include stable man page from the old website
Runa A. Sandvik

Runa A. Sandvik commited on 2011-03-25 14:08:28
Zeige 7 geänderte Dateien mit 2324 Einfügungen und 25 Löschungen.

... ...
@@ -61,9 +61,9 @@
61 61
           {'url'  => 'docs/running-a-mirror',
62 62
            'txt'  => 'ضبط مرآة',
63 63
           },
64
-#          {'url'  => 'docs/tor-manual',
65
-#           'txt'  => 'تور- دليل الإصدارة الثابتة',
66
-#          },
64
+          {'url'  => 'docs/tor-manual',
65
+           'txt'  => 'تور- دليل الإصدارة الثابتة',
66
+          },
67 67
           {'url'  => 'docs/tor-manual-dev',
68 68
            'txt'  => 'تور- دليل الإصدارة ألفا',
69 69
           },
... ...
@@ -61,9 +61,9 @@
61 61
           {'url'  => 'docs/running-a-mirror',
62 62
            'txt'  => 'Configuring a Mirror',
63 63
           },
64
-#          {'url'  => 'docs/tor-manual',
65
-#           'txt'  => 'Tor -stable Manual',
66
-#          },
64
+          {'url'  => 'docs/tor-manual',
65
+           'txt'  => 'Tor -stable Manual',
66
+          },
67 67
           {'url'  => 'docs/tor-manual-dev',
68 68
            'txt'  => 'Tor -alpha Manual',
69 69
           },
... ...
@@ -9,15 +9,2314 @@
9 9
   <div id="breadcrumbs">
10 10
     <a href="<page index>">Home &raquo; </a>
11 11
     <a href="<page docs/documentation>">Documentation &raquo; </a>
12
-    <a href="<page docs/tor-doc-osx>">Tor Dev Manual</a>
12
+    <a href="<page docs/tor-doc-osx>">Tor Manual</a>
13 13
   </div>
14 14
   <div id="maincol">
15
-    <:
16
-    	die "Missing git clone at $(TORGIT)" unless -d "$(TORGIT)";
17
-    	my $man = `GIT_DIR=$(TORGIT) git show $(STABLETAG):doc/tor.1.txt | asciidoc -d manpage -s -o - -`;
18
-    	die "No manpage because of asciidoc error or file not available from git" unless $man;
19
-    	print $man;
20
-    :>
15
+	<h2 id="_synopsis">SYNOPSIS</h2>
16
+	<div class="sectionbody">
17
+			<div class="paragraph"><p><strong>tor</strong> [<em>OPTION</em> <em>value</em>]&#8230;</p>
18
+			</div>
19
+	</div>
20
+		<h2 id="_description">DESCRIPTION</h2>
21
+		<div class="sectionbody">
22
+			<div class="paragraph"><p><em>tor</em> is a connection-oriented anonymizing communication
23
+			service. Users choose a source-routed path through a set of nodes, and
24
+			negotiate a "virtual circuit" through the network, in which each node 
25
+			knows its predecessor and successor, but no others. Traffic flowing down 
26
+			the circuit is unwrapped by a symmetric key at each node, which reveals
27
+			the downstream node.<br /></p></div>
28
+			
29
+			<div class="paragraph"><p>Basically <em>tor</em> provides a distributed network of servers ("onion routers").
30
+			Users bounce their TCP streams&#8201;&#8212;&#8201;web traffic, ftp, ssh, etc&#8201;&#8212;&#8201;around the
31
+			routers, and recipients, observers, and even the routers themselves have 
32
+			difficulty tracking the source of the stream.</p></div>
33
+		</div>
34
+		<h2 id="_options">OPTIONS</h2>
35
+		<div class="sectionbody">
36
+			<div class="dlist"><dl>
37
+				<dt class="hdlist1">
38
+					<strong>-h</strong>, <strong>-help</strong>
39
+				</dt>
40
+				<dd>
41
+					<p>
42
+					    Display a short help message and exit.
