mirror of git://git.psyced.org/git/psyclpc
allow tor circuits to take longer to be detected as tls
This commit is contained in:
parent
30e65aa91d
commit
afaa9af5f4
|
@ -4016,9 +4016,12 @@ new_player ( object_t *ob, SOCKET_T new_socket
|
||||||
# ifdef HAS_PSYC
|
# ifdef HAS_PSYC
|
||||||
/* give TLS 4 seconds to start. in fact even 1 second should
|
/* give TLS 4 seconds to start. in fact even 1 second should
|
||||||
* be enough as the TLS init packet is sent immediately with
|
* be enough as the TLS init packet is sent immediately with
|
||||||
* the TCP 3-way handshake completion.
|
* the TCP 3-way handshake completion. Is it different for
|
||||||
|
* Tor? When connections are coming from a Tor exit node
|
||||||
|
* they may need more than 4 seconds to fire up TLS. We
|
||||||
|
* should discontinue unencrypted protocols entirely...
|
||||||
*/
|
*/
|
||||||
new_interactive->tls_autodetect = ob == NULL? 4 : 0;
|
new_interactive->tls_autodetect = ob == NULL? 9 : 0;
|
||||||
# endif
|
# endif
|
||||||
new_interactive->tls_want_peer_cert = MY_FALSE;
|
new_interactive->tls_want_peer_cert = MY_FALSE;
|
||||||
#endif
|
#endif
|
||||||
|
|
Loading…
Reference in New Issue