config.c 298 KB
Newer Older
1
/* Copyright (c) 2001 Matej Pfajfar.
Roger Dingledine's avatar
Roger Dingledine committed
2
 * Copyright (c) 2001-2004, Roger Dingledine.
3
 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
Nick Mathewson's avatar
Nick Mathewson committed
4
 * Copyright (c) 2007-2018, The Tor Project, Inc. */
5
/* See LICENSE for licensing information */
6

Nick Mathewson's avatar
Nick Mathewson committed
7
/**
8
 * \file config.c
9
10
11
12
13
14
15
16
17
18
19
20
 * \brief Code to interpret the user's configuration of Tor.
 *
 * This module handles torrc configuration file, including parsing it,
 * combining it with torrc.defaults and the command line, allowing
 * user changes to it (via editing and SIGHUP or via the control port),
 * writing it back to disk (because of SAVECONF from the control port),
 * and -- most importantly, acting on it.
 *
 * The module additionally has some tools for manipulating and
 * inspecting values that are calculated as a result of the
 * configured options.
 *
21
 * <h3>How to add new options</h3>
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
 *
 * To add new items to the torrc, there are a minimum of three places to edit:
 * <ul>
 *   <li>The or_options_t structure in or.h, where the options are stored.
 *   <li>The option_vars_ array below in this module, which configures
 *       the names of the torrc options, their types, their multiplicities,
 *       and their mappings to fields in or_options_t.
 *   <li>The manual in doc/tor.1.txt, to document what the new option
 *       is, and how it works.
 * </ul>
 *
 * Additionally, you might need to edit these places too:
 * <ul>
 *   <li>options_validate() below, in case you want to reject some possible
 *       values of the new configuration option.
 *   <li>options_transition_allowed() below, in case you need to
 *       forbid some or all changes in the option while Tor is
 *       running.
 *   <li>options_transition_affects_workers(), in case changes in the option
 *       might require Tor to relaunch or reconfigure its worker threads.
 *   <li>options_transition_affects_descriptor(), in case changes in the
 *       option might require a Tor relay to build and publish a new server
 *       descriptor.
 *   <li>options_act() and/or options_act_reversible(), in case there's some
 *       action that needs to be taken immediately based on the option's
 *       value.
 * </ul>
 *
 * <h3>Changing the value of an option</h3>
 *
 * Because of the SAVECONF command from the control port, it's a bad
 * idea to change the value of any user-configured option in the
 * or_options_t.  If you want to sometimes do this anyway, we recommend
 * that you create a secondary field in or_options_t; that you have the
 * user option linked only to the secondary field; that you use the
 * secondary field to initialize the one that Tor actually looks at; and that
 * you use the one Tor looks as the one that you modify.
Nick Mathewson's avatar
Nick Mathewson committed
59
60
 **/

61
#define CONFIG_PRIVATE
62
#include "core/or/or.h"
63
64
65
66
67
68
69
70
#include "app/config/config.h"
#include "app/config/confparse.h"
#include "app/config/statefile.h"
#include "app/main/main.h"
#include "core/mainloop/connection.h"
#include "core/mainloop/cpuworker.h"
#include "core/mainloop/mainloop.h"
#include "core/mainloop/netstatus.h"
71
72
73
74
75
76
77
78
#include "core/or/channel.h"
#include "core/or/circuitbuild.h"
#include "core/or/circuitlist.h"
#include "core/or/circuitmux.h"
#include "core/or/circuitmux_ewma.h"
#include "core/or/circuitstats.h"
#include "core/or/connection_edge.h"
#include "core/or/connection_or.h"
79
80
81
82
83
84
85
86
#include "core/or/dos.h"
#include "core/or/policies.h"
#include "core/or/relay.h"
#include "core/or/scheduler.h"
#include "feature/client/addressmap.h"
#include "feature/client/bridges.h"
#include "feature/client/entrynodes.h"
#include "feature/client/transports.h"
87
#include "feature/control/control.h"
88
89
#include "feature/dirauth/bwauth.h"
#include "feature/dirauth/guardfraction.h"
90
91
92
#include "feature/dircache/consdiffmgr.h"
#include "feature/dircache/dirserv.h"
#include "feature/dircommon/voting_schedule.h"
93
#include "feature/hibernate/hibernate.h"
94
95
#include "feature/hs/hs_config.h"
#include "feature/nodelist/dirlist.h"
96
#include "feature/nodelist/networkstatus.h"
97
#include "feature/nodelist/nickname.h"
98
#include "feature/nodelist/nodelist.h"
99
100
101
102
#include "feature/nodelist/routerset.h"
#include "feature/relay/dns.h"
#include "feature/relay/ext_orport.h"
#include "feature/relay/routermode.h"
103
104
#include "feature/rend/rendclient.h"
#include "feature/rend/rendservice.h"
105
#include "feature/stats/geoip.h"
106
#include "feature/stats/rephist.h"
107
108
109
110
111
112
#include "lib/compress/compress.h"
#include "lib/crypt_ops/crypto_init.h"
#include "lib/crypt_ops/crypto_rand.h"
#include "lib/crypt_ops/crypto_util.h"
#include "lib/encoding/confline.h"
#include "lib/log/git_revision.h"
113
#include "lib/net/resolve.h"
114
115
116
117
118
119
120
121
#include "lib/sandbox/sandbox.h"

#ifdef ENABLE_NSS
#include "lib/crypt_ops/crypto_nss_mgt.h"
#else
#include "lib/crypt_ops/crypto_openssl_mgt.h"
#endif

122
#ifdef _WIN32
123
124
#include <shlobj.h>
#endif
125
126
127
128
129
130
131
132
133
#ifdef HAVE_FCNTL_H
#include <fcntl.h>
#endif
#ifdef HAVE_SYS_STAT_H
#include <sys/stat.h>
#endif
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
Roger Dingledine's avatar
Roger Dingledine committed
134

135
#include "lib/meminfo/meminfo.h"
136
#include "lib/osinfo/uname.h"
137
138
139
140
141
#include "lib/process/daemon.h"
#include "lib/process/pidfile.h"
#include "lib/process/restrict.h"
#include "lib/process/setuid.h"
#include "lib/process/subprocess.h"
142
#include "lib/net/gethostname.h"
143
#include "lib/thread/numcpus.h"
144

