config.c 299 KB
Newer Older
1
/* Copyright (c) 2001 Matej Pfajfar.
Roger Dingledine's avatar
Roger Dingledine committed
2
 * Copyright (c) 2001-2004, Roger Dingledine.
3
 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
Nick Mathewson's avatar
Nick Mathewson committed
4
 * Copyright (c) 2007-2018, The Tor Project, Inc. */
5
/* See LICENSE for licensing information */
6

Nick Mathewson's avatar
Nick Mathewson committed
7
/**
8
 * \file config.c
9
10
11
12
13
14
15
16
17
18
19
20
 * \brief Code to interpret the user's configuration of Tor.
 *
 * This module handles torrc configuration file, including parsing it,
 * combining it with torrc.defaults and the command line, allowing
 * user changes to it (via editing and SIGHUP or via the control port),
 * writing it back to disk (because of SAVECONF from the control port),
 * and -- most importantly, acting on it.
 *
 * The module additionally has some tools for manipulating and
 * inspecting values that are calculated as a result of the
 * configured options.
 *
21
 * <h3>How to add new options</h3>
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
 *
 * To add new items to the torrc, there are a minimum of three places to edit:
 * <ul>
 *   <li>The or_options_t structure in or.h, where the options are stored.
 *   <li>The option_vars_ array below in this module, which configures
 *       the names of the torrc options, their types, their multiplicities,
 *       and their mappings to fields in or_options_t.
 *   <li>The manual in doc/tor.1.txt, to document what the new option
 *       is, and how it works.
 * </ul>
 *
 * Additionally, you might need to edit these places too:
 * <ul>
 *   <li>options_validate() below, in case you want to reject some possible
 *       values of the new configuration option.
 *   <li>options_transition_allowed() below, in case you need to
 *       forbid some or all changes in the option while Tor is
 *       running.
 *   <li>options_transition_affects_workers(), in case changes in the option
 *       might require Tor to relaunch or reconfigure its worker threads.
 *   <li>options_transition_affects_descriptor(), in case changes in the
 *       option might require a Tor relay to build and publish a new server
 *       descriptor.
 *   <li>options_act() and/or options_act_reversible(), in case there's some
 *       action that needs to be taken immediately based on the option's
 *       value.
 * </ul>
 *
 * <h3>Changing the value of an option</h3>
 *
 * Because of the SAVECONF command from the control port, it's a bad
 * idea to change the value of any user-configured option in the
 * or_options_t.  If you want to sometimes do this anyway, we recommend
 * that you create a secondary field in or_options_t; that you have the
 * user option linked only to the secondary field; that you use the
 * secondary field to initialize the one that Tor actually looks at; and that
 * you use the one Tor looks as the one that you modify.
Nick Mathewson's avatar
Nick Mathewson committed
59
60
 **/

61
#define CONFIG_PRIVATE
62
#include "core/or/or.h"
63
64
65
66
67
68
69
70
#include "app/config/config.h"
#include "app/config/confparse.h"
#include "app/config/statefile.h"
#include "app/main/main.h"
#include "core/mainloop/connection.h"
#include "core/mainloop/cpuworker.h"
#include "core/mainloop/mainloop.h"
#include "core/mainloop/netstatus.h"
71
72
73
74
75
76
77
78
#include "core/or/channel.h"
#include "core/or/circuitbuild.h"
#include "core/or/circuitlist.h"
#include "core/or/circuitmux.h"
#include "core/or/circuitmux_ewma.h"
#include "core/or/circuitstats.h"
#include "core/or/connection_edge.h"
#include "core/or/connection_or.h"
79
80
81
82
83
84
85
86
#include "core/or/dos.h"
#include "core/or/policies.h"
#include "core/or/relay.h"
#include "core/or/scheduler.h"
#include "feature/client/addressmap.h"
#include "feature/client/bridges.h"
#include "feature/client/entrynodes.h"
#include "feature/client/transports.h"
87
#include "feature/control/control.h"
88
89
#include "feature/dirauth/bwauth.h"
#include "feature/dirauth/guardfraction.h"
90
91
92
#include "feature/dircache/consdiffmgr.h"
#include "feature/dircache/dirserv.h"
#include "feature/dircommon/voting_schedule.h"
93
#include "feature/hibernate/hibernate.h"
94
95
#include "feature/hs/hs_config.h"
#include "feature/nodelist/dirlist.h"
96
#include "feature/nodelist/networkstatus.h"
97
#include "feature/nodelist/nickname.h"
98
#include "feature/nodelist/nodelist.h"
99
#include "feature/nodelist/routerlist.h"
100
101
102
103
#include "feature/nodelist/routerset.h"
#include "feature/relay/dns.h"
#include "feature/relay/ext_orport.h"
#include "feature/relay/routermode.h"
104
105
#include "feature/rend/rendclient.h"
#include "feature/rend/rendservice.h"
106
#include "lib/geoip/geoip.h"
107
#include "feature/stats/geoip_stats.h"
108
#include "feature/stats/predict_ports.h"
109
#include "feature/stats/rephist.h"
110
111
112
113
114
115
#include "lib/compress/compress.h"
#include "lib/crypt_ops/crypto_init.h"
#include "lib/crypt_ops/crypto_rand.h"
#include "lib/crypt_ops/crypto_util.h"
#include "lib/encoding/confline.h"
#include "lib/log/git_revision.h"
116
#include "lib/net/resolve.h"
117
118
119
120
121
122
123
124
#include "lib/sandbox/sandbox.h"

#ifdef ENABLE_NSS
#include "lib/crypt_ops/crypto_nss_mgt.h"
#else
#include "lib/crypt_ops/crypto_openssl_mgt.h"
#endif

125
#ifdef _WIN32
126
127
#include <shlobj.h>
#endif
128
129
130
131
132
133
134
135
136
#ifdef HAVE_FCNTL_H
#include <fcntl.h>
#endif
#ifdef HAVE_SYS_STAT_H
#include <sys/stat.h>
#endif
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
Roger Dingledine's avatar
Roger Dingledine committed
137

