|
Tor 0.4.9.3-alpha-dev
|
#include <or_options_st.h>
Configuration options for a Tor process.
Definition at line 64 of file or_options_st.h.
| anonymous enum |
Parsed value of TransProxyType.
Definition at line 182 of file or_options_st.h.
| anonymous enum |
Definition at line 548 of file or_options_st.h.
| anonymous enum |
Definition at line 582 of file or_options_st.h.
| anonymous enum |
Definition at line 1022 of file or_options_st.h.
| uint64_t AccountingMax |
How many bytes do we allow per accounting interval before hibernation? 0 for "never hibernate."
Definition at line 539 of file or_options_st.h.
Referenced by accounting_is_enabled(), accounting_set_wakeup_time(), check_and_prune_server_ports(), consider_hibernation(), getinfo_helper_accounting(), hibernate_hard_limit_reached(), hibernate_soft_limit_reached(), options_validate_relay_accounting(), and router_should_be_dirserver().
| char* AccountingRule_option |
How do we determine when our AccountingMax has been reached? "max" for when in or out reaches AccountingMax "sum" for when in plus out reaches AccountingMax "in" for when in reaches AccountingMax "out" for when out reaches AccountingMax
Definition at line 547 of file or_options_st.h.
Referenced by options_validate_relay_accounting().
| char* AccountingStart |
How long is the accounting interval, and when does it start?
Definition at line 537 of file or_options_st.h.
Referenced by accounting_parse_options().
| struct config_line_t* Address |
OR only: configured address for this onion router. Up to two times this options is accepted as in IPv4 and IPv6.
Definition at line 104 of file or_options_st.h.
Referenced by get_address_from_config().
| int AddressDisableIPv6 |
Boolean: If set, disable IPv6 address resolution, IPv6 ORPorts, IPv6 reachability checks, and publishing an IPv6 ORPort in its descriptor.
Definition at line 108 of file or_options_st.h.
Referenced by find_my_address(), and relay_find_addr_to_publish().
| struct config_line_t* AddressMap |
List of address map directives.
Definition at line 401 of file or_options_st.h.
Referenced by config_register_addressmaps().
| int AllDirActionsPrivate |
Should every directory action be sent through a Tor circuit?
Definition at line 330 of file or_options_st.h.
| bool AllFamilyIdsExpected |
If true, we should accept all the FamilyIds in the FamilyKeyDirectory.
Definition at line 508 of file or_options_st.h.
Referenced by family_key_id_is_expected(), and options_validate_relay_mode().
| int AllowNonRFC953Hostnames |
If true, we allow connections to hostnames with weird characters.
Definition at line 670 of file or_options_st.h.
| struct config_line_t* AlternateBridgeAuthority |
If set, use these bridge authorities and not the default one.
Definition at line 499 of file or_options_st.h.
Referenced by consider_adding_dir_servers(), options_validate_cb(), and validate_dir_servers().
| struct config_line_t* AlternateDirAuthority |
If set, use these main (currently v3) directory authorities and not the default ones.
Definition at line 496 of file or_options_st.h.
Referenced by consider_adding_dir_servers(), options_validate_cb(), and validate_dir_servers().
| int AlwaysCongestionControl |
Boolean: Switch to override consensus to enable congestion control
Definition at line 620 of file or_options_st.h.
Referenced by congestion_control_enabled(), and congestion_control_init_params().
| int AssumeReachable |
Whether to publish our descriptor regardless of all our self-tests
Definition at line 243 of file or_options_st.h.
Referenced by address_can_be_used(), options_validate_cb(), and router_reachability_checks_disabled().
| int AssumeReachableIPv6 |
Whether to publish our descriptor regardless of IPv6 self-tests.
This is an autobool; when set to AUTO, it uses AssumeReachable.
Definition at line 248 of file or_options_st.h.
Referenced by address_can_be_used(), options_validate_cb(), and router_orport_seems_reachable().
| struct config_line_t* AuthDirBadExit |
Address policy for descriptors to mark as bad exits.
Definition at line 515 of file or_options_st.h.
Referenced by policies_parse_from_options(), and validate_addr_policies().
| struct smartlist_t* AuthDirBadExitCCs |
Definition at line 531 of file or_options_st.h.
| struct config_line_t* AuthDirInvalid |
Address policy for descriptors to never mark as valid.
Definition at line 522 of file or_options_st.h.
Referenced by policies_parse_from_options(), and validate_addr_policies().
| struct smartlist_t* AuthDirInvalidCCs |
Definition at line 532 of file or_options_st.h.
| struct config_line_t* AuthDirMiddleOnly |
Address policy for descriptors to mark as only suitable for the middle position in circuits.
Definition at line 519 of file or_options_st.h.
Referenced by policies_parse_from_options(), and validate_addr_policies().
| struct smartlist_t* AuthDirMiddleOnlyCCs |
Definition at line 533 of file or_options_st.h.
| struct config_line_t* AuthDirReject |
Address policy for descriptors to reject.
Definition at line 520 of file or_options_st.h.
Referenced by policies_parse_from_options(), and validate_addr_policies().
| struct smartlist_t* AuthDirRejectCCs |
Definition at line 534 of file or_options_st.h.
| int AuthoritativeDir |
Boolean: is this an authoritative directory?
Definition at line 249 of file or_options_st.h.
Referenced by authdir_mode(), and options_validate_dirauth_mode().
| int AutomapHostsOnResolve |
If true, when we get a resolve request for a hostname ending with one of the suffixes in AutomapHostsSuffixes, map it to a virtual address.
Definition at line 402 of file or_options_st.h.
Referenced by addressmap_clear_invalid_automaps(), and options_act().
| struct smartlist_t* AutomapHostsSuffixes |
List of suffixes for AutomapHostsOnResolve. The special value "." means "match everything."
Definition at line 408 of file or_options_st.h.
Referenced by addressmap_address_should_automap(), addressmap_clear_invalid_automaps(), and options_act().
| int AvoidDiskWrites |
Boolean: should we never cache things to disk? Not used yet.
Definition at line 289 of file or_options_st.h.
Referenced by bwhist_update_bwhist_state_section(), circuit_build_times_add_time(), circuit_build_times_update_state(), and init_keys().
| uint64_t BandwidthBurst |
How much bandwidth, at maximum, are we willing to use in a second?
Definition at line 433 of file or_options_st.h.
Referenced by connection_bucket_adjust(), connection_bucket_init(), connection_or_update_token_buckets_helper(), options_act(), options_validate_cb(), options_validate_relay_bandwidth(), relay_get_effective_bwburst(), and rep_hist_get_overload_stats_lines().
| uint64_t BandwidthRate |
How much bandwidth, on average, are we willing to use in a second?
Definition at line 431 of file or_options_st.h.
Referenced by connection_bucket_adjust(), connection_bucket_init(), connection_or_update_token_buckets_helper(), options_act(), options_validate_cb(), options_validate_relay_bandwidth(), relay_get_effective_bwrate(), rep_hist_get_overload_stats_lines(), router_has_bandwidth_to_be_dirserver(), router_perform_bandwidth_test(), and update_expected_bandwidth().
| int BridgeAuthoritativeDir |
Boolean: is this an authoritative directory that aggregates bridge descriptors?
Definition at line 252 of file or_options_st.h.
Referenced by authdir_mode_bridge(), dirserv_compute_performance_thresholds(), geoip_note_client_seen(), handle_get_descriptor(), handle_get_networkstatus_bridges(), init_keys(), options_validate_dirauth_mode(), write_bridge_ns_callback(), and write_stats_file_callback().
| char* BridgeDistribution |
If set on a bridge relay, it will include this value on a new "bridge-distribution-request" line in its bridge descriptor.
Definition at line 257 of file or_options_st.h.
Referenced by options_validate_publish_server(), and router_dump_router_to_string().
| char* BridgePassword |
If set on a bridge authority, it will answer requests on its dirport for bridge statuses – but only if the requests use this password.
Definition at line 261 of file or_options_st.h.
Referenced by options_act().
| char* BridgePassword_AuthDigest_ |
If BridgePassword is set, this is a SHA256 digest of the basic http authenticator for it. Used so we can do a time-independent comparison.
Definition at line 264 of file or_options_st.h.
Referenced by handle_get_networkstatus_bridges(), options_act(), and options_clear_cb().
| int BridgeRecordUsageByCountry |
If true, and we have GeoIP data, and we're a bridge, keep a per-country count of how many client addresses have contacted us so that we can help the bridge authority guess which countries have blocked access to us.
Definition at line 873 of file or_options_st.h.
Referenced by should_record_bridge_info().
| int BridgeRelay |
Boolean: are we acting as a bridge relay? We make this explicit so we can change how we behave in the future.
Definition at line 281 of file or_options_st.h.
Referenced by check_and_prune_server_ports(), choose_good_entry_server(), compute_publishserverdescriptor(), dirclient_fetches_from_authorities(), directory_caches_dir_info(), directory_caches_unknown_auth_certs(), directory_permits_begindir_requests(), get_my_declared_family(), get_my_roles(), handle_get_descriptor(), have_enough_mem_for_dircache(), log_heartbeat(), options_act_bridge_stats(), options_validate_publish_server(), options_validate_relay_mode(), options_validate_relay_mode(), policies_parse_exit_policy_from_options(), public_server_mode(), router_build_fresh_unsigned_extrainfo(), router_build_fresh_unsigned_routerinfo(), router_dump_router_to_string(), and should_record_bridge_info().
| struct config_line_t* Bridges |
List of bootstrap bridge addresses.
Definition at line 267 of file or_options_st.h.
Referenced by options_act(), and options_validate_cb().
| char* CacheDirectory |
Where to store cached data, as modified.
Definition at line 98 of file or_options_st.h.
Referenced by options_clear_cb(), options_create_directories(), options_get_dir_fname2_suffix(), and validate_data_directories().
| char* CacheDirectory_option |
Where to store cached data, as configured by the user.
Definition at line 96 of file or_options_st.h.
Referenced by validate_data_directories().
| int CacheDirectoryGroupReadable |
Boolean: Is the CacheDirectory g+r?
Definition at line 99 of file or_options_st.h.
Referenced by options_create_directories().
| int CellStatistics |
If true, the user wants us to collect cell statistics.
Definition at line 693 of file or_options_st.h.
