config.c 299 KB
Newer Older
1
/* Copyright (c) 2001 Matej Pfajfar.
Roger Dingledine's avatar
Roger Dingledine committed
2
 * Copyright (c) 2001-2004, Roger Dingledine.
3
 * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
4
 * Copyright (c) 2007-2017, The Tor Project, Inc. */
5
/* See LICENSE for licensing information */
6

Nick Mathewson's avatar
Nick Mathewson committed
7
/**
8
 * \file config.c
9
10
11
12
13
14
15
16
17
18
19
20
 * \brief Code to interpret the user's configuration of Tor.
 *
 * This module handles torrc configuration file, including parsing it,
 * combining it with torrc.defaults and the command line, allowing
 * user changes to it (via editing and SIGHUP or via the control port),
 * writing it back to disk (because of SAVECONF from the control port),
 * and -- most importantly, acting on it.
 *
 * The module additionally has some tools for manipulating and
 * inspecting values that are calculated as a result of the
 * configured options.
 *
21
 * <h3>How to add new options</h3>
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
 *
 * To add new items to the torrc, there are a minimum of three places to edit:
 * <ul>
 *   <li>The or_options_t structure in or.h, where the options are stored.
 *   <li>The option_vars_ array below in this module, which configures
 *       the names of the torrc options, their types, their multiplicities,
 *       and their mappings to fields in or_options_t.
 *   <li>The manual in doc/tor.1.txt, to document what the new option
 *       is, and how it works.
 * </ul>
 *
 * Additionally, you might need to edit these places too:
 * <ul>
 *   <li>options_validate() below, in case you want to reject some possible
 *       values of the new configuration option.
 *   <li>options_transition_allowed() below, in case you need to
 *       forbid some or all changes in the option while Tor is
 *       running.
 *   <li>options_transition_affects_workers(), in case changes in the option
 *       might require Tor to relaunch or reconfigure its worker threads.
 *   <li>options_transition_affects_descriptor(), in case changes in the
 *       option might require a Tor relay to build and publish a new server
 *       descriptor.
 *   <li>options_act() and/or options_act_reversible(), in case there's some
 *       action that needs to be taken immediately based on the option's
 *       value.
 * </ul>
 *
 * <h3>Changing the value of an option</h3>
 *
 * Because of the SAVECONF command from the control port, it's a bad
 * idea to change the value of any user-configured option in the
 * or_options_t.  If you want to sometimes do this anyway, we recommend
 * that you create a secondary field in or_options_t; that you have the
 * user option linked only to the secondary field; that you use the
 * secondary field to initialize the one that Tor actually looks at; and that
 * you use the one Tor looks as the one that you modify.
Nick Mathewson's avatar
Nick Mathewson committed
59
60
 **/

61
#define CONFIG_PRIVATE
Roger Dingledine's avatar
Roger Dingledine committed
62
#include "or.h"
63
#include "bridges.h"
64
#include "compat.h"
65
#include "addressmap.h"
66
#include "channel.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
67
#include "circuitbuild.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
68
#include "circuitlist.h"
69
70
#include "circuitmux.h"
#include "circuitmux_ewma.h"
71
#include "circuitstats.h"
72
#include "compress.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
73
#include "config.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
74
#include "connection.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
75
#include "connection_edge.h"
76
#include "connection_or.h"
77
#include "consdiffmgr.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
78
#include "control.h"
79
#include "confparse.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
80
#include "cpuworker.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
81
#include "dirserv.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
82
#include "dirvote.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
83
#include "dns.h"
84
#include "dos.h"
85
#include "entrynodes.h"
86
#include "git_revision.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
87
#include "geoip.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
88
#include "hibernate.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
89
#include "main.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
90
#include "networkstatus.h"
91
#include "nodelist.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
92
#include "policies.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
93
#include "relay.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
94
#include "rendclient.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
95
#include "rendservice.h"
96
#include "hs_config.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
97
#include "rephist.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
98
#include "router.h"
99
#include "sandbox.h"
100
#include "util.h"
Sebastian Hahn's avatar
Sebastian Hahn committed
101
#include "routerlist.h"
102
#include "routerset.h"
103
#include "scheduler.h"
104
#include "statefile.h"
105
#include "transports.h"
106
#include "ext_orport.h"
107
#ifdef _WIN32
108
109
#include <shlobj.h>
#endif
Roger Dingledine's avatar
Roger Dingledine committed
110

111
112
#include "procmon.h"

113
114
115
116
117
118
#ifdef HAVE_SYSTEMD
#   if defined(__COVERITY__) && !defined(__INCLUDE_LEVEL__)
/* Systemd's use of gcc's __INCLUDE_LEVEL__ extension macro appears to confuse
 * Coverity. Here's a kludge to unconfuse it.
 */
#   define __INCLUDE_LEVEL__ 2
119
#endif /* defined(__COVERITY__) && !defined(__INCLUDE_LEVEL__) */
120
#include <systemd/sd-daemon.h>
121
#endif /* defined(HAVE_SYSTEMD) */
122

123
/* Prefix used to indicate a Unix socket in a FooPort configuration. */
124
static const char unix_socket_prefix[] = "unix:";
125
126
127
/* Prefix used to indicate a Unix socket with spaces in it, in a FooPort
 * configuration. */
static const char unix_q_socket_prefix[] = "unix:\"";
128