138
#include "lib/meminfo/meminfo.h"
139
#include "lib/osinfo/uname.h"
140
141
142
143
144
#include "lib/process/daemon.h"
#include "lib/process/pidfile.h"
#include "lib/process/restrict.h"
#include "lib/process/setuid.h"
#include "lib/process/subprocess.h"
145
#include "lib/net/gethostname.h"
146
#include "lib/thread/numcpus.h"
147

148
#include "lib/encoding/keyval.h"
149
#include "lib/fs/conffile.h"
150
#include "lib/evloop/procmon.h"
151

152
#include "feature/dirauth/dirvote.h"
153
#include "feature/dirauth/recommend_pkg.h"
154
#include "feature/dirauth/authmode.h"
155

156
157
#include "core/or/connection_st.h"
#include "core/or/port_cfg_st.h"
158

159
160
161
162
163
164
#ifdef HAVE_SYSTEMD
#   if defined(__COVERITY__) && !defined(__INCLUDE_LEVEL__)
/* Systemd's use of gcc's __INCLUDE_LEVEL__ extension macro appears to confuse
 * Coverity. Here's a kludge to unconfuse it.
 */
#   define __INCLUDE_LEVEL__ 2
165
#endif /* defined(__COVERITY__) && !defined(__INCLUDE_LEVEL__) */
166
#include <systemd/sd-daemon.h>
167
#endif /* defined(HAVE_SYSTEMD) */
168

169
/* Prefix used to indicate a Unix socket in a FooPort configuration. */
170
static const char unix_socket_prefix[] = "unix:";
171
172
173
/* Prefix used to indicate a Unix socket with spaces in it, in a FooPort
 * configuration. */
static const char unix_q_socket_prefix[] = "unix:\"";
174

175
176
177
178
/* limits for TCP send and recv buffer size used for constrained sockets */
#define MIN_CONSTRAINED_TCP_BUFFER 2048
#define MAX_CONSTRAINED_TCP_BUFFER 262144  /* 256k */

179
180
181
182
183
/** macro to help with the bulk rename of *DownloadSchedule to
 * *DowloadInitialDelay . */
#define DOWNLOAD_SCHEDULE(name) \
  { #name "DownloadSchedule", #name "DownloadInitialDelay", 0, 1 }

184
185
/** A list of abbreviations and aliases to map command-line options, obsolete
 * option names, or alternative option names, to their current values. */
186
static config_abbrev_t option_abbrevs_[] = {
187
188
189
190
  PLURAL(AuthDirBadDirCC),
  PLURAL(AuthDirBadExitCC),
  PLURAL(AuthDirInvalidCC),
  PLURAL(AuthDirRejectCC),
191
  PLURAL(EntryNode),
192
193
  PLURAL(ExcludeNode),
  PLURAL(FirewallPort),
194
  PLURAL(LongLivedPort),
195
196
  PLURAL(HiddenServiceNode),
  PLURAL(HiddenServiceExcludeNode),
197
  PLURAL(NumCPU),
198
  PLURAL(RendNode),
199
  PLURAL(RecommendedPackage),
200
  PLURAL(RendExcludeNode),
201
202
  PLURAL(StrictEntryNode),
  PLURAL(StrictExitNode),
203
  PLURAL(StrictNode),
204
  { "l", "Log", 1, 0},
205
  { "AllowUnverifiedNodes", "AllowInvalidNodes", 0, 0},
206
207
  { "AutomapHostSuffixes", "AutomapHostsSuffixes", 0, 0},
  { "AutomapHostOnResolve", "AutomapHostsOnResolve", 0, 0},
208
209
210
  { "BandwidthRateBytes", "BandwidthRate", 0, 0},
  { "BandwidthBurstBytes", "BandwidthBurst", 0, 0},
  { "DirFetchPostPeriod", "StatusFetchPeriod", 0, 0},
211
  { "DirServer", "DirAuthority", 0, 0}, /* XXXX later, make this warn? */
212
  { "MaxConn", "ConnLimit", 0, 1},
213
  { "MaxMemInCellQueues", "MaxMemInQueues", 0, 0},
214
215
216
  { "ORBindAddress", "ORListenAddress", 0, 0},
  { "DirBindAddress", "DirListenAddress", 0, 0},
  { "SocksBindAddress", "SocksListenAddress", 0, 0},
217
218
219
220
  { "UseHelperNodes", "UseEntryGuards", 0, 0},
  { "NumHelperNodes", "NumEntryGuards", 0, 0},
  { "UseEntryNodes", "UseEntryGuards", 0, 0},
  { "NumEntryNodes", "NumEntryGuards", 0, 0},
221
222
  { "ResolvConf", "ServerDNSResolvConfFile", 0, 1},
  { "SearchDomains", "ServerDNSSearchDomains", 0, 1},
223
  { "ServerDNSAllowBrokenResolvConf", "ServerDNSAllowBrokenConfig", 0, 0},
224
  { "PreferTunnelledDirConns", "PreferTunneledDirConns", 0, 0},
225
  { "BridgeAuthoritativeDirectory", "BridgeAuthoritativeDir", 0, 0},
226
  { "HashedControlPassword", "__HashedControlSessionPassword", 1, 0},
227
  { "VirtualAddrNetwork", "VirtualAddrNetworkIPv4", 0, 0},
228
  { "SocksSocketsGroupWritable", "UnixSocksGroupWritable", 0, 1},
229
230
231
  { "_HSLayer2Nodes", "HSLayer2Nodes", 0, 1 },
  { "_HSLayer3Nodes", "HSLayer3Nodes", 0, 1 },

232
233
234
235
236
237
238
239
240
241
  DOWNLOAD_SCHEDULE(ClientBootstrapConsensusAuthority),
  DOWNLOAD_SCHEDULE(ClientBootstrapConsensusAuthorityOnly),
  DOWNLOAD_SCHEDULE(ClientBootstrapConsensusFallback),
  DOWNLOAD_SCHEDULE(TestingBridge),
  DOWNLOAD_SCHEDULE(TestingBridgeBootstrap),
  DOWNLOAD_SCHEDULE(TestingClient),
  DOWNLOAD_SCHEDULE(TestingClientConsensus),
  DOWNLOAD_SCHEDULE(TestingServer),
  DOWNLOAD_SCHEDULE(TestingServerConsensus),

