config.c 288 KB
Newer Older
1
/* Copyright (c) 2001 Matej Pfajfar.
Roger Dingledine's avatar
Roger Dingledine committed
2
 * Copyright (c) 2001-2004, Roger Dingledine.
3
 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
Nick Mathewson's avatar
Nick Mathewson committed
4
 * Copyright (c) 2007-2016, The Tor Project, Inc. */
5
/* See LICENSE for licensing information */
6

Nick Mathewson's avatar
Nick Mathewson committed
7
/**
8
 * \file config.c
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
 * \brief Code to interpret the user's configuration of Tor.
 *
 * This module handles torrc configuration file, including parsing it,
 * combining it with torrc.defaults and the command line, allowing
 * user changes to it (via editing and SIGHUP or via the control port),
 * writing it back to disk (because of SAVECONF from the control port),
 * and -- most importantly, acting on it.
 *
 * The module additionally has some tools for manipulating and
 * inspecting values that are calculated as a result of the
 * configured options.
 *
 * <h3>How to add  new options</h3>
 *
 * To add new items to the torrc, there are a minimum of three places to edit:
 * <ul>
 *   <li>The or_options_t structure in or.h, where the options are stored.
 *   <li>The option_vars_ array below in this module, which configures
 *       the names of the torrc options, their types, their multiplicities,
 *       and their mappings to fields in or_options_t.
 *   <li>The manual in doc/tor.1.txt, to document what the new option
 *       is, and how it works.
 * </ul>
 *
 * Additionally, you might need to edit these places too:
 * <ul>
 *   <li>options_validate() below, in case you want to reject some possible
 *       values of the new configuration option.
 *   <li>options_transition_allowed() below, in case you need to
 *       forbid some or all changes in the option while Tor is
 *       running.
 *   <li>options_transition_affects_workers(), in case changes in the option
 *       might require Tor to relaunch or reconfigure its worker threads.
 *   <li>options_transition_affects_descriptor(), in case changes in the
 *       option might require a Tor relay to build and publish a new server
 *       descriptor.
 *   <li>options_act() and/or options_act_reversible(), in case there's some
 *       action that needs to be taken immediately based on the option's
 *       value.
 * </ul>
 *
 * <h3>Changing the value of an option</h3>
 *
 * Because of the SAVECONF command from the control port, it's a bad
 * idea to change the value of any user-configured option in the
 * or_options_t.  If you want to sometimes do this anyway, we recommend
 * that you create a secondary field in or_options_t; that you have the
 * user option linked only to the secondary field; that you use the
 * secondary field to initialize the one that Tor actually looks at; and that
 * you use the one Tor looks as the one that you modify.
Nick Mathewson's avatar
Nick Mathewson committed
59
60
 **/

61
#define CONFIG_PRIVATE
Roger Dingledine's avatar
Roger Dingledine committed
62
#include "or.h"
63
#include "compat.h"
64
#include "addressmap.h"
65
#include "channel.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
66
#include "circuitbuild.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
67
#include "circuitlist.h"
68
69
#include "circuitmux.h"
#include "circuitmux_ewma.h"
70
#include "circuitstats.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
71
#include "config.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
72
#include "connection.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
73
#include "connection_edge.h"
74
#include "connection_or.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
75
#include "control.h"
76
#include "confparse.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
77
#include "cpuworker.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
78
#include "dirserv.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
79
#include "dirvote.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
80
#include "dns.h"
81
#include "entrynodes.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
82
#include "geoip.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
83
#include "hibernate.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
84
#include "main.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
85
#include "networkstatus.h"
86
#include "nodelist.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
87
#include "policies.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
88
#include "relay.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
89
#include "rendclient.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
90
#include "rendservice.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
91
#include "rephist.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
92
#include "router.h"
93
#include "sandbox.h"
94
#include "util.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
95
#include "routerlist.h"
96
#include "routerset.h"
97
#include "scheduler.h"
98
#include "statefile.h"
99
#include "transports.h"
100
#include "ext_orport.h"
101
#include "torgzip.h"
102
#ifdef _WIN32
103
104
#include <shlobj.h>
#endif
Roger Dingledine's avatar
Roger Dingledine committed
105

106
107
#include "procmon.h"

108
109
110
111
112
113
114
115
116
117
#ifdef HAVE_SYSTEMD
#   if defined(__COVERITY__) && !defined(__INCLUDE_LEVEL__)
/* Systemd's use of gcc's __INCLUDE_LEVEL__ extension macro appears to confuse
 * Coverity. Here's a kludge to unconfuse it.
 */
#   define __INCLUDE_LEVEL__ 2
#   endif
#include <systemd/sd-daemon.h>
#endif

118
/* Prefix used to indicate a Unix socket in a FooPort configuration. */
119
static const char unix_socket_prefix[] = "unix:";
120
121
122
/* Prefix used to indicate a Unix socket with spaces in it, in a FooPort
 * configuration. */
static const char unix_q_socket_prefix[] = "unix:\"";
123