Referenced by channel_flush_from_first_active_circuit(), extrainfo_dump_to_string_stats_helper(), options_act(), options_act_relay_stats(), and write_stats_file_callback().
| int change_key_passphrase |
Definition at line 1029 of file or_options_st.h.
| int CircuitBuildTimeout |
Cull non-open circuits that were born at least this many seconds ago. Used until adaptive algorithm learns a new value.
Definition at line 417 of file or_options_st.h.
Referenced by circuit_build_times_get_initial_timeout(), and options_validate_cb().
| int CircuitPadding |
Boolean: if true, then circuit padding will be negotiated by client and server, subject to consenus limits (default). If 0, it will be fully disabled.
Definition at line 304 of file or_options_st.h.
Referenced by options_validate_relay_padding().
| double CircuitPriorityHalflife |
The main parameter for picking circuits within a connection.
If this value is positive, when picking a cell to relay on a connection, we always relay from the circuit whose weighted cell count is lowest. Cells are weighted exponentially such that if one cell is sent 'CircuitPriorityHalflife' seconds before another, it counts for half as much.
If this value is zero, we're disabling the cell-EWMA algorithm.
If this value is negative, we're using the default approach according to either Tor or a parameter set in the consensus.
Definition at line 901 of file or_options_st.h.
| int CircuitsAvailableTimeout |
Try to have an open circuit for at least this long after last activity
Definition at line 420 of file or_options_st.h.
Referenced by channelpadding_get_channel_idle_timeout(), channelpadding_get_circuits_available_timeout(), and options_validate_cb().
| int CircuitStreamTimeout |
If non-zero, detach streams from circuits and try a new circuit if the stream has been waiting for this many seconds. If zero, use our default internal timeout schedule.
Definition at line 422 of file or_options_st.h.
Referenced by compute_retry_timeout(), and options_validate_cb().
| int ClientBootstrapConsensusAuthorityDownloadInitialDelay |
Schedule for when clients should download consensuses from authorities if they are bootstrapping (that is, they don't have a usable, reasonably live consensus). Only used by clients fetching from a list of fallback directory mirrors.
This schedule is incremented by (potentially concurrent) connection attempts, unlike other schedules, which are incremented by connection failures. Only altered on testing networks.
Definition at line 815 of file or_options_st.h.
Referenced by find_dl_min_delay().
| int ClientBootstrapConsensusAuthorityOnlyDownloadInitialDelay |
Schedule for when clients should download consensuses from authorities if they are bootstrapping (that is, they don't have a usable, reasonably live consensus). Only used by clients which don't have or won't fetch from a list of fallback directory mirrors.
This schedule is incremented by (potentially concurrent) connection attempts, unlike other schedules, which are incremented by connection failures. Only altered on testing networks.
Definition at line 835 of file or_options_st.h.
| int ClientBootstrapConsensusFallbackDownloadInitialDelay |
Schedule for when clients should download consensuses from fallback directory mirrors if they are bootstrapping (that is, they don't have a usable, reasonably live consensus). Only used by clients fetching from a list of fallback directory mirrors.
This schedule is incremented by (potentially concurrent) connection attempts, unlike other schedules, which are incremented by connection failures. Only altered on testing networks.
Definition at line 825 of file or_options_st.h.
Referenced by find_dl_min_delay().
| int ClientBootstrapConsensusMaxInProgressTries |
How many simultaneous in-progress connections will we make when trying to fetch a consensus before we wait for one to complete, timeout, or error out? Only altered on testing networks.
Definition at line 857 of file or_options_st.h.
Referenced by options_validate_cb(), and update_consensus_networkstatus_downloads().
| int ClientDNSRejectInternalAddresses |
If true, do not believe anybody who tells us that a domain resolves to an internal address, or that an internal address has a PTR mapping. Helps avoid some cross-site attacks.
Definition at line 718 of file or_options_st.h.
Referenced by options_validate_cb().
| char* ClientOnionAuthDir |
Directory to keep client onion service authorization secret keys
Definition at line 446 of file or_options_st.h.
Referenced by find_and_remove_client_auth_creds_file(), get_creds_from_client_auth_filename(), hs_config_client_authorization(), and store_permanent_client_auth_credentials().
| int ClientOnly |
Boolean: should we never evolve into a server role?
Definition at line 291 of file or_options_st.h.
Referenced by decide_if_publishable_server(), options_validate_dirauth_mode(), port_parse_ports_relay(), port_update_port_set_relay(), and server_mode().
| int ClientPreferIPv6DirPort |
If true, prefer an IPv6 directory port over an IPv4 one for direct directory connections. If auto, bridge clients prefer IPv6, and other clients prefer IPv4. Use reachable_addr_prefer_ipv6_dirport() instead of accessing this value directly.
Definition at line 741 of file or_options_st.h.
Referenced by reachable_addr_prefer_ipv6_dirport(), and reachable_addr_use_ipv6().
| int ClientPreferIPv6ORPort |
If true, prefer an IPv6 OR port over an IPv4 one for entry node connections. If auto, bridge clients prefer IPv6, and other clients prefer IPv4. Use node_ipv6_or_preferred() instead of accessing this value directly.
Definition at line 736 of file or_options_st.h.
Referenced by reachable_addr_prefer_ipv6_orport(), reachable_addr_use_ipv6(), and rewrite_node_address_for_bridge().
| int ClientRejectInternalAddresses |
If true, do not accept any requests to connect to internal addresses over randomly chosen exits.
Definition at line 722 of file or_options_st.h.
Referenced by connection_ap_handshake_rewrite_and_attach().
| struct config_line_t* ClientTransportPlugin |
List of client transport plugins.
Definition at line 269 of file or_options_st.h.
Referenced by conn_get_proxy_type(), get_proxy_addrport(), options_act(), and options_validate_cb().
| int ClientUseIPv4 |
If true, clients may connect over IPv4. If false, they will avoid connecting over IPv4. We enforce this for OR and Dir connections.
Definition at line 726 of file or_options_st.h.
Referenced by options_validate_cb(), parse_reachable_addresses(), reachable_addr_allows(), reachable_addr_prefer_ipv6_impl(), and reachable_addr_use_ipv6().
| int ClientUseIPv6 |
If true, clients may connect over IPv6. If false, they will avoid connecting over IPv4. We enforce this for OR and Dir connections. Use reachable_addr_use_ipv6() instead of accessing this value directly.
Definition at line 731 of file or_options_st.h.
Referenced by reachable_addr_use_ipv6().
| tor_cmdline_mode_t command |
What should the tor process actually do?
Definition at line 68 of file or_options_st.h.
Referenced by init_keys(), load_ed_keys(), options_act(), options_act_dirauth_mtbf(), options_act_once_on_startup(), options_act_server_transport(), options_create_directories(), options_init_from_string(), options_new(), options_start_listener_transaction(), options_start_log_transaction(), and tor_cleanup().
| char* command_arg |
Argument for command-line option.
Definition at line 69 of file or_options_st.h.
Referenced by do_dump_config(), do_list_fingerprint(), log_cert_expiration(), options_clear_cb(), and options_init_from_string().
| int CompiledProofOfWorkHash |
If true, always use the compiled hash implementation. If false, always the interpreter. Default of "auto" allows a dynamic fallback from copmiler to interpreter.
Definition at line 746 of file or_options_st.h.
Referenced by consider_sending_introduce1().
| int ConfluxClientUX |
Definition at line 754 of file or_options_st.h.
| char* ConfluxClientUX_option |
Has the UX integer value that the client will request from the exit.
Definition at line 753 of file or_options_st.h.
Referenced by options_validate_cb().
| int ConfluxEnabled |
If true, the tor client will use conflux for its general purpose circuits which excludes onion service traffic.
Definition at line 750 of file or_options_st.h.
| int ConnDirectionStatistics |
If true, the user wants us to collect connection statistics.
Definition at line 690 of file or_options_st.h.
Referenced by extrainfo_dump_to_string_stats_helper(), options_act(), options_act_relay_stats(), and write_stats_file_callback().
| int ConnectionPadding |
Autobool: if auto, then connection padding will be negotiated by client and server. If 0, it will be fully disabled. If 1, the client will still pad to the server regardless of server support.
Definition at line 299 of file or_options_st.h.
Referenced by channelpadding_decide_to_pad_channel(), and options_validate_relay_padding().
| int ConnLimit |
Demanded minimum number of simultaneous connections.
Definition at line 361 of file or_options_st.h.
Referenced by options_commit_listener_transaction(), options_start_listener_transaction(), and options_validate_cb().
| int ConnLimit_ |
Maximum allowed number of simultaneous connections.
Definition at line 362 of file or_options_st.h.
Referenced by connection_check_oos(), options_commit_listener_transaction(), options_rollback_listener_transaction(), and options_start_listener_transaction().
| int ConnLimit_high_thresh |
start trying to lower socket usage if we have this many.
Definition at line 363 of file or_options_st.h.
Referenced by connection_check_oos(), and options_commit_listener_transaction().
| int ConnLimit_low_thresh |
try to get down to here after socket exhaustion.
Definition at line 365 of file or_options_st.h.
Referenced by connection_check_oos(), and options_commit_listener_transaction().
| int ConstrainedSockets |
Shrink xmit and recv socket buffers.
Definition at line 376 of file or_options_st.h.
Referenced by connection_connect_sockaddr(), connection_handle_listener_read(), options_validate_cb(), and options_validate_relay_mode().
| uint64_t ConstrainedSockSize |
Size of constrained buffers.
Definition at line 377 of file or_options_st.h.
Referenced by connection_connect_sockaddr(), connection_handle_listener_read(), and options_validate_cb().
| char* ContactInfo |
Contact info to be published in the directory.
Definition at line 448 of file or_options_st.h.
Referenced by dirserv_generate_networkstatus_vote_obj(), options_validate_dirauth_mode(), options_validate_relay_info(), options_validate_relay_mode(), and router_dump_router_to_string().
| struct config_line_t* ControlPort_lines |
Ports to listen on for control connections.
Definition at line 192 of file or_options_st.h.
Referenced by parse_ports().
| unsigned int ControlPort_set |
Definition at line 233 of file or_options_st.h.
| int ControlPortFileGroupReadable |
Should that file be group-readable?
Definition at line 915 of file or_options_st.h.
Referenced by control_ports_write_to_file().
| char* ControlPortWriteToFile |
File where we should write the ControlPort.
Definition at line 913 of file or_options_st.h.
Referenced by control_ports_write_to_file(), and tor_cleanup().
| struct config_line_t* ControlSocket |
List of Unix Domain Sockets to listen on for control connections.