145
#include "lib/encoding/keyval.h"
146
#include "lib/fs/conffile.h"
147
#include "lib/evloop/procmon.h"
148

149
#include "feature/dirauth/dirvote.h"
150
#include "feature/dirauth/recommend_pkg.h"
151
#include "feature/dirauth/authmode.h"
152

153
154
#include "core/or/connection_st.h"
#include "core/or/port_cfg_st.h"
155

156
157
158
159
160
161
#ifdef HAVE_SYSTEMD
#   if defined(__COVERITY__) && !defined(__INCLUDE_LEVEL__)
/* Systemd's use of gcc's __INCLUDE_LEVEL__ extension macro appears to confuse
 * Coverity. Here's a kludge to unconfuse it.
 */
#   define __INCLUDE_LEVEL__ 2
162
#endif /* defined(__COVERITY__) && !defined(__INCLUDE_LEVEL__) */
163
#include <systemd/sd-daemon.h>
164
#endif /* defined(HAVE_SYSTEMD) */
165

166
/* Prefix used to indicate a Unix socket in a FooPort configuration. */
167
static const char unix_socket_prefix[] = "unix:";
168
169
170
/* Prefix used to indicate a Unix socket with spaces in it, in a FooPort
 * configuration. */
static const char unix_q_socket_prefix[] = "unix:\"";
171

172
173
174
175
/* limits for TCP send and recv buffer size used for constrained sockets */
#define MIN_CONSTRAINED_TCP_BUFFER 2048
#define MAX_CONSTRAINED_TCP_BUFFER 262144  /* 256k */

176
177
178
179
180
/** macro to help with the bulk rename of *DownloadSchedule to
 * *DowloadInitialDelay . */
#define DOWNLOAD_SCHEDULE(name) \
  { #name "DownloadSchedule", #name "DownloadInitialDelay", 0, 1 }

181
182
/** A list of abbreviations and aliases to map command-line options, obsolete
 * option names, or alternative option names, to their current values. */
183
static config_abbrev_t option_abbrevs_[] = {
184
185
186
187
  PLURAL(AuthDirBadDirCC),
  PLURAL(AuthDirBadExitCC),
  PLURAL(AuthDirInvalidCC),
  PLURAL(AuthDirRejectCC),
188
  PLURAL(EntryNode),
189
190
  PLURAL(ExcludeNode),
  PLURAL(FirewallPort),
191
  PLURAL(LongLivedPort),
192
193
  PLURAL(HiddenServiceNode),
  PLURAL(HiddenServiceExcludeNode),
194
  PLURAL(NumCPU),
195
  PLURAL(RendNode),
196
  PLURAL(RecommendedPackage),
197
  PLURAL(RendExcludeNode),
198
199
  PLURAL(StrictEntryNode),
  PLURAL(StrictExitNode),
200
  PLURAL(StrictNode),
201
  { "l", "Log", 1, 0},
202
  { "AllowUnverifiedNodes", "AllowInvalidNodes", 0, 0},
203
204
  { "AutomapHostSuffixes", "AutomapHostsSuffixes", 0, 0},
  { "AutomapHostOnResolve", "AutomapHostsOnResolve", 0, 0},
205
206
207
  { "BandwidthRateBytes", "BandwidthRate", 0, 0},
  { "BandwidthBurstBytes", "BandwidthBurst", 0, 0},
  { "DirFetchPostPeriod", "StatusFetchPeriod", 0, 0},
208
  { "DirServer", "DirAuthority", 0, 0}, /* XXXX later, make this warn? */
209
  { "MaxConn", "ConnLimit", 0, 1},
210
  { "MaxMemInCellQueues", "MaxMemInQueues", 0, 0},
211
212
213
  { "ORBindAddress", "ORListenAddress", 0, 0},
  { "DirBindAddress", "DirListenAddress", 0, 0},
  { "SocksBindAddress", "SocksListenAddress", 0, 0},
214
215
216
217
  { "UseHelperNodes", "UseEntryGuards", 0, 0},
  { "NumHelperNodes", "NumEntryGuards", 0, 0},
  { "UseEntryNodes", "UseEntryGuards", 0, 0},
  { "NumEntryNodes", "NumEntryGuards", 0, 0},
218
219
  { "ResolvConf", "ServerDNSResolvConfFile", 0, 1},
  { "SearchDomains", "ServerDNSSearchDomains", 0, 1},
220
  { "ServerDNSAllowBrokenResolvConf", "ServerDNSAllowBrokenConfig", 0, 0},
221
  { "PreferTunnelledDirConns", "PreferTunneledDirConns", 0, 0},
222
  { "BridgeAuthoritativeDirectory", "BridgeAuthoritativeDir", 0, 0},
223
  { "HashedControlPassword", "__HashedControlSessionPassword", 1, 0},
224
  { "VirtualAddrNetwork", "VirtualAddrNetworkIPv4", 0, 0},
225
  { "SocksSocketsGroupWritable", "UnixSocksGroupWritable", 0, 1},
226
227
228
  { "_HSLayer2Nodes", "HSLayer2Nodes", 0, 1 },
  { "_HSLayer3Nodes", "HSLayer3Nodes", 0, 1 },

229
230
231
232
233
234
235
236
237
238
  DOWNLOAD_SCHEDULE(ClientBootstrapConsensusAuthority),
  DOWNLOAD_SCHEDULE(ClientBootstrapConsensusAuthorityOnly),
  DOWNLOAD_SCHEDULE(ClientBootstrapConsensusFallback),
  DOWNLOAD_SCHEDULE(TestingBridge),
  DOWNLOAD_SCHEDULE(TestingBridgeBootstrap),
  DOWNLOAD_SCHEDULE(TestingClient),
  DOWNLOAD_SCHEDULE(TestingClientConsensus),
  DOWNLOAD_SCHEDULE(TestingServer),
  DOWNLOAD_SCHEDULE(TestingServerConsensus),

239
240
  { NULL, NULL, 0, 0},
};
241

242
243
244
245
/** dummy instance of or_options_t, used for type-checking its
 * members with CONF_CHECK_VAR_TYPE. */
DUMMY_TYPECHECK_INSTANCE(or_options_t);

