|
@@ -232,8 +232,10 @@ into a chroot jail</a>.)</p>
|
|
<p>First, copy torrc.sample to torrc (by default it's in
|
|
<p>First, copy torrc.sample to torrc (by default it's in
|
|
/usr/local/etc/tor/), and edit the middle part. Create the DataDirectory,
|
|
/usr/local/etc/tor/), and edit the middle part. Create the DataDirectory,
|
|
and make sure it's owned by the uid/gid that will be running tor. Fix your system
|
|
and make sure it's owned by the uid/gid that will be running tor. Fix your system
|
|
-clock so it's not too far off. Make sure name resolution works. Open a
|
|
+clock so it's not too far off. Make sure name resolution works. Make sure
|
|
-hole in your firewall so outsiders can connect to your ORPort.</p>
|
|
+each process can get to 1024 file descriptors (this should be already
|
|
|
|
+done for everybody but the BSD folks). Open a hole in your firewall so
|
|
|
|
+outsiders can connect to your ORPort.</p>
|
|
|
|
|
|
<p>Then run tor to generate keys: <tt>tor</tt>. One of the files generated
|
|
<p>Then run tor to generate keys: <tt>tor</tt>. One of the files generated
|
|
in your DataDirectory is your 'fingerprint' file. Mail it to
|
|
in your DataDirectory is your 'fingerprint' file. Mail it to
|