    /// If all circuits have failed for this interval, then treat the internet
432    /// as "probably down", and treat any guard failures in that interval
433    /// as unproven.
434    pub guard_internet_likely_down: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (600)
435        from "guard-internet-likely-down-interval",
436    /// Largest number of guards that a client should try to maintain in
437    /// a sample of possible guards.
438    pub guard_max_sample_size: BoundedInt32<1, {i32::MAX}> = (60)
439        from "guard-max-sample-size",
440    /// Largest fraction of guard bandwidth on the network that a client
441    /// should try to remain in a sample of possible guards.
442    pub guard_max_sample_threshold: Percentage<BoundedInt32<1,100>> = (20)
443        from "guard-max-sample-threshold",
444
445    /// If the client ever has fewer than this many guards in their sample,
446    /// after filtering out unusable guards, they should try to add more guards
447    /// to the sample (if allowed).
448    pub guard_filtered_min_sample_size: BoundedInt32<1,{i32::MAX}> = (20)
449        from "guard-min-filtered-sample-size",
450
451    /// The number of confirmed guards that the client should treat as
452    /// "primary guards".
453    pub guard_n_primary: BoundedInt32<1,{i32::MAX}> = (3)
454        from "guard-n-primary-guards",
455    /// The number of primary guards that the client should use in parallel.
456    /// Other primary guards won't get used unless earlier ones are down.
457    pub guard_use_parallelism: BoundedInt32<1, {i32::MAX}> = (1)
458        from "guard-n-primary-guards-to-use",
459    /// The number of primary guards that the client should use in
460    /// parallel.  Other primary directory guards won't get used
461    /// unless earlier ones are down.
462    pub guard_dir_use_parallelism: BoundedInt32<1, {i32::MAX}> = (3)
463        from "guard-n-primary-dir-guards-to-use",
464
465    /// When trying to confirm nonprimary guards, if a guard doesn't
466    /// answer for more than this long in seconds, treat any lower-
467    /// priority guards as possibly usable.
468    pub guard_nonprimary_connect_timeout: IntegerSeconds<BoundedInt32<1,{i32::MAX}>> = (15)
469        from "guard-nonprimary-guard-connect-timeout",
470    /// When trying to confirm nonprimary guards, if a guard doesn't
471    /// answer for more than _this_ long in seconds, treat it as down.
472    pub guard_nonprimary_idle_timeout: IntegerSeconds<BoundedInt32<1,{i32::MAX}>> = (600)
473        from "guard-nonprimary-guard-idle-timeout",
474    /// If a guard has been unlisted in the consensus for at least this
475    /// long, remove it from the consensus.
476    pub guard_remove_unlisted_after: IntegerDays<BoundedInt32<1,3650>> = (20)
477        from "guard-remove-unlisted-guards-after-days",
478
479
480    /// The minimum threshold for circuit patch construction
481    pub min_circuit_path_threshold: Percentage<BoundedInt32<25, 95>> = (60)
482        from "min_paths_for_circs_pct",
483
484    /// Channel padding, low end of random padding interval, milliseconds
485    ///
486    /// `nf_ito` stands for "netflow inactive timeout".
487    pub nf_ito_low: IntegerMilliseconds<BoundedInt32<0, CHANNEL_PADDING_TIMEOUT_UPPER_BOUND>> = (1500)
488        from "nf_ito_low",
489    /// Channel padding, high end of random padding interval, milliseconds
490    pub nf_ito_high: IntegerMilliseconds<BoundedInt32<0, CHANNEL_PADDING_TIMEOUT_UPPER_BOUND>> = (9500)
491        from "nf_ito_high",
492    /// Channel padding, low end of random padding interval (reduced padding) milliseconds
493    pub nf_ito_low_reduced: IntegerMilliseconds<BoundedInt32<0, CHANNEL_PADDING_TIMEOUT_UPPER_BOUND>> = (9000)
494        from "nf_ito_low_reduced",
495    /// Channel padding, high end of random padding interval (reduced padding) , milliseconds
496    pub nf_ito_high_reduced: IntegerMilliseconds<BoundedInt32<0, CHANNEL_PADDING_TIMEOUT_UPPER_BOUND>> = (14000)
497        from "nf_ito_high_reduced",
498
499    /// The minimum sendme version to accept.