129
130
/** A list of abbreviations and aliases to map command-line options, obsolete
 * option names, or alternative option names, to their current values. */
131
static config_abbrev_t option_abbrevs_[] = {
132
133
134
135
  PLURAL(AuthDirBadDirCC),
  PLURAL(AuthDirBadExitCC),
  PLURAL(AuthDirInvalidCC),
  PLURAL(AuthDirRejectCC),
136
  PLURAL(EntryNode),
137
  PLURAL(ExcludeNode),
138
  PLURAL(Tor2webRendezvousPoint),
139
  PLURAL(FirewallPort),
140
  PLURAL(LongLivedPort),
141
142
  PLURAL(HiddenServiceNode),
  PLURAL(HiddenServiceExcludeNode),
143
  PLURAL(NumCPU),
144
  PLURAL(RendNode),
145
  PLURAL(RecommendedPackage),
146
  PLURAL(RendExcludeNode),
147
148
  PLURAL(StrictEntryNode),
  PLURAL(StrictExitNode),
149
  PLURAL(StrictNode),
150
  { "l", "Log", 1, 0},
151
  { "AllowUnverifiedNodes", "AllowInvalidNodes", 0, 0},
152
153
  { "AutomapHostSuffixes", "AutomapHostsSuffixes", 0, 0},
  { "AutomapHostOnResolve", "AutomapHostsOnResolve", 0, 0},
154
155
156
  { "BandwidthRateBytes", "BandwidthRate", 0, 0},
  { "BandwidthBurstBytes", "BandwidthBurst", 0, 0},
  { "DirFetchPostPeriod", "StatusFetchPeriod", 0, 0},
157
  { "DirServer", "DirAuthority", 0, 0}, /* XXXX later, make this warn? */
158
  { "MaxConn", "ConnLimit", 0, 1},
159
  { "MaxMemInCellQueues", "MaxMemInQueues", 0, 0},
160
161
162
  { "ORBindAddress", "ORListenAddress", 0, 0},
  { "DirBindAddress", "DirListenAddress", 0, 0},
  { "SocksBindAddress", "SocksListenAddress", 0, 0},
163
164
165
166
  { "UseHelperNodes", "UseEntryGuards", 0, 0},
  { "NumHelperNodes", "NumEntryGuards", 0, 0},
  { "UseEntryNodes", "UseEntryGuards", 0, 0},
  { "NumEntryNodes", "NumEntryGuards", 0, 0},
167
168
  { "ResolvConf", "ServerDNSResolvConfFile", 0, 1},
  { "SearchDomains", "ServerDNSSearchDomains", 0, 1},
169
  { "ServerDNSAllowBrokenResolvConf", "ServerDNSAllowBrokenConfig", 0, 0},
170
  { "PreferTunnelledDirConns", "PreferTunneledDirConns", 0, 0},
171
  { "BridgeAuthoritativeDirectory", "BridgeAuthoritativeDir", 0, 0},
172
  { "HashedControlPassword", "__HashedControlSessionPassword", 1, 0},
173
  { "VirtualAddrNetwork", "VirtualAddrNetworkIPv4", 0, 0},
174
175
  { NULL, NULL, 0, 0},
};
176

177
178
179
180
/** dummy instance of or_options_t, used for type-checking its
 * members with CONF_CHECK_VAR_TYPE. */
DUMMY_TYPECHECK_INSTANCE(or_options_t);

Nick Mathewson's avatar
Nick Mathewson committed
181
182
183
184
/** An entry for config_vars: "The option <b>name</b> has type
 * CONFIG_TYPE_<b>conftype</b>, and corresponds to
 * or_options_t.<b>member</b>"
 */
185
#define VAR(name,conftype,member,initvalue)                             \
Neel Chauhan's avatar
Neel Chauhan committed
186
  { name, CONFIG_TYPE_ ## conftype, offsetof(or_options_t, member),     \
187
      initvalue CONF_TEST_MEMBERS(or_options_t, conftype, member) }
188
189
190
/** As VAR, but the option name and member name are the same. */
#define V(member,conftype,initvalue)                                    \
  VAR(#member, conftype, member, initvalue)
Nick Mathewson's avatar
Nick Mathewson committed
191
/** An entry for config_vars: "The option <b>name</b> is obsolete." */
192
193
194
#ifdef TOR_UNIT_TESTS
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL, {.INT=NULL} }
#else
195
#define OBSOLETE(name) { name, CONFIG_TYPE_OBSOLETE, 0, NULL }
196
#endif
197

198
199
200
201
202
203
204
205
206
207
208
/**
 * Macro to declare *Port options.  Each one comes in three entries.
 * For example, most users should use "SocksPort" to configure the
 * socks port, but TorBrowser wants to use __SocksPort so that it
 * isn't stored by SAVECONF.  The SocksPortLines virtual option is
 * used to query both options from the controller.
 */
#define VPORT(member)                                           \
  VAR(#member "Lines", LINELIST_V, member ## _lines, NULL),     \
  VAR(#member, LINELIST_S, member ## _lines, NULL),             \
  VAR("__" #member, LINELIST_S, member ## _lines, NULL)
209