Definition at line 195 of file or_options_st.h.
Referenced by options_validate_cb(), and parse_ports().
| int ControlSocketsGroupWritable |
Boolean: Are control sockets g+rw?
Definition at line 197 of file or_options_st.h.
Referenced by options_validate_cb(), and parse_ports().
| int CookieAuthentication |
Boolean: do we enable cookie-based auth for the control system?
Definition at line 555 of file or_options_st.h.
Referenced by get_authmethods(), get_esc_cfile(), handle_control_authenticate(), options_act(), options_validate_cb(), and parse_ports().
| char* CookieAuthFile |
Filesystem location of a ControlPort authentication cookie.
Definition at line 557 of file or_options_st.h.
Referenced by get_controller_cookie_file_name(), and options_validate_cb().
| int CookieAuthFileGroupReadable |
Boolean: Is the CookieAuthFile g+r?
Definition at line 561 of file or_options_st.h.
Referenced by options_validate_cb().
| int CountPrivateBandwidth |
Boolean: if set, then even connections to private addresses will get rate-limited.
Definition at line 664 of file or_options_st.h.
Referenced by connection_is_rate_limited().
| char* DataDirectory |
Where to store long-term data, as modified.
Definition at line 84 of file or_options_st.h.
Referenced by create_keys_directory(), options_act(), options_clear_cb(), options_create_directories(), options_get_dir_fname2_suffix(), and validate_data_directories().
| char* DataDirectory_option |
Where to store long-term data, as configured by the user.
Definition at line 82 of file or_options_st.h.
Referenced by validate_data_directories().
| int DataDirectoryGroupReadable |
Boolean: Is the DataDirectory g+r?
Definition at line 85 of file or_options_st.h.
Referenced by create_keys_directory(), and options_create_directories().
| char* DebugLogFile |
Where to send verbose log messages.
Definition at line 81 of file or_options_st.h.
| int DirAllowPrivateAddresses |
Whether dirservers allow router descriptors with private IPs.
Definition at line 165 of file or_options_st.h.
| struct config_line_t* DirAuthorities |
List of configuration lines for replacement directory authorities. If you just want to replace one class of authority at a time, use the "Alternate*Authority" options below instead.
Definition at line 483 of file or_options_st.h.
Referenced by consider_adding_dir_servers(), options_validate_cb(), and validate_dir_servers().
| double DirAuthorityFallbackRate |
Weight to apply to all directory authority rates if considering them along with fallbackdirs
Definition at line 492 of file or_options_st.h.
Referenced by router_pick_trusteddirserver_impl().
| int DirCache |
Cache all directory documents and accept requests via tunnelled dir conns from clients. If 1, enabled (default); If 0, disabled. Use dir_server_mode() rather than referencing this option directly. (Except for routermode and relay_config, which do direct checks.)
Definition at line 633 of file or_options_st.h.
Referenced by dir_server_mode(), have_enough_mem_for_dircache(), options_validate_relay_mode(), and options_validate_relay_mode().
| struct config_line_t* DirPolicy |
Lists of dir policy components
Definition at line 151 of file or_options_st.h.
Referenced by policies_parse_from_options(), and validate_addr_policies().
| struct config_line_t* DirPort_lines |
Ports to listen on for directory connections.
Definition at line 200 of file or_options_st.h.
Referenced by options_validate_relay_mode(), options_validate_relay_mode(), and port_parse_ports_relay().
| unsigned int DirPort_set |
Definition at line 234 of file or_options_st.h.
| char* DirPortFrontPage |
This is a full path to a file with an html disclaimer. This allows a server administrator to show that they're running Tor and anyone visiting their server will know this without any specialized knowledge.
Definition at line 653 of file or_options_st.h.
Referenced by options_act_relay_dir().
| int DirReqStatistics |
Internal variable to remember whether we're actually acting on DirReqStatistics_option – yes if it's set and we're a server, else no.
Definition at line 684 of file or_options_st.h.
Referenced by extrainfo_dump_to_string_stats_helper(), geoip_note_client_seen(), options_act(), options_act_relay_stats(), and write_stats_file_callback().
| int DirReqStatistics_option |
If true, we're configured to collect statistics on clients requesting network statuses from us as directory.
Definition at line 681 of file or_options_st.h.
Referenced by options_act().
| int DisableAllSwap |
Boolean: Attempt to call mlockall() on our process for all current and future memory.
Definition at line 136 of file or_options_st.h.
Referenced by options_act_once_on_startup().
| int DisableDebuggerAttachment |
Currently Linux only specific attempt to disable ptrace; needs BSD testing.
Definition at line 657 of file or_options_st.h.
Referenced by options_act().
| int DisableNetwork |
If 1, we accept and launch no external network connections, except on control ports.
Definition at line 924 of file or_options_st.h.
Referenced by net_is_completely_disabled(), net_is_disabled(), options_act(), options_act_server_transport(), options_start_listener_transaction(), and should_delay_dir_fetches().
| int DisableOOSCheck |
If 1, we skip all OOS checks.
Definition at line 1041 of file or_options_st.h.
| int DisablePredictedCircuits |
Boolean: does Tor preemptively make circuits in the background (0), or not (1)?
Definition at line 567 of file or_options_st.h.
Referenced by circuit_build_needed_circs().
| int DisableSignalHandlers |
If true, Tor shouldn't install any posix signal handlers, since it is running embedded inside another process.
Definition at line 1080 of file or_options_st.h.
Referenced by handle_signals().
| struct config_line_t* DNSPort_lines |
Ports to listen on for DNS requests.
Definition at line 202 of file or_options_st.h.
Referenced by parse_ports().
| unsigned int DNSPort_set |
Definition at line 235 of file or_options_st.h.
| int DormantCanceledByStartup |
Boolean: true if Tor should treat every startup event as cancelling a possible previous dormant state.
Definition at line 1106 of file or_options_st.h.
| int DormantClientTimeout |
Interval: how long without activity does it take for a client to become dormant?
Definition at line 1085 of file or_options_st.h.
Referenced by check_network_participation_callback(), and options_validate_cb().
| int DormantOnFirstStartup |
Boolean: true if Tor should be dormant the first time it starts with a datadirectory; false otherwise.
Definition at line 1101 of file or_options_st.h.
| int DormantTimeoutDisabledByIdleStreams |
Boolean: true if having an idle stream is sufficient to prevent a client from becoming dormant.
Definition at line 1097 of file or_options_st.h.
Referenced by check_network_participation_callback().
| int DormantTimeoutEnabled |
Boolean: If enabled, then we consider the timeout when deciding whether to be dormant. If not enabled, then only the SIGNAL ACTIVE/DORMANT controls can change our status.
Definition at line 1092 of file or_options_st.h.
Referenced by check_network_participation_callback().
| int DownloadExtraInfo |
If true, we try to download extra-info documents (and we serve them, if we are a cache). For authorities, this is always true.
Definition at line 677 of file or_options_st.h.
Referenced by directory_info_has_arrived(), options_validate_dirauth_mode(), router_dump_router_to_string(), should_use_directory_guards(), and update_extrainfo_downloads().
| int EnforceDistinctSubnets |
If true, don't allow multiple routers in the same network zone in the same circuit.
Definition at line 668 of file or_options_st.h.
Referenced by nodelist_add_node_and_family(), and nodes_in_same_family().
| struct routerset_t* EntryNodes |
Structure containing nicknames, digests, country codes and IP address patterns of ORs to consider as entry points.
Definition at line 118 of file or_options_st.h.
Referenced by circuit_get_open_circ_or_launch(), compute_frac_paths_available(), entry_list_is_constrained(), node_passes_guard_filter(), options_act(), options_need_geoip_info(), options_validate_cb(), and refresh_all_country_info().
| int EntryStatistics |
If true, the user wants us to collect statistics as entry node.
Definition at line 699 of file or_options_st.h.
Referenced by extrainfo_dump_to_string_stats_helper(), geoip_note_client_seen(), options_act(), options_act_relay_stats(), and write_stats_file_callback().
| struct routerset_t* ExcludeExitNodes |
Structure containing nicknames, digests, country codes and IP address patterns of ORs not to consider as exits.
Definition at line 128 of file or_options_st.h.
Referenced by connection_ap_handshake_rewrite_and_attach(), options_act(), options_need_geoip_info(), options_validate_cb(), and refresh_all_country_info().
| struct routerset_t* ExcludeExitNodesUnion_ |
Union of ExcludeNodes and ExcludeExitNodes
Definition at line 134 of file or_options_st.h.
Referenced by addressmap_clear_excluded_trackexithosts(), choose_good_exit_server_general(), connection_ap_can_use_exit(), connection_ap_handshake_rewrite_and_attach(), options_act(), options_clear_cb(), options_validate_cb(), refresh_all_country_info(), router_find_exact_exit_enclave(), and warn_if_last_router_excluded().
| struct routerset_t* ExcludeNodes |
Structure containing nicknames, digests, country codes and IP address patterns of ORs not to use in circuits. But see StrictNodes above.
Definition at line 124 of file or_options_st.h.
Referenced by bridge_passes_guard_filter(), choose_good_entry_server(), choose_good_exit_server(), choose_good_middle_server(), circuit_find_to_cannibalize(), client_get_random_intro(), directory_post_to_dirservers(), directory_request_set_dir_from_routerstatus(), fetch_bridge_descriptors(), hs_pick_hsdir(), launch_direct_bridge_descriptor_fetch(), maintain_layer2_guards(), node_passes_guard_filter(), options_act(), options_need_geoip_info(), options_validate_cb(), pick_intro_point(), pick_vanguard_middle_node(), refresh_all_country_info(), router_pick_directory_server_impl(), router_pick_trusteddirserver_impl(), router_should_check_reachability(), and warn_if_last_router_excluded().
| struct routerset_t* ExitNodes |
Structure containing nicknames, digests, country codes and IP address patterns of ORs to consider as exits.
Definition at line 112 of file or_options_st.h.
Referenced by addressmap_clear_excluded_trackexithosts(), choose_good_exit_server_general(), compute_frac_paths_available(), options_act(), options_need_geoip_info(), and refresh_all_country_info().
| struct config_line_t* ExitPolicy |
Lists of exit policy components.
Definition at line 139 of file or_options_st.h.
Referenced by policies_parse_exit_policy_from_options(), and policy_using_default_exit_options().
| int ExitPolicyRejectLocalInterfaces |
Should we not exit to local interface addresses? Includes OutboundBindAddresses and configured ports.