Nick Mathewson's avatar
Nick Mathewson committed
246
247
248
249
/** An entry for config_vars: "The option <b>name</b> has type
 * CONFIG_TYPE_<b>conftype</b>, and corresponds to
 * or_options_t.<b>member</b>"
 */
250
#define VAR(name,conftype,member,initvalue)                             \
Neel Chauhan's avatar
Neel Chauhan committed
251
  { name, CONFIG_TYPE_ ## conftype, offsetof(or_options_t, member),     \
252
      initvalue CONF_TEST_MEMBERS(or_options_t, conftype, member) }
253
254
255
/** As VAR, but the option name and member name are the same. */
#define V(member,conftype,initvalue)                                    \
  VAR(#member, conftype, member, initvalue)
Nick Mathewson's avatar
Nick Mathewson committed
256
/** An entry for config_vars: "The option <b>name</b> is obsolete." */
257
258
259
#ifdef TOR_UNIT_TESTS
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL, {.INT=NULL} }
#else
260
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL }
261
#endif
262

263
264
265
266
267
268
269
270
271
272
273
/**
 * Macro to declare *Port options.  Each one comes in three entries.
 * For example, most users should use "SocksPort" to configure the
 * socks port, but TorBrowser wants to use __SocksPort so that it
 * isn't stored by SAVECONF.  The SocksPortLines virtual option is
 * used to query both options from the controller.
 */
#define VPORT(member)                                           \
  VAR(#member "Lines", LINELIST_V, member ## _lines, NULL),     \
  VAR(#member, LINELIST_S, member ## _lines, NULL),             \
  VAR("__" #member, LINELIST_S, member ## _lines, NULL)
274

275
276
277
/** UINT64_MAX as a decimal string */
#define UINT64_MAX_STRING "18446744073709551615"

