diff options
author | Nick Mathewson <nickm@torproject.org> | 2008-10-29 19:20:02 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2008-10-29 19:20:02 +0000 |
commit | 0c9dfffe5a19da330f3c2b6daa33c40aa786ba06 (patch) | |
tree | 6753fc75a167c7ed8b79271618232d79e10bca98 /src/or/config.c | |
parent | c8a5e2d588e0d91fd13070dc0ee4d6b19de779c3 (diff) | |
download | tor-0c9dfffe5a19da330f3c2b6daa33c40aa786ba06.tar.gz tor-0c9dfffe5a19da330f3c2b6daa33c40aa786ba06.zip |
Implement the 0x20-hack to make DNS poisoning harder against us, especially when resolving large names. Add a cfg option to disable it, since apparently 3/10 of a percent of servers get it wrong.
svn:r17171
Diffstat (limited to 'src/or/config.c')
-rw-r--r-- | src/or/config.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/or/config.c b/src/or/config.c index a704b7e6ca..bd42860011 100644 --- a/src/or/config.c +++ b/src/or/config.c @@ -292,6 +292,7 @@ static config_var_t _option_vars[] = { V(ServerDNSAllowBrokenResolvConf, BOOL, "0"), V(ServerDNSAllowNonRFC953Hostnames, BOOL,"0"), V(ServerDNSDetectHijacking, BOOL, "1"), + V(ServerDNSRandomizeCase, BOOL, "1"), V(ServerDNSResolvConfFile, STRING, NULL), V(ServerDNSSearchDomains, BOOL, "0"), V(ServerDNSTestAddresses, CSV, |