242
243
  { NULL, NULL, 0, 0},
};
244

245
246
247
248
/** dummy instance of or_options_t, used for type-checking its
 * members with CONF_CHECK_VAR_TYPE. */
DUMMY_TYPECHECK_INSTANCE(or_options_t);

Nick Mathewson's avatar
Nick Mathewson committed
249
250
251
252
/** An entry for config_vars: "The option <b>name</b> has type
 * CONFIG_TYPE_<b>conftype</b>, and corresponds to
 * or_options_t.<b>member</b>"
 */
253
#define VAR(name,conftype,member,initvalue)                             \
Neel Chauhan's avatar
Neel Chauhan committed
254
  { name, CONFIG_TYPE_ ## conftype, offsetof(or_options_t, member),     \
255
      initvalue CONF_TEST_MEMBERS(or_options_t, conftype, member) }
256
257
258
/** As VAR, but the option name and member name are the same. */
#define V(member,conftype,initvalue)                                    \
  VAR(#member, conftype, member, initvalue)
Nick Mathewson's avatar
Nick Mathewson committed
259
/** An entry for config_vars: "The option <b>name</b> is obsolete." */
260
261
262
#ifdef TOR_UNIT_TESTS
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL, {.INT=NULL} }
#else
263
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL }
264
#endif
265

266
267
268
269
270
271
272
273
274
275
276
/**
 * Macro to declare *Port options.  Each one comes in three entries.
 * For example, most users should use "SocksPort" to configure the
 * socks port, but TorBrowser wants to use __SocksPort so that it
 * isn't stored by SAVECONF.  The SocksPortLines virtual option is
 * used to query both options from the controller.
 */
#define VPORT(member)                                           \
  VAR(#member "Lines", LINELIST_V, member ## _lines, NULL),     \
  VAR(#member, LINELIST_S, member ## _lines, NULL),             \
  VAR("__" #member, LINELIST_S, member ## _lines, NULL)
277

278
279
280
/** UINT64_MAX as a decimal string */
#define UINT64_MAX_STRING "18446744073709551615"

