|
@@ -2822,6 +2822,7 @@ connection_control_process_inbuf_v0(control_connection_t *conn)
|
|
|
uint32_t body_len;
|
|
|
uint16_t command_type;
|
|
|
char *body=NULL;
|
|
|
+ static int have_warned_about_v0_protocol = 0;
|
|
|
|
|
|
again:
|
|
|
/* Try to suck a control message from the buffer. */
|
|
@@ -2850,6 +2851,15 @@ connection_control_process_inbuf_v0(control_connection_t *conn)
|
|
|
tor_assert(0);
|
|
|
}
|
|
|
|
|
|
+ if (!have_warned_about_v0_protocol) {
|
|
|
+ log_warn(LD_CONTROL, "An application has connected to us using the "
|
|
|
+ "version 0 control prototol, which has been deprecated since "
|
|
|
+ "Tor 0.1.1.1-alpha. This protocol will not be supported by "
|
|
|
+ "future versions of Tor; please use the v1 control protocol "
|
|
|
+ "instead.");
|
|
|
+ have_warned_about_v0_protocol = 1;
|
|
|
+ }
|
|
|
+
|
|
|
/* We got a command. If we need authentication, only authentication
|
|
|
* commands will be considered. */
|
|
|
if (conn->_base.state == CONTROL_CONN_STATE_NEEDAUTH_V0 &&
|