35 releases (22 breaking)
0.24.0 | Oct 31, 2024 |
---|---|
0.22.0 | Sep 3, 2024 |
0.20.0 | Jun 27, 2024 |
0.14.1 | Mar 4, 2024 |
0.0.2 | Nov 30, 2021 |
#37 in Network programming
3,754 downloads per month
Used in 25 crates
(18 directly)
6MB
95K
SLoC
arti-client
High-level functionality for accessing the Tor network as a client.
Overview
The arti-client
crate aims to provide a safe, easy-to-use API for
applications that want to use the Tor network to anonymize their traffic.
This crate is part of Arti, a project to implement Tor in Rust. It is the highest-level library crate in Arti, and the one that nearly all client-only programs should use. Most of its functionality is provided by lower-level crates in Arti.
Shape of the API, and relationship to other crates
The API here is great if you are building an application in async Rust
and want your Tor connections as async streams (AsyncRead
/AsyncWrite
).
If you are trying to glue Arti to some other programming language,
right now your best bet is probably to spawn the
arti
CLI
SOCKS proxy,
as a subprocess.
We don't yet offer an API that would be nice to expose via FFI;
we intend to add this in the future.
⚠ Warnings ⚠
Also note that the APIs for this crate are not all yet completely stable.
We'll try not to break things without good reason, and we'll follow semantic
versioning when we do, but please expect a certain amount of breakage
between now and us declaring arti-client
1.x.
The APIs exposed by lower-level crates in Arti are even more unstable;
they will break more often than those from arti-client
, for less reason.
Using arti-client
The main entry point for this crate is the TorClient
, an object that
lets you make connections over the Tor network.
Connecting to Tor
Calling TorClient::create_bootstrapped
establishes a connection to the
Tor network, pulling in necessary state about network consensus as required.
This state gets persisted to the locations specified in the
TorClientConfig
.
(This method requires you to initialize the client in an async fn
.
Consider using the builder method, below, if that doesn't work for you.)
// The client configuration describes how to connect to the Tor network,
// and what directories to use for storing persistent state.
let config = TorClientConfig::default();
// Start the Arti client, and let it bootstrap a connection to the Tor network.
// (This takes a while to gather the necessary directory information.
// It uses cached information when possible.)
let tor_client = TorClient::create_bootstrapped(config).await?;
Creating a client and connecting later
You might wish to create a Tor client immediately, without waiting for it to
bootstrap (or having to use an await
). This can be done by making a
TorClientBuilder
with TorClient::builder
, and calling
TorClientBuilder::create_unbootstrapped
.
The returned client can be made to bootstrap when it is first used (the
default), or not; see BootstrapBehavior
for more details.
// Specifying `BootstrapBehavior::OnDemand` means the client will automatically
// bootstrap when it is used. `Manual` exists if you'd rather have full control.
let tor_client = TorClient::builder()
.bootstrap_behavior(BootstrapBehavior::OnDemand)
.create_unbootstrapped()?;
Using the client
A client can then be used to make connections over Tor with
TorClient::connect
, which accepts anything implementing IntoTorAddr
.
This returns a DataStream
, an anonymized TCP stream type that implements
AsyncRead
and
AsyncWrite
, as well as the Tokio versions of
those traits if the tokio
crate feature is enabled.
Example: making connections over Tor
#
// Initiate a connection over Tor to example.com, port 80.
let mut stream = tor_client.connect(("example.com", 80)).await?;
use futures::io::{AsyncReadExt, AsyncWriteExt};
// Write out an HTTP request.
stream
.write_all(b"GET / HTTP/1.1\r\nHost: example.com\r\nConnection: close\r\n\r\n")
.await?;
// IMPORTANT: Make sure the request was written.
// Arti buffers data, so flushing the buffer is usually required.
stream.flush().await?;
// Read and print the result.
let mut buf = Vec::new();
stream.read_to_end(&mut buf).await?;
println!("{}", String::from_utf8_lossy(&buf));
#
Bridge usage
Bridges and Pluggable Transports (PT) can be used as censorship circumvention tools
to connect to Tor in places where it is otherwise blocked. In arti, they are
configured through config::BridgesConfig
. You will need to enable the feature
pt-client
for PT support. Note that pluggable transports need to be installed
separately and that Arti does not provide them on its own. You can read more about
PTs in TB manual.
More advanced usage
This version of Arti includes basic support for "stream isolation": the ability to ensure that different TCP connections ('streams') go over different Tor circuits (and thus different exit nodes, making them originate from different IP addresses).
This is useful to avoid deanonymizing users by correlation: for example, you might want a Tor connection to your bank and a Tor connection to an online forum to use different circuits, to avoid the possibility of the two identities being linked by having the same source IP.
