|
@@ -230,6 +230,8 @@ static config_var_t _option_vars[] = {
|
|
VAR("RunTesting", BOOL, RunTesting, "0"),
|
|
VAR("RunTesting", BOOL, RunTesting, "0"),
|
|
VAR("SafeLogging", BOOL, SafeLogging, "1"),
|
|
VAR("SafeLogging", BOOL, SafeLogging, "1"),
|
|
VAR("SafeSocks", BOOL, SafeSocks, "0"),
|
|
VAR("SafeSocks", BOOL, SafeSocks, "0"),
|
|
|
|
+ VAR("ServerDNSAllowNonRFC953Hostnames", BOOL,
|
|
|
|
+ ServerDNSAllowNonRFC953Hostnames, "0"),
|
|
VAR("ServerDNSDetectHijacking",BOOL, ServerDNSDetectHijacking,"1"),
|
|
VAR("ServerDNSDetectHijacking",BOOL, ServerDNSDetectHijacking,"1"),
|
|
VAR("ServerDNSResolvConfFile", STRING, ServerDNSResolvConfFile, NULL),
|
|
VAR("ServerDNSResolvConfFile", STRING, ServerDNSResolvConfFile, NULL),
|
|
VAR("ServerDNSSearchDomains", BOOL, ServerDNSSearchDomains, "0"),
|
|
VAR("ServerDNSSearchDomains", BOOL, ServerDNSSearchDomains, "0"),
|
|
@@ -3116,7 +3118,7 @@ config_register_addressmaps(or_options_t *options)
|
|
if (smartlist_len(elts) >= 2) {
|
|
if (smartlist_len(elts) >= 2) {
|
|
from = smartlist_get(elts,0);
|
|
from = smartlist_get(elts,0);
|
|
to = smartlist_get(elts,1);
|
|
to = smartlist_get(elts,1);
|
|
- if (address_is_invalid_destination(to)) {
|
|
+ if (address_is_invalid_destination(to, 1)) {
|
|
log_warn(LD_CONFIG,
|
|
log_warn(LD_CONFIG,
|
|
"Skipping invalid argument '%s' to MapAddress", to);
|
|
"Skipping invalid argument '%s' to MapAddress", to);
|
|
} else {
|
|
} else {
|