Nick Mathewson's avatar
Nick Mathewson committed
281
282
283
284
/** Array of configuration options.  Until we disallow nonstandard
 * abbreviations, order is significant, since the first matching option will
 * be chosen first.
 */
285
static config_var_t option_vars_[] = {
286
  V(AccountingMax,               MEMUNIT,  "0 bytes"),
287
  VAR("AccountingRule",          STRING,   AccountingRule_option,  "max"),
288
289
  V(AccountingStart,             STRING,   NULL),
  V(Address,                     STRING,   NULL),
Nick Mathewson's avatar
Nick Mathewson committed
290
  OBSOLETE("AllowDotExit"),
291
  OBSOLETE("AllowInvalidNodes"),
292
  V(AllowNonRFC953Hostnames,     BOOL,     "0"),
293
  OBSOLETE("AllowSingleHopCircuits"),
294
  OBSOLETE("AllowSingleHopExits"),
295
296
  V(AlternateBridgeAuthority,    LINELIST, NULL),
  V(AlternateDirAuthority,       LINELIST, NULL),
297
  OBSOLETE("AlternateHSAuthority"),
298
  V(AssumeReachable,             BOOL,     "0"),
299
300
  OBSOLETE("AuthDirBadDir"),
  OBSOLETE("AuthDirBadDirCCs"),
301
  V(AuthDirBadExit,              LINELIST, NULL),
302
  V(AuthDirBadExitCCs,           CSV,      ""),
303
  V(AuthDirInvalid,              LINELIST, NULL),
304
  V(AuthDirInvalidCCs,           CSV,      ""),
305
  V(AuthDirFastGuarantee,        MEMUNIT,  "100 KB"),
306
  V(AuthDirGuardBWGuarantee,     MEMUNIT,  "2 MB"),
307
  V(AuthDirPinKeys,              BOOL,     "1"),
308
  V(AuthDirReject,               LINELIST, NULL),
309
  V(AuthDirRejectCCs,            CSV,      ""),
310
  OBSOLETE("AuthDirRejectUnlisted"),
311
  OBSOLETE("AuthDirListBadDirs"),
312
  V(AuthDirListBadExits,         BOOL,     "0"),
313
  V(AuthDirMaxServersPerAddr,    UINT,     "2"),
314
  OBSOLETE("AuthDirMaxServersPerAuthAddr"),
315
  V(AuthDirHasIPv6Connectivity,  BOOL,     "0"),
316
317
318
319
  VAR("AuthoritativeDirectory",  BOOL, AuthoritativeDir,    "0"),
  V(AutomapHostsOnResolve,       BOOL,     "0"),
  V(AutomapHostsSuffixes,        CSV,      ".onion,.exit"),
  V(AvoidDiskWrites,             BOOL,     "0"),
320
321
  V(BandwidthBurst,              MEMUNIT,  "1 GB"),
  V(BandwidthRate,               MEMUNIT,  "1 GB"),
322
323
  V(BridgeAuthoritativeDir,      BOOL,     "0"),
  VAR("Bridge",                  LINELIST, Bridges,    NULL),
324
  V(BridgePassword,              STRING,   NULL),
325
  V(BridgeRecordUsageByCountry,  BOOL,     "1"),
326
  V(BridgeRelay,                 BOOL,     "0"),
327
  V(BridgeDistribution,          STRING,   NULL),
328
  VAR("CacheDirectory",          FILENAME, CacheDirectory_option, NULL),
329
  V(CacheDirectoryGroupReadable, AUTOBOOL,     "auto"),
330
  V(CellStatistics,              BOOL,     "0"),
331
  V(PaddingStatistics,           BOOL,     "1"),
332
  V(LearnCircuitBuildTimeout,    BOOL,     "1"),
333
  V(CircuitBuildTimeout,         INTERVAL, "0"),
334
335
  OBSOLETE("CircuitIdleTimeout"),
  V(CircuitsAvailableTimeout,    INTERVAL, "0"),
336
  V(CircuitStreamTimeout,        INTERVAL, "0"),
337
  V(CircuitPriorityHalflife,     DOUBLE,  "-1.0"), /*negative:'Use default'*/
338
  V(ClientDNSRejectInternalAddresses, BOOL,"1"),
339
  V(ClientOnly,                  BOOL,     "0"),
340
341
  V(ClientPreferIPv6ORPort,      AUTOBOOL, "auto"),
  V(ClientPreferIPv6DirPort,     AUTOBOOL, "auto"),
342
  V(ClientRejectInternalAddresses, BOOL,   "1"),
343
  V(ClientTransportPlugin,       LINELIST, NULL),
344
  V(ClientUseIPv6,               BOOL,     "0"),
345
  V(ClientUseIPv4,               BOOL,     "1"),
346
  V(ConsensusParams,             STRING,   NULL),
347
  V(ConnLimit,                   UINT,     "1000"),
348
  V(ConnDirectionStatistics,     BOOL,     "0"),
349
350
351
  V(ConstrainedSockets,          BOOL,     "0"),
  V(ConstrainedSockSize,         MEMUNIT,  "8192"),
  V(ContactInfo,                 STRING,   NULL),
352
  OBSOLETE("ControlListenAddress"),
353
  VPORT(ControlPort),
354
  V(ControlPortFileGroupReadable,BOOL,     "0"),
355
  V(ControlPortWriteToFile,      FILENAME, NULL),
356
  V(ControlSocket,               LINELIST, NULL),
357
  V(ControlSocketsGroupWritable, BOOL,     "0"),
358
  V(UnixSocksGroupWritable,    BOOL,     "0"),
359
360
361
  V(CookieAuthentication,        BOOL,     "0"),
  V(CookieAuthFileGroupReadable, BOOL,     "0"),
  V(CookieAuthFile,              STRING,   NULL),
362
  V(CountPrivateBandwidth,       BOOL,     "0"),
363
  VAR("DataDirectory",           FILENAME, DataDirectory_option, NULL),
364
  V(DataDirectoryGroupReadable,  BOOL,     "0"),
365
  V(DisableOOSCheck,             BOOL,     "1"),
366
  V(DisableNetwork,              BOOL,     "0"),
367
  V(DirAllowPrivateAddresses,    BOOL,     "0"),
368
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "30 minutes"),
369
  OBSOLETE("DirListenAddress"),
370
  V(DirPolicy,                   LINELIST, NULL),
371
  VPORT(DirPort),
372
  V(DirPortFrontPage,            FILENAME, NULL),
373
  VAR("DirReqStatistics",        BOOL,     DirReqStatistics_option, "1"),
374
  VAR("DirAuthority",            LINELIST, DirAuthorities, NULL),
375
  V(DirCache,                    BOOL,     "1"),
376
377
378
379
380
  /* A DirAuthorityFallbackRate of 0.1 means that 0.5% of clients try an
   * authority when all fallbacks are up, and 2% try an authority when 25% of
   * fallbacks are down. (We rebuild the list when 25% of fallbacks are down).
   *
   * We want to reduce load on authorities, but keep these two figures within
Nick Mathewson's avatar
Nick Mathewson committed
381
382
   * an order of magnitude, so there isn't too much load shifting to
   * authorities when fallbacks go down. */
383
  V(DirAuthorityFallbackRate,    DOUBLE,   "0.1"),
384
  V(DisableAllSwap,              BOOL,     "0"),
385
  V(DisableDebuggerAttachment,   BOOL,     "1"),
386
  OBSOLETE("DisableIOCP"),
387
  OBSOLETE("DisableV2DirectoryInfo_"),
388
  OBSOLETE("DynamicDHGroups"),
389
  VPORT(DNSPort),
390
  OBSOLETE("DNSListenAddress"),
391
392
393
  /* DoS circuit creation options. */
  V(DoSCircuitCreationEnabled,   AUTOBOOL, "auto"),
  V(DoSCircuitCreationMinConnections,      UINT, "0"),
394
  V(DoSCircuitCreationRate,      UINT,     "0"),
395
396
397
398
399
400
401
402
403
  V(DoSCircuitCreationBurst,     UINT,     "0"),
  V(DoSCircuitCreationDefenseType,         INT,  "0"),
  V(DoSCircuitCreationDefenseTimePeriod,   INTERVAL, "0"),
  /* DoS connection options. */
  V(DoSConnectionEnabled,        AUTOBOOL, "auto"),
  V(DoSConnectionMaxConcurrentCount,       UINT, "0"),
  V(DoSConnectionDefenseType,    INT,      "0"),
  /* DoS single hop client options. */
  V(DoSRefuseSingleHopClientRendezvous,    AUTOBOOL, "auto"),
404
  V(DownloadExtraInfo,           BOOL,     "0"),
405
  V(TestingEnableConnBwEvent,    BOOL,     "0"),
406
  V(TestingEnableCellStatsEvent, BOOL,     "0"),
407
  OBSOLETE("TestingEnableTbEmptyEvent"),
408
  V(EnforceDistinctSubnets,      BOOL,     "1"),
409
  V(EntryNodes,                  ROUTERSET,   NULL),
410
  V(EntryStatistics,             BOOL,     "0"),
411
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "10 minutes"),
412
413
  V(ExcludeNodes,                ROUTERSET, NULL),
  V(ExcludeExitNodes,            ROUTERSET, NULL),
414
  OBSOLETE("ExcludeSingleHopRelays"),
415
  V(ExitNodes,                   ROUTERSET, NULL),
416
417
  V(ExitPolicy,                  LINELIST, NULL),
  V(ExitPolicyRejectPrivate,     BOOL,     "1"),
418
  V(ExitPolicyRejectLocalInterfaces, BOOL, "0"),
419
  V(ExitPortStatistics,          BOOL,     "0"),
420
  V(ExtendAllowPrivateAddresses, BOOL,     "0"),
421
  V(ExitRelay,                   AUTOBOOL, "auto"),
422
  VPORT(ExtORPort),
423
  V(ExtORPortCookieAuthFile,     STRING,   NULL),
424
  V(ExtORPortCookieAuthFileGroupReadable, BOOL, "0"),
425
  V(ExtraInfoStatistics,         BOOL,     "1"),
426
  V(ExtendByEd25519ID,           AUTOBOOL, "auto"),
427
  V(FallbackDir,                 LINELIST, NULL),
428

