config.c 289 KB
Newer Older
1
/* Copyright (c) 2001 Matej Pfajfar.
Roger Dingledine's avatar
Roger Dingledine committed
2
 * Copyright (c) 2001-2004, Roger Dingledine.
3
 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
4
 * Copyright (c) 2007-2017, The Tor Project, Inc. */
5
/* See LICENSE for licensing information */
6

Nick Mathewson's avatar
Nick Mathewson committed
7
/**
8
 * \file config.c
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
 * \brief Code to interpret the user's configuration of Tor.
 *
 * This module handles torrc configuration file, including parsing it,
 * combining it with torrc.defaults and the command line, allowing
 * user changes to it (via editing and SIGHUP or via the control port),
 * writing it back to disk (because of SAVECONF from the control port),
 * and -- most importantly, acting on it.
 *
 * The module additionally has some tools for manipulating and
 * inspecting values that are calculated as a result of the
 * configured options.
 *
 * <h3>How to add  new options</h3>
 *
 * To add new items to the torrc, there are a minimum of three places to edit:
 * <ul>
 *   <li>The or_options_t structure in or.h, where the options are stored.
 *   <li>The option_vars_ array below in this module, which configures
 *       the names of the torrc options, their types, their multiplicities,
 *       and their mappings to fields in or_options_t.
 *   <li>The manual in doc/tor.1.txt, to document what the new option
 *       is, and how it works.
 * </ul>
 *
 * Additionally, you might need to edit these places too:
 * <ul>
 *   <li>options_validate() below, in case you want to reject some possible
 *       values of the new configuration option.
 *   <li>options_transition_allowed() below, in case you need to
 *       forbid some or all changes in the option while Tor is
 *       running.
 *   <li>options_transition_affects_workers(), in case changes in the option
 *       might require Tor to relaunch or reconfigure its worker threads.
 *   <li>options_transition_affects_descriptor(), in case changes in the
 *       option might require a Tor relay to build and publish a new server
 *       descriptor.
 *   <li>options_act() and/or options_act_reversible(), in case there's some
 *       action that needs to be taken immediately based on the option's
 *       value.
 * </ul>
 *
 * <h3>Changing the value of an option</h3>
 *
 * Because of the SAVECONF command from the control port, it's a bad
 * idea to change the value of any user-configured option in the
 * or_options_t.  If you want to sometimes do this anyway, we recommend
 * that you create a secondary field in or_options_t; that you have the
 * user option linked only to the secondary field; that you use the
 * secondary field to initialize the one that Tor actually looks at; and that
 * you use the one Tor looks as the one that you modify.
Nick Mathewson's avatar
Nick Mathewson committed
59
60
 **/

61
#define CONFIG_PRIVATE
Roger Dingledine's avatar
Roger Dingledine committed
62
#include "or.h"
63
#include "bridges.h"
64
#include "compat.h"
65
#include "addressmap.h"
66
#include "channel.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
67
#include "circuitbuild.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
68
#include "circuitlist.h"
69
70
#include "circuitmux.h"
#include "circuitmux_ewma.h"
71
#include "circuitstats.h"
72
#include "compress_zlib.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
73
#include "config.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
74
#include "connection.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
75
#include "connection_edge.h"
76
#include "connection_or.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
77
#include "control.h"
78
#include "confparse.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
79
#include "cpuworker.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
80
#include "dirserv.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
81
#include "dirvote.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
82
#include "dns.h"
83
#include "entrynodes.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
84
#include "geoip.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
85
#include "hibernate.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
86
#include "main.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
87
#include "networkstatus.h"
88
#include "nodelist.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
89
#include "policies.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
90
#include "relay.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
91
#include "rendclient.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
92
#include "rendservice.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
93
#include "rephist.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
94
#include "router.h"
95
#include "sandbox.h"
96
#include "util.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
97
#include "routerlist.h"
98
#include "routerset.h"
99
#include "scheduler.h"
100
#include "statefile.h"
101
#include "transports.h"
102
#include "ext_orport.h"
103
#include "torgzip.h"
104
#ifdef _WIN32
105
106
#include <shlobj.h>
#endif
Roger Dingledine's avatar
Roger Dingledine committed
107

108
109
#include "procmon.h"

110
111
112
113
114
115
116
117
118
119
#ifdef HAVE_SYSTEMD
#   if defined(__COVERITY__) && !defined(__INCLUDE_LEVEL__)
/* Systemd's use of gcc's __INCLUDE_LEVEL__ extension macro appears to confuse
 * Coverity. Here's a kludge to unconfuse it.
 */
#   define __INCLUDE_LEVEL__ 2
#   endif
#include <systemd/sd-daemon.h>
#endif

120
/* Prefix used to indicate a Unix socket in a FooPort configuration. */
121
static const char unix_socket_prefix[] = "unix:";
122
123
124
/* Prefix used to indicate a Unix socket with spaces in it, in a FooPort
 * configuration. */
static const char unix_q_socket_prefix[] = "unix:\"";
125

