mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-11 13:43:47 +01:00
d2b4b49ff0
See task 1114. The most plausible explanation for someone sending us weak DH keys is that they experiment with their Tor code or implement a new Tor client. Usually, we don't care about such events, especially not on warn level. If we really care about someone not following the Tor protocol, we can set ProtocolWarnings to 1. |
||
---|---|---|
.. | ||
common | ||
config | ||
or | ||
test | ||
tools | ||
win32 | ||
Makefile.am |