500    pub sendme_accept_min_version: SendMeVersion = (0)
501        from "sendme_accept_min_version",
502    /// The minimum sendme version to transmit.
503    pub sendme_emit_min_version: SendMeVersion = (0)
504        from "sendme_emit_min_version",
505
506    /// How long should never-used client circuits stay available,
507    /// in the steady state?
508    pub unused_client_circ_timeout: IntegerSeconds<BoundedInt32<60, 86_400>> = (30*60)
509        from "nf_conntimeout_clients",
510    /// When we're learning circuit timeouts, how long should never-used client
511    /// circuits stay available?
512    pub unused_client_circ_timeout_while_learning_cbt: IntegerSeconds<BoundedInt32<10, 60_000>> = (3*60)
513        from "cbtlearntimeout",
514
515    /// Lower bound on the number of INTRODUCE2 cells to allow per introduction
516    /// circuit before the service decides to rotate to a new introduction
517    /// circuit.
518    pub hs_introcirc_requests_min: BoundedInt32<0, {i32::MAX}> = (16384)
519        from "hs_intro_min_introduce2",
520
521    /// Upper bound on the number of INTRODUCE2 cells to allow per introduction
522    /// circuit before the service decides to rotate to a new introduction
523    /// circuit.
524    pub hs_introcirc_requests_max: BoundedInt32<0, {i32::MAX}> = (32768)
525        from "hs_intro_max_introduce2",
526
527    /// Lower bound on the lifetime of an introduction point.
528    pub hs_intro_min_lifetime: IntegerSeconds<BoundedInt32<0, {i32::MAX}>> = (18 * 60 * 60)
529        from "hs_intro_min_lifetime",
530
531    /// Upper bound on the lifetime of an introduction point.
532    pub hs_intro_max_lifetime: IntegerSeconds<BoundedInt32<0, {i32::MAX}>> = (24 * 60 * 60)
533        from "hs_intro_max_lifetime",
534
535    /// Number of "extra" introduction points that an onion service is allowed
536    /// to open based on demand.
537    pub hs_intro_num_extra_intropoints: BoundedInt32<0, 128> = (2)
538        from "hs_intro_num_extra",
539
540    /// Largest number of allowable relay cells received
541    /// in reply to an hsdir download attempt.
542    pub hsdir_dl_max_reply_cells: BoundedInt32<2, 2304> = (110)
543        from "hsdir_dl_max_reply_cells",
544
545    /// Largest number of allowable relay cells received
546    /// in reply to an hsdir upload attempt.
547    pub hsdir_ul_max_reply_cells: BoundedInt32<2, 1024> = (8)
548        from "hsdir_ul_max_reply_cells",
549
550    /// The duration of a time period, as used in the onion service directory
551    /// protocol.
552    ///
553    /// During each "time period", each onion service gets a different blinded
554    /// ID, and the hash ring gets a new layout.
555    pub hsdir_timeperiod_length: IntegerMinutes<BoundedInt32<5, 14400>> = (1440)
556        from "hsdir_interval",
557
558    /// The number of positions at the hash ring where an onion service
559    /// descriptor should be stored.
560    pub hsdir_n_replicas: BoundedInt32<1, 16> = (2)
561        from "hsdir_n_replicas",
562
563    /// The number of HSDir instances, at each position in the hash ring, that
564    /// should be considered when downloading an onion service descriptor.
565    pub hsdir_spread_fetch: BoundedInt32<1, 128> = (3)
566        from "hsdir_spread_fetch",
567
568    /// The number of HSDir instances, at each position in the hash ring, that
569    /// should be considered when uploading an onion service descriptor.
570    pub hsdir_spread_store: BoundedInt32<1,128> = (4)
571        from "hsdir_spread_store",
572
573    /// Largest allowable v3 onion service size (in bytes).
574    pub hsdir_max_desc_size: BoundedInt32<1, {i32::MAX}> = (50_000)
575        from "HSV3MaxDescriptorSize",
576
577    /// Largest number of failures to rendezvous that an onion service should
578    /// allow for a request.