Nick Mathewson's avatar
Nick Mathewson committed
210
211
212
213
/** Array of configuration options.  Until we disallow nonstandard
 * abbreviations, order is significant, since the first matching option will
 * be chosen first.
 */
214
static config_var_t option_vars_[] = {
215
  V(AccountingMax,               MEMUNIT,  "0 bytes"),
216
  VAR("AccountingRule",          STRING,   AccountingRule_option,  "max"),
217
218
  V(AccountingStart,             STRING,   NULL),
  V(Address,                     STRING,   NULL),
Nick Mathewson's avatar
Nick Mathewson committed
219
  OBSOLETE("AllowDotExit"),
220
  OBSOLETE("AllowInvalidNodes"),
221
  V(AllowNonRFC953Hostnames,     BOOL,     "0"),
222
  OBSOLETE("AllowSingleHopCircuits"),
223
  OBSOLETE("AllowSingleHopExits"),
224
225
  V(AlternateBridgeAuthority,    LINELIST, NULL),
  V(AlternateDirAuthority,       LINELIST, NULL),
226
  OBSOLETE("AlternateHSAuthority"),
227
  V(AssumeReachable,             BOOL,     "0"),
228
229
  OBSOLETE("AuthDirBadDir"),
  OBSOLETE("AuthDirBadDirCCs"),
230
  V(AuthDirBadExit,              LINELIST, NULL),
231
  V(AuthDirBadExitCCs,           CSV,      ""),
232
  V(AuthDirInvalid,              LINELIST, NULL),
233
  V(AuthDirInvalidCCs,           CSV,      ""),
234
  V(AuthDirFastGuarantee,        MEMUNIT,  "100 KB"),
235
  V(AuthDirGuardBWGuarantee,     MEMUNIT,  "2 MB"),
236
  V(AuthDirPinKeys,              BOOL,     "1"),
237
  V(AuthDirReject,               LINELIST, NULL),
238
  V(AuthDirRejectCCs,            CSV,      ""),
239
  OBSOLETE("AuthDirRejectUnlisted"),
240
  OBSOLETE("AuthDirListBadDirs"),
241
  V(AuthDirListBadExits,         BOOL,     "0"),
242
  V(AuthDirMaxServersPerAddr,    UINT,     "2"),
243
  OBSOLETE("AuthDirMaxServersPerAuthAddr"),
244
  V(AuthDirHasIPv6Connectivity,  BOOL,     "0"),
245
246
247
248
  VAR("AuthoritativeDirectory",  BOOL, AuthoritativeDir,    "0"),
  V(AutomapHostsOnResolve,       BOOL,     "0"),
  V(AutomapHostsSuffixes,        CSV,      ".onion,.exit"),
  V(AvoidDiskWrites,             BOOL,     "0"),
249
250
  V(BandwidthBurst,              MEMUNIT,  "1 GB"),
  V(BandwidthRate,               MEMUNIT,  "1 GB"),
251
252
  V(BridgeAuthoritativeDir,      BOOL,     "0"),
  VAR("Bridge",                  LINELIST, Bridges,    NULL),
253
  V(BridgePassword,              STRING,   NULL),
254
  V(BridgeRecordUsageByCountry,  BOOL,     "1"),
255
  V(BridgeRelay,                 BOOL,     "0"),
256
  V(BridgeDistribution,          STRING,   NULL),
257
258
  VAR("CacheDirectory",          FILENAME, CacheDirectory_option, NULL),
  V(CacheDirectoryGroupReadable, BOOL,     "0"),
259
  V(CellStatistics,              BOOL,     "0"),
260
  V(PaddingStatistics,           BOOL,     "1"),
261
  V(LearnCircuitBuildTimeout,    BOOL,     "1"),
262
  V(CircuitBuildTimeout,         INTERVAL, "0"),
263
264
  OBSOLETE("CircuitIdleTimeout"),
  V(CircuitsAvailableTimeout,    INTERVAL, "0"),
265
  V(CircuitStreamTimeout,        INTERVAL, "0"),
266
  V(CircuitPriorityHalflife,     DOUBLE,  "-100.0"), /*negative:'Use default'*/
267
  V(ClientDNSRejectInternalAddresses, BOOL,"1"),
268
  V(ClientOnly,                  BOOL,     "0"),
269
270
  V(ClientPreferIPv6ORPort,      AUTOBOOL, "auto"),
  V(ClientPreferIPv6DirPort,     AUTOBOOL, "auto"),
271
  V(ClientRejectInternalAddresses, BOOL,   "1"),
272
  V(ClientTransportPlugin,       LINELIST, NULL),
273
  V(ClientUseIPv6,               BOOL,     "0"),
274
  V(ClientUseIPv4,               BOOL,     "1"),
275
  V(ConsensusParams,             STRING,   NULL),
276
  V(ConnLimit,                   UINT,     "1000"),
277
  V(ConnDirectionStatistics,     BOOL,     "0"),
278
279
280
  V(ConstrainedSockets,          BOOL,     "0"),
  V(ConstrainedSockSize,         MEMUNIT,  "8192"),
  V(ContactInfo,                 STRING,   NULL),
281
  OBSOLETE("ControlListenAddress"),
282
  VPORT(ControlPort),
283
  V(ControlPortFileGroupReadable,BOOL,     "0"),
284