124
125
/** A list of abbreviations and aliases to map command-line options, obsolete
 * option names, or alternative option names, to their current values. */
126
static config_abbrev_t option_abbrevs_[] = {
127
128
129
130
  PLURAL(AuthDirBadDirCC),
  PLURAL(AuthDirBadExitCC),
  PLURAL(AuthDirInvalidCC),
  PLURAL(AuthDirRejectCC),
131
  PLURAL(EntryNode),
132
  PLURAL(ExcludeNode),
133
  PLURAL(Tor2webRendezvousPoint),
134
  PLURAL(FirewallPort),
135
  PLURAL(LongLivedPort),
136
137
  PLURAL(HiddenServiceNode),
  PLURAL(HiddenServiceExcludeNode),
138
  PLURAL(NumCPU),
139
  PLURAL(RendNode),
140
  PLURAL(RecommendedPackage),
141
  PLURAL(RendExcludeNode),
142
143
  PLURAL(StrictEntryNode),
  PLURAL(StrictExitNode),
144
  PLURAL(StrictNode),
145
  { "l", "Log", 1, 0},
146
  { "AllowUnverifiedNodes", "AllowInvalidNodes", 0, 0},
147
148
  { "AutomapHostSuffixes", "AutomapHostsSuffixes", 0, 0},
  { "AutomapHostOnResolve", "AutomapHostsOnResolve", 0, 0},
149
150
151
  { "BandwidthRateBytes", "BandwidthRate", 0, 0},
  { "BandwidthBurstBytes", "BandwidthBurst", 0, 0},
  { "DirFetchPostPeriod", "StatusFetchPeriod", 0, 0},
152
  { "DirServer", "DirAuthority", 0, 0}, /* XXXX later, make this warn? */
153
  { "MaxConn", "ConnLimit", 0, 1},
154
  { "MaxMemInCellQueues", "MaxMemInQueues", 0, 0},
155
156
157
  { "ORBindAddress", "ORListenAddress", 0, 0},
  { "DirBindAddress", "DirListenAddress", 0, 0},
  { "SocksBindAddress", "SocksListenAddress", 0, 0},
158
159
160
161
  { "UseHelperNodes", "UseEntryGuards", 0, 0},
  { "NumHelperNodes", "NumEntryGuards", 0, 0},
  { "UseEntryNodes", "UseEntryGuards", 0, 0},
  { "NumEntryNodes", "NumEntryGuards", 0, 0},
162
163
  { "ResolvConf", "ServerDNSResolvConfFile", 0, 1},
  { "SearchDomains", "ServerDNSSearchDomains", 0, 1},
164
  { "ServerDNSAllowBrokenResolvConf", "ServerDNSAllowBrokenConfig", 0, 0},
165
  { "PreferTunnelledDirConns", "PreferTunneledDirConns", 0, 0},
166
  { "BridgeAuthoritativeDirectory", "BridgeAuthoritativeDir", 0, 0},
167
  { "HashedControlPassword", "__HashedControlSessionPassword", 1, 0},
168
  { "VirtualAddrNetwork", "VirtualAddrNetworkIPv4", 0, 0},
169
170
  { NULL, NULL, 0, 0},
};
171

Nick Mathewson's avatar
Nick Mathewson committed
172
173
174
175
/** An entry for config_vars: "The option <b>name</b> has type
 * CONFIG_TYPE_<b>conftype</b>, and corresponds to
 * or_options_t.<b>member</b>"
 */
176
177
#define VAR(name,conftype,member,initvalue)                             \
  { name, CONFIG_TYPE_ ## conftype, STRUCT_OFFSET(or_options_t, member), \
178
      initvalue }
179
180
181
/** As VAR, but the option name and member name are the same. */
#define V(member,conftype,initvalue)                                    \
  VAR(#member, conftype, member, initvalue)
Nick Mathewson's avatar
Nick Mathewson committed
182
/** An entry for config_vars: "The option <b>name</b> is obsolete." */
183
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL }
184

185
186
187
#define VPORT(member,conftype,initvalue)                                    \
  VAR(#member, conftype, member ## _lines, initvalue)