579    pub hs_service_rendezvous_failures_max: BoundedInt32<1, 10> = (2)
580        from "hs_service_max_rdv_failures",
581
582    /// If set to 1, introduction points use the INTRODUCE1 rate limiting
583    /// defense when no `DosParams` are sent.
584    ///
585    /// See <https://spec.torproject.org/param-spec.html#HiddenServiceEnableIntroDoSDefense>
586    pub hs_intro_dos_enabled: BoundedInt32<0, 1> = (0)
587        from "HiddenServiceEnableIntroDoSDefense",
588
589    /// Default _rate_ value for an introduction point to use for INTRODUCE1 rate
590    /// limiting when no `DosParams` value is sent, in messages per second.
591    ///
592    /// See
593    /// <https://spec.torproject.org/param-spec.html#HiddenServiceEnableIntroDoSBurstPerSec>
594    pub hs_intro_dos_max_burst: BoundedInt32<0, {i32::MAX}> = (200)
595        from "HiddenServiceEnableIntroDoSBurstPerSec",
596
597    /// Default _burst_ value for an introduction point to use for INTRODUCE1 rate
598    /// limiting when no `DosParams` value is sent.
599    ///
600    /// See
601    /// <https://spec.torproject.org/param-spec.html#HiddenServiceEnableIntroDoSRatePerSec>
602    pub hs_intro_dos_rate: BoundedInt32<0, {i32::MAX}> = (25)
603        from  "HiddenServiceEnableIntroDoSRatePerSec",
604
605    /// Maximum Proof-of-Work V1 effort clients should send. Services will cap higher efforts to
606    /// this value.
607    ///
608    /// See
609    /// <https://spec.torproject.org/proposals/362-update-pow-control-loop.html>
610    // TODO POW: Make u32, or change spec.
611    pub hs_pow_v1_max_effort: BoundedInt32<0, {i32::MAX}> = (10_000)
612        from "HiddenServiceProofOfWorkV1MaxEffort",
613
614    /// The maximum age for items in the onion service intro queue, when Proof-of-Work V1 is
615    /// enabled.
616    ///
617    /// See
618    /// <https://spec.torproject.org/proposals/362-update-pow-control-loop.html>
619    pub hs_pow_v1_service_intro_timeout: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (300)
620        from "HiddenServiceProofOfWorkV1ServiceIntroTimeoutSeconds",
621
622    /// The default Proof-of-Work V1 decay adjustment value.
623    ///
624    /// See
625    /// <https://spec.torproject.org/proposals/362-update-pow-control-loop.html>
626    pub hs_pow_v1_default_decay_adjustment: Percentage<BoundedInt32<0, 99>> = (0)
627        from "HiddenServiceProofOfWorkV1ServiceDefaultDecayAdjustment",
628
629    /// The type of vanguards to use by default when building onion service circuits:
630    ///
631    /// ```text
632    ///    0: No vanguards.
633    ///    1: Lite vanguards.
634    ///    2: Full vanguards.
635    /// ```
636    ///
637    /// See
638    /// <https://spec.torproject.org/param-spec.html#vanguards>
639    pub vanguards_enabled: BoundedInt32<0, 2> = (1)
640        from "vanguards-enabled",
641
642    /// If higher than `vanguards-enabled`,
643    /// and we are running an onion service,
644    /// we use this level for all our onion service circuits:
645    ///
646    /// ```text
647    ///    0: No vanguards.
648    ///    1: Lite vanguards.
649    ///    2: Full vanguards.
650    /// ```
651    ///
652    /// See
653    /// <https://spec.torproject.org/param-spec.html#vanguards>
654    pub vanguards_hs_service: BoundedInt32<0, 2> = (2)
655        from "vanguards-hs-service",
656
657    /// The number of vanguards in the L2 vanguard set.
658    ///
659    /// See
660    /// <https://spec.torproject.org/param-spec.html#vanguards>
661    pub guard_hs_l2_number: BoundedInt32<1, {i32::MAX}> = (4)
662        from  "guard-hs-l2-number",
663
664    /// The minimum lifetime of L2 vanguards.