126
127
/** A list of abbreviations and aliases to map command-line options, obsolete
 * option names, or alternative option names, to their current values. */
128
static config_abbrev_t option_abbrevs_[] = {
129
130
131
132
  PLURAL(AuthDirBadDirCC),
  PLURAL(AuthDirBadExitCC),
  PLURAL(AuthDirInvalidCC),
  PLURAL(AuthDirRejectCC),
133
  PLURAL(EntryNode),
134
  PLURAL(ExcludeNode),
135
  PLURAL(Tor2webRendezvousPoint),
136
  PLURAL(FirewallPort),
137
  PLURAL(LongLivedPort),
138
139
  PLURAL(HiddenServiceNode),
  PLURAL(HiddenServiceExcludeNode),
140
  PLURAL(NumCPU),
141
  PLURAL(RendNode),
142
  PLURAL(RecommendedPackage),
143
  PLURAL(RendExcludeNode),
144
145
  PLURAL(StrictEntryNode),
  PLURAL(StrictExitNode),
146
  PLURAL(StrictNode),
147
  { "l", "Log", 1, 0},
148
  { "AllowUnverifiedNodes", "AllowInvalidNodes", 0, 0},
149
150
  { "AutomapHostSuffixes", "AutomapHostsSuffixes", 0, 0},
  { "AutomapHostOnResolve", "AutomapHostsOnResolve", 0, 0},
151
152
153
  { "BandwidthRateBytes", "BandwidthRate", 0, 0},
  { "BandwidthBurstBytes", "BandwidthBurst", 0, 0},
  { "DirFetchPostPeriod", "StatusFetchPeriod", 0, 0},
154
  { "DirServer", "DirAuthority", 0, 0}, /* XXXX later, make this warn? */
155
  { "MaxConn", "ConnLimit", 0, 1},
156
  { "MaxMemInCellQueues", "MaxMemInQueues", 0, 0},
157
158
159
  { "ORBindAddress", "ORListenAddress", 0, 0},
  { "DirBindAddress", "DirListenAddress", 0, 0},
  { "SocksBindAddress", "SocksListenAddress", 0, 0},
160
161
162
163
  { "UseHelperNodes", "UseEntryGuards", 0, 0},
  { "NumHelperNodes", "NumEntryGuards", 0, 0},
  { "UseEntryNodes", "UseEntryGuards", 0, 0},
  { "NumEntryNodes", "NumEntryGuards", 0, 0},
164
165
  { "ResolvConf", "ServerDNSResolvConfFile", 0, 1},
  { "SearchDomains", "ServerDNSSearchDomains", 0, 1},
166
  { "ServerDNSAllowBrokenResolvConf", "ServerDNSAllowBrokenConfig", 0, 0},
167
  { "PreferTunnelledDirConns", "PreferTunneledDirConns", 0, 0},
168
  { "BridgeAuthoritativeDirectory", "BridgeAuthoritativeDir", 0, 0},
169
  { "HashedControlPassword", "__HashedControlSessionPassword", 1, 0},
170
  { "VirtualAddrNetwork", "VirtualAddrNetworkIPv4", 0, 0},
171
172
  { NULL, NULL, 0, 0},
};
173

Nick Mathewson's avatar
Nick Mathewson committed
174
175
176
177
/** An entry for config_vars: "The option <b>name</b> has type
 * CONFIG_TYPE_<b>conftype</b>, and corresponds to
 * or_options_t.<b>member</b>"
 */
178
179
#define VAR(name,conftype,member,initvalue)                             \
  { name, CONFIG_TYPE_ ## conftype, STRUCT_OFFSET(or_options_t, member), \
180
      initvalue }
181
182
183
/** As VAR, but the option name and member name are the same. */
#define V(member,conftype,initvalue)                                    \
  VAR(#member, conftype, member, initvalue)
Nick Mathewson's avatar
Nick Mathewson committed
184
/** An entry for config_vars: "The option <b>name</b> is obsolete." */
185
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL }
186

187
188
189
190
191
192
193
194
195
196
197
/**
 * Macro to declare *Port options.  Each one comes in three entries.
 * For example, most users should use "SocksPort" to configure the
 * socks port, but TorBrowser wants to use __SocksPort so that it
 * isn't stored by SAVECONF.  The SocksPortLines virtual option is
 * used to query both options from the controller.
 */
#define VPORT(member)                                           \
  VAR(#member "Lines", LINELIST_V, member ## _lines, NULL),     \
  VAR(#member, LINELIST_S, member ## _lines, NULL),             \
  VAR("__" #member, LINELIST_S, member ## _lines, NULL)
198