43
+					</p>
44
+				</dd>
45
+				<dt class="hdlist1">
46
+					<strong>-f</strong> <em>FILE</em>
47
+				</dt>
48
+				<dd>
49
+					<p>
50
+					    FILE contains further "option value" pairs. (Default: @CONFDIR@/torrc)
51
+					</p>
52
+				</dd>
53
+				<dt class="hdlist1">
54
+					<strong>--hash-password</strong>
55
+				</dt>
56
+				<dd>
57
+					<p>
58
+					    Generates a hashed password for control port access.
59
+					</p>
60
+				</dd>
61
+				<dt class="hdlist1">
62
+					<strong>--list-fingerprint</strong>
63
+				</dt>
64
+				<dd>
65
+					<p>
66
+					    Generate your keys and output your nickname and fingerprint.
67
+					</p>
68
+				</dd>
69
+				<dt class="hdlist1">
70
+					<strong>--verify-config</strong>
71
+				</dt>
72
+				<dd>
73
+					<p>
74
+					    Verify the configuration file is valid.
75
+					</p>
76
+				</dd>
77
+				<dt class="hdlist1">
78
+					<strong>--nt-service</strong>
79
+				</dt>
80
+				<dd>
81
+					<p>
82
+					    <strong>--service [install|remove|start|stop]</strong> Manage the Tor Windows
83
+					    NT/2000/XP service. Current instructions can be found at
84
+					    <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#WinNTService">https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#WinNTService</a>
85
+					</p>
86
+				</dd>
87
+				<dt class="hdlist1">
88
+					<strong>--list-torrc-options</strong>
89
+				</dt>
90
+				<dd>
91
+					<p>
92
+					    List all valid options.
93
+					</p>
94
+				</dd>
95
+				<dt class="hdlist1">
96
+					<strong>--version</strong>
97
+				</dt>
98
+				<dd>
99
+					<p>
100
+					    Display Tor version and exit.
101
+					</p>
102
+				</dd>
103
+				<dt class="hdlist1">
104
+					<strong>--quiet</strong>
105
+				</dt>
106
+				<dd>
107
+					<p>
108
+					    Do not start Tor with a console log unless explicitly requested to do so.
109
+					    (By default, Tor starts out logging messages at level "notice" or higher to
110
+					    the console, until it has parsed its configuration.)
111
+					</p>
112
+				</dd>
113
+				</dl>
114
+			</div>
115
+			<div class="paragraph">
116
+				<p>Other options can be specified either on the command-line (--option
117
+    				value), or in the configuration file (option value or option "value").
118
+				Options are case-insensitive. C-style escaped characters are allowed inside
119
+				quoted values. Options on the command line take precedence over
120
+    				options found in the configuration file, except indicated otherwise. To
121
+    				split one configuration entry into multiple lines, use a single \ before
122
+    				the end of the line. Comments can be used in such multiline entries, but
123
+    				they must start at the beginning of a line.</p>
124
+			</div>
125
+			<div class="dlist"><dl>
126
+				<dt class="hdlist1">
127
+					<strong>BandwidthRate</strong> <em>N</em> <strong>bytes</strong>|<strong>KB</strong>|<strong>MB</strong>|<strong>GB</strong>
128
+				</dt>
129
+				<dd>
130
+					<p>
131
+					    A token bucket limits the average incoming bandwidth usage on this node to
132
+					    the specified number of bytes per second, and the average outgoing
133
+					    bandwidth usage to that same value. If you want to run a relay in the
134
+					    public network, this needs to be <em>at the very least</em> 20 KB (that is,
135
+					    20480 bytes). (Default: 5 MB)
136
+					</p>
137
+				</dd>
138
+				<dt class="hdlist1">
139
+					<strong>BandwidthBurst</strong> <em>N</em> <strong>bytes</strong>|<strong>KB</strong>|<strong>MB</strong>|<strong>GB</strong>
140
+				</dt>
141
+				<dd>
142
+					<p>
143
+					    Limit the maximum token bucket size (also known as the burst) to the given
144
+				    	    number of bytes in each direction. (Default: 10 MB)
145
+					</p>
146
+				</dd>
147
+				<dt class="hdlist1">
148
+					<strong>MaxAdvertisedBandwidth</strong> <em>N</em> <strong>bytes</strong>|<strong>KB</strong>|<strong>MB</strong>|<strong>GB</strong>
149
+				</dt>
150
+				<dd>
151
+					<p>
152
+					    If set, we will not advertise more than this amount of bandwidth for our
153
+					    BandwidthRate. Server operators who want to reduce the number of clients
154
+					    who ask to build circuits through them (since this is proportional to
155
+					    advertised bandwidth rate) can thus reduce the CPU demands on their server
156
+					    without impacting network performance.