Nick Mathewson's avatar
Nick Mathewson committed
188
189
190
191
/** Array of configuration options.  Until we disallow nonstandard
 * abbreviations, order is significant, since the first matching option will
 * be chosen first.
 */
192
static config_var_t option_vars_[] = {
193
  V(AccountingMax,               MEMUNIT,  "0 bytes"),
194
  VAR("AccountingRule",          STRING,   AccountingRule_option,  "max"),
195
196
  V(AccountingStart,             STRING,   NULL),
  V(Address,                     STRING,   NULL),
197
  V(AllowDotExit,                BOOL,     "0"),
198
199
  V(AllowInvalidNodes,           CSV,      "middle,rendezvous"),
  V(AllowNonRFC953Hostnames,     BOOL,     "0"),
200
201
  V(AllowSingleHopCircuits,      BOOL,     "0"),
  V(AllowSingleHopExits,         BOOL,     "0"),
202
203
  V(AlternateBridgeAuthority,    LINELIST, NULL),
  V(AlternateDirAuthority,       LINELIST, NULL),
204
  OBSOLETE("AlternateHSAuthority"),
205
  V(AssumeReachable,             BOOL,     "0"),
206
207
  OBSOLETE("AuthDirBadDir"),
  OBSOLETE("AuthDirBadDirCCs"),
208
  V(AuthDirBadExit,              LINELIST, NULL),
209
  V(AuthDirBadExitCCs,           CSV,      ""),
210
  V(AuthDirInvalid,              LINELIST, NULL),
211
  V(AuthDirInvalidCCs,           CSV,      ""),
212
  V(AuthDirFastGuarantee,        MEMUNIT,  "100 KB"),
213
  V(AuthDirGuardBWGuarantee,     MEMUNIT,  "2 MB"),
214
  V(AuthDirPinKeys,              BOOL,     "0"),
215
  V(AuthDirReject,               LINELIST, NULL),
216
  V(AuthDirRejectCCs,            CSV,      ""),
217
  OBSOLETE("AuthDirRejectUnlisted"),
218
  OBSOLETE("AuthDirListBadDirs"),
219
  V(AuthDirListBadExits,         BOOL,     "0"),
220
221
  V(AuthDirMaxServersPerAddr,    UINT,     "2"),
  V(AuthDirMaxServersPerAuthAddr,UINT,     "5"),
222
  V(AuthDirHasIPv6Connectivity,  BOOL,     "0"),
223
224
225
226
  VAR("AuthoritativeDirectory",  BOOL, AuthoritativeDir,    "0"),
  V(AutomapHostsOnResolve,       BOOL,     "0"),
  V(AutomapHostsSuffixes,        CSV,      ".onion,.exit"),
  V(AvoidDiskWrites,             BOOL,     "0"),
227
228
  V(BandwidthBurst,              MEMUNIT,  "1 GB"),
  V(BandwidthRate,               MEMUNIT,  "1 GB"),
229
230
  V(BridgeAuthoritativeDir,      BOOL,     "0"),
  VAR("Bridge",                  LINELIST, Bridges,    NULL),
231
  V(BridgePassword,              STRING,   NULL),
232
  V(BridgeRecordUsageByCountry,  BOOL,     "1"),
233
  V(BridgeRelay,                 BOOL,     "0"),
234
  V(CellStatistics,              BOOL,     "0"),
235
  V(LearnCircuitBuildTimeout,    BOOL,     "1"),
236
  V(CircuitBuildTimeout,         INTERVAL, "0"),
237
  V(CircuitIdleTimeout,          INTERVAL, "1 hour"),
238
  V(CircuitStreamTimeout,        INTERVAL, "0"),
239
  V(CircuitPriorityHalflife,     DOUBLE,  "-100.0"), /*negative:'Use default'*/
240
241
  V(ClientDNSRejectInternalAddresses, BOOL,"1"),
  V(ClientOnly,                  BOOL,     "0"),
242
243
  V(ClientPreferIPv6ORPort,      AUTOBOOL, "auto"),
  V(ClientPreferIPv6DirPort,     AUTOBOOL, "auto"),
244
  V(ClientRejectInternalAddresses, BOOL,   "1"),
245
  V(ClientTransportPlugin,       LINELIST, NULL),
246
  V(ClientUseIPv6,               BOOL,     "0"),
247
  V(ClientUseIPv4,               BOOL,     "1"),
248
  V(ConsensusParams,             STRING,   NULL),
249
  V(ConnLimit,                   UINT,     "1000"),
250
  V(ConnDirectionStatistics,     BOOL,     "0"),
251
252
253
254
  V(ConstrainedSockets,          BOOL,     "0"),
  V(ConstrainedSockSize,         MEMUNIT,  "8192"),
  V(ContactInfo,                 STRING,   NULL),
  V(ControlListenAddress,        LINELIST, NULL),
255
  VPORT(ControlPort,                 LINELIST, NULL),
256
  V(ControlPortFileGroupReadable,BOOL,     "0"),
257
  V(ControlPortWriteToFile,      FILENAME, NULL),
258
  V(ControlSocket,               LINELIST, NULL),
259
  V(ControlSocketsGroupWritable, BOOL,     "0"),
260
  V(SocksSocketsGroupWritable,   BOOL,     "0"),
261
262
263
  V(CookieAuthentication,        BOOL,     "0"),
  V(CookieAuthFileGroupReadable, BOOL,     "0"),
  V(CookieAuthFile,              STRING,   NULL),
264
  V(CountPrivateBandwidth,       BOOL,     "0"),
265
  V(DataDirectory,               FILENAME, NULL),
266
  V(DataDirectoryGroupReadable,  BOOL,     "0"),
267
  V(DisableOOSCheck,             BOOL,     "1"),
268
  V(DisableNetwork,              BOOL,     "0"),
269
  V(DirAllowPrivateAddresses,    BOOL,     "0"),
270
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "30 minutes"),
271
272
  V(DirListenAddress,            LINELIST, NULL),
  V(DirPolicy,                   LINELIST, NULL),
273
  VPORT(DirPort,                     LINELIST, NULL),
274
  V(DirPortFrontPage,            FILENAME, NULL),
275
  VAR("DirReqStatistics",        BOOL,     DirReqStatistics_option, "1"),
276
  VAR("DirAuthority",            LINELIST, DirAuthorities, NULL),
277
  V(DirCache,                    BOOL,     "1"),
278
  V(DirAuthorityFallbackRate,    DOUBLE,   "1.0"),
279
  V(DisableAllSwap,              BOOL,     "0"),
280
  V(DisableDebuggerAttachment,   BOOL,     "1"),
281
  OBSOLETE("DisableIOCP"),
282
  OBSOLETE("DisableV2DirectoryInfo_"),
283
  OBSOLETE("DynamicDHGroups"),
284
  VPORT(DNSPort,                     LINELIST, NULL),
285
286
  V(DNSListenAddress,            LINELIST, NULL),
  V(DownloadExtraInfo,           BOOL,     "0"),
287
  V(TestingEnableConnBwEvent,    BOOL,     "0"),
288
  V(TestingEnableCellStatsEvent, BOOL,     "0"),
289
  V(TestingEnableTbEmptyEvent,   BOOL,     "0"),
290
  V(EnforceDistinctSubnets,      BOOL,     "1"),
291
  V(EntryNodes,                  ROUTERSET,   NULL),
292
  V(EntryStatistics,             BOOL,     "0"),
293
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "10 minutes"),
294
295
  V(ExcludeNodes,                ROUTERSET, NULL),
  V(ExcludeExitNodes,            ROUTERSET, NULL),
296
  V(ExcludeSingleHopRelays,      BOOL,     "1"),
297
  V(ExitNodes,                   ROUTERSET, NULL),
298
299
  V(ExitPolicy,                  LINELIST, NULL),
  V(ExitPolicyRejectPrivate,     BOOL,     "1"),
300
  V(ExitPolicyRejectLocalInterfaces, BOOL, "0"),
301
  V(ExitPortStatistics,          BOOL,     "0"),
302
  V(ExtendAllowPrivateAddresses, BOOL,     "0"),
303
  V(ExitRelay,                   AUTOBOOL, "auto"),
304
  VPORT(ExtORPort,               LINELIST, NULL),
305
  V(ExtORPortCookieAuthFile,     STRING,   NULL),
306
  V(ExtORPortCookieAuthFileGroupReadable, BOOL, "0"),
307
  V(ExtraInfoStatistics,         BOOL,     "1"),
308
  V(ExtendByEd25519ID,           AUTOBOOL, "auto"),
309
  V(FallbackDir,                 LINELIST, NULL),
310
  V(UseDefaultFallbackDirs,      BOOL,     "1"),
311