Nick Mathewson's avatar
Nick Mathewson committed
278
279
280
281
/** Array of configuration options.  Until we disallow nonstandard
 * abbreviations, order is significant, since the first matching option will
 * be chosen first.
 */
282
static config_var_t option_vars_[] = {
283
  V(AccountingMax,               MEMUNIT,  "0 bytes"),
284
  VAR("AccountingRule",          STRING,   AccountingRule_option,  "max"),
285
286
  V(AccountingStart,             STRING,   NULL),
  V(Address,                     STRING,   NULL),
Nick Mathewson's avatar
Nick Mathewson committed
287
  OBSOLETE("AllowDotExit"),
288
  OBSOLETE("AllowInvalidNodes"),
289
  V(AllowNonRFC953Hostnames,     BOOL,     "0"),
290
  OBSOLETE("AllowSingleHopCircuits"),
291
  OBSOLETE("AllowSingleHopExits"),
292
293
  V(AlternateBridgeAuthority,    LINELIST, NULL),
  V(AlternateDirAuthority,       LINELIST, NULL),
294
  OBSOLETE("AlternateHSAuthority"),
295
  V(AssumeReachable,             BOOL,     "0"),
296
297
  OBSOLETE("AuthDirBadDir"),
  OBSOLETE("AuthDirBadDirCCs"),
298
  V(AuthDirBadExit,              LINELIST, NULL),
299
  V(AuthDirBadExitCCs,           CSV,      ""),
300
  V(AuthDirInvalid,              LINELIST, NULL),
301
  V(AuthDirInvalidCCs,           CSV,      ""),
302
  V(AuthDirFastGuarantee,        MEMUNIT,  "100 KB"),
303
  V(AuthDirGuardBWGuarantee,     MEMUNIT,  "2 MB"),
304
  V(AuthDirPinKeys,              BOOL,     "1"),
305
  V(AuthDirReject,               LINELIST, NULL),
306
  V(AuthDirRejectCCs,            CSV,      ""),
307
  OBSOLETE("AuthDirRejectUnlisted"),
308
  OBSOLETE("AuthDirListBadDirs"),
309
  V(AuthDirListBadExits,         BOOL,     "0"),
310
  V(AuthDirMaxServersPerAddr,    UINT,     "2"),
311
  OBSOLETE("AuthDirMaxServersPerAuthAddr"),
312
  V(AuthDirHasIPv6Connectivity,  BOOL,     "0"),
313
314
315
316
  VAR("AuthoritativeDirectory",  BOOL, AuthoritativeDir,    "0"),
  V(AutomapHostsOnResolve,       BOOL,     "0"),
  V(AutomapHostsSuffixes,        CSV,      ".onion,.exit"),
  V(AvoidDiskWrites,             BOOL,     "0"),
317
318
  V(BandwidthBurst,              MEMUNIT,  "1 GB"),
  V(BandwidthRate,               MEMUNIT,  "1 GB"),
319
320
  V(BridgeAuthoritativeDir,      BOOL,     "0"),
  VAR("Bridge",                  LINELIST, Bridges,    NULL),
321
  V(BridgePassword,              STRING,   NULL),
322
  V(BridgeRecordUsageByCountry,  BOOL,     "1"),
323
  V(BridgeRelay,                 BOOL,     "0"),
324
  V(BridgeDistribution,          STRING,   NULL),
325
  VAR("CacheDirectory",          FILENAME, CacheDirectory_option, NULL),
326
  V(CacheDirectoryGroupReadable, AUTOBOOL,     "auto"),
327
  V(CellStatistics,              BOOL,     "0"),
328
  V(PaddingStatistics,           BOOL,     "1"),
329
  V(LearnCircuitBuildTimeout,    BOOL,     "1"),
330
  V(CircuitBuildTimeout,         INTERVAL, "0"),
331
332
  OBSOLETE("CircuitIdleTimeout"),
  V(CircuitsAvailableTimeout,    INTERVAL, "0"),
333
  V(CircuitStreamTimeout,        INTERVAL, "0"),
334
  V(CircuitPriorityHalflife,     DOUBLE,  "-1.0"), /*negative:'Use default'*/
335
  V(ClientDNSRejectInternalAddresses, BOOL,"1"),
336
  V(ClientOnly,                  BOOL,     "0"),
337
338
  V(ClientPreferIPv6ORPort,      AUTOBOOL, "auto"),
  V(ClientPreferIPv6DirPort,     AUTOBOOL, "auto"),
339
  V(ClientRejectInternalAddresses, BOOL,   "1"),
340
  V(ClientTransportPlugin,       LINELIST, NULL),
341
  V(ClientUseIPv6,               BOOL,     "0"),
342
  V(ClientUseIPv4,               BOOL,     "1"),
343
  V(ConsensusParams,             STRING,   NULL),
344
  V(ConnLimit,                   UINT,     "1000"),
345
  V(ConnDirectionStatistics,     BOOL,     "0"),
346
347
348
  V(ConstrainedSockets,          BOOL,     "0"),
  V(ConstrainedSockSize,         MEMUNIT,  "8192"),
  V(ContactInfo,                 STRING,   NULL),
349
  OBSOLETE("ControlListenAddress"),
350
  VPORT(ControlPort),
351
  V(ControlPortFileGroupReadable,BOOL,     "0"),
352
  V(ControlPortWriteToFile,      FILENAME, NULL),
353
  V(ControlSocket,               LINELIST, NULL),
354
  V(ControlSocketsGroupWritable, BOOL,     "0"),
355
  V(UnixSocksGroupWritable,    BOOL,     "0"),
356
357
358
  V(CookieAuthentication,        BOOL,     "0"),
  V(CookieAuthFileGroupReadable, BOOL,     "0"),
  V(CookieAuthFile,              STRING,   NULL),
359
  V(CountPrivateBandwidth,       BOOL,     "0"),
360
  VAR("DataDirectory",           FILENAME, DataDirectory_option, NULL),
361
  V(DataDirectoryGroupReadable,  BOOL,     "0"),
362
  V(DisableOOSCheck,             BOOL,     "1"),
363
  V(DisableNetwork,              BOOL,     "0"),
364
  V(DirAllowPrivateAddresses,    BOOL,     "0"),
365
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "30 minutes"),
366
  OBSOLETE("DirListenAddress"),
367
  V(DirPolicy,                   LINELIST, NULL),
368
  VPORT(DirPort),
369
  V(DirPortFrontPage,            FILENAME, NULL),
370
  VAR("DirReqStatistics",        BOOL,     DirReqStatistics_option, "1"),
371
  VAR("DirAuthority",            LINELIST, DirAuthorities, NULL),
372
  V(DirCache,                    BOOL,     "1"),
373
374
375
376
377
  /* A DirAuthorityFallbackRate of 0.1 means that 0.5% of clients try an
   * authority when all fallbacks are up, and 2% try an authority when 25% of
   * fallbacks are down. (We rebuild the list when 25% of fallbacks are down).
   *
   * We want to reduce load on authorities, but keep these two figures within
Nick Mathewson's avatar
Nick Mathewson committed
378
379
   * an order of magnitude, so there isn't too much load shifting to
   * authorities when fallbacks go down. */
380
  V(DirAuthorityFallbackRate,    DOUBLE,   "0.1"),
381
  V(DisableAllSwap,              BOOL,     "0"),
382
  V(DisableDebuggerAttachment,   BOOL,     "1"),
383
  OBSOLETE("DisableIOCP"),
384
  OBSOLETE("DisableV2DirectoryInfo_"),
385
  OBSOLETE("DynamicDHGroups"),
386
  VPORT(DNSPort),
387
  OBSOLETE("DNSListenAddress"),
388
389
390
  /* DoS circuit creation options. */
  V(DoSCircuitCreationEnabled,   AUTOBOOL, "auto"),
  V(DoSCircuitCreationMinConnections,      UINT, "0"),
391
  V(DoSCircuitCreationRate,      UINT,     "0"),
392
393
394
395
396
397
398
399
400
  V(DoSCircuitCreationBurst,     UINT,     "0"),
  V(DoSCircuitCreationDefenseType,         INT,  "0"),
  V(DoSCircuitCreationDefenseTimePeriod,   INTERVAL, "0"),
  /* DoS connection options. */
  V(DoSConnectionEnabled,        AUTOBOOL, "auto"),
  V(DoSConnectionMaxConcurrentCount,       UINT, "0"),
  V(DoSConnectionDefenseType,    INT,      "0"),
  /* DoS single hop client options. */
  V(DoSRefuseSingleHopClientRendezvous,    AUTOBOOL, "auto"),
401
  V(DownloadExtraInfo,           BOOL,     "0"),
402
  V(TestingEnableConnBwEvent,    BOOL,     "0"),
403
  V(TestingEnableCellStatsEvent, BOOL,     "0"),
404
  OBSOLETE("TestingEnableTbEmptyEvent"),
405
  V(EnforceDistinctSubnets,      BOOL,     "1"),
406
  V(EntryNodes,                  ROUTERSET,   NULL),
407
  V(EntryStatistics,             BOOL,     "0"),
408
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "10 minutes"),
409
410
  V(ExcludeNodes,                ROUTERSET, NULL),
  V(ExcludeExitNodes,            ROUTERSET, NULL),
411
  OBSOLETE("ExcludeSingleHopRelays"),
412
  V(ExitNodes,                   ROUTERSET, NULL),
413
414
  V(ExitPolicy,                  LINELIST, NULL),
  V(ExitPolicyRejectPrivate,     BOOL,     "1"),
415
  V(ExitPolicyRejectLocalInterfaces, BOOL, "0"),
416
  V(ExitPortStatistics,          BOOL,     "0"),
417
  V(ExtendAllowPrivateAddresses, BOOL,     "0"),
418
  V(ExitRelay,                   AUTOBOOL, "auto"),
419
  VPORT(ExtORPort),
420
  V(ExtORPortCookieAuthFile,     STRING,   NULL),
421
  V(ExtORPortCookieAuthFileGroupReadable, BOOL, "0"),
422
  V(ExtraInfoStatistics,         BOOL,     "1"),
423
  V(ExtendByEd25519ID,           AUTOBOOL, "auto"),
424
  V(FallbackDir,                 LINELIST, NULL),
425