157
+					</p>
158
+				</dd>
159
+				<dt class="hdlist1">
160
+					<strong>RelayBandwidthRate</strong> <em>N</em> <strong>bytes</strong>|<strong>KB</strong>|<strong>MB</strong>|<strong>GB</strong>
161
+				</dt>
162
+				<dd>
163
+					<p>
164
+					    If not 0, a separate token bucket limits the average incoming bandwidth
165
+					    usage for _relayed traffic_ on this node to the specified number of bytes
166
+					    per second, and the average outgoing bandwidth usage to that same value.
167
+					    Relayed traffic currently is calculated to include answers to directory
168
+					    requests, but that may change in future versions. (Default: 0)
169
+					</p>
170
+				</dd>
171
+				<dt class="hdlist1">
172
+					<strong>RelayBandwidthBurst</strong> <em>N</em> <strong>bytes</strong>|<strong>KB</strong>|<strong>MB</strong>|<strong>GB</strong>
173
+				</dt>
174
+				<dd>
175
+					<p>
176
+					    If not 0, limit the maximum token bucket size (also known as the burst) for
177
+					    _relayed traffic_ to the given number of bytes in each direction.
178
+					    (Default: 0)
179
+					</p>
180
+				</dd>
181
+				<dt class="hdlist1">
182
+					<strong>ConnLimit</strong> <em>NUM</em>
183
+				</dt>
184
+				<dd>
185
+					<p>
186
+					    The minimum number of file descriptors that must be available to the Tor
187
+					    process before it will start. Tor will ask the OS for as many file
188
+					    descriptors as the OS will allow (you can find this by "ulimit -H -n").
189
+					    If this number is less than ConnLimit, then Tor will refuse to start.<br />
190
+					    <br />
191
+					    You probably don&#8217;t need to adjust this. It has no effect on Windows
192
+					    since that platform lacks getrlimit(). (Default: 1000)
193
+					</p>
194
+				</dd>
195
+				<dt class="hdlist1">
196
+					<strong>ConstrainedSockets</strong> <strong>0</strong>|<strong>1</strong>
197
+				</dt>
198
+				<dd>
199
+					<p>
200
+					    If set, Tor will tell the kernel to attempt to shrink the buffers for all
201
+					    sockets to the size specified in <strong>ConstrainedSockSize</strong>. This is useful for
202
+					    virtual servers and other environments where system level TCP buffers may
203
+					    be limited. If you&#8217;re on a virtual server, and you encounter the "Error
204
+					    creating network socket: No buffer space available" message, you are
205
+					    likely experiencing this problem.<br />
206
+					    <br />
207
+					    The preferred solution is to have the admin increase the buffer pool for
208
+					    the host itself via /proc/sys/net/ipv4/tcp_mem or equivalent facility;
209
+					    this configuration option is a second-resort.<br />
210
+					    <br />
211
+					    The DirPort option should also not be used if TCP buffers are scarce. The
212
+					    cached directory requests consume additional sockets which exacerbates
213
+					    the problem.<br />
214
+					    <br />
215
+					    You should <strong>not</strong> enable this feature unless you encounter the "no buffer
216
+					    space available" issue. Reducing the TCP buffers affects window size for
217
+					    the TCP stream and will reduce throughput in proportion to round trip
218
+					    time on long paths. (Default: 0.)