Definition at line 143 of file or_options_st.h.
Referenced by getinfo_helper_policies(), and policies_parse_exit_policy_from_options().
| int ExitPolicyRejectPrivate |
Should we not exit to reserved private addresses, and our own published addresses?
Definition at line 140 of file or_options_st.h.
Referenced by getinfo_helper_policies(), and policies_parse_exit_policy_from_options().
| int ExitPortStatistics |
If true, the user wants us to collect statistics on port usage.
Definition at line 687 of file or_options_st.h.
Referenced by extrainfo_dump_to_string_stats_helper(), options_act(), options_act_relay_stats(), and write_stats_file_callback().
| int ExitRelay |
Is this an exit node? This is a tristate, where "1" means "yes, and use the default exit policy if none is given" and "0" means "no; exit policy is 'reject *'" and "auto" (-1) means "same as 1, but warn the user."
XXXX Eventually, the default will be 0.
Definition at line 1000 of file or_options_st.h.
Referenced by options_validate_relay_mode(), policies_parse_exit_policy_from_options(), and policy_using_default_exit_options().
| int ExtendAllowPrivateAddresses |
Whether routers accept EXTEND cells to routers with private IPs.
Definition at line 167 of file or_options_st.h.
Referenced by circuit_handle_first_hop().
| int ExtendByEd25519ID |
Autobool: Should we include Ed25519 identities in extend2 cells? If -1, we should do whatever the consensus parameter says.
Definition at line 1045 of file or_options_st.h.
Referenced by should_include_ed25519_id_extend_cells().
| struct config_line_t* ExtORPort_lines |
Ports to listen on for extended OR connections.
Definition at line 172 of file or_options_st.h.
Referenced by create_managed_proxy_environment(), options_act_server_transport(), options_validate_server_transport(), and port_parse_ports_relay().
| unsigned int ExtORPort_set |
Definition at line 236 of file or_options_st.h.
| char* ExtORPortCookieAuthFile |
Filesystem location of Extended ORPort authentication cookie.
Definition at line 559 of file or_options_st.h.
Referenced by get_ext_or_auth_cookie_file_name().
| int ExtORPortCookieAuthFileGroupReadable |
Boolean: Is the ExtORPortCookieAuthFile g+r?
Definition at line 562 of file or_options_st.h.
| int ExtraInfoStatistics |
If true, include statistics file contents in extra-info documents.
Definition at line 710 of file or_options_st.h.
Referenced by extrainfo_dump_to_string_stats_helper().
| struct config_line_t* FallbackDir |
List of fallback directory servers
Definition at line 486 of file or_options_st.h.
Referenced by consider_adding_dir_servers(), options_validate_cb(), and validate_dir_servers().
| struct config_line_t* FamilyId_lines |
If set, IDs for family keys to use to certify this OR's membership.
Definition at line 504 of file or_options_st.h.
Referenced by options_validate_relay_mode().
| struct smartlist_t* FamilyIds |
FamilyIds, parsed and converted to a list of ed25519_public_key_t
Definition at line 506 of file or_options_st.h.
Referenced by family_key_id_is_expected(), load_family_id_keys(), options_clear_cb(), options_validate_relay_mode(), and warn_about_family_id_config().
| char* FamilyKeyDirectory |
Where to look for family ID keys.
Definition at line 94 of file or_options_st.h.
Referenced by load_family_id_keys(), options_clear_cb(), and validate_data_directories().
| char* FamilyKeyDirectory_option |
Where to look for family ID keys, as configured by the user.
Definition at line 92 of file or_options_st.h.
Referenced by validate_data_directories().
| int FascistFirewall |
Whether to prefer ORs reachable on open ports.
Definition at line 368 of file or_options_st.h.
Referenced by options_validate_cb().
| int FetchDirInfoEarly |
Should we always fetch our dir info on the mirror schedule (which means directly from the authorities) no matter our other config?
Definition at line 628 of file or_options_st.h.
Referenced by dirclient_fetches_from_authorities(), options_validate_cb(), and should_use_directory_guards().
| int FetchDirInfoExtraEarly |
Should we fetch our dir info at the start of the consensus period?
Definition at line 631 of file or_options_st.h.
Referenced by options_validate_cb(), should_use_directory_guards(), and update_consensus_networkstatus_fetch_time_impl().
| int FetchHidServDescriptors |
and hidden service descriptors?
Definition at line 327 of file or_options_st.h.
| int FetchServerDescriptors |
Do we fetch server descriptors as normal?
Definition at line 326 of file or_options_st.h.
Referenced by directory_get_from_dirserver().
| int FetchUselessDescriptors |
Do we fetch non-running descriptors too?
Definition at line 329 of file or_options_st.h.
Referenced by dirclient_too_idle_to_fetch_descriptors(), should_use_directory_guards(), we_fetch_microdescriptors(), we_fetch_router_descriptors(), we_want_to_fetch_flavor(), and we_want_to_fetch_unknown_auth_certs().
| struct smartlist_t* FilesOpenedByIncludes |
List of files that were opened by include in torrc and torrc-defaults
Definition at line 1075 of file or_options_st.h.
Referenced by options_clear_cb(), and options_init_from_string().
| struct smartlist_t* FirewallPorts |
Which ports our firewall allows (strings).
Definition at line 369 of file or_options_st.h.
Referenced by options_validate_cb().
| int GeoIPExcludeUnknown |
Autobool: if auto, then any attempt to Exclude{Exit,}Nodes a particular country code will exclude all nodes in ?? and A1. If true, all nodes in ?? and A1 are excluded. Has no effect if we don't know any GeoIP data.
Definition at line 882 of file or_options_st.h.
Referenced by options_act().
| char* GeoIPFile |
Optionally, IPv4 and IPv6 GeoIP data.
Definition at line 876 of file or_options_st.h.
Referenced by config_maybe_load_geoip_files_().
| char* GeoIPv6File |
Definition at line 877 of file or_options_st.h.
| char* GuardfractionFile |
Location of guardfraction file
Definition at line 773 of file or_options_st.h.
Referenced by dirserv_generate_networkstatus_vote_obj(), and options_validate_dirauth_mode().
| int GuardLifetime |
How long (seconds) do we keep a guard before picking a new one?
Definition at line 993 of file or_options_st.h.
Referenced by get_guard_confirmed_min_lifetime(), and get_guard_lifetime().
| struct config_line_t* HashedControlPassword |
Base64-encoded hash of accepted passwords for the control system.
Definition at line 551 of file or_options_st.h.
Referenced by get_authmethods(), handle_control_authenticate(), options_validate_cb(), and parse_ports().
| struct config_line_t* HashedControlSessionPassword |
As HashedControlPassword, but not saved.
Definition at line 553 of file or_options_st.h.
Referenced by get_authmethods(), handle_control_authenticate(), options_validate_cb(), and parse_ports().
| int HeartbeatPeriod |
Log heartbeat messages after this many seconds have passed.
Definition at line 450 of file or_options_st.h.
Referenced by format_client_stats_heartbeat(), heartbeat_callback(), and options_validate_cb().
| int HiddenServiceNonAnonymousMode |
Definition at line 359 of file or_options_st.h.
| int HiddenServiceSingleHopMode |
Onion Services in HiddenServiceSingleHopMode make one-hop (direct) circuits between the onion service server, and the introduction and rendezvous points. (Onion service descriptors are still posted using 3-hop paths, to avoid onion service directories blocking the service.) This option makes every hidden service instance hosted by this tor instance a Single Onion Service. HiddenServiceSingleHopMode requires HiddenServiceNonAnonymousMode to be set to 1. Use rend_service_allow_non_anonymous_connection() or rend_service_reveal_startup_time() instead of using this option directly.
Definition at line 352 of file or_options_st.h.
| int HiddenServiceStatistics |
Internal variable to remember whether we're actually acting on HiddenServiceStatistics_option – yes if it's set and we're a server, else no.
Definition at line 707 of file or_options_st.h.
Referenced by command_process_relay_cell(), extrainfo_dump_to_string_stats_helper(), options_act(), options_act_relay_stats(), rend_mid_rendezvous(), and write_stats_file_callback().
| int HiddenServiceStatistics_option |
If true, the user wants us to collect statistics as hidden service directory, introduction point, or rendezvous point.
Definition at line 703 of file or_options_st.h.
Referenced by options_act().
| struct routerset_t* HSLayer2Nodes |
A routerset that should be used when picking middle nodes for HS circuits.
Definition at line 335 of file or_options_st.h.
Referenced by circpad_machine_conditions_apply(), options_act(), options_need_geoip_info(), and pick_vanguard_middle_node().
| struct routerset_t* HSLayer3Nodes |
A routerset that should be used when picking third-hop nodes for HS circuits.
Definition at line 339 of file or_options_st.h.
Referenced by circpad_machine_conditions_apply(), middle_node_must_be_vanguard(), options_act(), options_need_geoip_info(), and pick_vanguard_middle_node().
| char* HTTPProxy |
hostname[:port] to use as http proxy, if any.
Definition at line 455 of file or_options_st.h.
Referenced by directory_initiate_request(), and options_validate_cb().
| tor_addr_t HTTPProxyAddr |
Parsed IPv4 addr for http proxy, if any.
Definition at line 456 of file or_options_st.h.
Referenced by directory_initiate_request(), and options_validate_cb().
| char* HTTPProxyAuthenticator |
username:password string, if any.
Definition at line 458 of file or_options_st.h.
Referenced by directory_send_command(), and options_validate_cb().
| uint16_t HTTPProxyPort |
Parsed port for http proxy, if any.
Definition at line 457 of file or_options_st.h.
Referenced by directory_initiate_request(), and options_validate_cb().
| char* HTTPSProxy |
hostname[:port] to use as https proxy, if any.
Definition at line 460 of file or_options_st.h.
Referenced by conn_get_proxy_type(), get_proxy_addrport(), get_pt_proxy_uri(), options_validate_cb(), and pt_parse_transport_line().
| tor_addr_t HTTPSProxyAddr |
Parsed addr for https proxy, if any.
Definition at line 461 of file or_options_st.h.
Referenced by get_proxy_addrport(), get_pt_proxy_uri(), and options_validate_cb().
| char* HTTPSProxyAuthenticator |
username:password string, if any.
Definition at line 463 of file or_options_st.h.