312
  OBSOLETE("FallbackNetworkstatusFile"),
313
314
  V(FascistFirewall,             BOOL,     "0"),
  V(FirewallPorts,               CSV,      ""),
315
  V(FastFirstHopPK,              AUTOBOOL, "auto"),
316
  V(FetchDirInfoEarly,           BOOL,     "0"),
317
  V(FetchDirInfoExtraEarly,      BOOL,     "0"),
318
319
320
  V(FetchServerDescriptors,      BOOL,     "1"),
  V(FetchHidServDescriptors,     BOOL,     "1"),
  V(FetchUselessDescriptors,     BOOL,     "0"),
321
  OBSOLETE("FetchV2Networkstatus"),
322
  V(GeoIPExcludeUnknown,         AUTOBOOL, "auto"),
323
#ifdef _WIN32
324
  V(GeoIPFile,                   FILENAME, "<default>"),
nils's avatar
nils committed
325
  V(GeoIPv6File,                 FILENAME, "<default>"),
326
#else
327
328
  V(GeoIPFile,                   FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip"),
nils's avatar
nils committed
329
330
  V(GeoIPv6File,                 FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip6"),
331
#endif
332
  OBSOLETE("Group"),
333
  V(GuardLifetime,               INTERVAL, "0 minutes"),
334
  V(HardwareAccel,               BOOL,     "0"),
335
  V(HeartbeatPeriod,             INTERVAL, "6 hours"),
336
337
  V(AccelName,                   STRING,   NULL),
  V(AccelDir,                    FILENAME, NULL),
338
  V(HashedControlPassword,       LINELIST, NULL),
339
  OBSOLETE("HidServDirectoryV2"),
Nick Mathewson's avatar
Nick Mathewson committed
340
  VAR("HiddenServiceDir",    LINELIST_S, RendConfigLines,    NULL),
341
  VAR("HiddenServiceDirGroupReadable",  LINELIST_S, RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
342
343
  VAR("HiddenServiceOptions",LINELIST_V, RendConfigLines,    NULL),
  VAR("HiddenServicePort",   LINELIST_S, RendConfigLines,    NULL),
344
  VAR("HiddenServiceVersion",LINELIST_S, RendConfigLines,    NULL),
345
  VAR("HiddenServiceAuthorizeClient",LINELIST_S,RendConfigLines, NULL),
346
  VAR("HiddenServiceAllowUnknownPorts",LINELIST_S, RendConfigLines, NULL),
347
348
  VAR("HiddenServiceMaxStreams",LINELIST_S, RendConfigLines, NULL),
  VAR("HiddenServiceMaxStreamsCloseCircuit",LINELIST_S, RendConfigLines, NULL),
349
  VAR("HiddenServiceNumIntroductionPoints", LINELIST_S, RendConfigLines, NULL),
350
  V(HiddenServiceStatistics,     BOOL,     "1"),
351
  V(HidServAuth,                 LINELIST, NULL),
352
  V(CloseHSClientCircuitsImmediatelyOnTimeout, BOOL, "0"),
353
  V(CloseHSServiceRendCircuitsImmediatelyOnTimeout, BOOL, "0"),
354
355
  V(HiddenServiceSingleHopMode,  BOOL,     "0"),
  V(HiddenServiceNonAnonymousMode,BOOL,    "0"),
356
357
358
359
  V(HTTPProxy,                   STRING,   NULL),
  V(HTTPProxyAuthenticator,      STRING,   NULL),
  V(HTTPSProxy,                  STRING,   NULL),
  V(HTTPSProxyAuthenticator,     STRING,   NULL),
360
  V(IPv6Exit,                    BOOL,     "0"),
361
  VAR("ServerTransportPlugin",   LINELIST, ServerTransportPlugin,  NULL),
362
  V(ServerTransportListenAddr,   LINELIST, NULL),
363
  V(ServerTransportOptions,      LINELIST, NULL),
364
  V(SigningKeyLifetime,          INTERVAL, "30 days"),
365
366
367
368
  V(Socks4Proxy,                 STRING,   NULL),
  V(Socks5Proxy,                 STRING,   NULL),
  V(Socks5ProxyUsername,         STRING,   NULL),
  V(Socks5ProxyPassword,         STRING,   NULL),
369
  V(KeepalivePeriod,             INTERVAL, "5 minutes"),
370
  V(KeepBindCapabilities,            AUTOBOOL, "auto"),
371
  VAR("Log",                     LINELIST, Logs,             NULL),
372
  V(LogMessageDomains,           BOOL,     "0"),
373
  V(LogTimeGranularity,          MSEC_INTERVAL, "1 second"),
Arlo Breault's avatar
Arlo Breault committed
374
  V(TruncateLogFile,             BOOL,     "0"),
Peter Palfrader's avatar
Peter Palfrader committed
375
  V(SyslogIdentityTag,           STRING,   NULL),
376
  V(LongLivedPorts,              CSV,
Nick Mathewson's avatar
Nick Mathewson committed
377
        "21,22,706,1863,5050,5190,5222,5223,6523,6667,6697,8300"),
378
379
380
  VAR("MapAddress",              LINELIST, AddressMap,           NULL),
  V(MaxAdvertisedBandwidth,      MEMUNIT,  "1 GB"),
  V(MaxCircuitDirtiness,         INTERVAL, "10 minutes"),
381
  V(MaxClientCircuitsPending,    UINT,     "32"),
382
  VAR("MaxMemInQueues",          MEMUNIT,   MaxMemInQueues_raw, "0"),
383
384
  OBSOLETE("MaxOnionsPending"),
  V(MaxOnionQueueDelay,          MSEC_INTERVAL, "1750 msec"),
385
  V(MaxUnparseableDescSizeToLog, MEMUNIT, "10 MB"),
386
  V(MinMeasuredBWsForAuthToIgnoreAdvertised, INT, "500"),
387
388
  V(MyFamily,                    STRING,   NULL),
  V(NewCircuitPeriod,            INTERVAL, "30 seconds"),
389
  OBSOLETE("NamingAuthoritativeDirectory"),
390
  V(NATDListenAddress,           LINELIST, NULL),
391
  VPORT(NATDPort,                    LINELIST, NULL),
392
  V(Nickname,                    STRING,   NULL),
393
  V(PredictedPortsRelevanceTime,  INTERVAL, "1 hour"),
394
  V(WarnUnsafeSocks,              BOOL,     "1"),
395
  VAR("NodeFamily",              LINELIST, NodeFamilies,         NULL),
396
  V(NumCPUs,                     UINT,     "0"),
397
  V(NumDirectoryGuards,          UINT,     "0"),
398
  V(NumEntryGuards,              UINT,     "0"),
Nick Mathewson's avatar
Nick Mathewson committed
399
  V(OfflineMasterKey,            BOOL,     "0"),
400
  V(ORListenAddress,             LINELIST, NULL),
401
  VPORT(ORPort,                      LINELIST, NULL),
402
  V(OutboundBindAddress,         LINELIST,   NULL),
403