219
+					</p>
220
+					</dd>
221
+					<dt class="hdlist1">
222
+						<strong>ConstrainedSockSize</strong> <em>N</em> <strong>bytes</strong>|<strong>KB</strong>
223
+					</dt>
224
+					<dd>
225
+						<p>
226
+						    When <strong>ConstrainedSockets</strong> is enabled the receive and transmit buffers for
227
+						    all sockets will be set to this limit. Must be a value between 2048 and
228
+						    262144, in 1024 byte increments. Default of 8192 is recommended.
229
+						</p>
230
+					</dd>
231
+					<dt class="hdlist1">
232
+						<strong>ControlPort</strong> <em>Port</em>
233
+					</dt>
234
+					<dd>
235
+						<p>
236
+						    If set, Tor will accept connections on this port and allow those
237
+						    connections to control the Tor process using the Tor Control Protocol
238
+						    (described in control-spec.txt). Note: unless you also specify one of
239
+						    <strong>HashedControlPassword</strong> or <strong>CookieAuthentication</strong>, setting this option will
240
+						    cause Tor to allow any process on the local host to control it. This
241
+						    option is required for many Tor controllers; most use the value of 9051.
242
+						</p>
243
+					</dd>
244
+					<dt class="hdlist1">
245
+						<strong>ControlListenAddress</strong> <em>IP</em>[:<em>PORT</em>]
246
+					</dt>
247
+					<dd>
248
+						<p>
249
+						    Bind the controller listener to this address. If you specify a port, bind
250
+						    to this port rather than the one specified in ControlPort. We strongly
251
+						    recommend that you leave this alone unless you know what you&#8217;re doing,
252
+						    since giving attackers access to your control listener is really
253
+						    dangerous. (Default: 127.0.0.1) This directive can be specified multiple
254
+						    times to bind to multiple addresses/ports.
255
+						</p>
256
+					</dd>
257
+					<dt class="hdlist1">
258
+						<strong>ControlSocket</strong> <em>Path</em>
259
+					</dt>
260
+					<dd>
261
+						<p>
262
+						    Like ControlPort, but listens on a Unix domain socket, rather than a TCP
263
+						    socket. (Unix and Unix-like systems only.)
264
+						</p>
265
+					</dd>
266
+					<dt class="hdlist1">
267
+						<strong>HashedControlPassword</strong> <em>hashed_password</em>
268
+					</dt>
269
+					<dd>
270
+						<p>
271
+						    Don&#8217;t allow any connections on the control port except when the other
272
+						    process knows the password whose one-way hash is <em>hashed_password</em>. You
273
+						    can compute the hash of a password by running "tor --hash-password
274
+						    <em>password</em>". You can provide several acceptable passwords by using more
275
+						    than one HashedControlPassword line.
276
+						</p>
277
+					</dd>
278
+					<dt class="hdlist1">
279
+						<strong>CookieAuthentication</strong> <strong>0</strong>|<strong>1</strong>
280
+					</dt>
281
+					<dd>
282
+						<p>
283
+						    If this option is set to 1, don&#8217;t allow any connections on the control port
284
+						    except when the connecting process knows the contents of a file named
285
+						    "control_auth_cookie", which Tor will create in its data directory. This
286
+						    authentication method should only be used on systems with good filesystem
287
+						    security. (Default: 0)
288
+						</p>
289
+					</dd>
290
+					<dt class="hdlist1">
291
+						<strong>CookieAuthFile</strong> <em>Path</em>
292
+					</dt>
293
+					<dd>
294
+						<p>
295
+						    If set, this option overrides the default location and file name
296
+						    for Tor&#8217;s cookie file. (See CookieAuthentication above.)
297
+						</p>
298
+					</dd>
299
+					<dt class="hdlist1">
300
+<strong>CookieAuthFileGroupReadable</strong> <strong>0</strong>|<strong>1</strong>|<em>Groupname</em>
301
+</dt>
302
+<dd>
303
+<p>
304
+    If this option is set to 0, don&#8217;t allow the filesystem group to read the
305
+    cookie file. If the option is set to 1, make the cookie file readable by
306
+    the default GID. [Making the file readable by other groups is not yet
307
+    implemented; let us know if you need this for some reason.] (Default: 0).
