2019-12-15 17:46:55 +01:00
|
|
|
/* Copyright (c) 2001 Matej Pfajfar.
|
|
|
|
* Copyright (c) 2001-2004, Roger Dingledine.
|
|
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
|
|
|
* Copyright (c) 2007-2019, The Tor Project, Inc. */
|
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @file dirauth_options.inc
|
|
|
|
* @brief Declare configuration options for the crypto_ops module.
|
|
|
|
**/
|
|
|
|
|
|
|
|
/** Holds configuration about our directory authority options. */
|
|
|
|
BEGIN_CONF_STRUCT(dirauth_options_t)
|
|
|
|
|
2019-12-19 14:50:19 +01:00
|
|
|
/** If non-zero, always vote the Fast flag for any relay advertising
|
|
|
|
* this amount of capacity or more. */
|
|
|
|
CONF_VAR(AuthDirFastGuarantee, MEMUNIT, 0, "100 KB")
|
|
|
|
|
|
|
|
/** If non-zero, this advertised capacity or more is always sufficient
|
|
|
|
* to satisfy the bandwidth requirement for the Guard flag. */
|
|
|
|
CONF_VAR(AuthDirGuardBWGuarantee, MEMUNIT, 0, "2 MB")
|
|
|
|
|
2019-12-19 15:07:01 +01:00
|
|
|
/** Boolean: are we on IPv6? */
|
|
|
|
CONF_VAR(AuthDirHasIPv6Connectivity, BOOL, 0, "0")
|
|
|
|
|
2019-12-19 15:24:57 +01:00
|
|
|
/** True iff we should list bad exits, * and vote for all other exits as
|
|
|
|
* good. */
|
|
|
|
CONF_VAR(AuthDirListBadExits, BOOL, 0, "0")
|
|
|
|
|
2019-12-15 17:46:55 +01:00
|
|
|
/** Do not permit more than this number of servers per IP address. */
|
|
|
|
CONF_VAR(AuthDirMaxServersPerAddr, POSINT, 0, "2")
|
|
|
|
|
2019-12-19 15:27:35 +01:00
|
|
|
/** Boolean: Do we enforce key-pinning? */
|
|
|
|
CONF_VAR(AuthDirPinKeys, BOOL, 0, "1")
|
|
|
|
|
2019-12-19 15:34:27 +01:00
|
|
|
/** Bool (default: 1): Switch for the shared random protocol. Only
|
|
|
|
* relevant to a directory authority. If off, the authority won't
|
|
|
|
* participate in the protocol. If on (default), a flag is added to the
|
|
|
|
* vote indicating participation. */
|
|
|
|
CONF_VAR(AuthDirSharedRandomness, BOOL, 0, "1")
|
|
|
|
|
2019-12-19 15:38:25 +01:00
|
|
|
/** Bool (default: 1): When testing routerinfos as a directory authority,
|
|
|
|
* do we enforce Ed25519 identity match? */
|
|
|
|
/* NOTE: remove this option someday. */
|
|
|
|
CONF_VAR(AuthDirTestEd25519LinkKeys, BOOL, 0, "1")
|
|
|
|
|
2019-12-19 15:46:14 +01:00
|
|
|
/** Authority only: key=value pairs that we add to our networkstatus
|
|
|
|
* consensus vote on the 'params' line. */
|
|
|
|
CONF_VAR(ConsensusParams, STRING, 0, NULL)
|
|
|
|
|
2019-12-19 15:43:25 +01:00
|
|
|
/** As directory authority, accept hidden service directories after what
|
|
|
|
* time? */
|
|
|
|
CONF_VAR(MinUptimeHidServDirectoryV2, INTERVAL, 0, "96 hours")
|
|
|
|
|
2019-12-19 14:24:46 +01:00
|
|
|
/** Which versions of tor should we tell users to run? */
|
|
|
|
CONF_VAR(RecommendedVersions, LINELIST, 0, NULL)
|
|
|
|
|
|
|
|
/** Which versions of tor should we tell users to run on clients? */
|
|
|
|
CONF_VAR(RecommendedClientVersions, LINELIST, 0, NULL)
|
|
|
|
|
|
|
|
/** Which versions of tor should we tell users to run on relays? */
|
|
|
|
CONF_VAR(RecommendedServerVersions, LINELIST, 0, NULL)
|
|
|
|
|
|
|
|
/** Boolean: is this an authoritative directory that's willing to recommend
|
|
|
|
* versions? */
|
|
|
|
CONF_VAR(VersioningAuthoritativeDirectory, BOOL, 0, "0")
|
|
|
|
|
2019-12-15 17:46:55 +01:00
|
|
|
END_CONF_STRUCT(dirauth_options_t)
|