Streams can be isolated in two ways:
- by calling
TorClient::isolated_client
, which returns a newTorClient
whose streams will use a different circuit - by generating
IsolationToken
s, and passing them in viaStreamPrefs
toTorClient::connect
.
Multiple runtime support
Arti uses the tor_rtcompat
crate to support multiple asynchronous
runtimes; currently, both Tokio and
async-std are supported.
The backend Arti uses for TCP connections (tor_rtcompat::NetStreamProvider
)
and for creating TLS sessions (tor_rtcompat::TlsProvider
) is also
configurable using this crate. This can be used to embed Arti in custom
environments where you want lots of control over how it uses the network.
View the tor_rtcompat
crate documentation for more
about these features.
Reporting Arti errors
Arti often outputs very long Debug messages that are hard to understand,
even for developers. In order to have a better idea of what went wrong in your
program, match
every Error
and have err.report()
be logged, where err
is the caught error.
For example, the previous example can be modified to report one of the errors:
// Initiate a connection over Tor to example.com, port 80.
// Note: here we try to handle the potential error using match
match tor_client.connect(("example.com", 80)).await {
Ok(mut stream) => {
eprintln!("sending request...");
stream
.write_all(b"GET / HTTP/1.1\r\nHost: example.com\r\nConnection: close\r\n\r\n")
.await?;
// IMPORTANT: Make sure the request was written.
// Arti buffers data, so flushing the buffer is usually required.
stream.flush().await?;
eprintln!("reading response...");
// Read and print the result.
let mut buf = Vec::new();
stream.read_to_end(&mut buf).await?;
println!("{}", String::from_utf8_lossy(&buf));
}
Err(err) => {
// Use .report() on an error to get a nicer error message
// Raw Debug output will be much harder to decipher for all parties involved
eprintln!("{}", err.report());
}
}
Feature flags
Additive features
-
tokio
(default) -- build with Tokio support -
native-tls
(default) -- build with the native-tls crate for TLS support -
async-std
-- build with async-std support -
compression
(default) -- Build support for downloading compressed documents. Requires a C compiler. -
bridge-client
-- Build with support for bridges. -
memquota
-- Build with support for memory use tracking and limiting. -
onion-service-client
-- Build with support for connecting to onion services. Note that this is not yet as secure as C-Tor and shouldn't be used for security-sensitive purposes. -
onion-service-service
-- Build with support for running onion services. Note that this is not yet as secure as C-Tor and shouldn't be used for security-sensitive purposes. -
pt-client
-- Build with support for pluggable transports. -
anyhow
-- Build with support for extractingErrorHint
s from anyhow::Error. -
full
-- Build with all features above, along with all stable additive features from other arti crates. (This does not include experimental features. It also does not include features that select a particular implementation to the exclusion of another, or those that set a build flag.) -
rustls
-- build with the rustls crate for TLS support. This is not included infull
, since it uses thering
crate, which uses the old (3BSD/SSLEay) OpenSSL license, which may introduce licensing compatibility issues.
Note that flags tokio
, native-tls
, async-std
, rustls
and static
will enable the flags of the same name on the tor_rtcompat
crate.
Build-flag related features
static
-- link with static versions of Arti's system dependencies, like SQLite and OpenSSL (⚠ Warning ⚠: this feature will include a dependency on native-tls, even if you weren't planning to use native-tls. If you only want to build with a static sqlite library, enable thestatic-sqlite
feature. We'll look for better solutions here in the future.)static-sqlite
-- link with a static version of sqlite.static-native-tls
-- link with a static version ofnative-tls
. Enablesnative-tls
.
Cryptographic acceleration features
Libraries should not enable these by default, since they replace one implementation with another.
accel-sha1-asm
-- Accelerate cryptography by using an assembly implementation of SHA1, if one is available.accel-openssl
-- Accelerate cryptography by using openssl as a backend.
Experimental and unstable features
Note that the APIs enabled by these features are NOT covered by semantic versioning[^1] guarantees: we might break them or remove them between patch versions.
experimental-api
-- build with experimental, unstable API support.error_detail
-- expose thearti_client::Error
inner error type.dirfilter
-- expose theDirFilter
API, which lets you modify a network directory before it is used.experimental
-- Build with all experimental features above, along with all experimental features from other arti crates.
[^1]: Remember, semantic versioning is what makes various cargo
features
work reliably. To be explicit: if you want cargo update
to only make safe
changes, then you cannot enable these features.
License: MIT OR Apache-2.0
Dependencies
~45–64MB
~1M SLoC