o Minor features:
- Use a lockfile to make sure that two Tor processes are not
simultaneously running with the same datadir.
+ - Directory mirrors store and serve v2 hidden service descriptors by
+ default (new default value for HidServDirectoryV2 is 1).
o Code simplifications and refactoring:
- Revise the connection_new functions so that a more typesafe variant
.TP
\fBHidServDirectoryV2 \fR\fB0\fR|\fB1\fR\fP
When this option is set, Tor accepts and serves v2 hidden service
-descriptors. (Default: 0)
+descriptors. (Default: 1)
.LP
.TP
\fBBridgeAuthoritativeDir \fR\fB0\fR|\fB1\fR\fP
V(Group, STRING, NULL),
V(HardwareAccel, BOOL, "0"),
V(HashedControlPassword, LINELIST, NULL),
- V(HidServDirectoryV2, BOOL, "0"),
+ V(HidServDirectoryV2, BOOL, "1"),
VAR("HiddenServiceDir", LINELIST_S, RendConfigLines, NULL),
OBSOLETE("HiddenServiceExcludeNodes"),
OBSOLETE("HiddenServiceNodes"),
REJECT("HSAuthorityRecordStats is set but we're not running as "
"a hidden service authority.");
- if (options->HidServDirectoryV2 && !options->DirPort)
- REJECT("Running as hidden service directory, but no DirPort set.");
-
if (options->ConnLimit <= 0) {
r = tor_snprintf(buf, sizeof(buf),
"ConnLimit must be greater than 0, but was set to %d",
onion_pkey, identity_pkey,
family_line,
we_are_hibernating() ? "opt hibernating 1\n" : "",
- options->HidServDirectoryV2 ? "opt hidden-service-dir\n" : "");
+ (options->DirPort && options->HidServDirectoryV2) ?
+ "opt hidden-service-dir\n" : "");
tor_free(family_line);
tor_free(onion_pkey);
routerstatus_t *rs;
if (!me)
return 0;
- if (!get_options()->HidServDirectoryV2) {
+ if (!get_options()->DirPort || !get_options()->HidServDirectoryV2) {
log_info(LD_REND, "We are not acting as hidden service directory, "
"because we have not been configured as such.");
return 0;