  V(ControlPortWriteToFile,      FILENAME, NULL),
285
  V(ControlSocket,               LINELIST, NULL),
286
  V(ControlSocketsGroupWritable, BOOL,     "0"),
287
  V(SocksSocketsGroupWritable,   BOOL,     "0"),
288
289
290
  V(CookieAuthentication,        BOOL,     "0"),
  V(CookieAuthFileGroupReadable, BOOL,     "0"),
  V(CookieAuthFile,              STRING,   NULL),
291
  V(CountPrivateBandwidth,       BOOL,     "0"),
292
  VAR("DataDirectory",           FILENAME, DataDirectory_option, NULL),
293
  V(DataDirectoryGroupReadable,  BOOL,     "0"),
294
  V(DisableOOSCheck,             BOOL,     "1"),
295
  V(DisableNetwork,              BOOL,     "0"),
296
  V(DirAllowPrivateAddresses,    BOOL,     "0"),
297
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "30 minutes"),
298
  OBSOLETE("DirListenAddress"),
299
  V(DirPolicy,                   LINELIST, NULL),
300
  VPORT(DirPort),
301
  V(DirPortFrontPage,            FILENAME, NULL),
302
  VAR("DirReqStatistics",        BOOL,     DirReqStatistics_option, "1"),
303
  VAR("DirAuthority",            LINELIST, DirAuthorities, NULL),
304
  V(DirCache,                    BOOL,     "1"),
305
306
307
308
309
  /* A DirAuthorityFallbackRate of 0.1 means that 0.5% of clients try an
   * authority when all fallbacks are up, and 2% try an authority when 25% of
   * fallbacks are down. (We rebuild the list when 25% of fallbacks are down).
   *
   * We want to reduce load on authorities, but keep these two figures within
Nick Mathewson's avatar
Nick Mathewson committed
310
311
   * an order of magnitude, so there isn't too much load shifting to
   * authorities when fallbacks go down. */
312
  V(DirAuthorityFallbackRate,    DOUBLE,   "0.1"),
313
  V(DisableAllSwap,              BOOL,     "0"),
314
  V(DisableDebuggerAttachment,   BOOL,     "1"),
315
  OBSOLETE("DisableIOCP"),
316
  OBSOLETE("DisableV2DirectoryInfo_"),
317
  OBSOLETE("DynamicDHGroups"),
318
  VPORT(DNSPort),
319
  OBSOLETE("DNSListenAddress"),
320
321
322
  /* DoS circuit creation options. */
  V(DoSCircuitCreationEnabled,   AUTOBOOL, "auto"),
  V(DoSCircuitCreationMinConnections,      UINT, "0"),
323
  V(DoSCircuitCreationRate,      UINT,     "0"),
324
325
326
327
328
329
330
331
332
  V(DoSCircuitCreationBurst,     UINT,     "0"),
  V(DoSCircuitCreationDefenseType,         INT,  "0"),
  V(DoSCircuitCreationDefenseTimePeriod,   INTERVAL, "0"),
  /* DoS connection options. */
  V(DoSConnectionEnabled,        AUTOBOOL, "auto"),
  V(DoSConnectionMaxConcurrentCount,       UINT, "0"),
  V(DoSConnectionDefenseType,    INT,      "0"),
  /* DoS single hop client options. */
  V(DoSRefuseSingleHopClientRendezvous,    AUTOBOOL, "auto"),
333
  V(DownloadExtraInfo,           BOOL,     "0"),
334
  V(TestingEnableConnBwEvent,    BOOL,     "0"),
335
  V(TestingEnableCellStatsEvent, BOOL,     "0"),
336
  V(TestingEnableTbEmptyEvent,   BOOL,     "0"),
337
  V(EnforceDistinctSubnets,      BOOL,     "1"),
338
  V(EntryNodes,                  ROUTERSET,   NULL),
339
  V(EntryStatistics,             BOOL,     "0"),
340
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "10 minutes"),
341
342
  V(ExcludeNodes,                ROUTERSET, NULL),
  V(ExcludeExitNodes,            ROUTERSET, NULL),
343
  OBSOLETE("ExcludeSingleHopRelays"),
344
  V(ExitNodes,                   ROUTERSET, NULL),
345
346
  V(ExitPolicy,                  LINELIST, NULL),
  V(ExitPolicyRejectPrivate,     BOOL,     "1"),
347
  V(ExitPolicyRejectLocalInterfaces, BOOL, "0"),
348
  V(ExitPortStatistics,          BOOL,     "0"),
349
  V(ExtendAllowPrivateAddresses, BOOL,     "0"),
350
  V(ExitRelay,                   AUTOBOOL, "auto"),
351
  VPORT(ExtORPort),
352
  V(ExtORPortCookieAuthFile,     STRING,   NULL),
353
  V(ExtORPortCookieAuthFileGroupReadable, BOOL, "0"),
354
  V(ExtraInfoStatistics,         BOOL,     "1"),
355
  V(ExtendByEd25519ID,           AUTOBOOL, "auto"),
356
  V(FallbackDir,                 LINELIST, NULL),
357