404
  OBSOLETE("PathBiasDisableRate"),
405
406
  V(PathBiasCircThreshold,       INT,      "-1"),
  V(PathBiasNoticeRate,          DOUBLE,   "-1"),
407
  V(PathBiasWarnRate,            DOUBLE,   "-1"),
408
  V(PathBiasExtremeRate,         DOUBLE,   "-1"),
409
  V(PathBiasScaleThreshold,      INT,      "-1"),
410
411
  OBSOLETE("PathBiasScaleFactor"),
  OBSOLETE("PathBiasMultFactor"),
412
  V(PathBiasDropGuards,          AUTOBOOL, "0"),
413
414
415
416
417
418
  OBSOLETE("PathBiasUseCloseCounts"),

  V(PathBiasUseThreshold,       INT,      "-1"),
  V(PathBiasNoticeUseRate,          DOUBLE,   "-1"),
  V(PathBiasExtremeUseRate,         DOUBLE,   "-1"),
  V(PathBiasScaleUseThreshold,      INT,      "-1"),
419

420
  V(PathsNeededToBuildCircuits,  DOUBLE,   "-1"),
421
422
  V(PerConnBWBurst,              MEMUNIT,  "0"),
  V(PerConnBWRate,               MEMUNIT,  "0"),
423
  V(PidFile,                     STRING,   NULL),
424
  V(TestingTorNetwork,           BOOL,     "0"),
425
  V(TestingMinExitFlagThreshold, MEMUNIT,  "0"),
426
  V(TestingMinFastFlagThreshold, MEMUNIT,  "0"),
427

428
  V(TestingLinkCertLifetime,          INTERVAL, "2 days"),
429
430
431
432
433
  V(TestingAuthKeyLifetime,          INTERVAL, "2 days"),
  V(TestingLinkKeySlop,              INTERVAL, "3 hours"),
  V(TestingAuthKeySlop,              INTERVAL, "3 hours"),
  V(TestingSigningKeySlop,           INTERVAL, "1 day"),