308
+</p>
309
+</dd>
310
+<dt class="hdlist1">
311
+<strong>DataDirectory</strong> <em>DIR</em>
312
+</dt>
313
+<dd>
314
+<p>
315
+    Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor)
316
+</p>
317
+</dd>
318
+<dt class="hdlist1">
319
+<strong>DirServer</strong> [<em>nickname</em>] [<strong>flags</strong>] <em>address</em>:<em>port</em> <em>fingerprint</em>
320
+</dt>
321
+<dd>
322
+<p>
323
+    Use a nonstandard authoritative directory server at the provided address
324
+    and port, with the specified key fingerprint. This option can be repeated
325
+    many times, for multiple authoritative directory servers. Flags are
326
+    separated by spaces, and determine what kind of an authority this directory
327
+    is. By default, every authority is authoritative for current ("v2")-style
328
+    directories, unless the "no-v2" flag is given. If the "v1" flags is
329
+    provided, Tor will use this server as an authority for old-style (v1)
330
+    directories as well. (Only directory mirrors care about this.) Tor will
331
+    use this server as an authority for hidden service information if the "hs"
332
+    flag is set, or if the "v1" flag is set and the "no-hs" flag is <strong>not</strong> set.
333
+    Tor will use this authority as a bridge authoritative directory if the
334
+    "bridge" flag is set. If a flag "orport=<strong>port</strong>" is given, Tor will use the
335
+    given port when opening encrypted tunnels to the dirserver. Lastly, if a
336
+    flag "v3ident=<strong>fp</strong>" is given, the dirserver is a v3 directory authority
337
+    whose v3 long-term signing key has the fingerprint <strong>fp</strong>.<br />
338
+<br />
339
+    If no <strong>dirserver</strong> line is given, Tor will use the default directory
340
+    servers. NOTE: this option is intended for setting up a private Tor
341
+    network with its own directory authorities. If you use it, you will be
342
+    distinguishable from other users, because you won&#8217;t believe the same
343
+    authorities they do.
344
+</p>
345
+</dd>
346
+</dl></div>
347
+<div class="paragraph"><p><strong>AlternateDirAuthority</strong> [<em>nickname</em>] [<strong>flags</strong>] <em>address</em>:<em>port</em> <em>fingerprint</em><br /></p></div>
348
+<div class="paragraph"><p><strong>AlternateHSAuthority</strong> [<em>nickname</em>] [<strong>flags</strong>] <em>address</em>:<em>port</em> <em>fingerprint</em><br /></p></div>
349
+<div class="dlist"><dl>
350
+<dt class="hdlist1">
351
+<strong>AlternateBridgeAuthority</strong> [<em>nickname</em>] [<strong>flags</strong>] <em>address</em>:<em>port</em> <em> fingerprint</em>
352
+</dt>
353
+<dd>
354
+<p>
355
+    As DirServer, but replaces less of the default directory authorities. Using
356
+    AlternateDirAuthority replaces the default Tor directory authorities, but
357
+    leaves the hidden service authorities and bridge authorities in place.
358
+    Similarly, Using AlternateHSAuthority replaces the default hidden service
359
+    authorities, but not the directory or bridge authorities.
360
+</p>
361
+</dd>
362
+<dt class="hdlist1">
363
+<strong>FetchDirInfoEarly</strong> <strong>0</strong>|<strong>1</strong>
364
+</dt>
365
+<dd>
366
+<p>
367
+    If set to 1, Tor will always fetch directory information like other
368
+    directory caches, even if you don&#8217;t meet the normal criteria for fetching
369
+    early. Normal users should leave it off. (Default: 0)
370
+</p>
371
+</dd>
372
+<dt class="hdlist1">
373
+<strong>FetchHidServDescriptors</strong> <strong>0</strong>|<strong>1</strong>
374
+</dt>
375
+<dd>
376
+<p>
377
+    If set to 0, Tor will never fetch any hidden service descriptors from the
378
+    rendezvous directories. This option is only useful if you&#8217;re using a Tor
379
+    controller that handles hidden service fetches for you. (Default: 1)
380
+</p>
381
+</dd>
382
+<dt class="hdlist1">
383
+<strong>FetchServerDescriptors</strong> <strong>0</strong>|<strong>1</strong>
384
+</dt>
385
+<dd>
386
+<p>
387
+    If set to 0, Tor will never fetch any network status summaries or server
388
+    descriptors from the directory servers. This option is only useful if
389
+    you&#8217;re using a Tor controller that handles directory fetches for you.
