Enable DISABLE_DISABLING_ED25519.

We are going to stop recommending 0.2.5 so there is no reason to keep the
undef statement anymore.

Fixes #20522.

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
This commit is contained in:
Fernando Fernandez Mancera 2018-04-05 16:19:40 +02:00
parent 21c81348a3
commit 9504fabb02

View File

@ -259,11 +259,12 @@ dirserv_load_fingerprint_file(void)
* identity to stop doing so. This is going to be essential for good identity * identity to stop doing so. This is going to be essential for good identity
* security: otherwise anybody who can attack RSA-1024 but not Ed25519 could * security: otherwise anybody who can attack RSA-1024 but not Ed25519 could
* just sign fake descriptors missing the Ed25519 key. But we won't actually * just sign fake descriptors missing the Ed25519 key. But we won't actually
* be able to prevent that kind of thing until we're confident that there * be able to prevent that kind of thing until we're confident that there isn't
* isn't actually a legit reason to downgrade to 0.2.5. So for now, we have * actually a legit reason to downgrade to 0.2.5. Now we are not recommending
* to leave this #undef. * 0.2.5 anymore so there is no reason to keep the #undef.
*/ */
#undef DISABLE_DISABLING_ED25519
#define DISABLE_DISABLING_ED25519
/** Check whether <b>router</b> has a nickname/identity key combination that /** Check whether <b>router</b> has a nickname/identity key combination that
* we recognize from the fingerprint list, or an IP we automatically act on * we recognize from the fingerprint list, or an IP we automatically act on