diff options
author | Nick Mathewson <nickm@torproject.org> | 2013-09-19 10:40:41 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2013-10-08 16:32:07 -0400 |
commit | 72c1e5acfe1c6f04f4d7d398fc4a964d4bc5b62e (patch) | |
tree | 1ce001a115af1a80b1cf6d8103a2e6bcc7ba73c4 /doc | |
parent | fa1034cd999f19a50e6183dac6c65b3acaefe856 (diff) | |
download | tor-72c1e5acfe1c6f04f4d7d398fc4a964d4bc5b62e.tar.gz tor-72c1e5acfe1c6f04f4d7d398fc4a964d4bc5b62e.zip |
Switch ECDHE group default logic for bridge/relay TLS
According to the manpage, bridges use P256 for conformity and relays
use P224 for speed. But skruffy points out that we've gotten it
backwards in the code.
In this patch, we make the default P256 for everybody.
Fixes bug 9780; bugfix on 0.2.4.8-alpha.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/tor.1.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/tor.1.txt b/doc/tor.1.txt index b206275461..38423c292f 100644 --- a/doc/tor.1.txt +++ b/doc/tor.1.txt @@ -1642,7 +1642,7 @@ is non-zero): What EC group should we try to use for incoming TLS connections? P224 is faster, but makes us stand out more. Has no effect if we're a client, or if our OpenSSL version lacks support for ECDHE. - (Default: P224 for public servers; P256 for bridges.) + (Default: P256) [[CellStatistics]] **CellStatistics** **0**|**1**:: When this option is enabled, Tor writes statistics on the mean time that |