Update tor-manual-cvs.html
Thomas Sjögren

Thomas Sjögren commited on 2005-05-15 12:39:18
Zeige 1 geänderte Dateien mit 50 Einfügungen und 45 Löschungen.

... ...
@@ -45,17 +45,6 @@ FILE contains further "option value" pairs. (Default: @CONFDIR@/torrc)
45 45
 <DT>Other options can be specified either on the command-line (<I>--option<DD>
46 46
 value</I>), or in the configuration file (<I>option value</I>).
47 47
 Options are case-insensitive.
48
-<DT><B>Log </B><I>minSeverity</I>[-<I>maxSeverity</I>] <B>stderr</B>|<B>stdout</B>|<B>syslog</B><DD>
49
-Send all messages between <I>minSeverity</I> and <I>maxSeverity</I> to
50
-the standard output stream, the standard error stream, or to the system
51
-log. (The &quot;syslog&quot; value is only supported on Unix.)  Recognized
52
-severity levels are debug, info, notice, warn, and err.  If only one
53
-severity level is given, all messages of that level or higher will be
54
-sent to the listed destination.
55
-<DT><B>Log </B><I>minSeverity</I>[-<I>maxSeverity</I>] <B>file</B> <I>FILENAME</I><DD>
56
-As above, but send log messages to the listed filename.  The &quot;Log&quot;
57
-option may appear more than once in a configuration file.  Messages
58
-are sent to all the logs that match their severity level.
59 48
 <DT><B>BandwidthRate </B><I>N</I> <B>bytes</B>|<B>KB</B>|<B>MB</B>|<B>GB</B>|<B>TB</B><DD>
60 49
 A token bucket limits the average incoming bandwidth on this node to
61 50
 the specified number of bytes per second. (Default: 2 MB)
... ...
@@ -67,8 +56,31 @@ BandwidthRate. Server operators who want to reduce the number of clients
67 56
 who ask to build circuits through them (since this is proportional to
68 57
 advertised bandwidth rate) can thus reduce the CPU demands on their
69 58
 server without impacting network performance.
59
+<DT><B>ControlPort </B><I>Port</I><DD>
60
+If set, Tor will accept connections from the same machine (localhost only) on
61
+this port, and allow those connections to control the Tor process using the
62
+Tor Control Protocol (described in control-spec.txt).  Note: unless you also
63
+specify one of <B>HashedControlPassword</B> or <B>CookieAuthentication</B>,
64
+setting this option will cause Tor to allow any process on the local host to
65
+control it.
66
+<DT><B>HashedControlPassword </B><I>hashed_password</I><DD>
67
+Don't allow any connections on the control port except when the other process
68
+knows the password whose one-way hash is <I>hashed_password</I>.  You can
69
+compute the hash of a password by running &quot;tor --hash-password
70
+<I>password</I>&quot;.
71
+<DT><B>CookieAuthentication </B><B>0</B>|<B>1</B><DD>
72
+If this option is set to 1, don't allow any connections on the control port
73
+except when the connecting process knows the contents of a file named
74
+&quot;control_auth_cookie&quot;, which Tor will create in its data directory.  This
75
+authentication methods should only be used on systems with good filesystem
76
+security. (Default: 0)
70 77
 <DT><B>DataDirectory </B><I>DIR</I><DD>
71 78
 Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor)
79
+<DT><B>DirFetchPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD>
80
+Every time the specified period elapses, Tor downloads a directory.
81
+A directory contains a signed list of all known servers as well as
82
+their current liveness status. A value of &quot;0 seconds&quot; tells Tor to choose an
83
+appropriate default. (Default: 1 hour for clients, 20 minutes for servers.)
72 84
 <DT><B>DirServer </B><I>address:port fingerprint</I><DD>
73 85
 Use a nonstandard authoritative directory server at the provided
74 86
 address and port, with the specified key fingerprint.  This option can
... ...
@@ -93,6 +105,17 @@ proxy only allows connecting to certain ports.
93 105
 <DT><B>KeepalivePeriod </B><I>NUM</I><DD>
94 106
 To keep firewalls from expiring connections, send a padding keepalive
95 107
 cell on open connections every NUM seconds. (Default: 5 minutes.)
108
+<DT><B>Log </B><I>minSeverity</I>[-<I>maxSeverity</I>] <B>stderr</B>|<B>stdout</B>|<B>syslog</B><DD>
109
+Send all messages between <I>minSeverity</I> and <I>maxSeverity</I> to
110
+the standard output stream, the standard error stream, or to the system
111
+log. (The &quot;syslog&quot; value is only supported on Unix.)  Recognized
112
+severity levels are debug, info, notice, warn, and err.  If only one
113
+severity level is given, all messages of that level or higher will be
114
+sent to the listed destination.
115
+<DT><B>Log </B><I>minSeverity</I>[-<I>maxSeverity</I>] <B>file</B> <I>FILENAME</I><DD>
116
+As above, but send log messages to the listed filename.  The &quot;Log&quot;
117
+option may appear more than once in a configuration file.  Messages
118
+are sent to all the logs that match their severity level.
96 119
