|
@@ -393,13 +393,15 @@ dirserv_get_status_impl(const char *id_digest, const char *nickname,
|
|
strmap_size(fingerprint_list->fp_by_name),
|
|
strmap_size(fingerprint_list->fp_by_name),
|
|
digestmap_size(fingerprint_list->status_by_digest));
|
|
digestmap_size(fingerprint_list->status_by_digest));
|
|
|
|
|
|
-
|
|
+
|
|
- * make them unsuitable for the current network. */
|
|
+ * getting any more security fixes. Disable them. */
|
|
- if (platform && !tor_version_as_new_as(platform,"0.2.2.35")) {
|
|
+ if (platform && !tor_version_as_new_as(platform,"0.2.3.25")) {
|
|
if (msg)
|
|
if (msg)
|
|
*msg = "Tor version is insecure or unsupported. Please upgrade!";
|
|
*msg = "Tor version is insecure or unsupported. Please upgrade!";
|
|
return FP_REJECT;
|
|
return FP_REJECT;
|
|
- } else if (platform && tor_version_as_new_as(platform,"0.2.3.0-alpha")) {
|
|
+ }
|
|
|
|
+#if 0
|
|
|
|
+ else if (platform && tor_version_as_new_as(platform,"0.2.3.0-alpha")) {
|
|
|
|
|
|
* issues that make them unusable for the current network */
|
|
* issues that make them unusable for the current network */
|
|
if (!tor_version_as_new_as(platform, "0.2.3.10-alpha")) {
|
|
if (!tor_version_as_new_as(platform, "0.2.3.10-alpha")) {
|
|
@@ -408,6 +410,7 @@ dirserv_get_status_impl(const char *id_digest, const char *nickname,
|
|
return FP_REJECT;
|
|
return FP_REJECT;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
+#endif
|
|
|
|
|
|
result = dirserv_get_name_status(id_digest, nickname);
|
|
result = dirserv_get_name_status(id_digest, nickname);
|
|
if (result & FP_NAMED) {
|
|
if (result & FP_NAMED) {
|