Nick Mathewson's avatar
Nick Mathewson committed
199
200
201
202
/** Array of configuration options.  Until we disallow nonstandard
 * abbreviations, order is significant, since the first matching option will
 * be chosen first.
 */
203
static config_var_t option_vars_[] = {
204
  V(AccountingMax,               MEMUNIT,  "0 bytes"),
205
  VAR("AccountingRule",          STRING,   AccountingRule_option,  "max"),
206
207
  V(AccountingStart,             STRING,   NULL),
  V(Address,                     STRING,   NULL),
208
  V(AllowDotExit,                BOOL,     "0"),
209
210
  V(AllowInvalidNodes,           CSV,      "middle,rendezvous"),
  V(AllowNonRFC953Hostnames,     BOOL,     "0"),
211
212
  V(AllowSingleHopCircuits,      BOOL,     "0"),
  V(AllowSingleHopExits,         BOOL,     "0"),
213
214
  V(AlternateBridgeAuthority,    LINELIST, NULL),
  V(AlternateDirAuthority,       LINELIST, NULL),
215
  OBSOLETE("AlternateHSAuthority"),
216
  V(AssumeReachable,             BOOL,     "0"),
217
218
  OBSOLETE("AuthDirBadDir"),
  OBSOLETE("AuthDirBadDirCCs"),
219
  V(AuthDirBadExit,              LINELIST, NULL),
220
  V(AuthDirBadExitCCs,           CSV,      ""),
221
  V(AuthDirInvalid,              LINELIST, NULL),
222
  V(AuthDirInvalidCCs,           CSV,      ""),
223
  V(AuthDirFastGuarantee,        MEMUNIT,  "100 KB"),
224
  V(AuthDirGuardBWGuarantee,     MEMUNIT,  "2 MB"),
225
  V(AuthDirPinKeys,              BOOL,     "1"),
226
  V(AuthDirReject,               LINELIST, NULL),
227
  V(AuthDirRejectCCs,            CSV,      ""),
228
  OBSOLETE("AuthDirRejectUnlisted"),
229
  OBSOLETE("AuthDirListBadDirs"),
230
  V(AuthDirListBadExits,         BOOL,     "0"),
231
  V(AuthDirMaxServersPerAddr,    UINT,     "2"),
232
  OBSOLETE("AuthDirMaxServersPerAuthAddr"),
233
  V(AuthDirHasIPv6Connectivity,  BOOL,     "0"),
234
235
236
237
  VAR("AuthoritativeDirectory",  BOOL, AuthoritativeDir,    "0"),
  V(AutomapHostsOnResolve,       BOOL,     "0"),
  V(AutomapHostsSuffixes,        CSV,      ".onion,.exit"),
  V(AvoidDiskWrites,             BOOL,     "0"),
238
239
  V(BandwidthBurst,              MEMUNIT,  "1 GB"),
  V(BandwidthRate,               MEMUNIT,  "1 GB"),
240
241
  V(BridgeAuthoritativeDir,      BOOL,     "0"),
  VAR("Bridge",                  LINELIST, Bridges,    NULL),
242
  V(BridgePassword,              STRING,   NULL),
243
  V(BridgeRecordUsageByCountry,  BOOL,     "1"),
244
  V(BridgeRelay,                 BOOL,     "0"),
245
  V(CellStatistics,              BOOL,     "0"),
246
  V(LearnCircuitBuildTimeout,    BOOL,     "1"),
247
  V(CircuitBuildTimeout,         INTERVAL, "0"),
248
  V(CircuitIdleTimeout,          INTERVAL, "1 hour"),
249
  V(CircuitStreamTimeout,        INTERVAL, "0"),
250
  V(CircuitPriorityHalflife,     DOUBLE,  "-100.0"), /*negative:'Use default'*/
251
252
  V(ClientDNSRejectInternalAddresses, BOOL,"1"),
  V(ClientOnly,                  BOOL,     "0"),
253
254
  V(ClientPreferIPv6ORPort,      AUTOBOOL, "auto"),
  V(ClientPreferIPv6DirPort,     AUTOBOOL, "auto"),
255
  V(ClientRejectInternalAddresses, BOOL,   "1"),
256
  V(ClientTransportPlugin,       LINELIST, NULL),
257
  V(ClientUseIPv6,               BOOL,     "0"),
258
  V(ClientUseIPv4,               BOOL,     "1"),
259
  V(ConsensusParams,             STRING,   NULL),
260
  V(ConnLimit,                   UINT,     "1000"),
261
  V(ConnDirectionStatistics,     BOOL,     "0"),
262
263
264
265
  V(ConstrainedSockets,          BOOL,     "0"),
  V(ConstrainedSockSize,         MEMUNIT,  "8192"),
  V(ContactInfo,                 STRING,   NULL),
  V(ControlListenAddress,        LINELIST, NULL),
266
  VPORT(ControlPort),
267
  V(ControlPortFileGroupReadable,BOOL,     "0"),
268
  V(ControlPortWriteToFile,      FILENAME, NULL),
269
  V(ControlSocket,               LINELIST, NULL),
270
  V(ControlSocketsGroupWritable, BOOL,     "0"),
271
  V(SocksSocketsGroupWritable,   BOOL,     "0"),
272
273
274
  V(CookieAuthentication,        BOOL,     "0"),
  V(CookieAuthFileGroupReadable, BOOL,     "0"),
  V(CookieAuthFile,              STRING,   NULL),
275
  V(CountPrivateBandwidth,       BOOL,     "0"),
276
  V(DataDirectory,               FILENAME, NULL),
277
  V(DataDirectoryGroupReadable,  BOOL,     "0"),
278
  V(DisableOOSCheck,             BOOL,     "1"),
279
  V(DisableNetwork,              BOOL,     "0"),
280
  V(DirAllowPrivateAddresses,    BOOL,     "0"),
281
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "30 minutes"),
282
283
  V(DirListenAddress,            LINELIST, NULL),
  V(DirPolicy,                   LINELIST, NULL),
284
  VPORT(DirPort),
285
  V(DirPortFrontPage,            FILENAME, NULL),
286
  VAR("DirReqStatistics",        BOOL,     DirReqStatistics_option, "1"),
287
  VAR("DirAuthority",            LINELIST, DirAuthorities, NULL),
288
  V(DirCache,                    BOOL,     "1"),
289
  V(DirAuthorityFallbackRate,    DOUBLE,   "1.0"),
290
  V(DisableAllSwap,              BOOL,     "0"),
291
  V(DisableDebuggerAttachment,   BOOL,     "1"),
292
  OBSOLETE("DisableIOCP"),
293
  OBSOLETE("DisableV2DirectoryInfo_"),
294
  OBSOLETE("DynamicDHGroups"),
295
  VPORT(DNSPort),
296
297
  V(DNSListenAddress,            LINELIST, NULL),
  V(DownloadExtraInfo,           BOOL,     "0"),
298
  V(TestingEnableConnBwEvent,    BOOL,     "0"),
299
  V(TestingEnableCellStatsEvent, BOOL,     "0"),
300
  V(TestingEnableTbEmptyEvent,   BOOL,     "0"),
301
  V(EnforceDistinctSubnets,      BOOL,     "1"),
302
  V(EntryNodes,                  ROUTERSET,   NULL),
303
  V(EntryStatistics,             BOOL,     "0"),
304
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "10 minutes"),
305
306
  V(ExcludeNodes,                ROUTERSET, NULL),
  V(ExcludeExitNodes,            ROUTERSET, NULL),
307
  V(ExcludeSingleHopRelays,      BOOL,     "1"),
308
  V(ExitNodes,                   ROUTERSET, NULL),
309
310
  V(ExitPolicy,                  LINELIST, NULL),
  V(ExitPolicyRejectPrivate,     BOOL,     "1"),
311
  V(ExitPolicyRejectLocalInterfaces, BOOL, "0"),
312
  V(ExitPortStatistics,          BOOL,     "0"),
313
  V(ExtendAllowPrivateAddresses, BOOL,     "0"),
314
  V(ExitRelay,                   AUTOBOOL, "auto"),
315
  VPORT(ExtORPort),
316
  V(ExtORPortCookieAuthFile,     STRING,   NULL),
317
  V(ExtORPortCookieAuthFileGroupReadable, BOOL, "0"),
318
  V(ExtraInfoStatistics,         BOOL,     "1"),
319
  V(ExtendByEd25519ID,           AUTOBOOL, "auto"),
320
  V(FallbackDir,                 LINELIST, NULL),
321

