torrc.complete.in 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534
  1. ####################################################################
  2. ## This config file is divided into four sections. They are:
  3. ## 1. Global Options (clients and servers)
  4. ## 2. Client Options Only
  5. ## 3. Server Options Only
  6. ## 4. Directory Server Options (for running your own Tor network)
  7. ## 5. Hidden Service Options (clients and servers)
  8. ##
  9. ## The conventions used are:
  10. ## double hash (##) is for summary text about the config option;
  11. ## single hash (#) is for the config option; and,
  12. ## the config option is always after the text.
  13. ####################################################################
  14. ## Section 1: Global Options (clients and servers)
  15. ## A token bucket limits the average incoming bandwidth on this node
  16. ## to the specified number of bytes per second. (Default: 2MB)
  17. #BandwidthRate N bytes|KB|MB|GB|TB
  18. ## Limit the maximum token bucket size (also known as the burst) to
  19. ## the given number of bytes. (Default: 5 MB)
  20. #BandwidthBurst N bytes|KB|MB|GB|TB
  21. ## If set, we will not advertise more than this amount of bandwidth
  22. ## for our BandwidthRate. Server operators who want to reduce the
  23. ## number of clients who ask to build circuits through them (since
  24. ## this is proportional to advertised bandwidth rate) can thus
  25. ## reduce the CPU demands on their server without impacting
  26. ## network performance.
  27. #MaxAdvertisedBandwidth N bytes|KB|MB|GB|TB
  28. ## If set, Tor will accept connections from the same machine
  29. ## (localhost only) on this port, and allow those connections to
  30. ## control the Tor process using the Tor Control Protocol
  31. ## (described in control-spec.txt). Note: unless you also specify
  32. ## one of HashedControlPassword or CookieAuthentication, setting
  33. ## this option will cause Tor to allow any process on the local
  34. ## host to control it.
  35. #ControlPort Port
  36. ## Don’t allow any connections on the control port except when the
  37. ## other process knows the password whose one-way hash is
  38. ## hashed_password. You can compute the hash of a password by
  39. ## running "tor --hash-password password".
  40. #HashedControlPassword hashed_password
  41. ## If this option is set to 1, don’t allow any connections on the
  42. ## control port except when the connecting process knows the
  43. ## contents of a file named "control_auth_cookie", which Tor will
  44. ## create in its data directory. This authentication method
  45. ## should only be used on systems with good filesystem security.
  46. ## (Default: 0)
  47. #CookieAuthentication 0|1
  48. ## Store working data in DIR (Default: /usr/local/var/lib/tor)
  49. #DataDirectory DIR
  50. ## Every time the specified period elapses, Tor downloads a direc-
  51. ## tory. A directory contains a signed list of all known servers
  52. ## as well as their current liveness status. A value of "0 sec-
  53. ## onds" tells Tor to choose an appropriate default.
  54. ## (Default: 1 hour for clients, 20 minutes for servers)
  55. #DirFetchPeriod N seconds|minutes|hours|days|weeks
  56. ## Tor only trusts directories signed with one of these keys, and
  57. ## uses the given addresses to connect to the trusted directory
  58. ## servers. If no DirServer lines are specified, Tor uses the built-in
  59. ## defaults (moria1, moria2, tor26), so you can leave this alone unless
  60. ## you need to change it.
  61. ##
  62. ## WARNING! Changing these options will make your Tor behave
  63. ## differently from everyone else's, and hurt your anonymity. Even
  64. ## uncommenting these lines is a bad idea. They are the defaults now,
  65. ## but the defaults may change in the future, leaving you behind.
  66. ##
  67. #DirServer moria1 v1 18.244.0.188:9031 FFCB 46DB 1339 DA84 674C 70D7 CB58 6434 C437 0441
  68. #DirServer moria2 v1 18.244.0.114:80 719B E45D E224 B607 C537 07D0 E214 3E2D 423E 74CF
  69. #DirServer tor26 v1 86.59.21.38:80 847B 1F85 0344 D787 6491 A548 92F9 0493 4E4E B85D
  70. ## Attempt to lock current and future memory pages and effectively disable swap
  71. # DisableAllSwap 0|1
  72. ## On startup, setgid to this user.