434
  V(OptimisticData,              AUTOBOOL, "auto"),
435
436
  V(PortForwarding,              BOOL,     "0"),
  V(PortForwardingHelper,        FILENAME, "tor-fw-helper"),
437
  OBSOLETE("PreferTunneledDirConns"),
438
  V(ProtocolWarnings,            BOOL,     "0"),
439
  V(PublishServerDescriptor,     CSV,      "1"),
440
441
442
443
444
445
446
  V(PublishHidServDescriptors,   BOOL,     "1"),
  V(ReachableAddresses,          LINELIST, NULL),
  V(ReachableDirAddresses,       LINELIST, NULL),
  V(ReachableORAddresses,        LINELIST, NULL),
  V(RecommendedVersions,         LINELIST, NULL),
  V(RecommendedClientVersions,   LINELIST, NULL),
  V(RecommendedServerVersions,   LINELIST, NULL),
447
  V(RecommendedPackages,         LINELIST, NULL),
448
  V(RefuseUnknownExits,          AUTOBOOL, "auto"),
449
  V(RejectPlaintextPorts,        CSV,      ""),
450
451
452
453
454
  V(RelayBandwidthBurst,         MEMUNIT,  "0"),
  V(RelayBandwidthRate,          MEMUNIT,  "0"),
  V(RendPostPeriod,              INTERVAL, "1 hour"),
  V(RephistTrackTime,            INTERVAL, "24 hours"),
  V(RunAsDaemon,                 BOOL,     "0"),
455
  OBSOLETE("RunTesting"), // currently unused
456
  V(Sandbox,                     BOOL,     "0"),
457
  V(SafeLogging,                 STRING,   "1"),
458
  V(SafeSocks,                   BOOL,     "0"),
459
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
460
461
  V(ServerDNSAllowNonRFC953Hostnames, BOOL,"0"),
  V(ServerDNSDetectHijacking,    BOOL,     "1"),
462
  V(ServerDNSRandomizeCase,      BOOL,     "1"),
463
464
465
  V(ServerDNSResolvConfFile,     STRING,   NULL),
  V(ServerDNSSearchDomains,      BOOL,     "0"),
  V(ServerDNSTestAddresses,      CSV,
466
      "www.google.com,www.mit.edu,www.yahoo.com,www.slashdot.org"),
467
468
469
  V(SchedulerLowWaterMark__,     MEMUNIT,  "100 MB"),
  V(SchedulerHighWaterMark__,    MEMUNIT,  "101 MB"),
  V(SchedulerMaxFlushCells__,    UINT,     "1000"),
470
471
472
  V(ShutdownWaitLength,          INTERVAL, "30 seconds"),
  V(SocksListenAddress,          LINELIST, NULL),
  V(SocksPolicy,                 LINELIST, NULL),
473
  VPORT(SocksPort,                   LINELIST, NULL),
474
  V(SocksTimeout,                INTERVAL, "2 minutes"),
475
  V(SSLKeyLifetime,              INTERVAL, "0"),
476
477
  OBSOLETE("StrictEntryNodes"),
  OBSOLETE("StrictExitNodes"),
478
  V(StrictNodes,                 BOOL,     "0"),
479
  OBSOLETE("Support022HiddenServices"),
480
  V(TestSocks,                   BOOL,     "0"),
481
  V(TokenBucketRefillInterval,   MSEC_INTERVAL, "100 msec"),
482
  V(Tor2webMode,                 BOOL,     "0"),
483
  V(Tor2webRendezvousPoints,      ROUTERSET, NULL),
484
  V(TLSECGroup,                  STRING,   NULL),
485
486
487
  V(TrackHostExits,              CSV,      NULL),
  V(TrackHostExitsExpire,        INTERVAL, "30 minutes"),
  V(TransListenAddress,          LINELIST, NULL),
488
  VPORT(TransPort,                   LINELIST, NULL),
489
  V(TransProxyType,              STRING,   "default"),
490
  OBSOLETE("TunnelDirConns"),
491
  V(UpdateBridgesFromAuthority,  BOOL,     "0"),
492
  V(UseBridges,                  BOOL,     "0"),
493
  VAR("UseEntryGuards",          BOOL,     UseEntryGuards_option, "1"),
494
  V(UseEntryGuardsAsDirGuards,   BOOL,     "1"),
495
  V(UseGuardFraction,            AUTOBOOL, "auto"),
496
  V(UseMicrodescriptors,         AUTOBOOL, "auto"),
497
  OBSOLETE("UseNTorHandshake"),
498
  V(User,                        STRING,   NULL),
499
  OBSOLETE("UserspaceIOCPBuffers"),
500
  V(AuthDirSharedRandomness,     BOOL,     "1"),
501
  OBSOLETE("V1AuthoritativeDirectory"),
502
  OBSOLETE("V2AuthoritativeDirectory"),
503
  VAR("V3AuthoritativeDirectory",BOOL, V3AuthoritativeDir,   "0"),
504
505
506
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "30 minutes"),
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "5 minutes"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "5 minutes"),
507
  V(TestingV3AuthVotingStartOffset, INTERVAL, "0"),
508
509
510
511
  V(V3AuthVotingInterval,        INTERVAL, "1 hour"),
  V(V3AuthVoteDelay,             INTERVAL, "5 minutes"),
  V(V3AuthDistDelay,             INTERVAL, "5 minutes"),
  V(V3AuthNIntervalsValid,       UINT,     "3"),
512
  V(V3AuthUseLegacyKey,          BOOL,     "0"),
513
  V(V3BandwidthsFile,            FILENAME, NULL),
514
  V(GuardfractionFile,           FILENAME, NULL),
515
  VAR("VersioningAuthoritativeDirectory",BOOL,VersioningAuthoritativeDir, "0"),
516
  OBSOLETE("VoteOnHidServDirectoriesV2"),
517
518
  V(VirtualAddrNetworkIPv4,      STRING,   "127.192.0.0/10"),
  V(VirtualAddrNetworkIPv6,      STRING,   "[FE80::]/10"),
519
  V(WarnPlaintextPorts,          CSV,      "23,109,110,143"),
520
521
  OBSOLETE("UseFilteringSSLBufferevents"),
  OBSOLETE("__UseFilteringSSLBufferevents"),
522
  VAR("__ReloadTorrcOnSIGHUP",   BOOL,  ReloadTorrcOnSIGHUP,      "1"),
523
524
525
  VAR("__AllDirActionsPrivate",  BOOL,  AllDirActionsPrivate,     "0"),
  VAR("__DisablePredictedCircuits",BOOL,DisablePredictedCircuits, "0"),
  VAR("__LeaveStreamsUnattached",BOOL,  LeaveStreamsUnattached,   "0"),
526
527
  VAR("__HashedControlSessionPassword", LINELIST, HashedControlSessionPassword,
      NULL),
528
  VAR("__OwningControllerProcess",STRING,OwningControllerProcess, NULL),
529
  V(MinUptimeHidServDirectoryV2, INTERVAL, "96 hours"),
530
531
532
533
534
535
536
537
538
539
  V(TestingServerDownloadSchedule, CSV_INTERVAL, "0, 0, 0, 60, 60, 120, "
                                 "300, 900, 2147483647"),
  V(TestingClientDownloadSchedule, CSV_INTERVAL, "0, 0, 60, 300, 600, "
                                 "2147483647"),
  V(TestingServerConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 60, "
                                 "300, 600, 1800, 1800, 1800, 1800, "
                                 "1800, 3600, 7200"),
  V(TestingClientConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 60, "
                                 "300, 600, 1800, 3600, 3600, 3600, "
                                 "10800, 21600, 43200"),
540
  /* With the ClientBootstrapConsensus*Download* below:
541
542
543
544
545
546
547
548
549
550
551
552
   * Clients with only authorities will try:
   *  - 3 authorities over 10 seconds, then wait 60 minutes.
   * Clients with authorities and fallbacks will try:
   *  - 2 authorities and 4 fallbacks over 21 seconds, then wait 60 minutes.
   * Clients will also retry when an application request arrives.
   * After a number of failed reqests, clients retry every 3 days + 1 hour.
   *
   * Clients used to try 2 authorities over 10 seconds, then wait for
   * 60 minutes or an application request.
   *
   * When clients have authorities and fallbacks available, they use these
   * schedules: (we stagger the times to avoid thundering herds) */
553
  V(ClientBootstrapConsensusAuthorityDownloadSchedule, CSV_INTERVAL,
554
    "6, 11, 3600, 10800, 25200, 54000, 111600, 262800" /* 3 days + 1 hour */),
555
  V(ClientBootstrapConsensusFallbackDownloadSchedule, CSV_INTERVAL,
556
557
    "0, 1, 4, 11, 3600, 10800, 25200, 54000, 111600, 262800"),
  /* When clients only have authorities available, they use this schedule: */
558
  V(ClientBootstrapConsensusAuthorityOnlyDownloadSchedule, CSV_INTERVAL,
559
560
561
562
563
    "0, 3, 7, 3600, 10800, 25200, 54000, 111600, 262800"),
  /* We don't want to overwhelm slow networks (or mirrors whose replies are
   * blocked), but we also don't want to fail if only some mirrors are
   * blackholed. Clients will try 3 directories simultaneously.
   * (Relays never use simultaneous connections.) */
564
  V(ClientBootstrapConsensusMaxInProgressTries, UINT, "3"),
565
  V(TestingBridgeDownloadSchedule, CSV_INTERVAL, "1200, 900, 900, 3600"),
566
567
568
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "10 minutes"),
  V(TestingDirConnectionMaxStall, INTERVAL, "5 minutes"),
  V(TestingConsensusMaxDownloadTries, UINT, "8"),
569
570
  /* Since we try connections rapidly and simultaneously, we can afford
   * to give up earlier. (This protects against overloading directories.) */
571
  V(ClientBootstrapConsensusMaxDownloadTries, UINT, "7"),
572
  /* We want to give up much earlier if we're only using authorities. */
573
  V(ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries, UINT, "4"),
574
575
576
  V(TestingDescriptorMaxDownloadTries, UINT, "8"),
  V(TestingMicrodescMaxDownloadTries, UINT, "8"),
  V(TestingCertMaxDownloadTries, UINT, "8"),
577
  V(TestingDirAuthVoteExit, ROUTERSET, NULL),
578
  V(TestingDirAuthVoteExitIsStrict,  BOOL,     "0"),
579
  V(TestingDirAuthVoteGuard, ROUTERSET, NULL),
580
  V(TestingDirAuthVoteGuardIsStrict,  BOOL,     "0"),
581
  V(TestingDirAuthVoteHSDir, ROUTERSET, NULL),
582
  V(TestingDirAuthVoteHSDirIsStrict,  BOOL,     "0"),
583
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "0"),
584