322
  V(UseDefaultFallbackDirs,      BOOL,     "1"),
323

324
  OBSOLETE("FallbackNetworkstatusFile"),
325
326
  V(FascistFirewall,             BOOL,     "0"),
  V(FirewallPorts,               CSV,      ""),
327
  V(FastFirstHopPK,              AUTOBOOL, "auto"),
328
  V(FetchDirInfoEarly,           BOOL,     "0"),
329
  V(FetchDirInfoExtraEarly,      BOOL,     "0"),
330
331
332
  V(FetchServerDescriptors,      BOOL,     "1"),
  V(FetchHidServDescriptors,     BOOL,     "1"),
  V(FetchUselessDescriptors,     BOOL,     "0"),
333
  OBSOLETE("FetchV2Networkstatus"),
334
  V(GeoIPExcludeUnknown,         AUTOBOOL, "auto"),
335
#ifdef _WIN32
336
  V(GeoIPFile,                   FILENAME, "<default>"),
nils's avatar
nils committed
337
  V(GeoIPv6File,                 FILENAME, "<default>"),
338
#else
339
340
  V(GeoIPFile,                   FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip"),
nils's avatar
nils committed
341
342
  V(GeoIPv6File,                 FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip6"),
343
#endif
344
  OBSOLETE("Group"),
345
  V(GuardLifetime,               INTERVAL, "0 minutes"),
346
  V(HardwareAccel,               BOOL,     "0"),
347
  V(HeartbeatPeriod,             INTERVAL, "6 hours"),
348
349
  V(AccelName,                   STRING,   NULL),
  V(AccelDir,                    FILENAME, NULL),
350
  V(HashedControlPassword,       LINELIST, NULL),
351
  OBSOLETE("HidServDirectoryV2"),
Nick Mathewson's avatar
Nick Mathewson committed
352
  VAR("HiddenServiceDir",    LINELIST_S, RendConfigLines,    NULL),
353
  VAR("HiddenServiceDirGroupReadable",  LINELIST_S, RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
354
355
  VAR("HiddenServiceOptions",LINELIST_V, RendConfigLines,    NULL),
  VAR("HiddenServicePort",   LINELIST_S, RendConfigLines,    NULL),
356
  VAR("HiddenServiceVersion",LINELIST_S, RendConfigLines,    NULL),
357
  VAR("HiddenServiceAuthorizeClient",LINELIST_S,RendConfigLines, NULL),
358
  VAR("HiddenServiceAllowUnknownPorts",LINELIST_S, RendConfigLines, NULL),
359
360
  VAR("HiddenServiceMaxStreams",LINELIST_S, RendConfigLines, NULL),
  VAR("HiddenServiceMaxStreamsCloseCircuit",LINELIST_S, RendConfigLines, NULL),
361
  VAR("HiddenServiceNumIntroductionPoints", LINELIST_S, RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
362
  VAR("HiddenServiceStatistics", BOOL, HiddenServiceStatistics_option, "1"),
363
  V(HidServAuth,                 LINELIST, NULL),
364
  V(CloseHSClientCircuitsImmediatelyOnTimeout, BOOL, "0"),
365
  V(CloseHSServiceRendCircuitsImmediatelyOnTimeout, BOOL, "0"),
366
367
  V(HiddenServiceSingleHopMode,  BOOL,     "0"),
  V(HiddenServiceNonAnonymousMode,BOOL,    "0"),
368
369
370
371
  V(HTTPProxy,                   STRING,   NULL),
  V(HTTPProxyAuthenticator,      STRING,   NULL),
  V(HTTPSProxy,                  STRING,   NULL),
  V(HTTPSProxyAuthenticator,     STRING,   NULL),
372
  V(IPv6Exit,                    BOOL,     "0"),
373
  VAR("ServerTransportPlugin",   LINELIST, ServerTransportPlugin,  NULL),
374
  V(ServerTransportListenAddr,   LINELIST, NULL),
375
  V(ServerTransportOptions,      LINELIST, NULL),
376
  V(SigningKeyLifetime,          INTERVAL, "30 days"),
377
378
379
380
  V(Socks4Proxy,                 STRING,   NULL),
  V(Socks5Proxy,                 STRING,   NULL),
  V(Socks5ProxyUsername,         STRING,   NULL),
  V(Socks5ProxyPassword,         STRING,   NULL),
381
  V(KeepalivePeriod,             INTERVAL, "5 minutes"),
382
  V(KeepBindCapabilities,            AUTOBOOL, "auto"),
383
  VAR("Log",                     LINELIST, Logs,             NULL),
384
  V(LogMessageDomains,           BOOL,     "0"),
385
  V(LogTimeGranularity,          MSEC_INTERVAL, "1 second"),
Arlo Breault's avatar
Arlo Breault committed
386
  V(TruncateLogFile,             BOOL,     "0"),
Peter Palfrader's avatar
Peter Palfrader committed
387
  V(SyslogIdentityTag,           STRING,   NULL),
388
  V(LongLivedPorts,              CSV,
Nick Mathewson's avatar
Nick Mathewson committed
389
        "21,22,706,1863,5050,5190,5222,5223,6523,6667,6697,8300"),
390
391
392
  VAR("MapAddress",              LINELIST, AddressMap,           NULL),
  V(MaxAdvertisedBandwidth,      MEMUNIT,  "1 GB"),
  V(MaxCircuitDirtiness,         INTERVAL, "10 minutes"),
393
  V(MaxClientCircuitsPending,    UINT,     "32"),
394
  VAR("MaxMemInQueues",          MEMUNIT,   MaxMemInQueues_raw, "0"),
395
396
  OBSOLETE("MaxOnionsPending"),
  V(MaxOnionQueueDelay,          MSEC_INTERVAL, "1750 msec"),
397
  V(MaxUnparseableDescSizeToLog, MEMUNIT, "10 MB"),
398
  V(MinMeasuredBWsForAuthToIgnoreAdvertised, INT, "500"),
399
400
  V(MyFamily,                    STRING,   NULL),
  V(NewCircuitPeriod,            INTERVAL, "30 seconds"),
401
  OBSOLETE("NamingAuthoritativeDirectory"),
402
  V(NATDListenAddress,           LINELIST, NULL),
403
  VPORT(NATDPort),
404
  V(Nickname,                    STRING,   NULL),
405
  V(PredictedPortsRelevanceTime,  INTERVAL, "1 hour"),
406
  V(WarnUnsafeSocks,              BOOL,     "1"),
407
  VAR("NodeFamily",              LINELIST, NodeFamilies,         NULL),
408
  V(NumCPUs,                     UINT,     "0"),
409
  V(NumDirectoryGuards,          UINT,     "0"),
410
  V(NumEntryGuards,              UINT,     "0"),
Nick Mathewson's avatar
Nick Mathewson committed
411
  V(OfflineMasterKey,            BOOL,     "0"),
412
  V(ORListenAddress,             LINELIST, NULL),
413
  VPORT(ORPort),
414
  V(OutboundBindAddress,         LINELIST,   NULL),
415
416
  V(OutboundBindAddressOR,       LINELIST,   NULL),
  V(OutboundBindAddressExit,     LINELIST,   NULL),
417