  73. #Group GID
  74. ## Tor will make all its directory requests through this host:port
  75. ## (or host:80 if port is not specified), rather than connecting
  76. ## directly to any directory servers.
  77. #HttpProxy host[:port]
  78. ## If defined, Tor will use this username:password for Basic Http
  79. ## proxy authentication, as in RFC 2617. This is currently the
  80. ## only form of Http proxy authentication that Tor supports; feel
  81. ## free to submit a patch if you want it to support others.
  82. #HttpProxyAuthenticator username:password
  83. ## Tor will make all its OR (SSL) connections through this
  84. ## host:port (or host:443 if port is not specified), via HTTP CON-
  85. ## NECT rather than connecting directly to servers. You may want
  86. ## to set FascistFirewall to restrict the set of ports you might
  87. ## try to connect to, if your Https proxy only allows connecting
  88. ## to certain ports.
  89. #HttpsProxy host[:port]
  90. ## If defined, Tor will use this username:password for Basic Https
  91. ## proxy authentication, as in RFC 2617. This is currently the
  92. ## only form of Https proxy authentication that Tor supports; feel
  93. ## free to submit a patch if you want it to support others.
  94. #HttpsProxyAuthenticator username:password
  95. ## To keep firewalls from expiring connections, send a padding
  96. ## keepalive cell every NUM seconds on open connections that are
  97. ## in use. If the connection has no open circuits, it will instead
  98. ## be closed after NUM seconds of idleness. (Default: 5 minutes)
  99. #KeepalivePeriod NUM
  100. ## Send all messages between minSeverity and maxSeverity to the
  101. ## standard output stream, the standard error stream, or to the
  102. ## system log. (The "syslog" value is only supported on Unix.)
  103. ## Recognized severity levels are debug, info, notice, warn, and
  104. ## err. If only one severity level is given, all messages of that
  105. ## level or higher will be sent to the listed destination.
  106. #Log minSeverity[-maxSeverity] stderr|stdout|syslog
  107. ## As above, but send log messages to the listed filename. The
  108. ## "Log" option may appear more than once in a configuration file.
  109. ## Messages are sent to all the logs that match their severity
  110. ## level.
  111. #Log minSeverity[-maxSeverity] file FILENAME
  112. ## Maximum number of simultaneous sockets allowed. You probably
  113. ## don’t need to adjust this. (Default: 1024)
  114. #MaxConn NUM
  115. ## Make all outbound connections originate from the IP address
  116. ## specified. This is only useful when you have multiple network
  117. ## interfaces, and you want all of Tor’s outgoing connections to
  118. ## use a single one.
  119. #OutboundBindAddress IP
  120. ## On startup, write our PID to FILE. On clean shutdown, remove
  121. ## FILE.
  122. #PIDFile FILE
  123. ## If 1, Tor forks and daemonizes to the background. (Default: 0)
  124. #RunAsDaemon 0|1
  125. ## If 1, Tor replaces potentially sensitive strings in the logs
  126. ## (e.g. addresses) with the string [scrubbed]. This way logs can
  127. ## still be useful, but they don’t leave behind personally identi-
  128. ## fying information about what sites a user might have visited.
  129. ## (Default: 1)
  130. #SafeLogging 0|1
  131. ## Every time the specified period elapses, Tor downloads signed
  132. ## status information about the current state of known servers. A
  133. ## value of "0 seconds" tells Tor to choose an appropriate
  134. ## default. (Default: 30 minutes for clients, 15 minutes for
  135. ## servers)
  136. #StatusFetchPeriod N seconds|minutes|hours|days|weeks
  137. ## On startup, setuid to this user.
  138. #User UID
  139. ## If non-zero, try to use crypto hardware acceleration when
  140. ## available. (Default: 1)
  141. #HardwareAccel 0|1
  142. ## Section 2: Client Options Only
  143. ## Where on our circuits should we allow Tor servers that the
  144. ## directory servers haven’t authenticated as "verified"?
  145. ## (Default: middle,rendezvous)
  146. #AllowUnverifiedNodes entry|exit|middle|introduction|rendezvous|...