429
  V(UseDefaultFallbackDirs,      BOOL,     "1"),
430

431
  OBSOLETE("FallbackNetworkstatusFile"),
432
433
  V(FascistFirewall,             BOOL,     "0"),
  V(FirewallPorts,               CSV,      ""),
434
  OBSOLETE("FastFirstHopPK"),
435
  V(FetchDirInfoEarly,           BOOL,     "0"),
436
  V(FetchDirInfoExtraEarly,      BOOL,     "0"),
437
438
439
  V(FetchServerDescriptors,      BOOL,     "1"),
  V(FetchHidServDescriptors,     BOOL,     "1"),
  V(FetchUselessDescriptors,     BOOL,     "0"),
440
  OBSOLETE("FetchV2Networkstatus"),
441
  V(GeoIPExcludeUnknown,         AUTOBOOL, "auto"),
442
#ifdef _WIN32
443
  V(GeoIPFile,                   FILENAME, "<default>"),
nils's avatar
nils committed
444
  V(GeoIPv6File,                 FILENAME, "<default>"),
445
#else
446
447
  V(GeoIPFile,                   FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip"),
nils's avatar
nils committed
448
449
  V(GeoIPv6File,                 FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip6"),
450
#endif /* defined(_WIN32) */
451
  OBSOLETE("Group"),
452
  V(GuardLifetime,               INTERVAL, "0 minutes"),
453
  V(HardwareAccel,               BOOL,     "0"),
454
  V(HeartbeatPeriod,             INTERVAL, "6 hours"),
Alexander Færøy's avatar
Alexander Færøy committed
455
  V(MainloopStats,               BOOL,     "0"),
456
457
  V(AccelName,                   STRING,   NULL),
  V(AccelDir,                    FILENAME, NULL),
458
  V(HashedControlPassword,       LINELIST, NULL),
459
  OBSOLETE("HidServDirectoryV2"),
Nick Mathewson's avatar
Nick Mathewson committed
460
  VAR("HiddenServiceDir",    LINELIST_S, RendConfigLines,    NULL),
461
  VAR("HiddenServiceDirGroupReadable",  LINELIST_S, RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
462
463
  VAR("HiddenServiceOptions",LINELIST_V, RendConfigLines,    NULL),
  VAR("HiddenServicePort",   LINELIST_S, RendConfigLines,    NULL),
464
  VAR("HiddenServiceVersion",LINELIST_S, RendConfigLines,    NULL),
465
  VAR("HiddenServiceAuthorizeClient",LINELIST_S,RendConfigLines, NULL),
466
  VAR("HiddenServiceAllowUnknownPorts",LINELIST_S, RendConfigLines, NULL),
467
468
  VAR("HiddenServiceMaxStreams",LINELIST_S, RendConfigLines, NULL),
  VAR("HiddenServiceMaxStreamsCloseCircuit",LINELIST_S, RendConfigLines, NULL),
469
  VAR("HiddenServiceNumIntroductionPoints", LINELIST_S, RendConfigLines, NULL),
470
  VAR("HiddenServiceExportCircuitID", LINELIST_S,  RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
471
  VAR("HiddenServiceStatistics", BOOL, HiddenServiceStatistics_option, "1"),
472
  V(HidServAuth,                 LINELIST, NULL),
473
  V(ClientOnionAuthDir,          FILENAME, NULL),
474
  OBSOLETE("CloseHSClientCircuitsImmediatelyOnTimeout"),
475
  OBSOLETE("CloseHSServiceRendCircuitsImmediatelyOnTimeout"),
476
477
  V(HiddenServiceSingleHopMode,  BOOL,     "0"),
  V(HiddenServiceNonAnonymousMode,BOOL,    "0"),
478
479
480
481
  V(HTTPProxy,                   STRING,   NULL),
  V(HTTPProxyAuthenticator,      STRING,   NULL),
  V(HTTPSProxy,                  STRING,   NULL),
  V(HTTPSProxyAuthenticator,     STRING,   NULL),
482
  VPORT(HTTPTunnelPort),
483
  V(IPv6Exit,                    BOOL,     "0"),
484
  VAR("ServerTransportPlugin",   LINELIST, ServerTransportPlugin,  NULL),
485
  V(ServerTransportListenAddr,   LINELIST, NULL),
486
  V(ServerTransportOptions,      LINELIST, NULL),
487
  V(SigningKeyLifetime,          INTERVAL, "30 days"),
488
489
490
491
  V(Socks4Proxy,                 STRING,   NULL),
  V(Socks5Proxy,                 STRING,   NULL),
  V(Socks5ProxyUsername,         STRING,   NULL),
  V(Socks5ProxyPassword,         STRING,   NULL),
492
493
  VAR("KeyDirectory",            FILENAME, KeyDirectory_option, NULL),
  V(KeyDirectoryGroupReadable,   BOOL,     "0"),
494
495
  VAR("HSLayer2Nodes",           ROUTERSET,  HSLayer2Nodes,  NULL),
  VAR("HSLayer3Nodes",           ROUTERSET,  HSLayer3Nodes,  NULL),
496
  V(KeepalivePeriod,             INTERVAL, "5 minutes"),
497
  V(KeepBindCapabilities,            AUTOBOOL, "auto"),
498
  VAR("Log",                     LINELIST, Logs,             NULL),
499
  V(LogMessageDomains,           BOOL,     "0"),
500
  V(LogTimeGranularity,          MSEC_INTERVAL, "1 second"),
Arlo Breault's avatar
Arlo Breault committed
501
  V(TruncateLogFile,             BOOL,     "0"),
Peter Palfrader's avatar
Peter Palfrader committed
502
  V(SyslogIdentityTag,           STRING,   NULL),
503
  V(AndroidIdentityTag,          STRING,   NULL),
504
  V(LongLivedPorts,              CSV,
Nick Mathewson's avatar
Nick Mathewson committed
505
        "21,22,706,1863,5050,5190,5222,5223,6523,6667,6697,8300"),
506
507
508
  VAR("MapAddress",              LINELIST, AddressMap,           NULL),
  V(MaxAdvertisedBandwidth,      MEMUNIT,  "1 GB"),
  V(MaxCircuitDirtiness,         INTERVAL, "10 minutes"),
509
  V(MaxClientCircuitsPending,    UINT,     "32"),
510
  V(MaxConsensusAgeForDiffs,     INTERVAL, "0 seconds"),
511
  VAR("MaxMemInQueues",          MEMUNIT,   MaxMemInQueues_raw, "0"),
512
513
  OBSOLETE("MaxOnionsPending"),
  V(MaxOnionQueueDelay,          MSEC_INTERVAL, "1750 msec"),
514
  V(MaxUnparseableDescSizeToLog, MEMUNIT, "10 MB"),
515
  V(MinMeasuredBWsForAuthToIgnoreAdvertised, INT, "500"),
516
  VAR("MyFamily",                LINELIST, MyFamily_lines,       NULL),
517
  V(NewCircuitPeriod,            INTERVAL, "30 seconds"),
518
  OBSOLETE("NamingAuthoritativeDirectory"),
519
  OBSOLETE("NATDListenAddress"),
520
  VPORT(NATDPort),
521
  V(Nickname,                    STRING,   NULL),
522
  OBSOLETE("PredictedPortsRelevanceTime"),
523
  OBSOLETE("WarnUnsafeSocks"),
524
  VAR("NodeFamily",              LINELIST, NodeFamilies,         NULL),
525
  V(NoExec,                      BOOL,     "0"),
526
  V(NumCPUs,                     UINT,     "0"),
527
  V(NumDirectoryGuards,          UINT,     "0"),
528
  V(NumEntryGuards,              UINT,     "0"),
529
  V(NumPrimaryGuards,            UINT,     "0"),
Nick Mathewson's avatar
Nick Mathewson committed
530
  V(OfflineMasterKey,            BOOL,     "0"),
531
  OBSOLETE("ORListenAddress"),
532
  VPORT(ORPort),
533
  V(OutboundBindAddress,         LINELIST,   NULL),
534
535
  V(OutboundBindAddressOR,       LINELIST,   NULL),
  V(OutboundBindAddressExit,     LINELIST,   NULL),
536