665    ///
666    /// See
667    /// <https://spec.torproject.org/param-spec.html#vanguards>
668    pub guard_hs_l2_lifetime_min: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (86400)
669        from  "guard-hs-l2-lifetime-min",
670
671    /// The maximum lifetime of L2 vanguards.
672    ///
673    /// See
674    /// <https://spec.torproject.org/param-spec.html#vanguards>
675    pub guard_hs_l2_lifetime_max: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (1036800)
676        from  "guard-hs-l2-lifetime-max",
677
678    /// The number of vanguards in the L3 vanguard set.
679    ///
680    /// See
681    /// <https://spec.torproject.org/param-spec.html#vanguards>
682    pub guard_hs_l3_number: BoundedInt32<1, {i32::MAX}> = (8)
683        from  "guard-hs-l3-number",
684
685    /// The minimum lifetime of L3 vanguards.
686    ///
687    /// See
688    /// <https://spec.torproject.org/param-spec.html#vanguards>
689    pub guard_hs_l3_lifetime_min: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (3600)
690        from  "guard-hs-l3-lifetime-min",
691
692    /// The maximum lifetime of L3 vanguards.
693    ///
694    /// See
695    /// <https://spec.torproject.org/param-spec.html#vanguards>
696    pub guard_hs_l3_lifetime_max: IntegerSeconds<BoundedInt32<1, {i32::MAX}>> = (172800)
697        from  "guard-hs-l3-lifetime-max",
698
699    /// The KIST to use by default when building inter-relay channels:
700    ///
701    /// ```text
702    ///    0: No KIST.
703    ///    1: KIST using TCP_NOTSENT_LOWAT.
704    /// ```
705    ///
706    // TODO(KIST): add this to param spec
707    // TODO(KIST): make this default to 1 (KIST with TCP_NOTSENT_LOWAT)
708    // when we're confident it behaves correctly in conjunction with cc
709    pub kist_enabled: BoundedInt32<0, 1> = (0)
710        from "kist-enabled",
711
712    /// If `kist_enabled` is `1` (KIST using TCP_NOTSENT_LOWAT),
713    /// the TCP_NOTSENT_LOWAT value to set for each channel.
714    ///
715    /// If `kist_enabled` is `0` (disabled),
716    /// the TCP_NOTSENT_LOWAT option is set to 0xFFFFFFFF (u32::MAX).
717    ///
718    // TODO(KIST): technically, this should be a u32, not an i32.
719    // However, because we're using it to limit the amount of unsent data in TCP sockets,
720    // it's unlikely we're ever going to want to set this to a high value,
721    // so an upper bound of i32::MAX is good enough for our purposes.
722    pub kist_tcp_notsent_lowat: BoundedInt32<1, {i32::MAX}> = (1)
723        from  "kist-tcp-notsent-lowat",
724
725    /// If true, we use lists of family members
726    /// when making decisions about which relays belong to the same family.
727    pub use_family_lists: BoundedInt32<0,1> = (1)
728        from "use-family-lists",
729
730    /// If true, we use lists of family IDs
731    /// when making decisions about which relays belong to the same family.
732    pub use_family_ids: BoundedInt32<0,1> = (1)
733        from "use-family-ids",
734}
735
736}
737
738impl Default for NetParameters {
739    fn default() -> Self {
740        NetParameters::default_values().expect("Default parameters were out-of-bounds")
741    }
742}
743
744// This impl is a bit silly, but it makes the `params` method on NetDirProvider
745// work out.
746impl AsRef<NetParameters> for NetParameters {
747    fn as_ref(&self) -> &NetParameters {
748        self
749    }
750}
751
752impl NetParameters {
753    /// Construct a new NetParameters from a given list of key=value parameters.
754    ///
755    /// Unrecognized parameters are ignored.
756    pub fn from_map(p: &tor_netdoc::doc::netstatus::NetParams<i32>) -> Self {
757        let mut params = NetParameters::default();
758        let unrecognized = params.saturating_update(p.iter());
759        for u in unrecognized {
760            tracing::debug!("Ignored unrecognized net param: {u}");
761        }
762        params
763    }
764
765    /// Replace a list of parameters, using the logic of
766    /// `set_saturating`.
