mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 13:53:31 +01:00
Enable DISABLE_DISABLING_ED25519.
We are going to stop recommending 0.2.5 so there is no reason to keep the undef statement anymore. Fixes #20522. Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
This commit is contained in:
parent
21c81348a3
commit
9504fabb02
@ -259,11 +259,12 @@ dirserv_load_fingerprint_file(void)
|
|||||||
* identity to stop doing so. This is going to be essential for good identity
|
* identity to stop doing so. This is going to be essential for good identity
|
||||||
* security: otherwise anybody who can attack RSA-1024 but not Ed25519 could
|
* security: otherwise anybody who can attack RSA-1024 but not Ed25519 could
|
||||||
* just sign fake descriptors missing the Ed25519 key. But we won't actually
|
* just sign fake descriptors missing the Ed25519 key. But we won't actually
|
||||||
* be able to prevent that kind of thing until we're confident that there
|
* be able to prevent that kind of thing until we're confident that there isn't
|
||||||
* isn't actually a legit reason to downgrade to 0.2.5. So for now, we have
|
* actually a legit reason to downgrade to 0.2.5. Now we are not recommending
|
||||||
* to leave this #undef.
|
* 0.2.5 anymore so there is no reason to keep the #undef.
|
||||||
*/
|
*/
|
||||||
#undef DISABLE_DISABLING_ED25519
|
|
||||||
|
#define DISABLE_DISABLING_ED25519
|
||||||
|
|
||||||
/** Check whether <b>router</b> has a nickname/identity key combination that
|
/** Check whether <b>router</b> has a nickname/identity key combination that
|
||||||
* we recognize from the fingerprint list, or an IP we automatically act on
|
* we recognize from the fingerprint list, or an IP we automatically act on
|
||||||
|
Loading…
Reference in New Issue
Block a user