418
  OBSOLETE("PathBiasDisableRate"),
419
420
  V(PathBiasCircThreshold,       INT,      "-1"),
  V(PathBiasNoticeRate,          DOUBLE,   "-1"),
421
  V(PathBiasWarnRate,            DOUBLE,   "-1"),
422
  V(PathBiasExtremeRate,         DOUBLE,   "-1"),
423
  V(PathBiasScaleThreshold,      INT,      "-1"),
424
425
  OBSOLETE("PathBiasScaleFactor"),
  OBSOLETE("PathBiasMultFactor"),
426
  V(PathBiasDropGuards,          AUTOBOOL, "0"),
427
428
429
430
431
432
  OBSOLETE("PathBiasUseCloseCounts"),

  V(PathBiasUseThreshold,       INT,      "-1"),
  V(PathBiasNoticeUseRate,          DOUBLE,   "-1"),
  V(PathBiasExtremeUseRate,         DOUBLE,   "-1"),
  V(PathBiasScaleUseThreshold,      INT,      "-1"),
433

434
  V(PathsNeededToBuildCircuits,  DOUBLE,   "-1"),
435
436
  V(PerConnBWBurst,              MEMUNIT,  "0"),
  V(PerConnBWRate,               MEMUNIT,  "0"),
437
  V(PidFile,                     STRING,   NULL),
438
  V(TestingTorNetwork,           BOOL,     "0"),
439
  V(TestingMinExitFlagThreshold, MEMUNIT,  "0"),
440
  V(TestingMinFastFlagThreshold, MEMUNIT,  "0"),
441

442
  V(TestingLinkCertLifetime,          INTERVAL, "2 days"),
443
444
445
446
447
  V(TestingAuthKeyLifetime,          INTERVAL, "2 days"),
  V(TestingLinkKeySlop,              INTERVAL, "3 hours"),
  V(TestingAuthKeySlop,              INTERVAL, "3 hours"),
  V(TestingSigningKeySlop,           INTERVAL, "1 day"),