  147. ## If set to 1, Tor will under no circumstances run as a server.
  148. ## The default is to run as a client unless ORPort is configured.
  149. ## (Usually, you don’t need to set this; Tor is pretty smart at
  150. ## figuring out whether you are reliable and high-bandwidth enough
  151. ## to be a useful server.)
  152. ## This option will likely be deprecated in the future; see the
  153. ## NoPublish option below. (Default: 0)
  154. #ClientOnly 0|1
  155. ## A list of preferred nodes to use for the first hop in the
  156. ## circuit, if possible.
  157. #EntryNodes nickname,nickname,...
  158. ## A list of preferred nodes to use for the last hop in the
  159. ## circuit, if possible.
  160. #ExitNodes nickname,nickname,...
  161. ## A list of nodes to never use when building a circuit.
  162. #ExcludeNodes nickname,nickname,...
  163. ## If 1, Tor will never use any nodes besides those listed in
  164. ## "exitnodes" for the last hop of a circuit.
  165. #StrictExitNodes 0|1
  166. ## If 1, Tor will never use any nodes besides those listed in
  167. ## "entrynodes" for the first hop of a circuit.
  168. #StrictEntryNodes 0|1
  169. ## If 1, Tor will only create outgoing connections to ORs running
  170. ## on ports that your firewall allows (defaults to 80 and 443; see
  171. ## FirewallPorts). This will allow you to run Tor as a client
  172. ## behind a firewall with restrictive policies, but will not allow
  173. ## you to run as a server behind such a firewall.
  174. #FascistFirewall 0|1
  175. ## A list of ports that your firewall allows you to connect to.
  176. ## Only used when FascistFirewall is set. (Default: 80, 443)
  177. #FirewallPorts PORTS
  178. ## A comma-separated list of IPs that your firewall allows you to
  179. ## connect to. Only used when FascistFirewall is set. The format
  180. ## is as for the addresses in ExitPolicy.
  181. ## For example, ’FirewallIPs 99.0.0.0/8, *:80’ means that your
  182. ## firewall allows connections to everything inside net 99, and
  183. ## to port 80 outside.
  184. #FirewallIPs ADDR[/MASK][:PORT]...
  185. ## A list of ports for services that tend to have long-running
  186. ## connections (e.g. chat and interactive shells). Circuits for
  187. ## streams that use these ports will contain only high-uptime
  188. ## nodes, to reduce the chance that a node will go down before the
  189. ## stream is finished. (Default: 21, 22, 706, 1863, 5050, 5190,
  190. ## 5222, 5223, 6667, 8300, 8888)
  191. #LongLivedPorts PORTS
  192. ## When a request for address arrives to Tor, it will rewrite it
  193. ## to newaddress before processing it. For example, if you always
  194. ## want connections to www.indymedia.org to exit via torserver
  195. ## (where torserver is the nickname of the server),
  196. ## use "MapAddress www.indymedia.org www.indymedia.org.torserver.exit".
  197. #MapAddress address newaddress
  198. ## Every NUM seconds consider whether to build a new circuit.
  199. ## (Default: 30 seconds)
  200. #NewCircuitPeriod NUM
  201. ## Feel free to reuse a circuit that was first used at most NUM
  202. ## seconds ago, but never attach a new stream to a circuit that is
  203. ## too old. (Default: 10 minutes)
  204. #MaxCircuitDirtiness NUM
  205. ## The named Tor servers constitute a "family" of similar or co-
  206. ## administered servers, so never use any two of them in the same
  207. ## circuit. Defining a NodeFamily is only needed when a server
  208. ## doesn’t list the family itself (with MyFamily). This option can
  209. ## be used multiple times.
  210. #NodeFamily nickname,nickname,...
  211. ## A list of preferred nodes to use for the rendezvous point, if
  212. ## possible.
  213. #RendNodes nickname,nickname,...
  214. ## A list of nodes to never use when choosing a rendezvous point.
  215. #RendExcludeNodes nickname,nickname,...