426
  V(UseDefaultFallbackDirs,      BOOL,     "1"),
427

428
  OBSOLETE("FallbackNetworkstatusFile"),
429
430
  V(FascistFirewall,             BOOL,     "0"),
  V(FirewallPorts,               CSV,      ""),
431
  OBSOLETE("FastFirstHopPK"),
432
  V(FetchDirInfoEarly,           BOOL,     "0"),
433
  V(FetchDirInfoExtraEarly,      BOOL,     "0"),
434
435
436
  V(FetchServerDescriptors,      BOOL,     "1"),
  V(FetchHidServDescriptors,     BOOL,     "1"),
  V(FetchUselessDescriptors,     BOOL,     "0"),
437
  OBSOLETE("FetchV2Networkstatus"),
438
  V(GeoIPExcludeUnknown,         AUTOBOOL, "auto"),
439
#ifdef _WIN32
440
  V(GeoIPFile,                   FILENAME, "<default>"),
nils's avatar
nils committed
441
  V(GeoIPv6File,                 FILENAME, "<default>"),
442
#else
443
444
  V(GeoIPFile,                   FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip"),
nils's avatar
nils committed
445
446
  V(GeoIPv6File,                 FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip6"),
447
#endif /* defined(_WIN32) */
448
  OBSOLETE("Group"),
449
  V(GuardLifetime,               INTERVAL, "0 minutes"),
450
  V(HardwareAccel,               BOOL,     "0"),
451
  V(HeartbeatPeriod,             INTERVAL, "6 hours"),
Alexander Færøy's avatar
Alexander Færøy committed
452
  V(MainloopStats,               BOOL,     "0"),
453
454
  V(AccelName,                   STRING,   NULL),
  V(AccelDir,                    FILENAME, NULL),
455
  V(HashedControlPassword,       LINELIST, NULL),
456
  OBSOLETE("HidServDirectoryV2"),
Nick Mathewson's avatar
Nick Mathewson committed
457
  VAR("HiddenServiceDir",    LINELIST_S, RendConfigLines,    NULL),
458
  VAR("HiddenServiceDirGroupReadable",  LINELIST_S, RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
459
460
  VAR("HiddenServiceOptions",LINELIST_V, RendConfigLines,    NULL),
  VAR("HiddenServicePort",   LINELIST_S, RendConfigLines,    NULL),
461
  VAR("HiddenServiceVersion",LINELIST_S, RendConfigLines,    NULL),
462
  VAR("HiddenServiceAuthorizeClient",LINELIST_S,RendConfigLines, NULL),
463
  VAR("HiddenServiceAllowUnknownPorts",LINELIST_S, RendConfigLines, NULL),
464
465
  VAR("HiddenServiceMaxStreams",LINELIST_S, RendConfigLines, NULL),
  VAR("HiddenServiceMaxStreamsCloseCircuit",LINELIST_S, RendConfigLines, NULL),
466
  VAR("HiddenServiceNumIntroductionPoints", LINELIST_S, RendConfigLines, NULL),
467
  VAR("HiddenServiceExportCircuitID", LINELIST_S,  RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
468
  VAR("HiddenServiceStatistics", BOOL, HiddenServiceStatistics_option, "1"),
469
  V(HidServAuth,                 LINELIST, NULL),
470
  V(ClientOnionAuthDir,          FILENAME, NULL),
471
  OBSOLETE("CloseHSClientCircuitsImmediatelyOnTimeout"),
472
  OBSOLETE("CloseHSServiceRendCircuitsImmediatelyOnTimeout"),
473
474
  V(HiddenServiceSingleHopMode,  BOOL,     "0"),
  V(HiddenServiceNonAnonymousMode,BOOL,    "0"),
475
476
477
478
  V(HTTPProxy,                   STRING,   NULL),
  V(HTTPProxyAuthenticator,      STRING,   NULL),
  V(HTTPSProxy,                  STRING,   NULL),
  V(HTTPSProxyAuthenticator,     STRING,   NULL),
479
  VPORT(HTTPTunnelPort),
480
  V(IPv6Exit,                    BOOL,     "0"),
481
  VAR("ServerTransportPlugin",   LINELIST, ServerTransportPlugin,  NULL),
482
  V(ServerTransportListenAddr,   LINELIST, NULL),
483
  V(ServerTransportOptions,      LINELIST, NULL),
484
  V(SigningKeyLifetime,          INTERVAL, "30 days"),
485
486
487
488
  V(Socks4Proxy,                 STRING,   NULL),
  V(Socks5Proxy,                 STRING,   NULL),
  V(Socks5ProxyUsername,         STRING,   NULL),
  V(Socks5ProxyPassword,         STRING,   NULL),
489
490
  VAR("KeyDirectory",            FILENAME, KeyDirectory_option, NULL),
  V(KeyDirectoryGroupReadable,   BOOL,     "0"),
491
492
  VAR("HSLayer2Nodes",           ROUTERSET,  HSLayer2Nodes,  NULL),
  VAR("HSLayer3Nodes",           ROUTERSET,  HSLayer3Nodes,  NULL),
493
  V(KeepalivePeriod,             INTERVAL, "5 minutes"),
494
  V(KeepBindCapabilities,            AUTOBOOL, "auto"),
495
  VAR("Log",                     LINELIST, Logs,             NULL),
496
  V(LogMessageDomains,           BOOL,     "0"),
497
  V(LogTimeGranularity,          MSEC_INTERVAL, "1 second"),
Arlo Breault's avatar
Arlo Breault committed
498
  V(TruncateLogFile,             BOOL,     "0"),
Peter Palfrader's avatar
Peter Palfrader committed
499
  V(SyslogIdentityTag,           STRING,   NULL),
500
  V(AndroidIdentityTag,          STRING,   NULL),
501
  V(LongLivedPorts,              CSV,
Nick Mathewson's avatar
Nick Mathewson committed
502
        "21,22,706,1863,5050,5190,5222,5223,6523,6667,6697,8300"),
503
504
505
  VAR("MapAddress",              LINELIST, AddressMap,           NULL),
  V(MaxAdvertisedBandwidth,      MEMUNIT,  "1 GB"),
  V(MaxCircuitDirtiness,         INTERVAL, "10 minutes"),
506
  V(MaxClientCircuitsPending,    UINT,     "32"),
507
  V(MaxConsensusAgeForDiffs,     INTERVAL, "0 seconds"),
508
  VAR("MaxMemInQueues",          MEMUNIT,   MaxMemInQueues_raw, "0"),
509
510
  OBSOLETE("MaxOnionsPending"),
  V(MaxOnionQueueDelay,          MSEC_INTERVAL, "1750 msec"),
511
  V(MaxUnparseableDescSizeToLog, MEMUNIT, "10 MB"),
512
  V(MinMeasuredBWsForAuthToIgnoreAdvertised, INT, "500"),
513
  VAR("MyFamily",                LINELIST, MyFamily_lines,       NULL),
514
  V(NewCircuitPeriod,            INTERVAL, "30 seconds"),
515
  OBSOLETE("NamingAuthoritativeDirectory"),
516
  OBSOLETE("NATDListenAddress"),
517
  VPORT(NATDPort),
518
  V(Nickname,                    STRING,   NULL),
519
  OBSOLETE("PredictedPortsRelevanceTime"),
520
  OBSOLETE("WarnUnsafeSocks"),
521
  VAR("NodeFamily",              LINELIST, NodeFamilies,         NULL),
522
  V(NoExec,                      BOOL,     "0"),
523
  V(NumCPUs,                     UINT,     "0"),
524
  V(NumDirectoryGuards,          UINT,     "0"),
525
  V(NumEntryGuards,              UINT,     "0"),
526
  V(NumPrimaryGuards,            UINT,     "0"),
Nick Mathewson's avatar
Nick Mathewson committed
527
  V(OfflineMasterKey,            BOOL,     "0"),
528
  OBSOLETE("ORListenAddress"),
529
  VPORT(ORPort),
530
  V(OutboundBindAddress,         LINELIST,   NULL),
531
532
  V(OutboundBindAddressOR,       LINELIST,   NULL),
  V(OutboundBindAddressExit,     LINELIST,   NULL),
533