448
  V(OptimisticData,              AUTOBOOL, "auto"),
449
450
  V(PortForwarding,              BOOL,     "0"),
  V(PortForwardingHelper,        FILENAME, "tor-fw-helper"),
451
  OBSOLETE("PreferTunneledDirConns"),
452
  V(ProtocolWarnings,            BOOL,     "0"),
453
  V(PublishServerDescriptor,     CSV,      "1"),
454
455
456
457
458
459
460
  V(PublishHidServDescriptors,   BOOL,     "1"),
  V(ReachableAddresses,          LINELIST, NULL),
  V(ReachableDirAddresses,       LINELIST, NULL),
  V(ReachableORAddresses,        LINELIST, NULL),
  V(RecommendedVersions,         LINELIST, NULL),
  V(RecommendedClientVersions,   LINELIST, NULL),
  V(RecommendedServerVersions,   LINELIST, NULL),
461
  V(RecommendedPackages,         LINELIST, NULL),
462
  V(RefuseUnknownExits,          AUTOBOOL, "auto"),
463
  V(RejectPlaintextPorts,        CSV,      ""),
464
465
466
467
468
  V(RelayBandwidthBurst,         MEMUNIT,  "0"),
  V(RelayBandwidthRate,          MEMUNIT,  "0"),
  V(RendPostPeriod,              INTERVAL, "1 hour"),
  V(RephistTrackTime,            INTERVAL, "24 hours"),
  V(RunAsDaemon,                 BOOL,     "0"),
469
  OBSOLETE("RunTesting"), // currently unused
470
  V(Sandbox,                     BOOL,     "0"),
471
  V(SafeLogging,                 STRING,   "1"),
472
  V(SafeSocks,                   BOOL,     "0"),
473
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
474
475
  V(ServerDNSAllowNonRFC953Hostnames, BOOL,"0"),
  V(ServerDNSDetectHijacking,    BOOL,     "1"),
476
  V(ServerDNSRandomizeCase,      BOOL,     "1"),
477
478
479
  V(ServerDNSResolvConfFile,     STRING,   NULL),
  V(ServerDNSSearchDomains,      BOOL,     "0"),
  V(ServerDNSTestAddresses,      CSV,
480
      "www.google.com,www.mit.edu,www.yahoo.com,www.slashdot.org"),
481
482
483
  V(SchedulerLowWaterMark__,     MEMUNIT,  "100 MB"),
  V(SchedulerHighWaterMark__,    MEMUNIT,  "101 MB"),
  V(SchedulerMaxFlushCells__,    UINT,     "1000"),
484
485
486
  V(ShutdownWaitLength,          INTERVAL, "30 seconds"),
  V(SocksListenAddress,          LINELIST, NULL),
  V(SocksPolicy,                 LINELIST, NULL),
487
  VPORT(SocksPort),
488
  V(SocksTimeout,                INTERVAL, "2 minutes"),
489
  V(SSLKeyLifetime,              INTERVAL, "0"),
490
491
  OBSOLETE("StrictEntryNodes"),
  OBSOLETE("StrictExitNodes"),
492
  V(StrictNodes,                 BOOL,     "0"),
493
  OBSOLETE("Support022HiddenServices"),
494
  V(TestSocks,                   BOOL,     "0"),
495
  V(TokenBucketRefillInterval,   MSEC_INTERVAL, "100 msec"),
496
  V(Tor2webMode,                 BOOL,     "0"),
497
  V(Tor2webRendezvousPoints,      ROUTERSET, NULL),
498
  V(TLSECGroup,                  STRING,   NULL),
499
500
501
  V(TrackHostExits,              CSV,      NULL),
  V(TrackHostExitsExpire,        INTERVAL, "30 minutes"),
  V(TransListenAddress,          LINELIST, NULL),
502
  VPORT(TransPort),
503
  V(TransProxyType,              STRING,   "default"),
504
  OBSOLETE("TunnelDirConns"),
505
  V(UpdateBridgesFromAuthority,  BOOL,     "0"),
506
  V(UseBridges,                  BOOL,     "0"),
507
  VAR("UseEntryGuards",          BOOL,     UseEntryGuards_option, "1"),
Nick Mathewson's avatar
Nick Mathewson committed
508
  OBSOLETE("UseEntryGuardsAsDirGuards"),
509
  V(UseGuardFraction,            AUTOBOOL, "auto"),
510
  V(UseMicrodescriptors,         AUTOBOOL, "auto"),
511
  OBSOLETE("UseNTorHandshake"),
512
  V(User,                        STRING,   NULL),
513
  OBSOLETE("UserspaceIOCPBuffers"),
514
  V(AuthDirSharedRandomness,     BOOL,     "1"),
515
  V(AuthDirTestEd25519LinkKeys,  BOOL,     "1"),
516
  OBSOLETE("V1AuthoritativeDirectory"),
517
  OBSOLETE("V2AuthoritativeDirectory"),
518
  VAR("V3AuthoritativeDirectory",BOOL, V3AuthoritativeDir,   "0"),
519
520
521
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "30 minutes"),
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "5 minutes"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "5 minutes"),
522
  V(TestingV3AuthVotingStartOffset, INTERVAL, "0"),
523
524
525
526
  V(V3AuthVotingInterval,        INTERVAL, "1 hour"),
  V(V3AuthVoteDelay,             INTERVAL, "5 minutes"),
  V(V3AuthDistDelay,             INTERVAL, "5 minutes"),
  V(V3AuthNIntervalsValid,       UINT,     "3"),
527
  V(V3AuthUseLegacyKey,          BOOL,     "0"),
528
  V(V3BandwidthsFile,            FILENAME, NULL),
529
  V(GuardfractionFile,           FILENAME, NULL),
530
  VAR("VersioningAuthoritativeDirectory",BOOL,VersioningAuthoritativeDir, "0"),
531
  OBSOLETE("VoteOnHidServDirectoriesV2"),
532
533
  V(VirtualAddrNetworkIPv4,      STRING,   "127.192.0.0/10"),
  V(VirtualAddrNetworkIPv6,      STRING,   "[FE80::]/10"),
534
  V(WarnPlaintextPorts,          CSV,      "23,109,110,143"),
535
536
  OBSOLETE("UseFilteringSSLBufferevents"),
  OBSOLETE("__UseFilteringSSLBufferevents"),
537
  VAR("__ReloadTorrcOnSIGHUP",   BOOL,  ReloadTorrcOnSIGHUP,      "1"),
538
539
540
  VAR("__AllDirActionsPrivate",  BOOL,  AllDirActionsPrivate,     "0"),
  VAR("__DisablePredictedCircuits",BOOL,DisablePredictedCircuits, "0"),
  VAR("__LeaveStreamsUnattached",BOOL,  LeaveStreamsUnattached,   "0"),
541
542
  VAR("__HashedControlSessionPassword", LINELIST, HashedControlSessionPassword,
      NULL),
543
  VAR("__OwningControllerProcess",STRING,OwningControllerProcess, NULL),
544
  V(MinUptimeHidServDirectoryV2, INTERVAL, "96 hours"),
545
546
547
548
549
550
551
552
553
554
  V(TestingServerDownloadSchedule, CSV_INTERVAL, "0, 0, 0, 60, 60, 120, "
                                 "300, 900, 2147483647"),
  V(TestingClientDownloadSchedule, CSV_INTERVAL, "0, 0, 60, 300, 600, "
                                 "2147483647"),
  V(TestingServerConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 60, "
                                 "300, 600, 1800, 1800, 1800, 1800, "
                                 "1800, 3600, 7200"),
  V(TestingClientConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 60, "
                                 "300, 600, 1800, 3600, 3600, 3600, "
                                 "10800, 21600, 43200"),
555
  /* With the ClientBootstrapConsensus*Download* below:
556
557
558
559
560
561
562
563
564
565
566
567
   * Clients with only authorities will try:
   *  - 3 authorities over 10 seconds, then wait 60 minutes.
   * Clients with authorities and fallbacks will try:
   *  - 2 authorities and 4 fallbacks over 21 seconds, then wait 60 minutes.
   * Clients will also retry when an application request arrives.
   * After a number of failed reqests, clients retry every 3 days + 1 hour.
   *
   * Clients used to try 2 authorities over 10 seconds, then wait for
   * 60 minutes or an application request.
   *
   * When clients have authorities and fallbacks available, they use these
   * schedules: (we stagger the times to avoid thundering herds) */
568
  V(ClientBootstrapConsensusAuthorityDownloadSchedule, CSV_INTERVAL,
569
    "6, 11, 3600, 10800, 25200, 54000, 111600, 262800" /* 3 days + 1 hour */),
570
  V(ClientBootstrapConsensusFallbackDownloadSchedule, CSV_INTERVAL,
571
572
    "0, 1, 4, 11, 3600, 10800, 25200, 54000, 111600, 262800"),
  /* When clients only have authorities available, they use this schedule: */
573
  V(ClientBootstrapConsensusAuthorityOnlyDownloadSchedule, CSV_INTERVAL,
574
575
576
577
578
    "0, 3, 7, 3600, 10800, 25200, 54000, 111600, 262800"),
  /* We don't want to overwhelm slow networks (or mirrors whose replies are
   * blocked), but we also don't want to fail if only some mirrors are
   * blackholed. Clients will try 3 directories simultaneously.
   * (Relays never use simultaneous connections.) */
579
  V(ClientBootstrapConsensusMaxInProgressTries, UINT, "3"),
580
  V(TestingBridgeDownloadSchedule, CSV_INTERVAL, "1200, 900, 900, 3600"),
581
582
583
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "10 minutes"),
  V(TestingDirConnectionMaxStall, INTERVAL, "5 minutes"),
  V(TestingConsensusMaxDownloadTries, UINT, "8"),
584
585
  /* Since we try connections rapidly and simultaneously, we can afford
   * to give up earlier. (This protects against overloading directories.) */
586
  V(ClientBootstrapConsensusMaxDownloadTries, UINT, "7"),
587
  /* We want to give up much earlier if we're only using authorities. */
588
  V(ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries, UINT, "4"),
589
590
591
  V(TestingDescriptorMaxDownloadTries, UINT, "8"),
  V(TestingMicrodescMaxDownloadTries, UINT, "8"),
  V(TestingCertMaxDownloadTries, UINT, "8"),
592
  V(TestingDirAuthVoteExit, ROUTERSET, NULL),
593
  V(TestingDirAuthVoteExitIsStrict,  BOOL,     "0"),
594
  V(TestingDirAuthVoteGuard, ROUTERSET, NULL),
595
  V(TestingDirAuthVoteGuardIsStrict,  BOOL,     "0"),
596
  V(TestingDirAuthVoteHSDir, ROUTERSET, NULL),
597
  V(TestingDirAuthVoteHSDirIsStrict,  BOOL,     "0"),
598
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "0"),
599