537
  OBSOLETE("PathBiasDisableRate"),
538
539
  V(PathBiasCircThreshold,       INT,      "-1"),
  V(PathBiasNoticeRate,          DOUBLE,   "-1"),
540
  V(PathBiasWarnRate,            DOUBLE,   "-1"),
541
  V(PathBiasExtremeRate,         DOUBLE,   "-1"),
542
  V(PathBiasScaleThreshold,      INT,      "-1"),
543
544
  OBSOLETE("PathBiasScaleFactor"),
  OBSOLETE("PathBiasMultFactor"),
545
  V(PathBiasDropGuards,          AUTOBOOL, "0"),
546
547
548
549
550
551
  OBSOLETE("PathBiasUseCloseCounts"),

  V(PathBiasUseThreshold,       INT,      "-1"),
  V(PathBiasNoticeUseRate,          DOUBLE,   "-1"),
  V(PathBiasExtremeUseRate,         DOUBLE,   "-1"),
  V(PathBiasScaleUseThreshold,      INT,      "-1"),
552

553
  V(PathsNeededToBuildCircuits,  DOUBLE,   "-1"),
554
555
  V(PerConnBWBurst,              MEMUNIT,  "0"),
  V(PerConnBWRate,               MEMUNIT,  "0"),
556
  V(PidFile,                     STRING,   NULL),
557
  V(TestingTorNetwork,           BOOL,     "0"),
558
  V(TestingMinExitFlagThreshold, MEMUNIT,  "0"),
559
  V(TestingMinFastFlagThreshold, MEMUNIT,  "0"),
560

561
  V(TestingLinkCertLifetime,          INTERVAL, "2 days"),
562
563
564
565
566
  V(TestingAuthKeyLifetime,          INTERVAL, "2 days"),
  V(TestingLinkKeySlop,              INTERVAL, "3 hours"),
  V(TestingAuthKeySlop,              INTERVAL, "3 hours"),
  V(TestingSigningKeySlop,           INTERVAL, "1 day"),