767    ///
768    /// Return a vector of the parameter names we didn't recognize.
769    pub(crate) fn saturating_update<'a, S>(
770        &mut self,
771        iter: impl Iterator<Item = (S, &'a i32)>,
772    ) -> Vec<S>
773    where
774        S: AsRef<str>,
775    {
776        let mut unrecognized = Vec::new();
777        for (k, v) in iter {
778            if !self.set_saturating(k.as_ref(), *v) {
779                unrecognized.push(k);
780            }
781        }
782        unrecognized
783    }
784}
785
786#[cfg(test)]
787#[allow(clippy::many_single_char_names)]
788#[allow(clippy::cognitive_complexity)]
789mod test {
790    // @@ begin test lint list maintained by maint/add_warning @@
791    #![allow(clippy::bool_assert_comparison)]
792    #![allow(clippy::clone_on_copy)]
793    #![allow(clippy::dbg_macro)]
794    #![allow(clippy::mixed_attributes_style)]
795    #![allow(clippy::print_stderr)]
796    #![allow(clippy::print_stdout)]
797    #![allow(clippy::single_char_pattern)]
798    #![allow(clippy::unwrap_used)]
799    #![allow(clippy::unchecked_duration_subtraction)]
800    #![allow(clippy::useless_vec)]
801    #![allow(clippy::needless_pass_by_value)]
802    //! <!-- @@ end test lint list maintained by maint/add_warning @@ -->
803    use super::*;
804    use std::string::String;
805
806    #[test]
807    fn empty_list() {
808        let mut x = NetParameters::default();
809        let y = Vec::<(&String, &i32)>::new();
810        let u = x.saturating_update(y.into_iter());
811        assert!(u.is_empty());
812    }
813
814    #[test]
815    fn unknown_parameter() {
816        let mut x = NetParameters::default();
817        let mut y = Vec::<(&String, &i32)>::new();
818        let k = &String::from("This_is_not_a_real_key");
819        let v = &456;
820        y.push((k, v));
821        let u = x.saturating_update(y.into_iter());
822        assert_eq!(u, vec![&String::from("This_is_not_a_real_key")]);
823    }
824
825    // #[test]
826    // fn duplicate_parameter() {}
827
828    #[test]
829    fn single_good_parameter() {
830        let mut x = NetParameters::default();
831        let mut y = Vec::<(&String, &i32)>::new();
832        let k = &String::from("min_paths_for_circs_pct");
833        let v = &54;
834        y.push((k, v));
835        let z = x.saturating_update(y.into_iter());
836        assert!(z.is_empty());
837        assert_eq!(x.min_circuit_path_threshold.as_percent().get(), 54);
838    }
839
840    #[test]
841    fn multiple_good_parameters() {
842        let mut x = NetParameters::default();
843        let mut y = Vec::<(&String, &i32)>::new();
844        let k = &String::from("min_paths_for_circs_pct");
845        let v = &54;
846        y.push((k, v));
847        let k = &String::from("circwindow");
848        let v = &900;
849        y.push((k, v));
850        let z = x.saturating_update(y.into_iter());
851        assert!(z.is_empty());
852        assert_eq!(x.min_circuit_path_threshold.as_percent().get(), 54);
853        assert_eq!(x.circuit_window.get(), 900);
854    }
855
856    #[test]
857    fn good_out_of_range() {
858        let mut x = NetParameters::default();
859        let mut y = Vec::<(&String, &i32)>::new();
860        let k = &String::from("sendme_accept_min_version");
861        let v = &30;
862        y.push((k, v));
863        let k = &String::from("min_paths_for_circs_pct");
864        let v = &255;
865        y.push((k, v));
866        let z = x.saturating_update(y.into_iter());
867        assert!(z.is_empty());
868        assert_eq!(x.sendme_accept_min_version.get(), 30);
869        assert_eq!(x.min_circuit_path_threshold.as_percent().get(), 95);
870    }
871
872    #[test]
873    fn good_invalid_rep() {
874        let mut x = NetParameters::default();