585
  { NULL, CONFIG_TYPE_OBSOLETE, 0, NULL }
586
};
587

588
589
/** Override default values with these if the user sets the TestingTorNetwork
 * option. */
590
static const config_var_t testing_tor_network_defaults[] = {
591
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
592
593
594
595
596
  V(DirAllowPrivateAddresses,    BOOL,     "1"),
  V(EnforceDistinctSubnets,      BOOL,     "0"),
  V(AssumeReachable,             BOOL,     "1"),
  V(AuthDirMaxServersPerAddr,    UINT,     "0"),
  V(AuthDirMaxServersPerAuthAddr,UINT,     "0"),
597
598
599
600
601
602
603
604
  V(ClientBootstrapConsensusAuthorityDownloadSchedule, CSV_INTERVAL,
    "0, 2, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusFallbackDownloadSchedule, CSV_INTERVAL,
    "0, 1, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusAuthorityOnlyDownloadSchedule, CSV_INTERVAL,
    "0, 1, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusMaxDownloadTries, UINT, "80"),
  V(ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries, UINT, "80"),
605
  V(ClientDNSRejectInternalAddresses, BOOL,"0"), // deprecated in 0.2.9.2-alpha
606
  V(ClientRejectInternalAddresses, BOOL,   "0"),
607
  V(CountPrivateBandwidth,       BOOL,     "1"),
608
  V(ExitPolicyRejectPrivate,     BOOL,     "0"),
609
  V(ExtendAllowPrivateAddresses, BOOL,     "1"),
610
611
612
  V(V3AuthVotingInterval,        INTERVAL, "5 minutes"),
  V(V3AuthVoteDelay,             INTERVAL, "20 seconds"),
  V(V3AuthDistDelay,             INTERVAL, "20 seconds"),
613
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "150 seconds"),
614
615
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "20 seconds"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "20 seconds"),
616
  V(TestingV3AuthVotingStartOffset, INTERVAL, "0"),
617
618
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "0 minutes"),
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "0 minutes"),
619
  V(MinUptimeHidServDirectoryV2, INTERVAL, "0 minutes"),
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
  V(TestingServerDownloadSchedule, CSV_INTERVAL, "0, 0, 0, 5, 10, 15, "
                                 "20, 30, 60"),
  V(TestingClientDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, 15, 20, "
                                 "30, 60"),
  V(TestingServerConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, "
                                 "15, 20, 30, 60"),
  V(TestingClientConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, "
                                 "15, 20, 30, 60"),
  V(TestingBridgeDownloadSchedule, CSV_INTERVAL, "60, 30, 30, 60"),
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "5 seconds"),
  V(TestingDirConnectionMaxStall, INTERVAL, "30 seconds"),
  V(TestingConsensusMaxDownloadTries, UINT, "80"),
  V(TestingDescriptorMaxDownloadTries, UINT, "80"),
  V(TestingMicrodescMaxDownloadTries, UINT, "80"),
  V(TestingCertMaxDownloadTries, UINT, "80"),
635
  V(TestingEnableConnBwEvent,    BOOL,     "1"),
636
  V(TestingEnableCellStatsEvent, BOOL,     "1"),
637
  V(TestingEnableTbEmptyEvent,   BOOL,     "1"),
638
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "1"),
639
  V(RendPostPeriod,              INTERVAL, "2 minutes"),
640