567
  V(OptimisticData,              AUTOBOOL, "auto"),
568
569
  OBSOLETE("PortForwarding"),
  OBSOLETE("PortForwardingHelper"),
570
  OBSOLETE("PreferTunneledDirConns"),
571
  V(ProtocolWarnings,            BOOL,     "0"),
572
  V(PublishServerDescriptor,     CSV,      "1"),
573
574
575
576
577
578
579
  V(PublishHidServDescriptors,   BOOL,     "1"),
  V(ReachableAddresses,          LINELIST, NULL),
  V(ReachableDirAddresses,       LINELIST, NULL),
  V(ReachableORAddresses,        LINELIST, NULL),
  V(RecommendedVersions,         LINELIST, NULL),
  V(RecommendedClientVersions,   LINELIST, NULL),
  V(RecommendedServerVersions,   LINELIST, NULL),
580
  V(RecommendedPackages,         LINELIST, NULL),
581
582
  V(ReducedConnectionPadding,    BOOL,     "0"),
  V(ConnectionPadding,           AUTOBOOL, "auto"),
583
  V(RefuseUnknownExits,          AUTOBOOL, "auto"),
584
  V(RejectPlaintextPorts,        CSV,      ""),
585
586
587
588
589
  V(RelayBandwidthBurst,         MEMUNIT,  "0"),
  V(RelayBandwidthRate,          MEMUNIT,  "0"),
  V(RendPostPeriod,              INTERVAL, "1 hour"),
  V(RephistTrackTime,            INTERVAL, "24 hours"),
  V(RunAsDaemon,                 BOOL,     "0"),
590
  V(ReducedExitPolicy,           BOOL,     "0"),
591
  OBSOLETE("RunTesting"), // currently unused
592
  V(Sandbox,                     BOOL,     "0"),
593
  V(SafeLogging,                 STRING,   "1"),
594
  V(SafeSocks,                   BOOL,     "0"),
595
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
596
597
  V(ServerDNSAllowNonRFC953Hostnames, BOOL,"0"),
  V(ServerDNSDetectHijacking,    BOOL,     "1"),
598
  V(ServerDNSRandomizeCase,      BOOL,     "1"),
599
600
601
  V(ServerDNSResolvConfFile,     STRING,   NULL),
  V(ServerDNSSearchDomains,      BOOL,     "0"),
  V(ServerDNSTestAddresses,      CSV,
602
      "www.google.com,www.mit.edu,www.yahoo.com,www.slashdot.org"),
603
604
605
606
607
  OBSOLETE("SchedulerLowWaterMark__"),
  OBSOLETE("SchedulerHighWaterMark__"),
  OBSOLETE("SchedulerMaxFlushCells__"),
  V(KISTSchedRunInterval,        MSEC_INTERVAL, "0 msec"),
  V(KISTSockBufSizeFactor,       DOUBLE,   "1.0"),
608
  V(Schedulers,                  CSV,      "KIST,KISTLite,Vanilla"),
609
  V(ShutdownWaitLength,          INTERVAL, "30 seconds"),
610
  OBSOLETE("SocksListenAddress"),
611
  V(SocksPolicy,                 LINELIST, NULL),
612
  VPORT(SocksPort),
613
  V(SocksTimeout,                INTERVAL, "2 minutes"),
614
  V(SSLKeyLifetime,              INTERVAL, "0"),
615
616
  OBSOLETE("StrictEntryNodes"),
  OBSOLETE("StrictExitNodes"),
617
  V(StrictNodes,                 BOOL,     "0"),
618
  OBSOLETE("Support022HiddenServices"),
619
  V(TestSocks,                   BOOL,     "0"),
620
  V(TokenBucketRefillInterval,   MSEC_INTERVAL, "100 msec"),
David Goulet's avatar
David Goulet committed
621
622
  OBSOLETE("Tor2webMode"),
  OBSOLETE("Tor2webRendezvousPoints"),
623
  OBSOLETE("TLSECGroup"),
624
625
  V(TrackHostExits,              CSV,      NULL),
  V(TrackHostExitsExpire,        INTERVAL, "30 minutes"),
626
  OBSOLETE("TransListenAddress"),
627
  VPORT(TransPort),
628
  V(TransProxyType,              STRING,   "default"),
629
  OBSOLETE("TunnelDirConns"),
630
  V(UpdateBridgesFromAuthority,  BOOL,     "0"),
631
  V(UseBridges,                  BOOL,     "0"),
632
  VAR("UseEntryGuards",          BOOL,     UseEntryGuards_option, "1"),
Nick Mathewson's avatar
Nick Mathewson committed
633
  OBSOLETE("UseEntryGuardsAsDirGuards"),
634
  V(UseGuardFraction,            AUTOBOOL, "auto"),
635
  V(UseMicrodescriptors,         AUTOBOOL, "auto"),
636
  OBSOLETE("UseNTorHandshake"),
637
  V(User,                        STRING,   NULL),
638
  OBSOLETE("UserspaceIOCPBuffers"),
639
  V(AuthDirSharedRandomness,     BOOL,     "1"),
640
  V(AuthDirTestEd25519LinkKeys,  BOOL,     "1"),
641
  OBSOLETE("V1AuthoritativeDirectory"),
642
  OBSOLETE("V2AuthoritativeDirectory"),
643
  VAR("V3AuthoritativeDirectory",BOOL, V3AuthoritativeDir,   "0"),
644
645
646
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "30 minutes"),
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "5 minutes"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "5 minutes"),
647
  V(TestingV3AuthVotingStartOffset, INTERVAL, "0"),
648
649
650
651
  V(V3AuthVotingInterval,        INTERVAL, "1 hour"),
  V(V3AuthVoteDelay,             INTERVAL, "5 minutes"),
  V(V3AuthDistDelay,             INTERVAL, "5 minutes"),
  V(V3AuthNIntervalsValid,       UINT,     "3"),
652
  V(V3AuthUseLegacyKey,          BOOL,     "0"),
653
  V(V3BandwidthsFile,            FILENAME, NULL),
654
  V(GuardfractionFile,           FILENAME, NULL),
655
  VAR("VersioningAuthoritativeDirectory",BOOL,VersioningAuthoritativeDir, "0"),
656
  OBSOLETE("VoteOnHidServDirectoriesV2"),
657
658
  V(VirtualAddrNetworkIPv4,      STRING,   "127.192.0.0/10"),
  V(VirtualAddrNetworkIPv6,      STRING,   "[FE80::]/10"),
659
  V(WarnPlaintextPorts,          CSV,      "23,109,110,143"),
660
661
  OBSOLETE("UseFilteringSSLBufferevents"),
  OBSOLETE("__UseFilteringSSLBufferevents"),
662
  VAR("__ReloadTorrcOnSIGHUP",   BOOL,  ReloadTorrcOnSIGHUP,      "1"),
663
664
  VAR("__AllDirActionsPrivate",  BOOL,  AllDirActionsPrivate,     "0"),
  VAR("__DisablePredictedCircuits",BOOL,DisablePredictedCircuits, "0"),
665
  VAR("__DisableSignalHandlers", BOOL,  DisableSignalHandlers,    "0"),
666
  VAR("__LeaveStreamsUnattached",BOOL,  LeaveStreamsUnattached,   "0"),
667
668
  VAR("__HashedControlSessionPassword", LINELIST, HashedControlSessionPassword,
      NULL),
669
  VAR("__OwningControllerProcess",STRING,OwningControllerProcess, NULL),
670
  VAR("__OwningControllerFD", UINT64, OwningControllerFD, UINT64_MAX_STRING),
671
  V(MinUptimeHidServDirectoryV2, INTERVAL, "96 hours"),
672
673
674
675
  V(TestingServerDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingClientDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingServerConsensusDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingClientConsensusDownloadInitialDelay, CSV_INTERVAL, "0"),
676
  /* With the ClientBootstrapConsensus*Download* below:
677
   * Clients with only authorities will try:
678
679
   *  - at least 3 authorities over 10 seconds, then exponentially backoff,
   *    with the next attempt 3-21 seconds later,
680
   * Clients with authorities and fallbacks will try:
681
682
   *  - at least 2 authorities and 4 fallbacks over 21 seconds, then
   *    exponentially backoff, with the next attempts 4-33 seconds later,
683
   * Clients will also retry when an application request arrives.
684
   * After a number of failed requests, clients retry every 3 days + 1 hour.
685
686
687
688
689
690
   *
   * Clients used to try 2 authorities over 10 seconds, then wait for
   * 60 minutes or an application request.
   *
   * When clients have authorities and fallbacks available, they use these
   * schedules: (we stagger the times to avoid thundering herds) */
691
692
  V(ClientBootstrapConsensusAuthorityDownloadInitialDelay, CSV_INTERVAL, "6"),
  V(ClientBootstrapConsensusFallbackDownloadInitialDelay, CSV_INTERVAL, "0"),
693
  /* When clients only have authorities available, they use this schedule: */
694
  V(ClientBootstrapConsensusAuthorityOnlyDownloadInitialDelay, CSV_INTERVAL,
695
    "0"),
696
697
698
699
  /* We don't want to overwhelm slow networks (or mirrors whose replies are
   * blocked), but we also don't want to fail if only some mirrors are
   * blackholed. Clients will try 3 directories simultaneously.
   * (Relays never use simultaneous connections.) */
700
  V(ClientBootstrapConsensusMaxInProgressTries, UINT, "3"),
701
702
  /* When a client has any running bridges, check each bridge occasionally,
    * whether or not that bridge is actually up. */
703
  V(TestingBridgeDownloadInitialDelay, CSV_INTERVAL,"10800"),
704
705
706
707
  /* When a client is just starting, or has no running bridges, check each
   * bridge a few times quickly, and then try again later. These schedules
   * are much longer than the other schedules, because we try each and every
   * configured bridge with this schedule. */
708
  V(TestingBridgeBootstrapDownloadInitialDelay, CSV_INTERVAL, "0"),
709
710
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "10 minutes"),
  V(TestingDirConnectionMaxStall, INTERVAL, "5 minutes"),
711
712
713
714
715
716
  OBSOLETE("TestingConsensusMaxDownloadTries"),
  OBSOLETE("ClientBootstrapConsensusMaxDownloadTries"),
  OBSOLETE("ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries"),
  OBSOLETE("TestingDescriptorMaxDownloadTries"),
  OBSOLETE("TestingMicrodescMaxDownloadTries"),
  OBSOLETE("TestingCertMaxDownloadTries"),
717
  V(TestingDirAuthVoteExit, ROUTERSET, NULL),
718
  V(TestingDirAuthVoteExitIsStrict,  BOOL,     "0"),
719
  V(TestingDirAuthVoteGuard, ROUTERSET, NULL),
720
  V(TestingDirAuthVoteGuardIsStrict,  BOOL,     "0"),
721
  V(TestingDirAuthVoteHSDir, ROUTERSET, NULL),
722
  V(TestingDirAuthVoteHSDirIsStrict,  BOOL,     "0"),
723
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "0"),
724