Referenced by connection_https_proxy_connect(), get_pt_proxy_uri(), and options_validate_cb().
| uint16_t HTTPSProxyPort |
Parsed port for https proxy, if any.
Definition at line 462 of file or_options_st.h.
Referenced by get_proxy_addrport(), get_pt_proxy_uri(), and options_validate_cb().
| struct config_line_t* HTTPTunnelPort_lines |
Ports to listen on for HTTP Tunnel connections.
Definition at line 191 of file or_options_st.h.
Referenced by parse_ports().
| unsigned int HTTPTunnelPort_set |
Definition at line 237 of file or_options_st.h.
| int IncludeUsed |
Bool (default: 0): Tells if a include was used on torrc
Definition at line 1048 of file or_options_st.h.
Referenced by handle_control_saveconf(), and options_init_from_string().
| int IPv6Exit |
Do we support exiting to IPv6 addresses?
Definition at line 983 of file or_options_st.h.
Referenced by connection_exit_begin_conn(), getinfo_helper_policies(), policies_parse_exit_policy_from_options(), policy_using_default_exit_options(), router_build_fresh_unsigned_routerinfo(), router_compare_to_my_exit_policy(), and set_exitconn_info_from_resolve().
| int KeepalivePeriod |
How often do we send padding cells to keep connections alive?
Definition at line 409 of file or_options_st.h.
Referenced by options_validate_cb(), and run_connection_housekeeping().
| int KeepBindCapabilities |
Autobool: Do we try to retain capabilities if we can?
Definition at line 1033 of file or_options_st.h.
Referenced by check_and_prune_server_ports(), and options_switch_id().
| key_expiration_format_t key_expiration_format |
Definition at line 1020 of file or_options_st.h.
| char* KeyDirectory |
Where to store keys data, as modified.
Definition at line 89 of file or_options_st.h.
Referenced by create_keys_directory(), options_clear_cb(), options_create_directories(), options_get_dir_fname2_suffix(), and validate_data_directories().
| char* KeyDirectory_option |
Where to store keys, as configured by the user.
Definition at line 87 of file or_options_st.h.
Referenced by validate_data_directories().
| int KeyDirectoryGroupReadable |
Boolean: Is the KeyDirectory g+r?
Definition at line 90 of file or_options_st.h.
Referenced by options_create_directories().
| int keygen_passphrase_fd |
Definition at line 1028 of file or_options_st.h.
| int KISTSchedRunInterval |
Have the KIST scheduler run every X milliseconds. If less than zero, do not use the KIST scheduler but use the old vanilla scheduler instead. If zero, do what the consensus says and fall back to using KIST as if this is set to "10 msec" if the consensus doesn't say anything.
Definition at line 1063 of file or_options_st.h.
| double KISTSockBufSizeFactor |
A multiplier for the KIST per-socket limit calculation.
Definition at line 1066 of file or_options_st.h.
| int LearnCircuitBuildTimeout |
If non-zero, we attempt to learn a value for CircuitBuildTimeout based on timeout history. Use circuit_build_times_disabled() rather than checking this value directly.
Definition at line 413 of file or_options_st.h.
Referenced by circuit_build_times_disabled_(), and options_validate_cb().
| int LeaveStreamsUnattached |
Boolean: Does Tor attach new streams to circuits itself (0), or does it expect a controller to cope? (1)
Definition at line 564 of file or_options_st.h.
Referenced by connection_ap_rewrite_and_attach_if_allowed().
| int LogMessageDomains |
Boolean: Should we log the domain(s) in which each log message occurs?
Definition at line 75 of file or_options_st.h.
Referenced by options_init_logs().
| struct config_line_t* Logs |
New-style list of configuration lines for logs
Definition at line 71 of file or_options_st.h.
Referenced by options_init_logs().
| int LogTimeGranularity |
Log resolution in milliseconds.
Definition at line 73 of file or_options_st.h.
Referenced by options_init_log_granularity().
| struct smartlist_t* LongLivedPorts |
Application ports that require all nodes in circ to have sufficient uptime.
Definition at line 387 of file or_options_st.h.
Referenced by circuit_all_predicted_ports_handled(), circuit_get_open_circ_or_launch(), and options_validate_cb().
| uint32_t magic_ |
Definition at line 65 of file or_options_st.h.
| int MainloopStats |
Log main loop statistics as part of the heartbeat messages.
Definition at line 452 of file or_options_st.h.
Referenced by log_heartbeat(), and options_act().
| char* master_key_fname |
Definition at line 1030 of file or_options_st.h.
| uint64_t MaxAdvertisedBandwidth |
How much bandwidth are we willing to tell other nodes we have?
Definition at line 435 of file or_options_st.h.
Referenced by options_validate_relay_bandwidth(), and relay_get_effective_bwrate().
| int MaxCircuitDirtiness |
Never use circs that were first used more than this interval ago.
Definition at line 429 of file or_options_st.h.
Referenced by circuit_log_ancient_one_hop_circuits(), mark_circuit_unusable_for_new_conns(), and options_validate_cb().
| int MaxClientCircuitsPending |
Maximum number of non-open general-purpose origin circuits to allow at once.
Definition at line 920 of file or_options_st.h.
Referenced by circuit_get_open_circ_or_launch(), and options_validate_cb().
| int MaxConsensusAgeForDiffs |
The seconds after expiration which we as a relay should keep old consensuses around so that we can generate diffs from them. If 0, use the default.
Definition at line 1053 of file or_options_st.h.
Referenced by get_max_age_to_cache().
| uint64_t MaxHSDirCacheBytes |
If we have more memory than this allocated for the hidden service directory cache, run the HS cache OOM handler
Definition at line 212 of file or_options_st.h.
Referenced by hs_cache_get_max_bytes().
| uint64_t MaxMemInQueues |
If we have more memory than this allocated for queues and buffers, run the OOM handler
Definition at line 207 of file or_options_st.h.
Referenced by cell_queues_check_size(), circuits_handle_oom(), have_enough_mem_for_dircache(), hs_cache_get_max_bytes(), and options_validate_cb().
| uint64_t MaxMemInQueues_low_threshold |
Above this value, consider ourselves low on RAM.
Definition at line 210 of file or_options_st.h.
Referenced by options_validate_cb().
| uint64_t MaxMemInQueues_raw |
Definition at line 206 of file or_options_st.h.
| int MaxOnionQueueDelay |
Definition at line 426 of file or_options_st.h.
| uint64_t MaxUnparseableDescSizeToLog |
Maximum total size of unparseable descriptors to log during the lifetime of this Tor process.
Definition at line 1038 of file or_options_st.h.
Referenced by dump_desc_fifo_add_and_clean().
| struct config_line_t* MetricsPort_lines |
Ports to listen on for Metrics connections.
Definition at line 174 of file or_options_st.h.
Referenced by metrics_parse_ports().
| unsigned int MetricsPort_set |
Definition at line 238 of file or_options_st.h.
| struct config_line_t* MetricsPortPolicy |
List of policy allowed to query the Metrics port.
Definition at line 1109 of file or_options_st.h.
Referenced by parse_metrics_port_policy().
| struct routerset_t* MiddleNodes |
Structure containing nicknames, digests, country codes and IP address patterns of ORs to consider as middles.
Definition at line 115 of file or_options_st.h.
Referenced by choose_good_middle_server(), compute_frac_paths_available(), options_act(), options_need_geoip_info(), and refresh_all_country_info().
| struct config_line_t* MyFamily |
Declared family for this OR, normalized
Definition at line 502 of file or_options_st.h.
Referenced by get_my_declared_family(), options_clear_cb(), options_validate_relay_mode(), and warn_about_family_id_config().
| struct config_line_t* MyFamily_lines |
Declared family for this OR.
Definition at line 501 of file or_options_st.h.
Referenced by options_validate_relay_mode().
| struct config_line_t* NATDPort_lines |
Ports to listen on for transparent natd connections.
Definition at line 189 of file or_options_st.h.
Referenced by parse_ports().
| unsigned int NATDPort_set |
Definition at line 232 of file or_options_st.h.
| int NewCircuitPeriod |
How long do we use a circuit before building a new one?
Definition at line 427 of file or_options_st.h.
Referenced by circuit_expire_old_circs_as_needed().
| char* Nickname |
OR only: nickname of this onion router.
Definition at line 101 of file or_options_st.h.
Referenced by dirserv_generate_networkstatus_vote_obj(), do_list_fingerprint(), get_my_declared_family(), init_keys(), options_validate_relay_info(), router_build_fresh_unsigned_extrainfo(), router_build_fresh_unsigned_routerinfo(), and router_write_fingerprint().
| struct config_line_t* NodeFamilies |
List of config lines for node families
Definition at line 511 of file or_options_st.h.
Referenced by options_validate_cb().
| struct smartlist_t* NodeFamilySets |
List of parsed NodeFamilies values.
Definition at line 514 of file or_options_st.h.
Referenced by nodelist_add_node_and_family(), nodes_in_same_family(), options_clear_cb(), and options_validate_cb().
| int NoExec |
Bool (default: 0). Tells Tor to never try to exec another program.
Definition at line 1057 of file or_options_st.h.
Referenced by options_act(), and pt_parse_transport_line().
| int NumCPUs |
How many CPUs should we try to use?
Definition at line 443 of file or_options_st.h.
Referenced by get_num_cpus().
| int NumDirectoryGuards |
How many dir guards do we try to establish? If 0, use value from NumEntryGuards.
Definition at line 612 of file or_options_st.h.
Referenced by get_n_primary_guards_to_use().
| int NumEntryGuards |
How many entry guards do we try to establish?
Definition at line 605 of file or_options_st.h.
Referenced by get_n_primary_guards_to_use(), and options_validate_cb().
| int NumPrimaryGuards |
How many primary guards do we want?
Definition at line 614 of file or_options_st.h.
Referenced by get_n_primary_guards(), and options_validate_cb().
| int OfflineMasterKey |
Force use of offline master key features: never generate a master ed25519 identity key except from tor –keygen
Definition at line 1018 of file or_options_st.h.
Referenced by load_ed_keys().
| struct config_line_t* ORPort_lines |
Ports to listen on for OR connections.
Definition at line 170 of file or_options_st.h.
Referenced by options_act_bridge_stats(), options_validate_relay_mode(), and port_parse_ports_relay().
| unsigned int ORPort_set |
Definition at line 229 of file or_options_st.h.
| struct config_line_t* OutboundBindAddress |
Local address to bind outbound sockets
Definition at line 153 of file or_options_st.h.
