torrc.sample.in 3.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485
  1. # Configuration file for a typical tor user
  2. # List of routers. Tor nodes start out knowing about the directory
  3. # servers, and from them they get a list of currently up nodes.
  4. RouterFile @CONFDIR@/dirservers
  5. # Replace this with "SocksPort 0" if you don't want clients to connect.
  6. SocksPort 9050
  7. SocksBindAddress 127.0.0.1 # accept connections only from localhost
  8. #SocksBindAddress 192.168.0.1:9100 # listen on a chosen IP/port
  9. # Entry policies to allow/deny SOCKS requests based on IP address.
  10. # First entry that matches wins. If no SocksPolicy is set, we accept
  11. # all (and only) requests from SocksBindAddress.
  12. #
  13. #SocksPolicy accept 192.168.0.1/16
  14. #SocksPolicy reject *
  15. # Allow no-name routers (ones that the dirserver operators don't
  16. # know anything about) in only these positions in your circuits.
  17. # Other choices (not advised) are entry,exit,introduction.
  18. AllowUnverifiedNodes middle,rendezvous
  19. # By default, we send log messages to stdout. If you want
  20. # them to go somewhere else, uncomment one or more of these example
  21. # configurations.
  22. ### Send all messages of level 'warn' or higher to /var/log/tor/warnings
  23. #LogFile /var/log/tor/warnings
  24. #LogLevel warn
  25. ### Send all debug and info messages to /var/log/tor/debug
  26. #LogFile /var/log/tor/debug
  27. #LogLevel debug-info
  28. ### Send all debug messages ONLY to /var/log/tor/debug
  29. #LogFile /var/log/tor/debug
  30. #LogLevel debug-debug
  31. # Uncomment this to start the process in the background
  32. #RunAsDaemon 1
  33. ##################### Below is just for servers #####################
  34. ## NOTE: If you enable these, you should consider mailing your
  35. ## identity key fingerprint to the tor-ops, so we can verify
  36. ## your configuration. See the README for details.
  37. ## The directory for keeping all the keys/etc for this server
  38. #DataDirectory @LOCALSTATEDIR@/lib/tor
  39. #Nickname moria # A unique handle for this server
  40. #Address moria.seul.org # The IP or fqdn for this server
  41. #ContactInfo 1024D/28988BF5 Roger Dingledine <arma@mit.edu>
  42. #ORPort 9001 # where to listen for tor connections
  43. #ORBindAddress 0.0.0.0 # accept connections from anywhere
  44. #ORBindAddress 0.0.0.0:9090 # accept connections from anywhere, and
  45. # listen on a port other than the one we
  46. # advertised.
  47. # Uncomment this to mirror the directory for others (please do)
  48. #DirPort 9030
  49. ## A comma-separated list of exit policies. They're considered first
  50. ## to last, and the first match wins. If you want to *replace*
  51. ## the default exit policy, end this with either a reject *:* or an
  52. ## accept *:*. Otherwise, you're *augmenting* (prepending to) the
  53. ## default exit policy. Leave commented to just use the default.
  54. #ExitPolicy accept *:6660-6667
  55. #ExitPolicy reject 192.168.0.1:*
  56. #ExitPolicy reject *:*
  57. ##################### Below is just for location-hidden services ###
  58. ## Look in .../hidden_service/hostname for the url to tell people.
  59. ## HiddenServicePort x y:z says to redirect a port x request from the
  60. ## client to y:z.
  61. #HiddenServiceDir @LOCALSTATEDIR@/lib/tor/hidden_service/
  62. #HiddenServicePort 80 127.0.0.1:80
  63. #HiddenServiceDir @LOCALSTATEDIR@/lib/tor/other_hidden_service/
  64. #HiddenServicePort 80 127.0.0.1:80
  65. #HiddenServicePort 22 127.0.0.1:22
  66. #HiddenServiceNodes moria1,moria2
  67. #HiddenServiceExcludeNodes bad,otherbad