534
  OBSOLETE("PathBiasDisableRate"),
535
536
  V(PathBiasCircThreshold,       INT,      "-1"),
  V(PathBiasNoticeRate,          DOUBLE,   "-1"),
537
  V(PathBiasWarnRate,            DOUBLE,   "-1"),
538
  V(PathBiasExtremeRate,         DOUBLE,   "-1"),
539
  V(PathBiasScaleThreshold,      INT,      "-1"),
540
541
  OBSOLETE("PathBiasScaleFactor"),
  OBSOLETE("PathBiasMultFactor"),
542
  V(PathBiasDropGuards,          AUTOBOOL, "0"),
543
544
545
546
547
548
  OBSOLETE("PathBiasUseCloseCounts"),

  V(PathBiasUseThreshold,       INT,      "-1"),
  V(PathBiasNoticeUseRate,          DOUBLE,   "-1"),
  V(PathBiasExtremeUseRate,         DOUBLE,   "-1"),
  V(PathBiasScaleUseThreshold,      INT,      "-1"),
549

550
  V(PathsNeededToBuildCircuits,  DOUBLE,   "-1"),
551
552
  V(PerConnBWBurst,              MEMUNIT,  "0"),
  V(PerConnBWRate,               MEMUNIT,  "0"),
553
  V(PidFile,                     STRING,   NULL),
554
  V(TestingTorNetwork,           BOOL,     "0"),
555
  V(TestingMinExitFlagThreshold, MEMUNIT,  "0"),
556
  V(TestingMinFastFlagThreshold, MEMUNIT,  "0"),
557

558
  V(TestingLinkCertLifetime,          INTERVAL, "2 days"),
559
560
561
562
563
  V(TestingAuthKeyLifetime,          INTERVAL, "2 days"),
  V(TestingLinkKeySlop,              INTERVAL, "3 hours"),
  V(TestingAuthKeySlop,              INTERVAL, "3 hours"),
  V(TestingSigningKeySlop,           INTERVAL, "1 day"),