Referenced by parse_outbound_addresses().
| tor_addr_t OutboundBindAddresses[OUTBOUND_ADDR_MAX][2] |
Addresses derived from the various OutboundBindAddress lines. [][0] is IPv4, [][1] is IPv6
Definition at line 163 of file or_options_st.h.
Referenced by conn_get_outbound_address(), managed_proxy_outbound_address(), parse_outbound_addresses(), and policies_copy_outbound_addresses_to_smartlist().
| struct config_line_t* OutboundBindAddressExit |
Local address to bind outbound exit sockets
Definition at line 157 of file or_options_st.h.
Referenced by parse_outbound_addresses().
| struct config_line_t* OutboundBindAddressOR |
Local address to bind outbound relay sockets
Definition at line 155 of file or_options_st.h.
Referenced by parse_outbound_addresses().
| struct config_line_t* OutboundBindAddressPT |
Local address to bind outbound PT sockets
Definition at line 159 of file or_options_st.h.
Referenced by parse_outbound_addresses().
| int OverloadStatistics |
If true, include overload statistics in extra-info documents.
Definition at line 713 of file or_options_st.h.
Referenced by extrainfo_dump_to_string_stats_helper(), and router_dump_router_to_string().
| uint64_t OwningControllerFD |
FD specifier for a controller that owns this Tor instance.
Definition at line 575 of file or_options_st.h.
Referenced by get_my_roles(), and options_act().
| char* OwningControllerProcess |
Process specifier for a controller that ‘owns’ this Tor instance. Tor will terminate if its owning controller does.
Definition at line 573 of file or_options_st.h.
Referenced by options_act(), and options_validate_cb().
| int PaddingStatistics |
If true, the user wants us to collect padding statistics.
Definition at line 696 of file or_options_st.h.
Referenced by extrainfo_dump_to_string_stats_helper().
| int PathBiasCircThreshold |
Parameters for path-bias detection.
These options override the default behavior of Tor's (currently experimental) path bias detection algorithm. To try to find broken or misbehaving guard nodes, Tor looks for nodes where more than a certain fraction of circuits through that guard fail to get built.
The PathBiasCircThreshold option controls how many circuits we need to build through a guard before we make these checks. The PathBiasNoticeRate, PathBiasWarnRate and PathBiasExtremeRate options control what fraction of circuits must succeed through a guard so we won't write log messages. If less than PathBiasExtremeRate circuits succeed and PathBiasDropGuards is set to 1, we disable use of that guard.
When we have seen more than PathBiasScaleThreshold circuits through a guard, we scale our observations by 0.5 (governed by the consensus) so that new observations don't get swamped by old ones.
By default, or if a negative value is provided for one of these options, Tor uses reasonable defaults from the networkstatus consensus document. If no defaults are available there, these options default to 150, .70, .50, .30, 0, and 300 respectively.
Definition at line 951 of file or_options_st.h.
Referenced by pathbias_get_min_circs().
| int PathBiasDropGuards |
Definition at line 955 of file or_options_st.h.
| double PathBiasExtremeRate |
Definition at line 954 of file or_options_st.h.
| double PathBiasExtremeUseRate |
Definition at line 979 of file or_options_st.h.
| double PathBiasNoticeRate |
Definition at line 952 of file or_options_st.h.
| double PathBiasNoticeUseRate |
Definition at line 978 of file or_options_st.h.
| int PathBiasScaleThreshold |
Definition at line 956 of file or_options_st.h.
| int PathBiasScaleUseThreshold |
Definition at line 980 of file or_options_st.h.
| int PathBiasUseThreshold |
Parameters for path-bias use detection
Similar to the above options, these options override the default behavior of Tor's (currently experimental) path use bias detection algorithm.
Where as the path bias parameters govern thresholds for successfully building circuits, these four path use bias parameters govern thresholds only for circuit usage. Circuits which receive no stream usage are not counted by this detection algorithm. A used circuit is considered successful if it is capable of carrying streams or otherwise receiving well-formed responses to RELAY cells.
By default, or if a negative value is provided for one of these options, Tor uses reasonable defaults from the networkstatus consensus document. If no defaults are available there, these options default to 20, .80, .60, and 100, respectively.
Definition at line 977 of file or_options_st.h.
Referenced by pathbias_get_min_use().
| double PathBiasWarnRate |
Definition at line 953 of file or_options_st.h.
| double PathsNeededToBuildCircuits |
Fraction:
Definition at line 986 of file or_options_st.h.
Referenced by get_frac_paths_needed_for_circs(), and options_validate_cb().
| uint64_t PerConnBWBurst |
Allowed burst on a single TLS conn, if set.
Definition at line 442 of file or_options_st.h.
Referenced by connection_or_update_token_buckets_helper(), options_act_relay_bandwidth(), and options_validate_relay_bandwidth().
| uint64_t PerConnBWRate |
Long-term bw on a single TLS conn, if set.
Definition at line 441 of file or_options_st.h.
Referenced by connection_or_update_token_buckets_helper(), options_act_relay_bandwidth(), and options_validate_relay_bandwidth().
| char* PidFile |
Where to store PID of Tor process.
Definition at line 110 of file or_options_st.h.
Referenced by options_act(), and tor_cleanup().
| int ProtocolWarnings |
Boolean: when other parties screw up the Tor protocol, is it a warn or an info in our logs?
Definition at line 589 of file or_options_st.h.
Referenced by options_act().
| int PublishHidServDescriptors |
Boolean: do we publish hidden service descriptors to the HS auths?
Definition at line 325 of file or_options_st.h.
| struct smartlist_t* PublishServerDescriptor |
To what authority types do we publish our descriptor? Choices are "v1", "v2", "v3", "bridge", or "".
Definition at line 321 of file or_options_st.h.
Referenced by compute_publishserverdescriptor(), and options_validate_publish_server().
| dirinfo_type_t PublishServerDescriptor_ |
A bitfield of authority types, derived from PublishServerDescriptor.
Definition at line 323 of file or_options_st.h.
Referenced by address_can_be_used(), compute_publishserverdescriptor(), decide_if_publishable_server(), directories_have_accepted_server_descriptor(), mark_my_descriptor_dirty(), options_validate_publish_server(), ready_to_publish(), and router_upload_dir_desc_to_dirservers().
| struct config_line_t* ReachableAddresses |
IP:ports our firewall allows.
Definition at line 372 of file or_options_st.h.
Referenced by options_validate_cb(), parse_reachable_addresses(), and validate_addr_policies().
| struct config_line_t* ReachableDirAddresses |
IP:ports for Dir conns.
Definition at line 374 of file or_options_st.h.
Referenced by options_validate_cb(), parse_reachable_addresses(), and validate_addr_policies().
| struct config_line_t* ReachableORAddresses |
IP:ports for OR conns.
Definition at line 373 of file or_options_st.h.
Referenced by options_validate_cb(), parse_reachable_addresses(), and validate_addr_policies().
| int ReconfigDropsBridgeDescs |
Boolean: if true, then this client will discard cached bridge descriptors on a setconf or other config change that impacts guards or bridges (see options_transition_affects_guards() for exactly which config changes trigger it). Useful for tools that test bridge reachability by fetching fresh descriptors.
Definition at line 311 of file or_options_st.h.
Referenced by options_act().
| int ReducedCircuitPadding |
Boolean: if true, then this client will only use circuit padding algorithms that are known to use a low amount of overhead. If false, we will use all available circuit padding algorithms.
Definition at line 317 of file or_options_st.h.
Referenced by options_validate_relay_padding().
| int ReducedConnectionPadding |
Boolean: Should we try to keep connections open shorter and pad them less against connection-level traffic analysis?
Definition at line 293 of file or_options_st.h.
Referenced by channelpadding_get_channel_idle_timeout(), channelpadding_get_circuits_available_timeout(), and options_validate_relay_padding().
| int ReducedExitPolicy |
Should we use the Reduced Exit Policy?
Definition at line 147 of file or_options_st.h.
Referenced by policies_parse_exit_policy_from_options(), and policy_using_default_exit_options().
| int ReevaluateExitPolicy |
Should we re-evaluate Exit Policy on existing connections when it changes?
Definition at line 148 of file or_options_st.h.
| int RefuseUnknownExits |
Whether we should drop exit streams from Tors that we don't know are relays. One of "0" (never refuse), "1" (always refuse), or "-1" (do what the consensus says, defaulting to 'refuse' if the consensus says nothing).
Definition at line 383 of file or_options_st.h.
Referenced by should_refuse_unknown_exits().
| struct smartlist_t* RejectPlaintextPorts |
Application ports that are likely to be unencrypted and unauthenticated; we reject requests for them to prevent the user from screwing up and leaking plaintext secrets to an observer somewhere on the Internet.
Definition at line 392 of file or_options_st.h.
Referenced by consider_plaintext_ports(), and options_validate_cb().
| uint64_t RelayBandwidthBurst |
How much bandwidth, at maximum, will we use in a second for all relayed conns?
Definition at line 439 of file or_options_st.h.
Referenced by connection_bucket_adjust(), connection_bucket_init(), options_act_relay_bandwidth(), options_validate_relay_bandwidth(), and relay_get_effective_bwburst().
| uint64_t RelayBandwidthRate |
How much bandwidth, on average, are we willing to use for all relayed conns?
Definition at line 437 of file or_options_st.h.
Referenced by bwhist_fill_bandwidth_history(), connection_bucket_adjust(), connection_bucket_init(), options_act_relay_bandwidth(), options_validate_relay_bandwidth(), relay_get_effective_bwrate(), router_has_bandwidth_to_be_dirserver(), and update_expected_bandwidth().
| int ReloadTorrcOnSIGHUP |
If true, SIGHUP should reload the torrc. Sometimes controllers want to make this false.
Definition at line 886 of file or_options_st.h.
Referenced by do_hup().
| struct config_line_t* RendConfigLines |
List of configuration lines for rendezvous services.
Definition at line 444 of file or_options_st.h.
Referenced by hs_config_service_all(), options_validate_cb(), options_validate_relay_accounting(), options_validate_relay_mode(), and warn_about_relative_paths().
| int RephistTrackTime |
How many seconds do we keep rephist info?
Definition at line 625 of file or_options_st.h.
Referenced by clean_caches_callback().
| int RunAsDaemon |
If true, run in the background. (Unix only)
Definition at line 367 of file or_options_st.h.
