|
@@ -598,21 +598,26 @@ GENERAL OPTIONS
|
|
|
Otherwise the sandbox will be disabled. The option is currently an
|
|
|
experimental feature. It only works on Linux-based operating systems,
|
|
|
and only when Tor has been built with the libseccomp library. This option
|
|
|
- can not be changed while tor is running.
|
|
|
+ can not be changed while tor is running. +
|
|
|
+
|
|
|
- When the Sandbox is 1, the following options can not be changed when tor
|
|
|
+ When the **Sandbox** is 1, the following options can not be changed when tor
|
|
|
is running:
|
|
|
- Address
|
|
|
- ConnLimit
|
|
|
- CookieAuthFile
|
|
|
- DirPortFrontPage
|
|
|
- ExtORPortCookieAuthFile
|
|
|
- Logs
|
|
|
- ServerDNSResolvConfFile
|
|
|
- Tor must remain in client or server mode (some changes to ClientOnly and
|
|
|
- ORPort are not allowed). Launching new Onion Services through Control
|
|
|
- Port is not supported with current syscall sandboxing implementation.
|
|
|
- ClientOnionAuthDir and any files in it won't reload on HUP signal.
|
|
|
+ **Address**,
|
|
|
+ **ConnLimit**,
|
|
|
+ **CookieAuthFile**,
|
|
|
+ **DirPortFrontPage**,
|
|
|
+ **ExtORPortCookieAuthFile**,
|
|
|
+ **Logs**,
|
|
|
+ **ServerDNSResolvConfFile**,
|
|
|
+ **ClientOnionAuthDir** (and any files in it won't reload on HUP signal).
|
|
|
+ +
|
|
|
+ Launching new Onion Services through the control port is not supported
|
|
|
+ with current syscall sandboxing implementation.
|
|
|
+ +
|
|
|
+ Tor must remain in client or server mode (some changes to **ClientOnly**
|
|
|
+ and **ORPort** are not allowed). Currently, if **Sandbox** is 1,
|
|
|
+ **ControlPort** command "GETINFO address" will not work.
|
|
|
+ +
|
|
|
(Default: 0)
|
|
|
|
|
|
[[Socks4Proxy]] **Socks4Proxy** __host__[:__port__]::
|