  216. ## Advertise this port to listen for connections from SOCKS-speak-
  217. ## ing applications. Set this to 0 if you don’t want to allow
  218. ## application connections. (Default: 9050)
  219. #SOCKSPort PORT
  220. ## Bind to this address to listen for connections from SOCKS-
  221. ## speaking applications. (Default: 127.0.0.1) You can also spec-
  222. ## ify a port (e.g. 192.168.0.1:9100). This directive can be spec-
  223. ## ified multiple times to bind to multiple addresses/ports.
  224. #SOCKSBindAddress IP[:PORT]
  225. ## Set an entrance policy for this server, to limit who can con-
  226. ## nect to the SOCKS ports. The policies have the same form as
  227. ## exit policies below.
  228. #SOCKSPolicy policy,policy,...
  229. ## For each value in the comma separated list, Tor will track
  230. ## recent connections to hosts that match this value and attempt
  231. ## to reuse the same exit node for each. If the value is prepended
  232. ## with a ’.’, it is treated as matching an entire domain. If one
  233. ## of the values is just a ’.’, it means match everything. This
  234. ## option is useful if you frequently connect to sites that will
  235. ## expire all your authentication cookies (ie log you out) if your
  236. ## IP address changes. Note that this option does have the disad-
  237. ## vantage of making it more clear that a given history is associ-
  238. ## ated with a single user. However, most people who would wish to
  239. ## observe this will observe it through cookies or other protocol-
  240. ## specific means anyhow.
  241. #TrackHostExits host,.domain,...
  242. ## Since exit servers go up and down, it is desirable to expire
  243. ## the association between host and exit server after NUM seconds.
  244. ## The default is 1800 seconds (30 minutes).
  245. #TrackHostExitsExpire NUM
  246. ## If this option is set to 1, we pick a few entry servers as our
  247. ## "helpers", and try to use only those fixed entry servers. This
  248. ## is desirable, because constantly changing servers increases the
  249. ## odds that an adversary who owns some servers will observe a
  250. ## fraction of your paths. (Defaults to 0; will eventually
  251. ## default to 1.)
  252. #UseHelperNodes 0|1
  253. ## If UseHelperNodes is set to 1, we will try to pick a total of
  254. ## NUM helper nodes as entries for our circuits. (Defaults to 3.)
  255. #NumHelperNodes NUM
  256. ## Section 3: Server Options Only
  257. ## The IP or fqdn of this server (e.g. moria.mit.edu). You can
  258. ## leave this unset, and Tor will guess your IP.
  259. #Address address
  260. ## Administrative contact information for server.
  261. #ContactInfo email_address
  262. ## Set an exit policy for this server. Each policy is of the form
  263. ## "accept|reject ADDR[/MASK][:PORT]". If /MASK is omitted then
  264. ## this policy just applies to the host given. Instead of giving
  265. ## a host or network you can also use "*" to denote the universe
  266. ## (0.0.0.0/0). PORT can be a single port number, an interval of
  267. ## ports "FROM_PORT-TO_PORT", or "*". If PORT is omitted, that
  268. ## means "*".
  269. ##
  270. ## For example, "reject 127.0.0.1:*,reject 192.168.1.0/24:*,accept
  271. ## *:*" would reject any traffic destined for localhost and any
  272. ## 192.168.1.* address, but accept anything else.
  273. ##
  274. ## This directive can be specified multiple times so you don’t
  275. ## have to put it all on one line.
  276. ##
  277. ## See RFC 3330 for more details about internal and reserved IP
  278. ## address space. Policies are considered first to last, and the
  279. ## first match wins. If you want to _replace_ the default exit
  280. ## policy, end your exit policy with either a reject *:* or an
  281. ## accept *:*. Otherwise, you’re _augmenting_ (prepending to) the
  282. ## default exit policy. The default exit policy is:
  283. ## reject 0.0.0.0/8
  284. ## reject 169.254.0.0/16
  285. ## reject 127.0.0.0/8
  286. ## reject 192.168.0.0/16
  287. ## reject 10.0.0.0/8
  288. ## reject 172.16.0.0/12
  289. ## reject *:25
  290. ## reject *:119
  291. ## reject *:135-139
  292. ## reject *:445
  293. ## reject *:1214
  294. ## reject *:4661-4666
  295. ## reject *:6346-6429
  296. ## reject *:6699
  297. ## reject *:6881-6999
  298. ## accept *:*
  299. #ExitPolicy policy,policy,...