875        let mut y = Vec::<(&String, &i32)>::new();
876        let k = &String::from("sendme_accept_min_version");
877        let v = &30;
878        y.push((k, v));
879        let k = &String::from("min_paths_for_circs_pct");
880        let v = &9000;
881        y.push((k, v));
882        let z = x.saturating_update(y.into_iter());
883        assert!(z.is_empty());
884        assert_eq!(x.sendme_accept_min_version.get(), 30);
885        assert_eq!(x.min_circuit_path_threshold.as_percent().get(), 95);
886    }
887
888    // #[test]
889    // fn good_duplicate() {}
890    #[test]
891    fn good_unknown() {
892        let mut x = NetParameters::default();
893        let mut y = Vec::<(&String, &i32)>::new();
894        let k = &String::from("sendme_accept_min_version");
895        let v = &30;
896        y.push((k, v));
897        let k = &String::from("not_a_real_parameter");
898        let v = &9000;
899        y.push((k, v));
900        let z = x.saturating_update(y.into_iter());
901        assert_eq!(z, vec![&String::from("not_a_real_parameter")]);
902        assert_eq!(x.sendme_accept_min_version.get(), 30);
903    }
904
905    #[test]
906    fn from_consensus() {
907        let mut p = NetParameters::default();
908        let mut mp: std::collections::HashMap<String, i32> = std::collections::HashMap::new();
909        mp.insert("bwweightscale".to_string(), 70);
910        mp.insert("min_paths_for_circs_pct".to_string(), 45);
911        mp.insert("im_a_little_teapot".to_string(), 1);
912        mp.insert("circwindow".to_string(), 99999);
913        mp.insert("ExtendByEd25519ID".to_string(), 1);
914
915        let z = p.saturating_update(mp.iter());
916        assert_eq!(z, vec![&String::from("im_a_little_teapot")]);
917
918        assert_eq!(p.bw_weight_scale.get(), 70);
919        assert_eq!(p.min_circuit_path_threshold.as_percent().get(), 45);
920        let b_val: bool = p.extend_by_ed25519_id.into();
921        assert!(b_val);
922    }
923
924    #[test]
925    fn all_parameters() {
926        use std::time::Duration;
927        let mut p = NetParameters::default();
928        let mp = [
929            ("bwweightscale", 10),
930            ("cbtdisabled", 1),
931            ("cbtnummodes", 11),
932            ("cbtrecentcount", 12),
933            ("cbtmaxtimeouts", 13),
934            ("cbtmincircs", 5),
935            ("cbtquantile", 61),
936            ("cbtclosequantile", 15),
937            ("cbtlearntimeout", 1900),
938            ("cbtmintimeout", 2020),
939            ("cbtinitialtimeout", 2050),
940            ("cbttestfreq", 110),
941            ("cbtmaxopencircs", 14),
942            ("circwindow", 999),
943            ("CircuitPriorityHalflifeMsec", 222),
944            ("guard-lifetime-days", 36),
945            ("guard-confirmed-min-lifetime-days", 37),
946            ("guard-internet-likely-down-interval", 38),
947            ("guard-max-sample-size", 39),
948            ("guard-max-sample-threshold", 40),
949            ("guard-min-filtered-sample-size", 41),
950            ("guard-n-primary-guards", 42),
951            ("guard-n-primary-guards-to-use", 43),
952            ("guard-n-primary-dir-guards-to-use", 44),
953            ("guard-nonprimary-guard-connect-timeout", 45),
954            ("guard-nonprimary-guard-idle-timeout", 46),
955            ("guard-remove-unlisted-guards-after-days", 47),
956            ("guard-meaningful-restriction-percent", 12),
957            ("guard-extreme-restriction-percent", 3),
958            ("ExtendByEd25519ID", 0),
959            ("min_paths_for_circs_pct", 51),
960            ("nf_conntimeout_clients", 606),
961            ("nf_ito_low", 1_000),
962            ("nf_ito_high", 20_000),
963            ("nf_ito_low_reduced", 3_000),
964            ("nf_ito_high_reduced", 40_000),
