Code added to Tor to support PIR-based onion service descriptor lookups

Nick Mathewson ea668225c0 document changed option name 20 years ago
Win32Build 014198e758 Our new favored MS build environment is vc7/visual studio .net; vc6 is just too broken. 20 years ago
contrib fc37206df6 simple python script to parse directories and find tor nodes that exit to listed nodes/ports. interface could be more polished, but this should do. 20 years ago
debian 6e7007bfba Add a snippet to set nice level in etc/default/tor 20 years ago
doc ea668225c0 document changed option name 20 years ago
src bbaa3c7792 Implement more control spec functionality 20 years ago
.cvsignore ea97cb9c64 Add tor.spec and torctl to .cvsignore files 20 years ago
AUTHORS 51ca94fef3 add jbash and weasel to the AUTHORS list 21 years ago
ChangeLog a8aff4390e forward-port the 0.0.9.5 changelog 20 years ago
Doxyfile d15a95145e Add Doxygen config file and make target, along with section in HACKING document 21 years ago
INSTALL aa48b96036 migrate to the new URL 20 years ago
LICENSE ddc022fcc3 update our license for 2005, and also include the licenses of tree.h 20 years ago
Makefile.am 20142a2508 Forward-port OSX packaging stuff from maint branch 20 years ago
README aa48b96036 migrate to the new URL 20 years ago
autogen.sh 3e03602b9f make our autogen.sh work on ksh as well as bash 20 years ago
configure.in 70c3580f81 Patch to localtime/gmtime handling: use the _r variants where available. Use mutexes to fake _r where necessary. Make mutexes no-ops where no threading is enabled. 20 years ago
tor.spec.in aa48b96036 migrate to the new URL 20 years ago

README


'tor' is an implementation of The Onion Routing system, as
described in a bit more detail at http://www.onion-router.net/. You
can read list archives, and subscribe to the mailing list, at
http://archives.seul.org/or/dev/.

Is your question in the FAQ? Should it be?

**************************************************************************
See the INSTALL file for a quickstart. That is all you will probably need.
**************************************************************************

**************************************************************************
You only need to look beyond this point if the quickstart in the INSTALL
doesn't work for you.
**************************************************************************

Do you want to run a tor server?

See http://tor.eff.org/doc/tor-doc.html#server

Do you want to run a hidden service?

See http://tor.eff.org/doc/tor-doc.html#hidden-service

Configuring tsocks:

If you want to use Tor for protocols that can't use Privoxy, or
with applications that are not socksified, then download tsocks
(tsocks.sourceforge.net) and configure it to talk to localhost:9050
as a socks4 server. My /etc/tsocks.conf simply has:
server_port = 9050
server = 127.0.0.1
(I had to "cd /usr/lib; ln -s /lib/libtsocks.so" to get the tsocks
library working after install, since my libpath didn't include /lib.)
Then you can do "tsocks ssh arma@moria.mit.edu". But note that if
ssh is suid root, you either need to do this as root, or cp a local
version of ssh that isn't suid.

(On Windows, you may want to look at the Hummingbird SOCKS client,
or at SocksCap, instead.)