600
  { NULL, CONFIG_TYPE_OBSOLETE, 0, NULL }
601
};
602

603
604
/** Override default values with these if the user sets the TestingTorNetwork
 * option. */
605
static const config_var_t testing_tor_network_defaults[] = {
606
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
607
608
609
610
  V(DirAllowPrivateAddresses,    BOOL,     "1"),
  V(EnforceDistinctSubnets,      BOOL,     "0"),
  V(AssumeReachable,             BOOL,     "1"),
  V(AuthDirMaxServersPerAddr,    UINT,     "0"),
611
612
613
614
615
616
617
618
  V(ClientBootstrapConsensusAuthorityDownloadSchedule, CSV_INTERVAL,
    "0, 2, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusFallbackDownloadSchedule, CSV_INTERVAL,
    "0, 1, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusAuthorityOnlyDownloadSchedule, CSV_INTERVAL,
    "0, 1, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusMaxDownloadTries, UINT, "80"),
  V(ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries, UINT, "80"),
619
  V(ClientDNSRejectInternalAddresses, BOOL,"0"), // deprecated in 0.2.9.2-alpha
620
  V(ClientRejectInternalAddresses, BOOL,   "0"),
621
  V(CountPrivateBandwidth,       BOOL,     "1"),
622
  V(ExitPolicyRejectPrivate,     BOOL,     "0"),
623
  V(ExtendAllowPrivateAddresses, BOOL,     "1"),
624
625
626
  V(V3AuthVotingInterval,        INTERVAL, "5 minutes"),
  V(V3AuthVoteDelay,             INTERVAL, "20 seconds"),
  V(V3AuthDistDelay,             INTERVAL, "20 seconds"),
627
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "150 seconds"),
628
629
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "20 seconds"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "20 seconds"),
630
  V(TestingV3AuthVotingStartOffset, INTERVAL, "0"),
631
632
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "0 minutes"),
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "0 minutes"),
633
  V(MinUptimeHidServDirectoryV2, INTERVAL, "0 minutes"),
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
  V(TestingServerDownloadSchedule, CSV_INTERVAL, "0, 0, 0, 5, 10, 15, "
                                 "20, 30, 60"),
  V(TestingClientDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, 15, 20, "
                                 "30, 60"),
  V(TestingServerConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, "
                                 "15, 20, 30, 60"),
  V(TestingClientConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, "
                                 "15, 20, 30, 60"),
  V(TestingBridgeDownloadSchedule, CSV_INTERVAL, "60, 30, 30, 60"),
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "5 seconds"),
  V(TestingDirConnectionMaxStall, INTERVAL, "30 seconds"),
  V(TestingConsensusMaxDownloadTries, UINT, "80"),
  V(TestingDescriptorMaxDownloadTries, UINT, "80"),
  V(TestingMicrodescMaxDownloadTries, UINT, "80"),
  V(TestingCertMaxDownloadTries, UINT, "80"),
649
  V(TestingEnableConnBwEvent,    BOOL,     "1"),
650
  V(TestingEnableCellStatsEvent, BOOL,     "1"),
651
  V(TestingEnableTbEmptyEvent,   BOOL,     "1"),
652
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "1"),
653
  V(RendPostPeriod,              INTERVAL, "2 minutes"),
654

