|
@@ -3082,16 +3082,16 @@ dirserv_generate_networkstatus_vote_obj(crypto_pk_t *private_key,
|
|
|
/* These are hardwired, to avoid disaster. */
|
|
|
v3_out->recommended_relay_protocols =
|
|
|
tor_strdup("Cons=1-2 Desc=1-2 DirCache=1 HSDir=1 HSIntro=3 HSRend=1 "
|
|
|
- "Link=4 LinkAuth=1 Microdesc=1-2 Relay=2");
|
|
|
+ "Link=4 Microdesc=1-2 Relay=2");
|
|
|
v3_out->recommended_client_protocols =
|
|
|
tor_strdup("Cons=1-2 Desc=1-2 DirCache=1 HSDir=1 HSIntro=3 HSRend=1 "
|
|
|
- "Link=4 LinkAuth=1 Microdesc=1-2 Relay=2");
|
|
|
+ "Link=4 Microdesc=1-2 Relay=2");
|
|
|
v3_out->required_client_protocols =
|
|
|
tor_strdup("Cons=1-2 Desc=1-2 DirCache=1 HSDir=1 HSIntro=3 HSRend=1 "
|
|
|
- "Link=4 LinkAuth=1 Microdesc=1-2 Relay=2");
|
|
|
+ "Link=4 Microdesc=1-2 Relay=2");
|
|
|
v3_out->required_relay_protocols =
|
|
|
tor_strdup("Cons=1 Desc=1 DirCache=1 HSDir=1 HSIntro=3 HSRend=1 "
|
|
|
- "Link=3-4 LinkAuth=1 Microdesc=1 Relay=1-2");
|
|
|
+ "Link=3-4 Microdesc=1 Relay=1-2");
|
|
|
|
|
|
/* We are not allowed to vote to require anything we don't have. */
|
|
|
tor_assert(protover_all_supported(v3_out->required_relay_protocols, NULL));
|