 <DT><B>MaxConn </B><I>NUM</I><DD>
97 120
 Maximum number of simultaneous sockets allowed.  You probably don't need
98 121
 to adjust this. (Default: 1024)
... ...
@@ -104,40 +127,18 @@ of Tor's outgoing connections to use a single one.
104 127
 On startup, write our PID to FILE. On clean shutdown, remove FILE.
105 128
 <DT><B>RunAsDaemon </B><B>0</B>|<B>1</B><DD>
106 129
 If 1, Tor forks and daemonizes to the background. (Default: 0)
130
+<DT><B>SafeLogging </B><B>0</B>|<B>1</B><DD>
131
+If 1, Tor replaces potentially sensitive strings in the logs
132
+(e.g. addresses) with the string [scrubbed]. This way logs can still be
133
+useful, but they don't leave behind personally identifying information
134
+about what sites a user might have visited. (Default: 1)
135
+<DT><B>StatusFetchPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD>
136
+Every time the specified period elapses, Tor downloads signed status
137
+information about the current state of known servers.  A value of
138
+&quot;0 seconds&quot; tells Tor to choose an appropriate default. (Default: 30
139
+minutes for clients, 15 minutes for servers.)
107 140
 <DT><B>User </B><I>UID</I><DD>
108 141
 On startup, setuid to this user.
109
-<DT><B>ControlPort </B><I>Port</I><DD>
110
-If set, Tor will accept connections from the same machine (localhost only) on
111
-this port, and allow those connections to control the Tor process using the
112
-Tor Control Protocol (described in control-spec.txt).  Note: unless you also
113
-specify one of <B>HashedControlPassword</B> or <B>CookieAuthentication</B>,
114
-setting this option will cause Tor to allow any process on the local host to
115
-control it.
116
-<DT><B>HashedControlPassword </B><I>hashed_password</I><DD>
117
-Don't allow any connections on the control port except when the other process
118
-knows the password whose one-way hash is <I>hashed_password</I>.  You can
119
-compute the hash of a password by running &quot;tor --hash-password
120
-<I>password</I>&quot;.
121
-<DT><B>CookieAuthentication </B><B>0</B>|<B>1</B><DD>
122
-If this option is set to 1, don't allow any connections on the control port
123
-except when the connecting process knows the contents of a file named
124
-&quot;control_auth_cookie&quot;, which Tor will create in its data directory.  This
125
-authentication methods should only be used on systems with good filesystem
126
-security.
127
-<DT><B>DirFetchPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD>
128
-Every time the specified period elapses, Tor downloads a directory.
129
-A directory contains a signed list of all known servers as well as
130
-their current liveness status. A value of &quot;0 seconds&quot; tells Tor to choose an
131
-appropriate default. (Default: 1 hour for clients, 20 minutes for servers.)
132
-<DT><B>StatusFetchPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B> Every time the<DD>
133
-specified period elapses, Tor downloads signed status information about the
134
-current state of known servers.  A value of &quot;0 seconds&quot; tells Tor to choose
135
-an appropriate default. (Default: 30 minutes for clients, 15 minutes for
136
-servers.)  (Default: 20 minutes.)
137
-<DT><B>RendPostPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD>
138
-Every time the specified period elapses, Tor uploads any rendezvous
139
-service descriptors to the directory servers.  This information is also
140
-uploaded whenever it changes.  (Default: 20 minutes.)
141 142
 <P>
142 143
 </DL>
143 144
 <A NAME="lbAF">&nbsp;</A>
... ...
@@ -410,6 +411,10 @@ ones; most people can leave this unset.
410 411
 <DT><B>HiddenServiceExcludeNodes </B><I>nickname</I>,<I>nickname</I>,<I>...</I><DD>
411 412
 Do not use the specified nodes as introduction points for the hidden
412 413
 service. In normal use there is no reason to set this.
414
+<DT><B>RendPostPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD>
415
+Every time the specified period elapses, Tor uploads any rendezvous
416
+service descriptors to the directory servers.  This information is also
417
+uploaded whenever it changes.  (Default: 20 minutes.)
413 418
 <P>
414 419
 
415 420
 
... ...
@@ -475,7 +480,7 @@ The tor process stores keys and other data here.
475 480
 <A NAME="lbAM">&nbsp;</A>
476 481
 <H2>BUGS</H2>
477 482
 
478
-Plenty, probably. It's still in alpha. Please report them.
483
+Plenty, probably. Tor is still in development. Please report them.
479 484
 <A NAME="lbAN">&nbsp;</A>
480 485
 <H2>AUTHORS</H2>
481 486
 
... ...
@@ -503,6 +508,6 @@ Roger Dingledine &lt;<A HREF="mailto:arma@mit.edu">arma@mit.edu</A>&gt;, Nick Ma
503 508
 This document was created by
504 509
 <A HREF="../">man2html</A>,
505 510
 using the manual pages.<BR>
506
-Time: 01:40:02 GMT, May 15, 2005
511
+Time: 10:38:23 GMT, May 15, 2005
507 512
 </BODY>
508 513
 </HTML>
509 514