390
+    (Default: 1)
391
+</p>
392
+</dd>
393
+<dt class="hdlist1">
394
+<strong>FetchUselessDescriptors</strong> <strong>0</strong>|<strong>1</strong>
395
+</dt>
396
+<dd>
397
+<p>
398
+    If set to 1, Tor will fetch every non-obsolete descriptor from the
399
+    authorities that it hears about. Otherwise, it will avoid fetching useless
400
+    descriptors, for example for routers that are not running. This option is
401
+    useful if you&#8217;re using the contributed "exitlist" script to enumerate Tor
402
+    nodes that exit to certain addresses. (Default: 0)
403
+</p>
404
+</dd>
405
+<dt class="hdlist1">
406
+<strong>HTTPProxy</strong> <em>host</em>[:<em>port</em>]
407
+</dt>
408
+<dd>
409
+<p>
410
+    Tor will make all its directory requests through this host:port (or host:80
411
+    if port is not specified), rather than connecting directly to any directory
412
+    servers.
413
+</p>
414
+</dd>
415
+<dt class="hdlist1">
416
+<strong>HTTPProxyAuthenticator</strong> <em>username:password</em>
417
+</dt>
418
+<dd>
419
+<p>
420
+    If defined, Tor will use this username:password for Basic HTTP proxy
421
+    authentication, as in RFC 2617. This is currently the only form of HTTP
422
+    proxy authentication that Tor supports; feel free to submit a patch if you
423
+    want it to support others.
424
+</p>
425
+</dd>
426
+<dt class="hdlist1">
427
+<strong>HTTPSProxy</strong> <em>host</em>[:<em>port</em>]
428
+</dt>
429
+<dd>
430
+<p>
431
+    Tor will make all its OR (SSL) connections through this host:port (or
432
+    host:443 if port is not specified), via HTTP CONNECT rather than connecting
433
+    directly to servers. You may want to set <strong>FascistFirewall</strong> to restrict
434
+    the set of ports you might try to connect to, if your HTTPS proxy only
435
+    allows connecting to certain ports.
436
+</p>
437
+</dd>
438
+<dt class="hdlist1">
439
+<strong>HTTPSProxyAuthenticator</strong> <em>username:password</em>
440
+</dt>
441
+<dd>
442
+<p>
443
+    If defined, Tor will use this username:password for Basic HTTPS proxy
444
+    authentication, as in RFC 2617. This is currently the only form of HTTPS
445
+    proxy authentication that Tor supports; feel free to submit a patch if you
446
+    want it to support others.
447
+</p>
448
+</dd>
449
+<dt class="hdlist1">
450
+<strong>KeepalivePeriod</strong> <em>NUM</em>
451
+</dt>
452
+<dd>
453
+<p>
454
+    To keep firewalls from expiring connections, send a padding keepalive cell
455
+    every NUM seconds on open connections that are in use. If the connection
456
+    has no open circuits, it will instead be closed after NUM seconds of
457
+    idleness. (Default: 5 minutes)
458
+</p>
459
+</dd>
460
+<dt class="hdlist1">
461
+<strong>Log</strong> <em>minSeverity</em>[-<em>maxSeverity</em>] <strong>stderr</strong>|<strong>stdout</strong>|<strong>syslog</strong>
462
+</dt>
463
+<dd>
464
+<p>
465
+    Send all messages between <em>minSeverity</em> and <em>maxSeverity</em> to the standard
466
+    output stream, the standard error stream, or to the system log. (The
467
+    "syslog" value is only supported on Unix.) Recognized severity levels are
468
+    debug, info, notice, warn, and err. We advise using "notice" in most cases,
469
+    since anything more verbose may provide sensitive information to an
470
+    attacker who obtains the logs. If only one severity level is given, all
471
+    messages of that level or higher will be sent to the listed destination.