Referenced by options_act(), options_act_once_on_startup(), options_init_logs(), and options_validate_cb().
| char* SafeLogging |
Contains "relay", "1", "0" (meaning no scrubbing).
Definition at line 579 of file or_options_st.h.
Referenced by options_validate_cb().
| int SafeSocks |
Boolean: should we outright refuse application connections that use socks4 or socks5-with-local-dns?
Definition at line 587 of file or_options_st.h.
Referenced by connection_ap_handshake_process_socks().
| int Sandbox |
Boolean: should sandboxing be enabled?
Definition at line 586 of file or_options_st.h.
Referenced by list_family_key_files(), options_act(), and pt_parse_transport_line().
| int SbwsExit |
Boolean: Switch to specify this is an sbws measurement exit
Definition at line 623 of file or_options_st.h.
| struct smartlist_t* Schedulers |
The list of scheduler type string ordered by priority that is first one has to be tried first. Default: KIST,KISTLite,Vanilla
Definition at line 1070 of file or_options_st.h.
| struct smartlist_t* SchedulerTypes_ |
An ordered list of scheduler_types mapped from Schedulers.
Definition at line 1072 of file or_options_st.h.
Referenced by options_clear_cb().
| int ServerDNSAllowBrokenConfig |
Boolean: if set, we start even if our resolv.conf file is missing or broken.
Definition at line 661 of file or_options_st.h.
| int ServerDNSAllowNonRFC953Hostnames |
If true, we try resolving hostnames with weird characters.
Definition at line 673 of file or_options_st.h.
| int ServerDNSDetectHijacking |
Boolean: If true, check for DNS failure hijacking.
Definition at line 646 of file or_options_st.h.
| int ServerDNSRandomizeCase |
Boolean: Use the 0x20-hack to prevent DNS poisoning attacks.
Definition at line 648 of file or_options_st.h.
| char* ServerDNSResolvConfFile |
If provided, we configure our internal resolver from the file here rather than from /etc/resolv.conf (Unix) or the registry (Windows).
Definition at line 650 of file or_options_st.h.
Referenced by configure_nameservers().
| int ServerDNSSearchDomains |
Boolean: If set, we don't force exit addresses to be FQDNs, but rather search for them in the local domains.
Definition at line 643 of file or_options_st.h.
Referenced by launch_one_resolve().
| struct smartlist_t* ServerDNSTestAddresses |
A list of addresses that definitely should be resolvable. Used for testing our DNS server.
Definition at line 667 of file or_options_st.h.
Referenced by add_wildcarded_test_address(), is_test_address(), and launch_test_addresses().
| struct config_line_t* ServerTransportListenAddr |
List of TCP/IP addresses that transports should listen at.
Definition at line 276 of file or_options_st.h.
Referenced by options_validate_server_transport(), options_validate_server_transport(), and pt_get_bindaddr_from_config().
| struct config_line_t* ServerTransportOptions |
List of options that must be passed to pluggable transports.
Definition at line 279 of file or_options_st.h.
Referenced by options_validate_server_transport(), options_validate_server_transport(), and pt_get_options_for_server_transport().
| struct config_line_t* ServerTransportPlugin |
List of client transport plugins.
Definition at line 272 of file or_options_st.h.
Referenced by extrainfo_dump_to_string_stats_helper(), options_act_server_transport(), options_validate_server_transport(), and options_validate_server_transport().
| int ShutdownWaitLength |
When we get a SIGINT and we're a server, how long do we wait before exiting?
Definition at line 577 of file or_options_st.h.
Referenced by hibernate_begin().
| int SigningKeyLifetime |
For how long (seconds) do we declare our signing keys to be valid?
Definition at line 1003 of file or_options_st.h.
Referenced by load_ed_keys(), and options_validate_relay_testing().
| char* Socks4Proxy |
hostname:port to use as a SOCKS4 proxy, if any.
Definition at line 465 of file or_options_st.h.
Referenced by conn_get_proxy_type(), directory_initiate_request(), get_proxy_addrport(), get_pt_proxy_uri(), options_validate_cb(), and pt_parse_transport_line().
| tor_addr_t Socks4ProxyAddr |
Derived from Socks4Proxy.
Definition at line 466 of file or_options_st.h.
Referenced by get_proxy_addrport(), get_pt_proxy_uri(), and options_validate_cb().
| uint16_t Socks4ProxyPort |
Derived from Socks4Proxy.
Definition at line 467 of file or_options_st.h.
Referenced by get_proxy_addrport(), get_pt_proxy_uri(), and options_validate_cb().
| char* Socks5Proxy |
hostname:port to use as a SOCKS5 proxy, if any.
Definition at line 469 of file or_options_st.h.
Referenced by conn_get_proxy_type(), directory_initiate_request(), get_proxy_addrport(), get_pt_proxy_uri(), options_validate_cb(), and pt_parse_transport_line().
| tor_addr_t Socks5ProxyAddr |
Derived from Sock5Proxy.
Definition at line 470 of file or_options_st.h.
Referenced by get_proxy_addrport(), get_pt_proxy_uri(), and options_validate_cb().
| char* Socks5ProxyPassword |
Password for SOCKS5 authentication, if any
Definition at line 473 of file or_options_st.h.
Referenced by connection_read_proxy_handshake(), get_pt_proxy_uri(), and options_validate_cb().
| uint16_t Socks5ProxyPort |
Derived from Socks5Proxy.
Definition at line 471 of file or_options_st.h.
Referenced by get_proxy_addrport(), get_pt_proxy_uri(), and options_validate_cb().
| char* Socks5ProxyUsername |
Username for SOCKS5 authentication, if any
Definition at line 472 of file or_options_st.h.
Referenced by connection_read_proxy_handshake(), connection_socks5_proxy_connect(), get_pt_proxy_uri(), and options_validate_cb().
| struct config_line_t* SocksPolicy |
Lists of socks policy components
Definition at line 150 of file or_options_st.h.
Referenced by policies_parse_from_options(), and validate_addr_policies().
| struct config_line_t* SocksPort_lines |
Ports to listen on for SOCKS connections.
Definition at line 176 of file or_options_st.h.
Referenced by parse_ports().
| unsigned int SocksPort_set |
Definition at line 230 of file or_options_st.h.
| int SocksTimeout |
How long do we let a socks connection wait unattached before we fail it?
Definition at line 411 of file or_options_st.h.
Referenced by connection_ap_expire_beginning(), and connection_ap_handshake_attach_circuit().
| int SSLKeyLifetime |
What expiry time shall we place on our SSL certs? "0" means we should guess a suitable value.
Definition at line 990 of file or_options_st.h.
Referenced by router_initialize_tls_context().
| int StrictNodes |
Boolean: When none of our EntryNodes or ExitNodes are up, or we need to access a node in ExcludeNodes, do we just fail instead?
Definition at line 121 of file or_options_st.h.
Referenced by client_get_random_intro(), connection_ap_handshake_rewrite_and_attach(), directory_post_to_dirservers(), directory_request_set_dir_from_routerstatus(), hs_pick_hsdir(), options_act(), options_validate_cb(), router_should_check_reachability(), and warn_if_last_router_excluded().
| struct config_suite_t* subconfigs_ |
Configuration objects for individual modules.
Never access this field or its members directly: instead, use the module in question to get its relevant configuration object.
Definition at line 1121 of file or_options_st.h.
| char* SyslogIdentityTag |
Identity tag to add for syslog logging.
Definition at line 79 of file or_options_st.h.
Referenced by options_init_logs().
| char* TCPProxy |
protocol and hostname:port to use as a proxy, if any.
Definition at line 475 of file or_options_st.h.
Referenced by conn_get_proxy_type(), get_proxy_addrport(), options_validate_cb(), and pt_parse_transport_line().
| tor_addr_t TCPProxyAddr |
Derived from TCPProxy.
Definition at line 477 of file or_options_st.h.
Referenced by get_proxy_addrport(), and parse_tcp_proxy_line().
| uint16_t TCPProxyPort |
Derived from TCPProxy.
Definition at line 478 of file or_options_st.h.
Referenced by get_proxy_addrport(), and parse_tcp_proxy_line().
| tcp_proxy_protocol_t TCPProxyProtocol |
Derived from TCPProxy.
Definition at line 476 of file or_options_st.h.
Referenced by conn_get_proxy_type(), get_proxy_addrport(), and parse_tcp_proxy_line().
| int TestingAuthKeyLifetime |
For how long (seconds) do we declare our auth keys to be valid?
Definition at line 1007 of file or_options_st.h.
Referenced by load_ed_keys(), and options_validate_relay_testing().
| int TestingAuthKeySlop |
How long before auth keys expire will we try to make a new one?
Definition at line 1014 of file or_options_st.h.
Referenced by load_ed_keys(), options_validate_relay_testing(), and should_make_new_ed_keys().
| int TestingBridgeBootstrapDownloadInitialDelay |
Schedule for when clients should download bridge descriptors when they have no running bridges. Only altered on testing networks.
Definition at line 843 of file or_options_st.h.
Referenced by find_dl_min_delay().
| int TestingBridgeDownloadInitialDelay |
Schedule for when clients should download bridge descriptors. Only altered on testing networks.
Definition at line 839 of file or_options_st.h.
Referenced by learned_bridge_descriptor().
| int TestingClientConsensusDownloadInitialDelay |
Schedule for when clients should download consensuses. Only altered on testing networks.
Definition at line 805 of file or_options_st.h.
Referenced by find_dl_min_delay().
| int TestingClientDownloadInitialDelay |
Schedule for when clients should download things in general. Only altered on testing networks.
Definition at line 797 of file or_options_st.h.
Referenced by find_dl_min_delay().
| int TestingClientMaxIntervalWithoutRequest |
When directory clients have only a few descriptors to request, they batch them until they have more, or until this amount of time has passed. Only altered on testing networks.
Definition at line 848 of file or_options_st.h.
Referenced by launch_descriptor_downloads(), and options_validate_cb().
| int TestingDirConnectionMaxStall |
How long do we let a directory connection stall before expiring it? Only altered on testing networks.
Definition at line 852 of file or_options_st.h.
Referenced by options_validate_cb(), and run_connection_housekeeping().
| int TestingEnableCellStatsEvent |
Enable CELL_STATS events. Only altered on testing networks.
Definition at line 868 of file or_options_st.h.
Referenced by options_validate_cb().
| int TestingEnableConnBwEvent |
Enable CONN_BW events. Only altered on testing networks.