358
  V(UseDefaultFallbackDirs,      BOOL,     "1"),
359

360
  OBSOLETE("FallbackNetworkstatusFile"),
361
362
  V(FascistFirewall,             BOOL,     "0"),
  V(FirewallPorts,               CSV,      ""),
363
  OBSOLETE("FastFirstHopPK"),
364
  V(FetchDirInfoEarly,           BOOL,     "0"),
365
  V(FetchDirInfoExtraEarly,      BOOL,     "0"),
366
367
368
  V(FetchServerDescriptors,      BOOL,     "1"),
  V(FetchHidServDescriptors,     BOOL,     "1"),
  V(FetchUselessDescriptors,     BOOL,     "0"),
369
  OBSOLETE("FetchV2Networkstatus"),
370
  V(GeoIPExcludeUnknown,         AUTOBOOL, "auto"),
371
#ifdef _WIN32
372
  V(GeoIPFile,                   FILENAME, "<default>"),
nils's avatar
nils committed
373
  V(GeoIPv6File,                 FILENAME, "<default>"),
374
#else
375
376
  V(GeoIPFile,                   FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip"),
nils's avatar
nils committed
377
378
  V(GeoIPv6File,                 FILENAME,
    SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip6"),
379
#endif /* defined(_WIN32) */
380
  OBSOLETE("Group"),
381
  V(GuardLifetime,               INTERVAL, "0 minutes"),
382
  V(HardwareAccel,               BOOL,     "0"),
383
  V(HeartbeatPeriod,             INTERVAL, "6 hours"),
Alexander Færøy's avatar
Alexander Færøy committed
384
  V(MainloopStats,               BOOL,     "0"),
385
386
  V(AccelName,                   STRING,   NULL),
  V(AccelDir,                    FILENAME, NULL),
387
  V(HashedControlPassword,       LINELIST, NULL),
388
  OBSOLETE("HidServDirectoryV2"),
Nick Mathewson's avatar
Nick Mathewson committed
389
  VAR("HiddenServiceDir",    LINELIST_S, RendConfigLines,    NULL),
390
  VAR("HiddenServiceDirGroupReadable",  LINELIST_S, RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
391
392
  VAR("HiddenServiceOptions",LINELIST_V, RendConfigLines,    NULL),
  VAR("HiddenServicePort",   LINELIST_S, RendConfigLines,    NULL),
393
  VAR("HiddenServiceVersion",LINELIST_S, RendConfigLines,    NULL),
394
  VAR("HiddenServiceAuthorizeClient",LINELIST_S,RendConfigLines, NULL),
395
  VAR("HiddenServiceAllowUnknownPorts",LINELIST_S, RendConfigLines, NULL),
396
397
  VAR("HiddenServiceMaxStreams",LINELIST_S, RendConfigLines, NULL),
  VAR("HiddenServiceMaxStreamsCloseCircuit",LINELIST_S, RendConfigLines, NULL),
398
  VAR("HiddenServiceNumIntroductionPoints", LINELIST_S, RendConfigLines, NULL),
Nick Mathewson's avatar
Nick Mathewson committed
399
  VAR("HiddenServiceStatistics", BOOL, HiddenServiceStatistics_option, "1"),
400
  V(HidServAuth,                 LINELIST, NULL),
401
  OBSOLETE("CloseHSClientCircuitsImmediatelyOnTimeout"),
402
  OBSOLETE("CloseHSServiceRendCircuitsImmediatelyOnTimeout"),
403
404
  V(HiddenServiceSingleHopMode,  BOOL,     "0"),
  V(HiddenServiceNonAnonymousMode,BOOL,    "0"),
405
406
407
408
  V(HTTPProxy,                   STRING,   NULL),
  V(HTTPProxyAuthenticator,      STRING,   NULL),
  V(HTTPSProxy,                  STRING,   NULL),
  V(HTTPSProxyAuthenticator,     STRING,   NULL),
409
  VPORT(HTTPTunnelPort),
410
  V(IPv6Exit,                    BOOL,     "0"),
411
  VAR("ServerTransportPlugin",   LINELIST, ServerTransportPlugin,  NULL),
412
  V(ServerTransportListenAddr,   LINELIST, NULL),
413
  V(ServerTransportOptions,      LINELIST, NULL),
414
  V(SigningKeyLifetime,          INTERVAL, "30 days"),
415
416
417
418
  V(Socks4Proxy,                 STRING,   NULL),
  V(Socks5Proxy,                 STRING,   NULL),
  V(Socks5ProxyUsername,         STRING,   NULL),
  V(Socks5ProxyPassword,         STRING,   NULL),
419
420
  VAR("KeyDirectory",            FILENAME, KeyDirectory_option, NULL),
  V(KeyDirectoryGroupReadable,   BOOL,     "0"),
421
422
  VAR("_HSLayer2Nodes",          ROUTERSET,  HSLayer2Nodes,  NULL),
  VAR("_HSLayer3Nodes",          ROUTERSET,  HSLayer3Nodes,  NULL),
423
  V(KeepalivePeriod,             INTERVAL, "5 minutes"),
424
  V(KeepBindCapabilities,            AUTOBOOL, "auto"),
425
  VAR("Log",                     LINELIST, Logs,             NULL),
426
  V(LogMessageDomains,           BOOL,     "0"),
427
  V(LogTimeGranularity,          MSEC_INTERVAL, "1 second"),
Arlo Breault's avatar
Arlo Breault committed
428
  V(TruncateLogFile,             BOOL,     "0"),
Peter Palfrader's avatar
Peter Palfrader committed
429
  V(SyslogIdentityTag,           STRING,   NULL),
430
  V(AndroidIdentityTag,          STRING,   NULL),
431
  V(LongLivedPorts,              CSV,
Nick Mathewson's avatar
Nick Mathewson committed
432
        "21,22,706,1863,5050,5190,5222,5223,6523,6667,6697,8300"),
433
434
435
  VAR("MapAddress",              LINELIST, AddressMap,           NULL),
  V(MaxAdvertisedBandwidth,      MEMUNIT,  "1 GB"),
  V(MaxCircuitDirtiness,         INTERVAL, "10 minutes"),
436
  V(MaxClientCircuitsPending,    UINT,     "32"),
437
  V(MaxConsensusAgeForDiffs,     INTERVAL, "0 seconds"),
438
  VAR("MaxMemInQueues",          MEMUNIT,   MaxMemInQueues_raw, "0"),
439
440
  OBSOLETE("MaxOnionsPending"),
  V(MaxOnionQueueDelay,          MSEC_INTERVAL, "1750 msec"),
441
  V(MaxUnparseableDescSizeToLog, MEMUNIT, "10 MB"),
442
  V(MinMeasuredBWsForAuthToIgnoreAdvertised, INT, "500"),
443
  VAR("MyFamily",                LINELIST, MyFamily_lines,       NULL),
444
  V(NewCircuitPeriod,            INTERVAL, "30 seconds"),
445
  OBSOLETE("NamingAuthoritativeDirectory"),
446
  OBSOLETE("NATDListenAddress"),
447
  VPORT(NATDPort),
448
  V(Nickname,                    STRING,   NULL),
449
  OBSOLETE("PredictedPortsRelevanceTime"),
450
  OBSOLETE("WarnUnsafeSocks"),
451
  VAR("NodeFamily",              LINELIST, NodeFamilies,         NULL),
452
  V(NoExec,                      BOOL,     "0"),
453
  V(NumCPUs,                     UINT,     "0"),
454
  V(NumDirectoryGuards,          UINT,     "0"),
455
  V(NumEntryGuards,              UINT,     "0"),
Nick Mathewson's avatar
Nick Mathewson committed
456
  V(OfflineMasterKey,            BOOL,     "0"),
457
  OBSOLETE("ORListenAddress"),
458
  VPORT(ORPort),
459
  V(OutboundBindAddress,         LINELIST,   NULL),
460
461
  V(OutboundBindAddressOR,       LINELIST,   NULL),
  V(OutboundBindAddressExit,     LINELIST,   NULL),
462

463
  OBSOLETE("PathBiasDisableRate"),
464
465
  V(PathBiasCircThreshold,       INT,      "-1"),
  V(PathBiasNoticeRate,          DOUBLE,   "-1"),
466
  V(PathBiasWarnRate,            DOUBLE,   "-1"),
467
  V(PathBiasExtremeRate,         DOUBLE,   "-1"),
468
  V(PathBiasScaleThreshold,      INT,      "-1"),
469
470
  OBSOLETE("PathBiasScaleFactor"),
  OBSOLETE("PathBiasMultFactor"),
471
  V(PathBiasDropGuards,          AUTOBOOL, "0"),
472
473
474
475
476
477
  OBSOLETE("PathBiasUseCloseCounts"),

  V(PathBiasUseThreshold,       INT,      "-1"),
  V(PathBiasNoticeUseRate,          DOUBLE,   "-1"),
  V(PathBiasExtremeUseRate,         DOUBLE,   "-1"),
  V(PathBiasScaleUseThreshold,      INT,      "-1"),
478