472
+</p>
473
+</dd>
474
+<dt class="hdlist1">
475
+<strong>Log</strong> <em>minSeverity</em>[-<em>maxSeverity</em>] <strong>file</strong> <em>FILENAME</em>
476
+</dt>
477
+<dd>
478
+<p>
479
+    As above, but send log messages to the listed filename. The
480
+    "Log" option may appear more than once in a configuration file.
481
+    Messages are sent to all the logs that match their severity
482
+    level.
483
+</p>
484
+</dd>
485
+<dt class="hdlist1">
486
+<strong>OutboundBindAddress</strong> <em>IP</em>
487
+</dt>
488
+<dd>
489
+<p>
490
+    Make all outbound connections originate from the IP address specified. This
491
+    is only useful when you have multiple network interfaces, and you want all
492
+    of Tor&#8217;s outgoing connections to use a single one. This setting will be
493
+    ignored for connections to the loopback addresses (127.0.0.0/8 and ::1).
494
+</p>
495
+</dd>
496
+<dt class="hdlist1">
497
+<strong>PidFile</strong> <em>FILE</em>
498
+</dt>
499
+<dd>
500
+<p>
501
+    On startup, write our PID to FILE. On clean shutdown, remove
502
+    FILE.
503
+</p>
504
+</dd>
505
+<dt class="hdlist1">
506
+<strong>ProtocolWarnings</strong> <strong>0</strong>|<strong>1</strong>
507
+</dt>
508
+<dd>
509
+<p>
510
+    If 1, Tor will log with severity 'warn' various cases of other parties not
511
+    following the Tor specification. Otherwise, they are logged with severity
512
+    'info'. (Default: 0)
513
+</p>
514
+</dd>
515
+<dt class="hdlist1">
516
+<strong>RunAsDaemon</strong> <strong>0</strong>|<strong>1</strong>
517
+</dt>
518
+<dd>
519
+<p>
520
+    If 1, Tor forks and daemonizes to the background. This option has no effect
521
+    on Windows; instead you should use the --service command-line option.
522
+    (Default: 0)
523
+</p>
524
+</dd>
525
+<dt class="hdlist1">
526
+<strong>SafeLogging</strong> <strong>0</strong>|<strong>1</strong>
527
+</dt>
528
+<dd>
529
+<p>
530
+    Tor can scrub potentially sensitive strings from log messages (e.g.
531
+    addresses) by replacing them with the string [scrubbed]. This way logs can
532
+    still be useful, but they don&#8217;t leave behind personally identifying
533
+    information about what sites a user might have visited.<br />
534
+<br />
535
+    If this option is set to 0, Tor will not perform any scrubbing, if it is
536
+    set to 1, all potentially sensitive strings are replaced. (Default: 1)
537
+</p>
538
+</dd>
539
+<dt class="hdlist1">
540
+<strong>User</strong> <em>UID</em>
541
+</dt>
542
+<dd>
543
+<p>
544
+    On startup, setuid to this user and setgid to their primary group.
545
+</p>
546
+</dd>
547
+<dt class="hdlist1">
548
+<strong>HardwareAccel</strong> <strong>0</strong>|<strong>1</strong>
549
+</dt>
550
+<dd>
551
+<p>
552
+    If non-zero, try to use built-in (static) crypto hardware acceleration when
553
+    available. This is untested and probably buggy. (Default: 0)
554
+</p>
555
+</dd>
556
+<dt class="hdlist1">
557
+<strong>AvoidDiskWrites</strong> <strong>0</strong>|<strong>1</strong>
558
+</dt>
559
+<dd>
560
+<p>
561
+    If non-zero, try to write to disk less frequently than we would otherwise.
562
+    This is useful when running on flash memory or other media that support
563
+    only a limited number of writes. (Default: 0)
564
+</p>
565
+</dd>
566
+<dt class="hdlist1">
567
+<strong>TunnelDirConns</strong> <strong>0</strong>|<strong>1</strong>
568
+</dt>
569
+<dd>
570
+<p>
571
+    If non-zero, when a directory server we contact supports it, we will build
572
+    a one-hop circuit and make an encrypted connection via its ORPort.
