|
@@ -28,19 +28,6 @@ Other options can be specified either on the command-line (\fI--option
|
|
|
value\fR), or in the configuration file (\fIoption value\fR).
|
|
|
Options are case-insensitive.
|
|
|
.TP
|
|
|
-\fBLog \fR\fIminSeverity\fR[-\fImaxSeverity\fR] \fBstderr\fR|\fBstdout\fR|\fBsyslog\fR\fP
|
|
|
-Send all messages between \fIminSeverity\fR and \fImaxSeverity\fR to
|
|
|
-the standard output stream, the standard error stream, or to the system
|
|
|
-log. (The "syslog" value is only supported on Unix.) Recognized
|
|
|
-severity levels are debug, info, notice, warn, and err. If only one
|
|
|
-severity level is given, all messages of that level or higher will be
|
|
|
-sent to the listed destination.
|
|
|
-.TP
|
|
|
-\fBLog \fR\fIminSeverity\fR[-\fImaxSeverity\fR] \fBfile\fR \fIFILENAME\fP
|
|
|
-As above, but send log messages to the listed filename. The "Log"
|
|
|
-option may appear more than once in a configuration file. Messages
|
|
|
-are sent to all the logs that match their severity level.
|
|
|
-.TP
|
|
|
\fBBandwidthRate \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
|
|
|
A token bucket limits the average incoming bandwidth on this node to
|
|
|
the specified number of bytes per second. (Default: 2 MB)
|
|
@@ -55,9 +42,36 @@ who ask to build circuits through them (since this is proportional to
|
|
|
advertised bandwidth rate) can thus reduce the CPU demands on their
|
|
|
server without impacting network performance.
|
|
|
.TP
|
|
|
+\fBControlPort \fR\fIPort\fP
|
|
|
+If set, Tor will accept connections from the same machine (localhost only) on
|
|
|
+this port, and allow those connections to control the Tor process using the
|
|
|
+Tor Control Protocol (described in control-spec.txt). Note: unless you also
|
|
|
+specify one of \fBHashedControlPassword\fP or \fBCookieAuthentication\fP,
|
|
|
+setting this option will cause Tor to allow any process on the local host to
|
|
|
+control it.
|
|
|
+.TP
|
|
|
+\fBHashedControlPassword \fR\fIhashed_password\fP
|
|
|
+Don't allow any connections on the control port except when the other process
|
|
|
+knows the password whose one-way hash is \fIhashed_password\fP. You can
|
|
|
+compute the hash of a password by running "tor --hash-password
|
|
|
+\fIpassword\fP".
|
|
|
+.TP
|
|
|
+\fBCookieAuthentication \fR\fB0\fR|\fB1\fP
|
|
|
+If this option is set to 1, don't allow any connections on the control port
|
|
|
+except when the connecting process knows the contents of a file named
|
|
|
+"control_auth_cookie", which Tor will create in its data directory. This
|
|
|
+authentication methods should only be used on systems with good filesystem
|
|
|
+security. (Default: 0)
|
|
|
+.TP
|
|
|
\fBDataDirectory \fR\fIDIR\fP
|
|
|
Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor)
|
|
|
.TP
|
|
|
+\fBDirFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
|
|
+Every time the specified period elapses, Tor downloads a directory.
|
|
|
+A directory contains a signed list of all known servers as well as
|
|
|
+their current liveness status. A value of "0 seconds" tells Tor to choose an
|
|
|
+appropriate default. (Default: 1 hour for clients, 20 minutes for servers.)
|
|
|
+.TP
|
|
|
\fBDirServer \fR\fIaddress:port fingerprint\fP
|
|
|
Use a nonstandard authoritative directory server at the provided
|
|
|
address and port, with the specified key fingerprint. This option can
|
|
@@ -88,6 +102,19 @@ proxy only allows connecting to certain ports.
|
|
|
To keep firewalls from expiring connections, send a padding keepalive
|
|
|
cell on open connections every NUM seconds. (Default: 5 minutes.)
|
|
|
.TP
|
|
|
+\fBLog \fR\fIminSeverity\fR[-\fImaxSeverity\fR] \fBstderr\fR|\fBstdout\fR|\fBsyslog\fR\fP
|
|
|
+Send all messages between \fIminSeverity\fR and \fImaxSeverity\fR to
|
|
|
+the standard output stream, the standard error stream, or to the system
|
|
|
+log. (The "syslog" value is only supported on Unix.) Recognized
|
|
|
+severity levels are debug, info, notice, warn, and err. If only one
|
|
|
+severity level is given, all messages of that level or higher will be
|
|
|
+sent to the listed destination.
|
|
|
+.TP
|
|
|
+\fBLog \fR\fIminSeverity\fR[-\fImaxSeverity\fR] \fBfile\fR \fIFILENAME\fP
|
|
|
+As above, but send log messages to the listed filename. The "Log"
|
|
|
+option may appear more than once in a configuration file. Messages
|
|
|
+are sent to all the logs that match their severity level.
