[tor-commits] [tor/master] Update remaining trac.tpo wiki urls
nickm at torproject.org
nickm at torproject.org
Mon Sep 14 15:02:54 UTC 2020
commit 33380f6b2770a3c4d9e2a9cc8a4b18c71a40571b
Author: Nick Mathewson <nickm at torproject.org>
Date: Mon Sep 14 11:02:38 2020 -0400
Update remaining trac.tpo wiki urls
---
configure.ac | 2 +-
doc/HACKING/CircuitPaddingDevelopment.md | 2 +-
src/core/proto/proto_socks.c | 4 ++--
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/configure.ac b/configure.ac
index 74f2379fca..41c23e964c 100644
--- a/configure.ac
+++ b/configure.ac
@@ -2642,7 +2642,7 @@ other kinds of attacks easier. A Tor instance build with this option will be
somewhat less vulnerable to remote code execution, arithmetic overflow, or
out-of-bounds read/writes... but at the cost of becoming more vulnerable to
denial of service attacks. For more information, see
-https://trac.torproject.org/projects/tor/wiki/doc/TorFragileHardening
+https://gitlab.torproject.org/tpo/core/team/-/wikis/TorFragileHardening
============
])
fi
diff --git a/doc/HACKING/CircuitPaddingDevelopment.md b/doc/HACKING/CircuitPaddingDevelopment.md
index 1344ebd3d8..95ffbae4dd 100644
--- a/doc/HACKING/CircuitPaddingDevelopment.md
+++ b/doc/HACKING/CircuitPaddingDevelopment.md
@@ -150,7 +150,7 @@ might be recognized on the wire.
The problem of differentiating Tor traffic from non-Tor traffic based on
TCP/TLS packet sizes, initial handshake patterns, and DPI characteristics is the
domain of [pluggable
-transports](https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports),
+transports](https://gitlab.torproject.org/tpo/anti-censorship/team/-/wikis/AChildsGardenOfPluggableTransports),
which may optionally be used in conjunction with this framework (or without
it).
diff --git a/src/core/proto/proto_socks.c b/src/core/proto/proto_socks.c
index 198195c0ae..08febee5bb 100644
--- a/src/core/proto/proto_socks.c
+++ b/src/core/proto/proto_socks.c
@@ -67,8 +67,8 @@ log_unsafe_socks_warning(int socks_protocol, const char *address,
"Tor only an IP address. Applications that do DNS resolves "
"themselves may leak information. Consider using Socks4A "
"(e.g. via privoxy or socat) instead. For more information, "
- "please see https://wiki.torproject.org/TheOnionRouter/"
- "TorFAQ#SOCKSAndDNS.%s",
+ "please see https://2019.www.torproject.org/docs/faq.html.en"
+ "#WarningsAboutSOCKSandDNSInformationLeaks.%s",
socks_protocol,
(int)port,
safe_socks ? " Rejecting." : "");
More information about the tor-commits
mailing list