641
642
  { NULL, CONFIG_TYPE_OBSOLETE, 0, NULL }
};
643

644
#undef VAR
645
#undef V
646
647
#undef OBSOLETE

648
static const config_deprecation_t option_deprecation_notes_[] = {
649
  /* Deprecated since 0.2.9.2-alpha... */
650
651
652
653
654
655
656
657
658
659
660
661
662
663
  { "AllowDotExit", "Unrestricted use of the .exit notation can be used for "
    "a wide variety of application-level attacks." },
  { "AllowInvalidNodes", "There is no reason to enable this option; at best "
    "it will make you easier to track." },
  { "AllowSingleHopCircuits", "Almost no relays actually allow single-hop "
    "exits, making this option pointless." },
  { "AllowSingleHopExits", "Turning this on will make your relay easier "
    "to abuse." },
  { "ClientDNSRejectInternalAddresses", "Turning this on makes your client "
    "easier to fingerprint, and may open you to esoteric attacks." },
  { "ExcludeSingleHopRelays", "Turning it on makes your client easier to "
    "fingerprint." },
  { "FastFirstHopPK", "Changing this option does not make your client more "
    "secure, but does make it easier to fingerprint." },
664
  { "CloseHSClientCircuitsImmediatelyOnTimeout", "This option makes your "
665
    "client easier to fingerprint." },
666
  { "CloseHSServiceRendCircuitsImmediatelyOnTimeout", "This option makes "
667
668
669
670
671
672
673
674
675
676
677
678
679
680
    "your hidden services easier to fingerprint." },
  { "WarnUnsafeSocks", "Changing this option makes it easier for you "
    "to accidentally lose your anonymity by leaking DNS information" },
  { "TLSECGroup", "The default is a nice secure choice; the other option "
    "is less secure." },
  { "ControlListenAddress", "Use ControlPort instead." },
  { "DirListenAddress", "Use DirPort instead, possibly with the "
    "NoAdvertise sub-option" },
  { "DNSListenAddress", "Use DNSPort instead." },
  { "SocksListenAddress", "Use SocksPort instead." },
  { "TransListenAddress", "Use TransPort instead." },
  { "NATDListenAddress", "Use NATDPort instead." },
  { "ORListenAddress", "Use ORPort instead, possibly with the "
    "NoAdvertise sub-option" },
681
  /* End of options deprecated since 0.2.9.2-alpha. */
682
683
684
685

  { NULL, NULL }
};

686
#ifdef _WIN32
687
688
static char *get_windows_conf_root(void);
#endif
689
690
691
static int options_act_reversible(const or_options_t *old_options, char **msg);
static int options_transition_allowed(const or_options_t *old,
                                      const or_options_t *new,
692
                                      char **msg);
693
694
695
696
static int options_transition_affects_workers(
      const or_options_t *old_options, const or_options_t *new_options);
static int options_transition_affects_descriptor(
      const or_options_t *old_options, const or_options_t *new_options);
697
static int check_nickname_list(char **lst, const char *name, char **msg);
698
699
static char *get_bindaddr_from_transport_listen_line(const char *line,
                                                     const char *transport);
700
static int parse_ports(or_options_t *options, int validate_only,
701
702
                              char **msg_out, int *n_ports_out,
                              int *world_writable_control_socket);
703
static int check_server_ports(const smartlist_t *ports,
704
705
                              const or_options_t *options,
                              int *num_low_ports_out);
706

707
static int validate_data_directory(or_options_t *options);
708
709
static int write_configuration_file(const char *fname,
                                    const or_options_t *options);
Arlo Breault's avatar
Arlo Breault committed
710
711
static int options_init_logs(const or_options_t *old_options,
                             or_options_t *options, int validate_only);
712

713
static void init_libevent(const or_options_t *options);
714
static int opt_streq(const char *s1, const char *s2);
715
716
static int parse_outbound_addresses(or_options_t *options, int validate_only,
                                    char **msg);
Linus Nordberg's avatar
Linus Nordberg committed
717
718
static void config_maybe_load_geoip_files_(const or_options_t *options,
                                           const or_options_t *old_options);
719
720
721
static int options_validate_cb(void *old_options, void *options,
                               void *default_options,
                               int from_setconf, char **msg);
722
723
static uint64_t compute_real_max_mem_in_queues(const uint64_t val,
                                               int log_guess);
724

725
/** Magic value for or_options_t. */
726
727
#define OR_OPTIONS_MAGIC 9090909

728
/** Configuration format for or_options_t. */
729
STATIC config_format_t options_format = {
730
731
  sizeof(or_options_t),
  OR_OPTIONS_MAGIC,
732
733
  STRUCT_OFFSET(or_options_t, magic_),
  option_abbrevs_,
734
  option_deprecation_notes_,
735
  option_vars_,
736
  options_validate_cb,
737
  NULL
738
739
};

740
741
742
743
744
/*
 * Functions to read and write the global options pointer.
 */

/** Command-line and config-file options. */
745
static or_options_t *global_options = NULL;
746
747
/** The fallback options_t object; this is where we look for options not
 * in torrc before we fall back to Tor's defaults. */
748
static or_options_t *global_default_options = NULL;
Roger Dingledine's avatar
Roger Dingledine committed
749
/** Name of most recently read torrc file. */
750
static char *torrc_fname = NULL;
751
/** Name of the most recently read torrc-defaults file.*/
752
static char *torrc_defaults_fname;
753
/** Configuration options set by command line. */
754
static config_line_t *global_cmdline_options = NULL;
755
756
757
758
/** Non-configuration options set by the command line */
static config_line_t *global_cmdline_only_options = NULL;
/** Boolean: Have we parsed the command line? */
static int have_parsed_cmdline = 0;
Roger Dingledine's avatar
Roger Dingledine committed
759
/** Contents of most recently read DirPortFrontPage file. */
760
static char *global_dirfrontpagecontents = NULL;
761
762
/** List of port_cfg_t for all configured ports. */
static smartlist_t *configured_ports = NULL;
763
764

/** Return the contents of our frontpage string, or NULL if not configured. */
765
766