  300. ## If you have more than this number of onionskins queued for
  301. ## decrypt, reject new ones. (Default: 100)
  302. #MaxOnionsPending NUM
  303. ## Declare that this Tor server is controlled or administered by a
  304. ## group or organization identical or similar to that of the other
  305. ## named servers. When two servers both declare that they are in
  306. ## the same ’family’, Tor clients will not use them in the same
  307. ## circuit. (Each server only needs to list the other servers in
  308. ## its family; it doesn’t need to list itself, but it won’t hurt.)
  309. #MyFamily nickname,nickname,...
  310. ## Set the server’s nickname to ’name’.
  311. #Nickname name
  312. ## If you set NoPublish 1, Tor will act as a server if you have an
  313. ## ORPort defined, but it will not publish its descriptor to the
  314. ## dirservers. This option is useful if you're testing out your
  315. ## server, or if you're using alternate dirservers (e.g. for other
  316. ## Tor networks such as Blossom). (Default: 0)
  317. #NoPublish 0|1
  318. ## How many processes to use at once for decrypting onionskins.
  319. ## (Default: 1)
  320. #NumCPUs num
  321. ## Advertise this port to listen for connections from Tor clients
  322. ## and servers.
  323. #ORPort PORT
  324. ## Bind to this IP address to listen for connections from Tor
  325. ## clients and servers. If you specify a port, bind to this port
  326. ## rather than the one specified in ORPort. (Default: 0.0.0.0)
  327. #ORBindAddress IP[:PORT]
  328. ## Whenever an outgoing connection tries to connect to one of a
  329. ## given set of addresses, connect to target (an address:port
  330. ## pair) instead. The address pattern is given in the same format
  331. ## as for an exit policy. The address translation applies after
  332. ## exit policies are applied. Multiple RedirectExit options can
  333. ## be used: once any one has matched successfully, no subsequent
  334. ## rules are considered. You can specify that no redirection is
  335. ## to be performed on a given set of addresses by using the spe-
  336. ## cial target string "pass", which prevents subsequent rules from
  337. ## being considered.
  338. #RedirectExit pattern target
  339. ## When we get a SIGINT and we're a server, we begin shutting
  340. ## down: we close listeners and start refusing new circuits. After
  341. ## NUM seconds, we exit. If we get a second SIGINT, we exit imme-
  342. ## diately. (Default: 30 seconds)
  343. #ShutdownWaitLengthNUM
  344. ## Every time the specified period elapses, Tor uploads its server
  345. ## descriptors to the directory servers. This information is also
  346. ## uploaded whenever it changes. (Default: 20 minutes)
  347. #DirPostPeriod N seconds|minutes|hours|days|weeks
  348. ## A token bucket limits the average relayed bandwidth (server
  349. ## traffic only, not client traffic) on this node to the specified
  350. ## number of bytes per second.
  351. #RelayBandwidthRate N bytes|KB|MB|GB|TB
  352. ## Limit the maximum token bucket size (also known as the burst) for
  353. ## relayed traffic (server traffic only, not client traffic) to the
  354. ## given number of bytes.
  355. #RelayBandwidthBurst N bytes|KB|MB|GB|TB
  356. ## Never send more than the specified number of bytes in a given
  357. ## accounting period, or receive more than that number in the
  358. ## period. For example, with AccountingMax set to 1 GB, a server
  359. ## could send 900 MB and receive 800 MB and continue running. It
  360. ## will only hibernate once one of the two reaches 1 GB. When the
  361. ## number of bytes is exhausted, Tor will hibernate until some
  362. ## time in the next accounting period. To prevent all servers
  363. ## from waking at the same time, Tor will also wait until a random
  364. ## point in each period before waking up. If you have bandwidth
  365. ## cost issues, enabling hibernation is preferable to setting a
  366. ## low bandwidth, since it provides users with a collection of
  367. ## fast servers that are up some of the time, which is more useful
  368. ## than a set of slow servers that are always "available".