|
|
|
+.TP
|
|
|
\fBMaxConn \fR\fINUM\fP
|
|
|
Maximum number of simultaneous sockets allowed. You probably don't need
|
|
|
to adjust this. (Default: 1024)
|
|
@@ -103,46 +130,20 @@ On startup, write our PID to FILE. On clean shutdown, remove FILE.
|
|
|
\fBRunAsDaemon \fR\fB0\fR|\fB1\fR\fP
|
|
|
If 1, Tor forks and daemonizes to the background. (Default: 0)
|
|
|
.TP
|
|
|
-\fBUser \fR\fIUID\fP
|
|
|
-On startup, setuid to this user.
|
|
|
+\fBSafeLogging \fR\fB0\fR|\fB1\fP
|
|
|
+If 1, Tor replaces potentially sensitive strings in the logs
|
|
|
+(e.g. addresses) with the string [scrubbed]. This way logs can still be
|
|
|
+useful, but they don't leave behind personally identifying information
|
|
|
+about what sites a user might have visited. (Default: 1)
|
|
|
.TP
|
|
|
-\fBControlPort \fR\fIPort\fP
|
|
|
-If set, Tor will accept connections from the same machine (localhost only) on
|
|
|
-this port, and allow those connections to control the Tor process using the
|
|
|
-Tor Control Protocol (described in control-spec.txt). Note: unless you also
|
|
|
-specify one of \fBHashedControlPassword\fP or \fBCookieAuthentication\fP,
|
|
|
-setting this option will cause Tor to allow any process on the local host to
|
|
|
-control it.
|
|
|
+\fBStatusFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
|
|
+Every time the specified period elapses, Tor downloads signed status
|
|
|
+information about the current state of known servers. A value of
|
|
|
+"0 seconds" tells Tor to choose an appropriate default. (Default: 30
|
|
|
+minutes for clients, 15 minutes for servers.)
|
|
|
.TP
|
|
|
-\fBHashedControlPassword \fR\fIhashed_password\fP
|
|
|
-Don't allow any connections on the control port except when the other process
|
|
|
-knows the password whose one-way hash is \fIhashed_password\fP. You can
|
|
|
-compute the hash of a password by running "tor --hash-password
|
|
|
-\fIpassword\fP".
|
|
|
-.TP
|
|
|
-\fBCookieAuthentication \fR\fB0\fR|\fB1\fP
|
|
|
-If this option is set to 1, don't allow any connections on the control port
|
|
|
-except when the connecting process knows the contents of a file named
|
|
|
-"control_auth_cookie", which Tor will create in its data directory. This
|
|
|
-authentication methods should only be used on systems with good filesystem
|
|
|
-security.
|
|
|
-.TP
|
|
|
-\fBDirFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
|
|
-Every time the specified period elapses, Tor downloads a directory.
|
|
|
-A directory contains a signed list of all known servers as well as
|
|
|
-their current liveness status. A value of "0 seconds" tells Tor to choose an
|
|
|
-appropriate default. (Default: 1 hour for clients, 20 minutes for servers.)
|
|
|
-.TP
|
|
|
-\fBStatusFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP Every time the
|
|
|
-specified period elapses, Tor downloads signed status information about the
|
|
|
-current state of known servers. A value of "0 seconds" tells Tor to choose
|
|
|
-an appropriate default. (Default: 30 minutes for clients, 15 minutes for
|
|
|
-servers.) (Default: 20 minutes.)
|
|
|
-.TP
|
|
|
-\fBRendPostPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
|
|
-Every time the specified period elapses, Tor uploads any rendezvous
|
|
|
-service descriptors to the directory servers. This information is also
|
|
|
-uploaded whenever it changes. (Default: 20 minutes.)
|
|
|
+\fBUser \fR\fIUID\fP
|
|
|
+On startup, setuid to this user.
|
|
|
|
|
|
.SH CLIENT OPTIONS
|
|
|
.PP
|
|
@@ -437,6 +438,11 @@ ones; most people can leave this unset.
|
|
|
\fBHiddenServiceExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
|
|
Do not use the specified nodes as introduction points for the hidden
|
|
|
service. In normal use there is no reason to set this.
|
|
|
+.TP
|
|
|
+\fBRendPostPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
|
|
+Every time the specified period elapses, Tor uploads any rendezvous
|
|
|
+service descriptors to the directory servers. This information is also
|
|
|
+uploaded whenever it changes. (Default: 20 minutes.)
|
|
|
|
|
|
.\" UNDOCUMENTED
|
|
|
.\" ignoreversion
|
|
@@ -491,6 +497,6 @@ The tor process stores keys and other data here.
|
|
|
.BR http://tor.eff.org/
|
|
|
|
|
|
.SH BUGS
|
|
|
-Plenty, probably. It's still in alpha. Please report them.
|
|
|
+Plenty, probably. Tor is still in development. Please report them.
|
|
|
.SH AUTHORS
|
|
|
Roger Dingledine <arma@mit.edu>, Nick Mathewson <nickm@alum.mit.edu>.
|