Definition at line 865 of file or_options_st.h.
Referenced by connection_buf_read_from_socket(), connection_handle_write_impl(), and options_validate_cb().
| int TestingLinkCertLifetime |
For how long (seconds) do we declare our link keys to be valid?
Definition at line 1005 of file or_options_st.h.
Referenced by generate_ed_link_cert(), and options_validate_relay_testing().
| int TestingLinkKeySlop |
How long before link keys expire will we try to make a new one?
Definition at line 1012 of file or_options_st.h.
Referenced by generate_ed_link_cert(), options_validate_relay_testing(), and should_make_new_ed_keys().
| int TestingMinTimeToReportBandwidth |
How far must we be into the current bandwidth-measurement period to report bandwidth observations from this period?
Definition at line 1113 of file or_options_st.h.
Referenced by bwhist_bandwidth_assess().
| int TestingServerConsensusDownloadInitialDelay |
Schedule for when servers should download consensuses. Only altered on testing networks.
Definition at line 801 of file or_options_st.h.
Referenced by find_dl_min_delay().
| int TestingServerDownloadInitialDelay |
Schedule for when servers should download things in general. Only altered on testing networks.
Definition at line 793 of file or_options_st.h.
Referenced by find_dl_min_delay().
| int TestingSigningKeySlop |
How long before signing keys expire will we try to make a new one?
Definition at line 1010 of file or_options_st.h.
Referenced by load_ed_keys(), options_validate_relay_testing(), and should_make_new_ed_keys().
| int TestingTorNetwork |
If true, we take part in a testing network. Change the defaults of a couple of other configuration options and allow to change the values of certain configuration options.
Definition at line 862 of file or_options_st.h.
Referenced by check_descriptor_bandwidth_changed(), config_service(), dirauth_set_routerstatus_from_routerinfo(), dirserv_compute_performance_thresholds(), fetch_networkstatus_callback(), get_voting_interval(), hs_hsdir_requery_period(), networkstatus_parse_vote_from_string(), options_init_from_string(), options_validate_cb(), options_validate_dirauth_mode(), options_validate_dirauth_schedule(), rep_hist_note_router_reachable(), router_counts_toward_thresholds(), and router_orport_found_reachable().
| int TestingV3AuthInitialDistDelay |
The length of time we think it will take to distribute initial signatures. Only altered on testing networks.
Definition at line 785 of file or_options_st.h.
Referenced by options_validate_dirauth_testing().
| int TestingV3AuthInitialVoteDelay |
The length of time we think it will take to distribute initial votes. Only altered on testing networks.
Definition at line 781 of file or_options_st.h.
Referenced by options_validate_dirauth_testing().
| int TestingV3AuthInitialVotingInterval |
The length of time that we think an initial consensus should be fresh. Only altered on testing networks.
Definition at line 777 of file or_options_st.h.
Referenced by dirserv_generate_networkstatus_vote_obj(), and options_validate_dirauth_testing().
| int TestingV3AuthVotingStartOffset |
Offset in seconds added to the starting time for consensus voting. Only altered on testing networks.
Definition at line 789 of file or_options_st.h.
Referenced by dirauth_sched_get_cur_valid_after_time(), dirserv_generate_networkstatus_vote_obj(), and options_validate_dirauth_testing().
| int TestSocks |
Boolean: when we get a socks connection, do we loudly log whether it was DNS-leaking or not?
Definition at line 591 of file or_options_st.h.
Referenced by connection_ap_handshake_process_socks().
| int TokenBucketRefillInterval |
Token Bucket Refill resolution in milliseconds.
Definition at line 594 of file or_options_st.h.
Referenced by init_libevent(), options_validate_cb(), and reenable_blocked_connection_init().
| struct smartlist_t* TrackHostExits |
Should we try to reuse the same exit node for a given host
Definition at line 398 of file or_options_st.h.
Referenced by consider_recording_trackhost(), hostname_in_track_host_exits(), and options_act().
| int TrackHostExitsExpire |
Number of seconds until we expire an addressmap
Definition at line 399 of file or_options_st.h.
Referenced by consider_recording_trackhost().
| struct config_line_t* TransPort_lines |
Ports to listen on for transparent pf/netfilter connections.
Definition at line 178 of file or_options_st.h.
Referenced by parse_ports().
| unsigned int TransPort_set |
Definition at line 231 of file or_options_st.h.
| char* TransProxyType |
What kind of transparent proxy implementation are we using?
Definition at line 179 of file or_options_st.h.
Referenced by connection_ap_get_original_destination(), and options_validate_cb().
| enum { ... } TransProxyType_parsed |
Parsed value of TransProxyType.
Referenced by connection_ap_get_original_destination(), connection_listener_new(), options_start_listener_transaction(), and options_validate_cb().
| int TruncateLogFile |
Boolean: Should we truncate the log file before we start writing?
Definition at line 77 of file or_options_st.h.
Referenced by do_hup(), and options_init_logs().
| int UnixSocksGroupWritable |
Boolean: Are SOCKS Unix sockets g+rw?
Definition at line 198 of file or_options_st.h.
Referenced by parse_ports().
| int UpdateBridgesFromAuthority |
Boolean: if we know the bridge's digest, should we get new descriptors from the bridge authorities or from the bridge itself?
Definition at line 287 of file or_options_st.h.
Referenced by fetch_bridge_descriptors().
| int use_keygen_passphrase_fd |
Definition at line 1027 of file or_options_st.h.
| int UseBridges |
Boolean: should we start all circuits with a bridge?
Definition at line 266 of file or_options_st.h.
Referenced by authority_certs_fetch_missing(), choose_guard_selection(), circuit_get_open_circ_or_launch(), compute_frac_paths_available(), dirclient_fetches_dir_info_later(), directory_get_from_dirserver(), directory_pick_generic_dirserver(), entry_list_is_constrained(), options_act(), options_validate_cb(), reachable_addr_use_ipv6(), second_elapsed_callback(), and should_delay_dir_fetches().
| int UseDefaultFallbackDirs |
Whether to use the default hard-coded FallbackDirs
Definition at line 488 of file or_options_st.h.
Referenced by consider_adding_dir_servers(), and options_validate_cb().
| int UseEntryGuards |
Internal variable to remember whether we're actually acting on UseEntryGuards_option – when we're a non-anonymous Single Onion Service, it is always false, otherwise we use the value of UseEntryGuards_option.
Definition at line 603 of file or_options_st.h.
Referenced by choose_good_entry_server(), options_act(), options_validate_cb(), options_validate_dirauth_mode(), and should_use_directory_guards().
| int UseEntryGuards_option |
Boolean: Do we try to enter from a smallish number of fixed nodes?
Definition at line 598 of file or_options_st.h.
Referenced by options_validate_cb().
| int UseGuardFraction |
If 1, we use any guardfraction information we see in the consensus. If 0, we don't. If -1, let the consensus parameter decide.
Definition at line 610 of file or_options_st.h.
Referenced by should_apply_guardfraction().
| int UseMicrodescriptors |
If 1, we try to use microdescriptors to build circuits. If 0, we don't. If -1, Tor decides.
Definition at line 910 of file or_options_st.h.
Referenced by we_use_microdescriptors_for_circuits().
| char* User |
Name of user to run Tor as.
Definition at line 168 of file or_options_st.h.
Referenced by config_service(), connection_listener_new(), connection_listener_new_for_port(), create_keys_directory(), hs_config_client_authorization(), options_create_directories(), options_switch_id(), and store_permanent_client_auth_credentials().
| int UsingTestNetworkDefaults_ |
Set to true if the TestingTorNetwork configuration option is set. This is used so that options_validate() has a chance to realize that the defaults have changed.
Definition at line 906 of file or_options_st.h.
Referenced by options_validate_cb().
| int V3AuthDistDelay |
The length of time we think it will take to distribute signatures.
Definition at line 761 of file or_options_st.h.
Referenced by dirvote_get_preferred_voting_intervals(), and options_validate_dirauth_schedule().
| int V3AuthNIntervalsValid |
The number of intervals we think a consensus should be valid.
Definition at line 763 of file or_options_st.h.
Referenced by dirvote_get_preferred_voting_intervals(), and options_validate_dirauth_schedule().
| int V3AuthoritativeDir |
Boolean: is this an authoritative directory for version 3 directories?
Definition at line 250 of file or_options_st.h.
Referenced by init_keys(), options_validate_dirauth_mode(), and router_dump_router_to_string().
| int V3AuthUseLegacyKey |
Should advertise and sign consensuses with a legacy key, for key migration purposes?
Definition at line 767 of file or_options_st.h.
Referenced by dirserv_generate_networkstatus_vote_obj().
| int V3AuthVoteDelay |
The length of time we think it will take to distribute votes.
Definition at line 759 of file or_options_st.h.
Referenced by dirvote_get_preferred_voting_intervals(), and options_validate_dirauth_schedule().
| int V3AuthVotingInterval |
The length of time that we think a consensus should be fresh.
Definition at line 757 of file or_options_st.h.
Referenced by dirauth_sched_get_configured_interval(), dirvote_get_preferred_voting_intervals(), options_validate_dirauth_schedule(), and options_validate_dirauth_testing().
| char* V3BandwidthsFile |
Location of bandwidth measurement file
Definition at line 770 of file or_options_st.h.
Referenced by dirserv_generate_networkstatus_vote_obj(), handle_get_next_bandwidth(), and options_validate_dirauth_mode().
| int VanguardsLiteEnabled |
Boolean: Switch to toggle the vanguards-lite subsystem
Definition at line 617 of file or_options_st.h.
Referenced by vanguards_lite_is_enabled().
| char* VirtualAddrNetworkIPv4 |
Address and mask to hand out for virtual MAPADDRESS requests for IPv4 addresses
Definition at line 639 of file or_options_st.h.
Referenced by options_act(), and options_validate_cb().
| char* VirtualAddrNetworkIPv6 |
Address and mask to hand out for virtual MAPADDRESS requests for IPv6 addresses
Definition at line 641 of file or_options_st.h.
Referenced by options_act(), and options_validate_cb().
| struct smartlist_t* WarnPlaintextPorts |
Related to RejectPlaintextPorts above, except this config option controls whether we warn (in the log and via a controller status event) every time a risky connection is attempted.
Definition at line 396 of file or_options_st.h.
Referenced by consider_plaintext_ports(), and options_validate_cb().