655
656
  { NULL, CONFIG_TYPE_OBSOLETE, 0, NULL }
};
657

658
#undef VAR
659
#undef V
660
661
#undef OBSOLETE

662
static const config_deprecation_t option_deprecation_notes_[] = {
663
  /* Deprecated since 0.2.9.2-alpha... */
664
665
666
667
668
669
670
671
672
673
674
675
676
677
  { "AllowDotExit", "Unrestricted use of the .exit notation can be used for "
    "a wide variety of application-level attacks." },
  { "AllowInvalidNodes", "There is no reason to enable this option; at best "
    "it will make you easier to track." },
  { "AllowSingleHopCircuits", "Almost no relays actually allow single-hop "
    "exits, making this option pointless." },
  { "AllowSingleHopExits", "Turning this on will make your relay easier "
    "to abuse." },
  { "ClientDNSRejectInternalAddresses", "Turning this on makes your client "
    "easier to fingerprint, and may open you to esoteric attacks." },
  { "ExcludeSingleHopRelays", "Turning it on makes your client easier to "
    "fingerprint." },
  { "FastFirstHopPK", "Changing this option does not make your client more "
    "secure, but does make it easier to fingerprint." },
678
  { "CloseHSClientCircuitsImmediatelyOnTimeout", "This option makes your "
679
    "client easier to fingerprint." },
680
  { "CloseHSServiceRendCircuitsImmediatelyOnTimeout", "This option makes "
681
682
683
684
685
686
687
688
689
690
691
692
693
694
    "your hidden services easier to fingerprint." },
  { "WarnUnsafeSocks", "Changing this option makes it easier for you "
    "to accidentally lose your anonymity by leaking DNS information" },
  { "TLSECGroup", "The default is a nice secure choice; the other option "
    "is less secure." },
  { "ControlListenAddress", "Use ControlPort instead." },
  { "DirListenAddress", "Use DirPort instead, possibly with the "
    "NoAdvertise sub-option" },
  { "DNSListenAddress", "Use DNSPort instead." },
  { "SocksListenAddress", "Use SocksPort instead." },
  { "TransListenAddress", "Use TransPort instead." },
  { "NATDListenAddress", "Use NATDPort instead." },
  { "ORListenAddress", "Use ORPort instead, possibly with the "
    "NoAdvertise sub-option" },
695
  /* End of options deprecated since 0.2.9.2-alpha. */
696
697
698
699

  { NULL, NULL }
};

700
#ifdef _WIN32
701
702
static char *get_windows_conf_root(void);
#endif
703
704
705
static int options_act_reversible(const or_options_t *old_options, char **msg);
static int options_transition_allowed(const or_options_t *old,
                                      const or_options_t *new,
706
                                      char **msg);
707
708
709
710
static int options_transition_affects_workers(
      const or_options_t *old_options, const or_options_t *new_options);
static int options_transition_affects_descriptor(
      const or_options_t *old_options, const or_options_t *new_options);
711
static int check_nickname_list(char **lst, const char *name, char **msg);
712
713
static char *get_bindaddr_from_transport_listen_line(const char *line,
                                                     const char *transport);
714
static int parse_ports(or_options_t *options, int validate_only,
715
716
                              char **msg_out, int *n_ports_out,
                              int *world_writable_control_socket);
717
static int check_server_ports(const smartlist_t *ports,
718
719
                              const or_options_t *options,
                              int *num_low_ports_out);
720

721
static int validate_data_directory(or_options_t *options);
722
723
static int write_configuration_file(const char *fname,
                                    const or_options_t *options);
Arlo Breault's avatar
Arlo Breault committed
724
725
static int options_init_logs(const or_options_t *old_options,
                             or_options_t *options, int validate_only);
726

727
static void init_libevent(const or_options_t *options);
728
static int opt_streq(const char *s1, const char *s2);
729
730
static int parse_outbound_addresses(or_options_t *options, int validate_only,
                                    char **msg);
Linus Nordberg's avatar
Linus Nordberg committed
731
732
static void config_maybe_load_geoip_files_(const or_options_t *options,
                                           const or_options_t *old_options);
733
734
735
static int options_validate_cb(void *old_options, void *options,
                               void *default_options,
                               int from_setconf, char **msg);
736
737
static uint64_t compute_real_max_mem_in_queues(const uint64_t val,
                                               int log_guess);
738

739
/** Magic value for or_options_t. */
740
741
#define OR_OPTIONS_MAGIC 9090909

742
/** Configuration format for or_options_t. */
743
STATIC config_format_t options_format = {
744
745
  sizeof(or_options_t),
  OR_OPTIONS_MAGIC,
746
747
  STRUCT_OFFSET(or_options_t, magic_),
  option_abbrevs_,
748
  option_deprecation_notes_,
749
  option_vars_,
750
  options_validate_cb,
751
  NULL
752
753
};

754
755
756
757
758
/*
 * Functions to read and write the global options pointer.
 */

/** Command-line and config-file options. */
759
static or_options_t *global_options = NULL;
760
761
/** The fallback options_t object; this is where we look for options not
 * in torrc before we fall back to Tor's defaults. */
762
static or_options_t *global_default_options = NULL;
Roger Dingledine's avatar
Roger Dingledine committed
763
/** Name of most recently read torrc file. */
764
static char *torrc_fname = NULL;
765
/** Name of the most recently read torrc-defaults file.*/
766