aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2013-09-19 10:40:41 -0400
committerNick Mathewson <nickm@torproject.org>2013-10-08 16:32:07 -0400
commit72c1e5acfe1c6f04f4d7d398fc4a964d4bc5b62e (patch)
tree1ce001a115af1a80b1cf6d8103a2e6bcc7ba73c4 /doc
parentfa1034cd999f19a50e6183dac6c65b3acaefe856 (diff)
downloadtor-72c1e5acfe1c6f04f4d7d398fc4a964d4bc5b62e.tar
tor-72c1e5acfe1c6f04f4d7d398fc4a964d4bc5b62e.tar.gz
Switch ECDHE group default logic for bridge/relay TLS
According to the manpage, bridges use P256 for conformity and relays use P224 for speed. But skruffy points out that we've gotten it backwards in the code. In this patch, we make the default P256 for everybody. Fixes bug 9780; bugfix on 0.2.4.8-alpha.
Diffstat (limited to 'doc')
-rw-r--r--doc/tor.1.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/tor.1.txt b/doc/tor.1.txt
index b20627546..38423c292 100644
--- a/doc/tor.1.txt
+++ b/doc/tor.1.txt
@@ -1642,7 +1642,7 @@ is non-zero):
What EC group should we try to use for incoming TLS connections?
P224 is faster, but makes us stand out more. Has no effect if
we're a client, or if our OpenSSL version lacks support for ECDHE.
- (Default: P224 for public servers; P256 for bridges.)
+ (Default: P256)
[[CellStatistics]] **CellStatistics** **0**|**1**::
When this option is enabled, Tor writes statistics on the mean time that