564
  V(OptimisticData,              AUTOBOOL, "auto"),
565
566
  OBSOLETE("PortForwarding"),
  OBSOLETE("PortForwardingHelper"),
567
  OBSOLETE("PreferTunneledDirConns"),
568
  V(ProtocolWarnings,            BOOL,     "0"),
569
  V(PublishServerDescriptor,     CSV,      "1"),
570
571
572
573
574
575
576
  V(PublishHidServDescriptors,   BOOL,     "1"),
  V(ReachableAddresses,          LINELIST, NULL),
  V(ReachableDirAddresses,       LINELIST, NULL),
  V(ReachableORAddresses,        LINELIST, NULL),
  V(RecommendedVersions,         LINELIST, NULL),
  V(RecommendedClientVersions,   LINELIST, NULL),
  V(RecommendedServerVersions,   LINELIST, NULL),
577
  V(RecommendedPackages,         LINELIST, NULL),
578
579
  V(ReducedConnectionPadding,    BOOL,     "0"),
  V(ConnectionPadding,           AUTOBOOL, "auto"),
580
  V(RefuseUnknownExits,          AUTOBOOL, "auto"),
581
  V(RejectPlaintextPorts,        CSV,      ""),
582
583
584
585
586
  V(RelayBandwidthBurst,         MEMUNIT,  "0"),
  V(RelayBandwidthRate,          MEMUNIT,  "0"),
  V(RendPostPeriod,              INTERVAL, "1 hour"),
  V(RephistTrackTime,            INTERVAL, "24 hours"),
  V(RunAsDaemon,                 BOOL,     "0"),
587
  V(ReducedExitPolicy,           BOOL,     "0"),
588
  OBSOLETE("RunTesting"), // currently unused
589
  V(Sandbox,                     BOOL,     "0"),
590
  V(SafeLogging,                 STRING,   "1"),
591
  V(SafeSocks,                   BOOL,     "0"),
592
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
593
594
  V(ServerDNSAllowNonRFC953Hostnames, BOOL,"0"),
  V(ServerDNSDetectHijacking,    BOOL,     "1"),
595
  V(ServerDNSRandomizeCase,      BOOL,     "1"),
596
597
598
  V(ServerDNSResolvConfFile,     STRING,   NULL),
  V(ServerDNSSearchDomains,      BOOL,     "0"),
  V(ServerDNSTestAddresses,      CSV,
599
      "www.google.com,www.mit.edu,www.yahoo.com,www.slashdot.org"),
600
601
602
603
604
  OBSOLETE("SchedulerLowWaterMark__"),
  OBSOLETE("SchedulerHighWaterMark__"),
  OBSOLETE("SchedulerMaxFlushCells__"),
  V(KISTSchedRunInterval,        MSEC_INTERVAL, "0 msec"),
  V(KISTSockBufSizeFactor,       DOUBLE,   "1.0"),
605
  V(Schedulers,                  CSV,      "KIST,KISTLite,Vanilla"),
606
  V(ShutdownWaitLength,          INTERVAL, "30 seconds"),
607
  OBSOLETE("SocksListenAddress"),
608
  V(SocksPolicy,                 LINELIST, NULL),
609
  VPORT(SocksPort),
610
  V(SocksTimeout,                INTERVAL, "2 minutes"),
611
  V(SSLKeyLifetime,              INTERVAL, "0"),
612
613
  OBSOLETE("StrictEntryNodes"),
  OBSOLETE("StrictExitNodes"),
614
  V(StrictNodes,                 BOOL,     "0"),
615
  OBSOLETE("Support022HiddenServices"),
616
  V(TestSocks,                   BOOL,     "0"),
617
  V(TokenBucketRefillInterval,   MSEC_INTERVAL, "100 msec"),
David Goulet's avatar
David Goulet committed
618
619
  OBSOLETE("Tor2webMode"),
  OBSOLETE("Tor2webRendezvousPoints"),
620
  OBSOLETE("TLSECGroup"),
621
622
  V(TrackHostExits,              CSV,      NULL),
  V(TrackHostExitsExpire,        INTERVAL, "30 minutes"),
623
  OBSOLETE("TransListenAddress"),
624
  VPORT(TransPort),
625
  V(TransProxyType,              STRING,   "default"),
626
  OBSOLETE("TunnelDirConns"),
627
  V(UpdateBridgesFromAuthority,  BOOL,     "0"),
628
  V(UseBridges,                  BOOL,     "0"),
629
  VAR("UseEntryGuards",          BOOL,     UseEntryGuards_option, "1"),
Nick Mathewson's avatar
Nick Mathewson committed
630
  OBSOLETE("UseEntryGuardsAsDirGuards"),
631
  V(UseGuardFraction,            AUTOBOOL, "auto"),
632
  V(UseMicrodescriptors,         AUTOBOOL, "auto"),
633
  OBSOLETE("UseNTorHandshake"),
634
  V(User,                        STRING,   NULL),
635
  OBSOLETE("UserspaceIOCPBuffers"),
636
  V(AuthDirSharedRandomness,     BOOL,     "1"),
637
  V(AuthDirTestEd25519LinkKeys,  BOOL,     "1"),
638
  OBSOLETE("V1AuthoritativeDirectory"),
639
  OBSOLETE("V2AuthoritativeDirectory"),
640
  VAR("V3AuthoritativeDirectory",BOOL, V3AuthoritativeDir,   "0"),
641
642
643
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "30 minutes"),
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "5 minutes"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "5 minutes"),
644
  V(TestingV3AuthVotingStartOffset, INTERVAL, "0"),
645
646
647
648
  V(V3AuthVotingInterval,        INTERVAL, "1 hour"),
  V(V3AuthVoteDelay,             INTERVAL, "5 minutes"),
  V(V3AuthDistDelay,             INTERVAL, "5 minutes"),
  V(V3AuthNIntervalsValid,       UINT,     "3"),
649
  V(V3AuthUseLegacyKey,          BOOL,     "0"),
650
  V(V3BandwidthsFile,            FILENAME, NULL),
651
  V(GuardfractionFile,           FILENAME, NULL),
652
  VAR("VersioningAuthoritativeDirectory",BOOL,VersioningAuthoritativeDir, "0"),
653
  OBSOLETE("VoteOnHidServDirectoriesV2"),
654
655
  V(VirtualAddrNetworkIPv4,      STRING,   "127.192.0.0/10"),
  V(VirtualAddrNetworkIPv6,      STRING,   "[FE80::]/10"),
656
  V(WarnPlaintextPorts,          CSV,      "23,109,110,143"),
657
658
  OBSOLETE("UseFilteringSSLBufferevents"),
  OBSOLETE("__UseFilteringSSLBufferevents"),
659
  VAR("__ReloadTorrcOnSIGHUP",   BOOL,  ReloadTorrcOnSIGHUP,      "1"),
660
661
  VAR("__AllDirActionsPrivate",  BOOL,  AllDirActionsPrivate,     "0"),
  VAR("__DisablePredictedCircuits",BOOL,DisablePredictedCircuits, "0"),
662
  VAR("__DisableSignalHandlers", BOOL,  DisableSignalHandlers,    "0"),
663
  VAR("__LeaveStreamsUnattached",BOOL,  LeaveStreamsUnattached,   "0"),
664
665
  VAR("__HashedControlSessionPassword", LINELIST, HashedControlSessionPassword,
      NULL),
666
  VAR("__OwningControllerProcess",STRING,OwningControllerProcess, NULL),
667
  VAR("__OwningControllerFD", UINT64, OwningControllerFD, UINT64_MAX_STRING),
668
  V(MinUptimeHidServDirectoryV2, INTERVAL, "96 hours"),
669
670
671
672
  V(TestingServerDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingClientDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingServerConsensusDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingClientConsensusDownloadInitialDelay, CSV_INTERVAL, "0"),
673
  /* With the ClientBootstrapConsensus*Download* below:
674
   * Clients with only authorities will try:
675
676
   *  - at least 3 authorities over 10 seconds, then exponentially backoff,
   *    with the next attempt 3-21 seconds later,
677
   * Clients with authorities and fallbacks will try:
678
679
   *  - at least 2 authorities and 4 fallbacks over 21 seconds, then
   *    exponentially backoff, with the next attempts 4-33 seconds later,
680
   * Clients will also retry when an application request arrives.
681
   * After a number of failed requests, clients retry every 3 days + 1 hour.
682
683
684
685
686
687
   *
   * Clients used to try 2 authorities over 10 seconds, then wait for
   * 60 minutes or an application request.
   *
   * When clients have authorities and fallbacks available, they use these
   * schedules: (we stagger the times to avoid thundering herds) */
688
689
  V(ClientBootstrapConsensusAuthorityDownloadInitialDelay, CSV_INTERVAL, "6"),
  V(ClientBootstrapConsensusFallbackDownloadInitialDelay, CSV_INTERVAL, "0"),
690
  /* When clients only have authorities available, they use this schedule: */
691
  V(ClientBootstrapConsensusAuthorityOnlyDownloadInitialDelay, CSV_INTERVAL,
692
    "0"),
693
694
695
696
  /* We don't want to overwhelm slow networks (or mirrors whose replies are
   * blocked), but we also don't want to fail if only some mirrors are
   * blackholed. Clients will try 3 directories simultaneously.
   * (Relays never use simultaneous connections.) */
697
  V(ClientBootstrapConsensusMaxInProgressTries, UINT, "3"),
698
699
  /* When a client has any running bridges, check each bridge occasionally,
    * whether or not that bridge is actually up. */
700
  V(TestingBridgeDownloadInitialDelay, CSV_INTERVAL,"10800"),
701
702
703
704
  /* When a client is just starting, or has no running bridges, check each
   * bridge a few times quickly, and then try again later. These schedules
   * are much longer than the other schedules, because we try each and every
   * configured bridge with this schedule. */
705
  V(TestingBridgeBootstrapDownloadInitialDelay, CSV_INTERVAL, "0"),
706
707
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "10 minutes"),
  V(TestingDirConnectionMaxStall, INTERVAL, "5 minutes"),
708
709
710
711
712
713
  OBSOLETE("TestingConsensusMaxDownloadTries"),
  OBSOLETE("ClientBootstrapConsensusMaxDownloadTries"),
  OBSOLETE("ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries"),
  OBSOLETE("TestingDescriptorMaxDownloadTries"),
  OBSOLETE("TestingMicrodescMaxDownloadTries"),
  OBSOLETE("TestingCertMaxDownloadTries"),
714
  V(TestingDirAuthVoteExit, ROUTERSET, NULL),
715
  V(TestingDirAuthVoteExitIsStrict,  BOOL,     "0"),
716
  V(TestingDirAuthVoteGuard, ROUTERSET, NULL),
717
  V(TestingDirAuthVoteGuardIsStrict,  BOOL,     "0"),
718
  V(TestingDirAuthVoteHSDir, ROUTERSET, NULL),
719
  V(TestingDirAuthVoteHSDirIsStrict,  BOOL,     "0"),
720
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "0"),
721