479
  V(PathsNeededToBuildCircuits,  DOUBLE,   "-1"),
480
481
  V(PerConnBWBurst,              MEMUNIT,  "0"),
  V(PerConnBWRate,               MEMUNIT,  "0"),
482
  V(PidFile,                     STRING,   NULL),
483
  V(TestingTorNetwork,           BOOL,     "0"),
484
  V(TestingMinExitFlagThreshold, MEMUNIT,  "0"),
485
  V(TestingMinFastFlagThreshold, MEMUNIT,  "0"),
486

487
  V(TestingLinkCertLifetime,          INTERVAL, "2 days"),
488
489
490
491
492
  V(TestingAuthKeyLifetime,          INTERVAL, "2 days"),
  V(TestingLinkKeySlop,              INTERVAL, "3 hours"),
  V(TestingAuthKeySlop,              INTERVAL, "3 hours"),
  V(TestingSigningKeySlop,           INTERVAL, "1 day"),

493
  V(OptimisticData,              AUTOBOOL, "auto"),
494
495
  V(PortForwarding,              BOOL,     "0"),
  V(PortForwardingHelper,        FILENAME, "tor-fw-helper"),
496
  OBSOLETE("PreferTunneledDirConns"),
497
  V(ProtocolWarnings,            BOOL,     "0"),
498
  V(PublishServerDescriptor,     CSV,      "1"),
499
500
501
502
503
504
505
  V(PublishHidServDescriptors,   BOOL,     "1"),
  V(ReachableAddresses,          LINELIST, NULL),
  V(ReachableDirAddresses,       LINELIST, NULL),
  V(ReachableORAddresses,        LINELIST, NULL),
  V(RecommendedVersions,         LINELIST, NULL),
  V(RecommendedClientVersions,   LINELIST, NULL),
  V(RecommendedServerVersions,   LINELIST, NULL),
506
  V(RecommendedPackages,         LINELIST, NULL),
507
508
  V(ReducedConnectionPadding,    BOOL,     "0"),
  V(ConnectionPadding,           AUTOBOOL, "auto"),
509
  V(RefuseUnknownExits,          AUTOBOOL, "auto"),
510
  V(RejectPlaintextPorts,        CSV,      ""),
511
512
513
514
515
  V(RelayBandwidthBurst,         MEMUNIT,  "0"),
  V(RelayBandwidthRate,          MEMUNIT,  "0"),
  V(RendPostPeriod,              INTERVAL, "1 hour"),
  V(RephistTrackTime,            INTERVAL, "24 hours"),
  V(RunAsDaemon,                 BOOL,     "0"),
516
  V(ReducedExitPolicy,           BOOL,     "0"),
517
  OBSOLETE("RunTesting"), // currently unused
518
  V(Sandbox,                     BOOL,     "0"),
519
  V(SafeLogging,                 STRING,   "1"),
520
  V(SafeSocks,                   BOOL,     "0"),
521
  V(ServerDNSAllowBrokenConfig,  BOOL,     "1"),
522
523
  V(ServerDNSAllowNonRFC953Hostnames, BOOL,"0"),
  V(ServerDNSDetectHijacking,    BOOL,     "1"),
524
  V(ServerDNSRandomizeCase,      BOOL,     "1"),
525
526
527
  V(ServerDNSResolvConfFile,     STRING,   NULL),
  V(ServerDNSSearchDomains,      BOOL,     "0"),
  V(ServerDNSTestAddresses,      CSV,
528
      "www.google.com,www.mit.edu,www.yahoo.com,www.slashdot.org"),
529
530
531
532
533
  OBSOLETE("SchedulerLowWaterMark__"),
  OBSOLETE("SchedulerHighWaterMark__"),
  OBSOLETE("SchedulerMaxFlushCells__"),
  V(KISTSchedRunInterval,        MSEC_INTERVAL, "0 msec"),
  V(KISTSockBufSizeFactor,       DOUBLE,   "1.0"),
534
  V(Schedulers,                  CSV,      "KIST,KISTLite,Vanilla"),
535
  V(ShutdownWaitLength,          INTERVAL, "30 seconds"),
536
  OBSOLETE("SocksListenAddress"),
537
  V(SocksPolicy,                 LINELIST, NULL),
538
  VPORT(SocksPort),
539
  V(SocksTimeout,                INTERVAL, "2 minutes"),
540
  V(SSLKeyLifetime,              INTERVAL, "0"),
541
542
  OBSOLETE("StrictEntryNodes"),
  OBSOLETE("StrictExitNodes"),
543
  V(StrictNodes,                 BOOL,     "0"),
544
  OBSOLETE("Support022HiddenServices"),
545
  V(TestSocks,                   BOOL,     "0"),
546
  V(TokenBucketRefillInterval,   MSEC_INTERVAL, "100 msec"),
547
  V(Tor2webMode,                 BOOL,     "0"),
548
  V(Tor2webRendezvousPoints,      ROUTERSET, NULL),
549
  OBSOLETE("TLSECGroup"),
550
551
  V(TrackHostExits,              CSV,      NULL),
  V(TrackHostExitsExpire,        INTERVAL, "30 minutes"),
552
  OBSOLETE("TransListenAddress"),
553
  VPORT(TransPort),
554
  V(TransProxyType,              STRING,   "default"),
555
  OBSOLETE("TunnelDirConns"),
556
  V(UpdateBridgesFromAuthority,  BOOL,     "0"),
557
  V(UseBridges,                  BOOL,     "0"),
558
  VAR("UseEntryGuards",          BOOL,     UseEntryGuards_option, "1"),
Nick Mathewson's avatar
Nick Mathewson committed
559
  OBSOLETE("UseEntryGuardsAsDirGuards"),
560
  V(UseGuardFraction,            AUTOBOOL, "auto"),
561
  V(UseMicrodescriptors,         AUTOBOOL, "auto"),
562
  OBSOLETE("UseNTorHandshake"),
563
  V(User,                        STRING,   NULL),
564
  OBSOLETE("UserspaceIOCPBuffers"),
565
  V(AuthDirSharedRandomness,     BOOL,     "1"),
566
  V(AuthDirTestEd25519LinkKeys,  BOOL,     "1"),
567
  OBSOLETE("V1AuthoritativeDirectory"),
568
  OBSOLETE("V2AuthoritativeDirectory"),
569
  VAR("V3AuthoritativeDirectory",BOOL, V3AuthoritativeDir,   "0"),
570
571
572
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "30 minutes"),
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "5 minutes"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "5 minutes"),
573
  V(TestingV3AuthVotingStartOffset, INTERVAL, "0"),
574
575
576
577
  V(V3AuthVotingInterval,        INTERVAL, "1 hour"),
  V(V3AuthVoteDelay,             INTERVAL, "5 minutes"),
  V(V3AuthDistDelay,             INTERVAL, "5 minutes"),
  V(V3AuthNIntervalsValid,       UINT,     "3"),
578
  V(V3AuthUseLegacyKey,          BOOL,     "0"),
579
  V(V3BandwidthsFile,            FILENAME, NULL),
580
