| 
					
				 | 
			
			
				@@ -169,8 +169,6 @@ static config_abbrev_t option_abbrevs_[] = { 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   { "BridgeAuthoritativeDirectory", "BridgeAuthoritativeDir", 0, 0}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   { "HashedControlPassword", "__HashedControlSessionPassword", 1, 0}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   { "VirtualAddrNetwork", "VirtualAddrNetworkIPv4", 0, 0}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  { "ClientDNSRejectInternalAddresses", 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-    "TestingClientDNSRejectInternalAddresses", 0, 1, }, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   { NULL, NULL, 0, 0}, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 }; 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -262,7 +260,7 @@ static config_var_t option_vars_[] = { 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(CircuitsAvailableTimeout,    INTERVAL, "0"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(CircuitStreamTimeout,        INTERVAL, "0"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(CircuitPriorityHalflife,     DOUBLE,  "-100.0"), /*negative:'Use default'*/ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  V(TestingClientDNSRejectInternalAddresses, BOOL,"1"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  V(ClientDNSRejectInternalAddresses, BOOL,"1"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(ClientOnly,                  BOOL,     "0"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(ClientPreferIPv6ORPort,      AUTOBOOL, "auto"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(ClientPreferIPv6DirPort,     AUTOBOOL, "auto"), 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -648,7 +646,7 @@ static const config_var_t testing_tor_network_defaults[] = { 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				     "0, 1, 4, 4, 4, 4, 4, 4, 4, 4, 4, 4, 8, 16, 32, 60"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(ClientBootstrapConsensusMaxDownloadTries, UINT, "80"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries, UINT, "80"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  V(TestingClientDNSRejectInternalAddresses, BOOL,"0"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  V(ClientDNSRejectInternalAddresses, BOOL,"0"), // deprecated in 0.2.9.2-alpha 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(ClientRejectInternalAddresses, BOOL,   "0"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(CountPrivateBandwidth,       BOOL,     "1"), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   V(ExitPolicyRejectPrivate,     BOOL,     "0"), 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -693,7 +691,14 @@ static const config_var_t testing_tor_network_defaults[] = { 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 #undef OBSOLETE 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 static const config_deprecation_t option_deprecation_notes_[] = { 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  /* Deprecated since 0.3.2.1-alpha. */ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  /* Deprecated since 0.2.9.2-alpha... */ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  { "AllowDotExit", "Unrestricted use of the .exit notation can be used for " 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+    "a wide variety of application-level attacks." }, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  { "ClientDNSRejectInternalAddresses", "Turning this on makes your client " 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+    "easier to fingerprint, and may open you to esoteric attacks." }, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  /* End of options deprecated since 0.2.9.2-alpha. */ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+  /* Deprecated since 0.3.2.0-alpha. */ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   { "HTTPProxy", "It only applies to direct unencrypted HTTP connections " 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				     "to your directory server, which your Tor probably wasn't using." }, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   { "HTTPProxyAuthenticator", "HTTPProxy is deprecated in favor of HTTPSProxy " 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -4211,7 +4216,6 @@ options_validate(or_options_t *old_options, or_options_t *options, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   CHECK_DEFAULT(TestingSigningKeySlop); 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   CHECK_DEFAULT(TestingAuthKeySlop); 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   CHECK_DEFAULT(TestingLinkKeySlop); 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-  CHECK_DEFAULT(TestingClientDNSRejectInternalAddresses); 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 #undef CHECK_DEFAULT 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				   if (options->SigningKeyLifetime < options->TestingSigningKeySlop*2) 
			 |