  369. #AccountingMax N bytes|KB|MB|GB|TB
  370. ## Specify how long accounting periods last. If month is given,
  371. ## each accounting period runs from the time HH:MM on the dayth
  372. ## day of one month to the same day and time of the next. (The
  373. ## day must be between 1 and 28.) If week is given, each account-
  374. ## ing period runs from the time HH:MM of the dayth day of one
  375. ## week to the same day and time of the next week, with Monday as
  376. ## day 1 and Sunday as day 7. If day is given, each accounting
  377. ## period runs from the time HH:MM each day to the same time on
  378. ## the next day. All times are local, and given in 24-hour time.
  379. ## (Defaults to "month 1 0:00".)
  380. #AccountingStart day|week|month [day] HH:MM
  381. ## Section 4: Directory Server Options (for running your own Tor
  382. ## network)
  383. ## When this option is set to 1, Tor operates as an authoritative
  384. ## directory server. Instead of caching the directory, it gener-
  385. ## ates its own list of good servers, signs it, and sends that to
  386. ## the clients. Unless the clients already have you listed as a
  387. ## trusted directory, you probably do not want to set this option.
  388. ## Please coordinate with the other admins at
  389. ## tor-ops@freehaven.net if you think you should be a directory.
  390. #AuthoritativeDirectory 0|1
  391. ## Advertise the directory service on this port.
  392. #DirPort PORT
  393. ## Bind the directory service to this address. If you specify a
  394. ## port, bind to this port rather than the one specified in DirPort.
  395. ## (Default: 0.0.0.0)
  396. #DirBindAddress IP[:PORT]
  397. ## Set an entrance policy for this server, to limit who can con-
  398. ## nect to the directory ports. The policies have the same form
  399. ## as exit policies above.
  400. #DirPolicy policy,policy,...
  401. ## STRING is a command-separated list of Tor versions currently
  402. ## believed to be safe. The list is included in each directory,
  403. ## and nodes which pull down the directory learn whether they need
  404. ## to upgrade. This option can appear multiple times: the values
  405. ## from multiple lines are spliced together.
  406. #RecommendedVersions STRING
  407. ## If set to 1, Tor will accept router descriptors with arbitrary
  408. ## "Address" elements. Otherwise, if the address is not an IP or
  409. ## is a private IP, it will reject the router descriptor. Defaults
  410. ## to 0.
  411. #DirAllowPrivateAddresses 0|1
  412. ## If set to 1, Tor tries to build circuits through all of the
  413. ## servers it knows about, so it can tell which are up and which
  414. ## are down. This option is only useful for authoritative direc-
  415. ## tories, so you probably don't want to use it.
  416. #RunTesting 0|1
  417. ## Section 5: Hidden Service Options (clients and servers)
  418. ## Store data files for a hidden service in DIRECTORY. Every hid-
  419. ## den service must have a separate directory. You may use this
  420. ## option multiple times to specify multiple services.
  421. #HiddenServiceDir DIRECTORY
  422. ## Configure a virtual port VIRTPORT for a hidden service. You
  423. ## may use this option multiple times; each time applies to the
  424. ## service using the most recent hiddenservicedir. By default,
  425. ## this option maps the virtual port to the same port on
  426. ## 127.0.0.1. You may override the target port, address, or both
  427. ## by specifying a target of addr, port, or addr:port.
  428. #HiddenServicePort VIRTPORT [TARGET]
  429. ## If possible, use the specified nodes as introduction points for
  430. ## the hidden service. If this is left unset, Tor will be smart
  431. ## and pick some reasonable ones; most people can leave this unset.
  432. #HiddenServiceNodes nickname,nickname,...
  433. ## Do not use the specified nodes as introduction points for the
  434. ## hidden service. In normal use there is no reason to set this.
  435. #HiddenServiceExcludeNodes nickname,nickname,...
  436. ## Publish the given rendezvous service descriptor versions for the
  437. ## hidden service.
  438. #HiddenServiceVersion 0,2
  439. ## Every time the specified period elapses, Tor uploads any ren-
  440. ## dezvous service descriptors to the directory servers. This
  441. ## information is also uploaded whenever it changes.
  442. ## (Default: 1 hour)
  443. #RendPostPeriod N seconds|minutes|hours|days|weeks
  444. #