  V(GuardfractionFile,           FILENAME, NULL),
581
  VAR("VersioningAuthoritativeDirectory",BOOL,VersioningAuthoritativeDir, "0"),
582
  OBSOLETE("VoteOnHidServDirectoriesV2"),
583
584
  V(VirtualAddrNetworkIPv4,      STRING,   "127.192.0.0/10"),
  V(VirtualAddrNetworkIPv6,      STRING,   "[FE80::]/10"),
585
  V(WarnPlaintextPorts,          CSV,      "23,109,110,143"),
586
587
  OBSOLETE("UseFilteringSSLBufferevents"),
  OBSOLETE("__UseFilteringSSLBufferevents"),
588
  VAR("__ReloadTorrcOnSIGHUP",   BOOL,  ReloadTorrcOnSIGHUP,      "1"),
589
590
  VAR("__AllDirActionsPrivate",  BOOL,  AllDirActionsPrivate,     "0"),
  VAR("__DisablePredictedCircuits",BOOL,DisablePredictedCircuits, "0"),
591
  VAR("__DisableSignalHandlers", BOOL,  DisableSignalHandlers,    "0"),
592
  VAR("__LeaveStreamsUnattached",BOOL,  LeaveStreamsUnattached,   "0"),
593
594
  VAR("__HashedControlSessionPassword", LINELIST, HashedControlSessionPassword,
      NULL),
595
  VAR("__OwningControllerProcess",STRING,OwningControllerProcess, NULL),
596
  VAR("__OwningControllerFD",INT,OwningControllerFD, "-1"),
597
  V(MinUptimeHidServDirectoryV2, INTERVAL, "96 hours"),
598
599
600
601
602
603
604
605
606
607
  V(TestingServerDownloadSchedule, CSV_INTERVAL, "0, 0, 0, 60, 60, 120, "
                                 "300, 900, 2147483647"),
  V(TestingClientDownloadSchedule, CSV_INTERVAL, "0, 0, 60, 300, 600, "
                                 "2147483647"),
  V(TestingServerConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 60, "
                                 "300, 600, 1800, 1800, 1800, 1800, "
                                 "1800, 3600, 7200"),
  V(TestingClientConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 60, "
                                 "300, 600, 1800, 3600, 3600, 3600, "
                                 "10800, 21600, 43200"),
608
  /* With the ClientBootstrapConsensus*Download* below:
609
   * Clients with only authorities will try:
610
611
   *  - at least 3 authorities over 10 seconds, then exponentially backoff,
   *    with the next attempt 3-21 seconds later,
612
   * Clients with authorities and fallbacks will try:
613
614
   *  - at least 2 authorities and 4 fallbacks over 21 seconds, then
   *    exponentially backoff, with the next attempts 4-33 seconds later,
615
   * Clients will also retry when an application request arrives.
616
   * After a number of failed requests, clients retry every 3 days + 1 hour.
617
618
619
620
621
622
   *
   * Clients used to try 2 authorities over 10 seconds, then wait for
   * 60 minutes or an application request.
   *
   * When clients have authorities and fallbacks available, they use these
   * schedules: (we stagger the times to avoid thundering herds) */
623
  V(ClientBootstrapConsensusAuthorityDownloadSchedule, CSV_INTERVAL,
624
    "6, 11, 3600, 10800, 25200, 54000, 111600, 262800" /* 3 days + 1 hour */),
625
  V(ClientBootstrapConsensusFallbackDownloadSchedule, CSV_INTERVAL,
626
627
    "0, 1, 4, 11, 3600, 10800, 25200, 54000, 111600, 262800"),
  /* When clients only have authorities available, they use this schedule: */
628
  V(ClientBootstrapConsensusAuthorityOnlyDownloadSchedule, CSV_INTERVAL,
629
630
631
632
633
    "0, 3, 7, 3600, 10800, 25200, 54000, 111600, 262800"),
  /* We don't want to overwhelm slow networks (or mirrors whose replies are
   * blocked), but we also don't want to fail if only some mirrors are
   * blackholed. Clients will try 3 directories simultaneously.
   * (Relays never use simultaneous connections.) */
634
  V(ClientBootstrapConsensusMaxInProgressTries, UINT, "3"),
635
636
  /* When a client has any running bridges, check each bridge occasionally,
    * whether or not that bridge is actually up. */
637
  V(TestingBridgeDownloadSchedule, CSV_INTERVAL,
638
639
640
641
642
643
644
    "10800, 25200, 54000, 111600, 262800"),
  /* When a client is just starting, or has no running bridges, check each
   * bridge a few times quickly, and then try again later. These schedules
   * are much longer than the other schedules, because we try each and every
   * configured bridge with this schedule. */
  V(TestingBridgeBootstrapDownloadSchedule, CSV_INTERVAL,
    "0, 30, 90, 600, 3600, 10800, 25200, 54000, 111600, 262800"),
645
646
647
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "10 minutes"),
  V(TestingDirConnectionMaxStall, INTERVAL, "5 minutes"),
  V(TestingConsensusMaxDownloadTries, UINT, "8"),
648
649
  /* Since we try connections rapidly and simultaneously, we can afford
   * to give up earlier. (This protects against overloading directories.) */
650
  V(ClientBootstrapConsensusMaxDownloadTries, UINT, "7"),
651
  /* We want to give up much earlier if we're only using authorities. */
652
  V(ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries, UINT, "4"),
653
654
655
  V(TestingDescriptorMaxDownloadTries, UINT, "8"),
  V(TestingMicrodescMaxDownloadTries, UINT, "8"),
  V(TestingCertMaxDownloadTries, UINT, "8"),
656
  V(TestingDirAuthVoteExit, ROUTERSET, NULL),
657
  V(TestingDirAuthVoteExitIsStrict,  BOOL,     "0"),
658
  V(TestingDirAuthVoteGuard, ROUTERSET, NULL),
659
  V(TestingDirAuthVoteGuardIsStrict,  BOOL,     "0"),
660
  V(TestingDirAuthVoteHSDir, ROUTERSET, NULL),
661
  V(TestingDirAuthVoteHSDirIsStrict,  BOOL,     "0"),
662
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "0"),
663