965            ("sendme_accept_min_version", 31),
966            ("sendme_emit_min_version", 32),
967        ];
968        let ignored = p.saturating_update(mp.iter().map(|(a, b)| (a, b)));
969        assert!(ignored.is_empty());
970
971        assert_eq!(p.bw_weight_scale.get(), 10);
972        assert!(bool::from(p.cbt_learning_disabled));
973        assert_eq!(p.cbt_num_xm_modes.get(), 11);
974        assert_eq!(p.cbt_success_count.get(), 12);
975        assert_eq!(p.cbt_max_timeouts.get(), 13);
976        assert_eq!(p.cbt_min_circs_for_estimate.get(), 5);
977        assert_eq!(p.cbt_timeout_quantile.as_percent().get(), 61);
978        assert_eq!(p.cbt_abandon_quantile.as_percent().get(), 15);
979        assert_eq!(p.nf_ito_low.as_millis().get(), 1_000);
980        assert_eq!(p.nf_ito_high.as_millis().get(), 20_000);
981        assert_eq!(p.nf_ito_low_reduced.as_millis().get(), 3_000);
982        assert_eq!(p.nf_ito_high_reduced.as_millis().get(), 40_000);
983        assert_eq!(
984            Duration::try_from(p.unused_client_circ_timeout_while_learning_cbt).unwrap(),
985            Duration::from_secs(1900)
986        );
987        assert_eq!(
988            Duration::try_from(p.cbt_min_timeout).unwrap(),
989            Duration::from_millis(2020)
990        );
991        assert_eq!(
992            Duration::try_from(p.cbt_initial_timeout).unwrap(),
993            Duration::from_millis(2050)
994        );
995        assert_eq!(
996            Duration::try_from(p.cbt_testing_delay).unwrap(),
997            Duration::from_secs(110)
998        );
999        assert_eq!(p.cbt_max_open_circuits_for_testing.get(), 14);
1000        assert_eq!(p.circuit_window.get(), 999);
1001        assert_eq!(
1002            Duration::try_from(p.circuit_priority_half_life).unwrap(),
1003            Duration::from_millis(222)
1004        );
1005        assert!(!bool::from(p.extend_by_ed25519_id));
1006        assert_eq!(p.min_circuit_path_threshold.as_percent().get(), 51);
1007        assert_eq!(
1008            Duration::try_from(p.unused_client_circ_timeout).unwrap(),
1009            Duration::from_secs(606)
1010        );
1011        assert_eq!(p.sendme_accept_min_version.get(), 31);
1012        assert_eq!(p.sendme_emit_min_version.get(), 32);
1013
1014        assert_eq!(
1015            Duration::try_from(p.guard_lifetime_unconfirmed).unwrap(),
1016            Duration::from_secs(86400 * 36)
1017        );
1018        assert_eq!(
1019            Duration::try_from(p.guard_lifetime_confirmed).unwrap(),
1020            Duration::from_secs(86400 * 37)
1021        );
1022        assert_eq!(
1023            Duration::try_from(p.guard_internet_likely_down).unwrap(),
1024            Duration::from_secs(38)
1025        );
1026        assert_eq!(p.guard_max_sample_size.get(), 39);
1027        assert_eq!(p.guard_max_sample_threshold.as_percent().get(), 40);
1028        assert_eq!(p.guard_filtered_min_sample_size.get(), 41);
1029        assert_eq!(p.guard_n_primary.get(), 42);
1030        assert_eq!(p.guard_use_parallelism.get(), 43);
1031        assert_eq!(p.guard_dir_use_parallelism.get(), 44);
1032        assert_eq!(
1033            Duration::try_from(p.guard_nonprimary_connect_timeout).unwrap(),
1034            Duration::from_secs(45)
1035        );
1036        assert_eq!(
1037            Duration::try_from(p.guard_nonprimary_idle_timeout).unwrap(),
1038            Duration::from_secs(46)
1039        );
1040        assert_eq!(
1041            Duration::try_from(p.guard_remove_unlisted_after).unwrap(),
1042            Duration::from_secs(86400 * 47)
1043        );
1044        assert_eq!(p.guard_meaningful_restriction.as_percent().get(), 12);
1045        assert_eq!(p.guard_extreme_restriction.as_percent().get(), 3);
1046    }
1047}