From 8a341cc429879e642862cb16a9de5da889867020 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Wed, 6 Jun 2012 12:00:04 -0400 Subject: Change the default for DynamicDHGroups to 0 This feature can make Tor relays less identifiable by their use of the mod_ssl DH group, but at the cost of some usability (#4721) and bridge tracing (#6087) regressions. We should try to turn this on by default again if we find that the mod_ssl group is uncommon and/or we move to a different DH group size (see #6088). Before we can do so, we need a fix for bugs #6087 and Resolves ticket #5598 for now. --- doc/tor.1.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'doc') diff --git a/doc/tor.1.txt b/doc/tor.1.txt index 00371c380..f5e5b86c2 100644 --- a/doc/tor.1.txt +++ b/doc/tor.1.txt @@ -266,7 +266,7 @@ Other options can be specified either on the command-line (--option If this option is set to 1, when running as a server, generate our own Diffie-Hellman group instead of using the one from Apache's mod_ssl. This option may help circumvent censorship based on static - Diffie-Hellman parameters. (Default: 1). + Diffie-Hellman parameters. (Default: 0). **AlternateDirAuthority** [__nickname__] [**flags**] __address__:__port__ __fingerprint__ + -- cgit v1.2.3