664
  END_OF_CONFIG_VARS
665
};
666

667
668
/** Override default values with these if the user sets the TestingTorNetwork
 * option. */
669
static const config_var_t testing_tor_network_defaults[] = {
670
671
672
673
  V(DirAllowPrivateAddresses,    BOOL,     "1"),
  V(EnforceDistinctSubnets,      BOOL,     "0"),
  V(AssumeReachable,             BOOL,     "1"),
  V(AuthDirMaxServersPerAddr,    UINT,     "0"),
674
675
676
677
678
679
680
681
  V(ClientBootstrapConsensusAuthorityDownloadSchedule, CSV_INTERVAL,
    "0, 2, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusFallbackDownloadSchedule, CSV_INTERVAL,
    "0, 1, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusAuthorityOnlyDownloadSchedule, CSV_INTERVAL,
    "0, 1, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"),
  V(ClientBootstrapConsensusMaxDownloadTries, UINT, "80"),
  V(ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries, UINT, "80"),
682
  V(ClientDNSRejectInternalAddresses, BOOL,"0"),
683
  V(ClientRejectInternalAddresses, BOOL,   "0"),
684
  V(CountPrivateBandwidth,       BOOL,     "1"),
685
  V(ExitPolicyRejectPrivate,     BOOL,     "0"),
686
  V(ExtendAllowPrivateAddresses, BOOL,     "1"),
687
688
689
  V(V3AuthVotingInterval,        INTERVAL, "5 minutes"),
  V(V3AuthVoteDelay,             INTERVAL, "20 seconds"),
  V(V3AuthDistDelay,             INTERVAL, "20 seconds"),
690
  V(TestingV3AuthInitialVotingInterval, INTERVAL, "150 seconds"),
691
692
693
694
  V(TestingV3AuthInitialVoteDelay, INTERVAL, "20 seconds"),
  V(TestingV3AuthInitialDistDelay, INTERVAL, "20 seconds"),
  V(TestingAuthDirTimeToLearnReachability, INTERVAL, "0 minutes"),
  V(TestingEstimatedDescriptorPropagationTime, INTERVAL, "0 minutes"),
695
  V(MinUptimeHidServDirectoryV2, INTERVAL, "0 minutes"),
696
697
698
699
700
701
702
703
  V(TestingServerDownloadSchedule, CSV_INTERVAL, "0, 0, 0, 5, 10, 15, "
                                 "20, 30, 60"),
  V(TestingClientDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, 15, 20, "
                                 "30, 60"),
  V(TestingServerConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, "
                                 "15, 20, 30, 60"),
  V(TestingClientConsensusDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, "
                                 "15, 20, 30, 60"),
704
705
706
  V(TestingBridgeDownloadSchedule, CSV_INTERVAL, "10, 30, 60"),
  V(TestingBridgeBootstrapDownloadSchedule, CSV_INTERVAL, "0, 0, 5, 10, "
                                 "15, 20, 30, 60"),
707
708
709
710
711
712
  V(TestingClientMaxIntervalWithoutRequest, INTERVAL, "5 seconds"),
  V(TestingDirConnectionMaxStall, INTERVAL, "30 seconds"),
  V(TestingConsensusMaxDownloadTries, UINT, "80"),
  V(TestingDescriptorMaxDownloadTries, UINT, "80"),
  V(TestingMicrodescMaxDownloadTries, UINT, "80"),
  V(TestingCertMaxDownloadTries, UINT, "80"),
713
  V(TestingEnableConnBwEvent,    BOOL,     "1"),
714
  V(TestingEnableCellStatsEvent, BOOL,     "1"),
715
  V(TestingEnableTbEmptyEvent,   BOOL,     "1"),
716
  VAR("___UsingTestNetworkDefaults", BOOL, UsingTestNetworkDefaults_, "1"),
717
  V(RendPostPeriod,              INTERVAL, "2 minutes"),
718

719
  END_OF_CONFIG_VARS
720
};
721

722
#undef VAR
723
#undef V
724
725
#undef OBSOLETE

726
static const config_deprecation_t option_deprecation_notes_[] = {
727
  /* Deprecated since 0.3.2.0-alpha. */
728
729
730
731
  { "HTTPProxy", "It only applies to direct unencrypted HTTP connections "
    "to your directory server, which your Tor probably wasn't using." },
  { "HTTPProxyAuthenticator", "HTTPProxy is deprecated in favor of HTTPSProxy "
    "which should be used with HTTPSProxyAuthenticator." },
732
733
734
  /* End of options deprecated since 0.3.2.1-alpha */

  /* Options deprecated since 0.3.2.2-alpha */
735
736
737
738
  { "ReachableDirAddresses", "It has no effect on relays, and has had no "
    "effect on clients since 0.2.8." },
  { "ClientPreferIPv6DirPort", "It has no effect on relays, and has had no "
    "effect on clients since 0.2.8." },
739
  /* End of options deprecated since 0.3.2.2-alpha. */
740

741
742
743
  { NULL, NULL }
};