725
  END_OF_CONFIG_VARS
726
};
727

728
729
/** Override default values with these if the user sets the TestingTorNetwork
 * option. */
730
static const config_var_t testing_tor_network_defaults[] = {
731
732
733
734
  V(DirAllowPrivateAddresses,    BOOL,     "1"),
  V(EnforceDistinctSubnets,      BOOL,     "0"),
  V(AssumeReachable,             BOOL,     "1"),
  V(AuthDirMaxServersPerAddr,    UINT,     "0"),
735
736
  V(ClientBootstrapConsensusAuthorityDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(ClientBootstrapConsensusFallbackDownloadInitialDelay, CSV_INTERVAL, "0"),
737
  V(ClientBootstrapConsensusAuthorityOnlyDownloadInitialDelay, CSV_INTERVAL,
738
    "0"),
739
  V(ClientDNSRejectInternalAddresses, BOOL,"0"),
740
  V(ClientRejectInternalAddresses, BOOL,   "0"),
741
  V(CountPrivateBandwidth,       BOOL,     "1"),
742
  V(ExitPolicyRejectPrivate,     BOOL,     "0"),
743
  V(ExtendAllowPrivateAddresses, BOOL,     "1"),
744
745
746
  V(V3AuthVotingInterval,        INTERVAL, "5 minutes"),
  V(V3AuthVoteDelay,             INTERVAL, "20 seconds"),
  V(V3AuthDistDelay,             INTERVAL, "20 seconds"),
747
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "150 seconds"),
748
749
750
751
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "20 seconds"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "20 seconds"),
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "0 minutes"),
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "0 minutes"),
752
  V(MinUptimeHidServDirectoryV2, INTERVAL, "0 minutes"),
753
754
755
756
757
758
  V(TestingServerDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingClientDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingServerConsensusDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingClientConsensusDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingBridgeDownloadInitialDelay, CSV_INTERVAL, "10"),
  V(TestingBridgeBootstrapDownloadInitialDelay, CSV_INTERVAL, "0"),
759
760
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "5 seconds"),
  V(TestingDirConnectionMaxStall, INTERVAL, "30 seconds"),
761
  V(TestingEnableConnBwEvent,    BOOL,     "1"),
762
  V(TestingEnableCellStatsEvent, BOOL,     "1"),
763
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "1"),
764
  V(RendPostPeriod,              INTERVAL, "2 minutes"),
765

766
  END_OF_CONFIG_VARS
767
};
768

769
#undef VAR
770
#undef V
771
772
#undef OBSOLETE

773
static const config_deprecation_t option_deprecation_notes_[] = {
774
  /* Deprecated since 0.3.2.0-alpha. */
775
776
777
778
  { "HTTPProxy", "It only applies to direct unencrypted HTTP connections "
    "to your directory server, which your Tor probably wasn't using." },
  { "HTTPProxyAuthenticator", "HTTPProxy is deprecated in favor of HTTPSProxy "
    "which should be used with HTTPSProxyAuthenticator." },
779
780
781
  /* End of options deprecated since 0.3.2.1-alpha */

  /* Options deprecated since 0.3.2.2-alpha */
782
783
784