722
  END_OF_CONFIG_VARS
723
};
724

725
726
/** Override default values with these if the user sets the TestingTorNetwork
 * option. */
727
static const config_var_t testing_tor_network_defaults[] = {
728
729
730
731
  V(DirAllowPrivateAddresses,    BOOL,     "1"),
  V(EnforceDistinctSubnets,      BOOL,     "0"),
  V(AssumeReachable,             BOOL,     "1"),
  V(AuthDirMaxServersPerAddr,    UINT,     "0"),
732
733
  V(ClientBootstrapConsensusAuthorityDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(ClientBootstrapConsensusFallbackDownloadInitialDelay, CSV_INTERVAL, "0"),
734
  V(ClientBootstrapConsensusAuthorityOnlyDownloadInitialDelay, CSV_INTERVAL,
735
    "0"),
736
  V(ClientDNSRejectInternalAddresses, BOOL,"0"),
737
  V(ClientRejectInternalAddresses, BOOL,   "0"),
738
  V(CountPrivateBandwidth,       BOOL,     "1"),
739
  V(ExitPolicyRejectPrivate,     BOOL,     "0"),
740
  V(ExtendAllowPrivateAddresses, BOOL,     "1"),
741
742
743
  V(V3AuthVotingInterval,        INTERVAL, "5 minutes"),
  V(V3AuthVoteDelay,             INTERVAL, "20 seconds"),
  V(V3AuthDistDelay,             INTERVAL, "20 seconds"),
744
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "150 seconds"),
745
746
747
748
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "20 seconds"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "20 seconds"),
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "0 minutes"),
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "0 minutes"),
749
  V(MinUptimeHidServDirectoryV2, INTERVAL, "0 minutes"),
750
751
752
753
754
755
  V(TestingServerDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingClientDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingServerConsensusDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingClientConsensusDownloadInitialDelay, CSV_INTERVAL, "0"),
  V(TestingBridgeDownloadInitialDelay, CSV_INTERVAL, "10"),
  V(TestingBridgeBootstrapDownloadInitialDelay, CSV_INTERVAL, "0"),
756
757
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "5 seconds"),
  V(TestingDirConnectionMaxStall, INTERVAL, "30 seconds"),
758
  V(TestingEnableConnBwEvent,    BOOL,     "1"),
759
  V(TestingEnableCellStatsEvent, BOOL,     "1"),
760
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "1"),
761
  V(RendPostPeriod,              INTERVAL, "2 minutes"),
762

763
  END_OF_CONFIG_VARS
764
};
765

766
#undef VAR
767
#undef V
768
769
#undef OBSOLETE

770
static const config_deprecation_t option_deprecation_notes_[] = {
771
  /* Deprecated since 0.3.2.0-alpha. */
772
773
774
775
  { "HTTPProxy", "It only applies to direct unencrypted HTTP connections "
    "to your directory server, which your Tor probably wasn't using." },
  { "HTTPProxyAuthenticator", "HTTPProxy is deprecated in favor of HTTPSProxy "
    "which should be used with HTTPSProxyAuthenticator." },
776
777
778
  /* End of options deprecated since 0.3.2.1-alpha */

  /* Options deprecated since 0.3.2.2-alpha */
779
780
781
782
  { "ReachableDirAddresses", "It has no effect on relays, and has had no "
    "effect on clients since 0.2.8." },
  { "ClientPreferIPv6DirPort", "It has no effect on relays, and has had no "
    "effect on clients since 0.2.8." },
783
  /* End of options deprecated since 0.3.2.2-alpha. */
784