summaryrefslogtreecommitdiff
path: root/src/or/config.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-10-29 19:20:02 +0000
committerNick Mathewson <nickm@torproject.org>2008-10-29 19:20:02 +0000
commit0c9dfffe5a19da330f3c2b6daa33c40aa786ba06 (patch)
tree6753fc75a167c7ed8b79271618232d79e10bca98 /src/or/config.c
parentc8a5e2d588e0d91fd13070dc0ee4d6b19de779c3 (diff)
downloadtor-0c9dfffe5a19da330f3c2b6daa33c40aa786ba06.tar.gz
tor-0c9dfffe5a19da330f3c2b6daa33c40aa786ba06.zip
Implement the 0x20-hack to make DNS poisoning harder against us, especially when resolving large names. Add a cfg option to disable it, since apparently 3/10 of a percent of servers get it wrong.
svn:r17171
Diffstat (limited to 'src/or/config.c')
-rw-r--r--src/or/config.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/or/config.c b/src/or/config.c
index a704b7e6ca..bd42860011 100644
--- a/src/or/config.c
+++ b/src/or/config.c
@@ -292,6 +292,7 @@ static config_var_t _option_vars[] = {
V(ServerDNSAllowBrokenResolvConf, BOOL, "0"),
V(ServerDNSAllowNonRFC953Hostnames, BOOL,"0"),
V(ServerDNSDetectHijacking, BOOL, "1"),
+ V(ServerDNSRandomizeCase, BOOL, "1"),
V(ServerDNSResolvConfFile, STRING, NULL),
V(ServerDNSSearchDomains, BOOL, "0"),
V(ServerDNSTestAddresses, CSV,