573
+    (Default: 1)
574
+</p>
575
+</dd>
576
+<dt class="hdlist1">
577
+<strong>PreferTunneledDirConns</strong> <strong>0</strong>|<strong>1</strong>
578
+</dt>
579
+<dd>
580
+<p>
581
+    If non-zero, we will avoid directory servers that don&#8217;t support tunneled
582
+    directory connections, when possible. (Default: 1)
583
+</p>
584
+</dd>
585
+</dl></div>
586
+</div>
587
+<h2 id="_client_options">CLIENT OPTIONS</h2>
588
+<div class="sectionbody">
589
+<div class="paragraph"><p>The following options are useful only for clients (that is, if
590
+<strong>SocksPort</strong> is non-zero):</p></div>
591
+<div class="dlist"><dl>
592
+<dt class="hdlist1">
593
+<strong>AllowInvalidNodes</strong> <strong>entry</strong>|<strong>exit</strong>|<strong>middle</strong>|<strong>introduction</strong>|<strong>rendezvous</strong>|<strong>&#8230;</strong>
594
+</dt>
595
+<dd>
596
+<p>
597
+    If some Tor servers are obviously not working right, the directory
598
+    authorities can manually mark them as invalid, meaning that it&#8217;s not
599
+    recommended you use them for entry or exit positions in your circuits. You
600
+    can opt to use them in some circuit positions, though. The default is
601
+    "middle,rendezvous", and other choices are not advised.
602
+</p>
603
+</dd>
604
+<dt class="hdlist1">
605
+<strong>ExcludeSingleHopRelays</strong> <strong>0</strong>|<strong>1</strong>
606
+</dt>
607
+<dd>
608
+<p>
609
+    This option controls whether circuits built by Tor will include relays with
610
+    the AllowSingleHopExits flag set to true. If ExcludeSingleHopRelays is set
611
+    to 0, these relays will be included. Note that these relays might be at
612
+    higher risk of being seized or observed, so they are not normally
613
+    included. Also note that relatively few clients turn off this option,
614
+    so using these relays might make your client stand out.
615
+    (Default: 1)
616
+</p>
617
+</dd>
618
+<dt class="hdlist1">
619
+<strong>Bridge</strong> <em>IP</em>:<em>ORPort</em> [fingerprint]
620
+</dt>
621
+<dd>
622
+<p>
623
+    When set along with UseBridges, instructs Tor to use the relay at
624
+    "IP:ORPort" as a "bridge" relaying into the Tor network. If "fingerprint"
625
+    is provided (using the same format as for DirServer), we will verify that
626
+    the relay running at that location has the right fingerprint. We also use
627
+    fingerprint to look up the bridge descriptor at the bridge authority, if
628
+    it&#8217;s provided and if UpdateBridgesFromAuthority is set too.
629
+</p>
630
+</dd>
631
+<dt class="hdlist1">
632
+<strong>CircuitBuildTimeout</strong> <em>NUM</em>
633
+</dt>
634
+<dd>
635
+<p>
636
+    Try for at most NUM seconds when building circuits. If the circuit isn't
637
+    open in that time, give up on it. (Default: 1 minute.)
638
+</p>
639
+</dd>
640
+<dt class="hdlist1">
641
+<strong>CircuitIdleTimeout</strong> <em>NUM</em>
642
+</dt>
643
+<dd>
644
+<p>
645
+    If we have kept a clean (never used) circuit around for NUM seconds, then
646
+    close it. This way when the Tor client is entirely idle, it can expire all
647
+    of its circuits, and then expire its TLS connections. Also, if we end up
648
+    making a circuit that is not useful for exiting any of the requests we&#8217;re
649
+    receiving, it won&#8217;t forever take up a slot in the circuit list. (Default: 1
650
+    hour.)
651
+</p>
652
+</dd>
653
+<dt class="hdlist1">
654
+<strong>ClientOnly</strong> <strong>0</strong>|<strong>1</strong>
655
+</dt>
656
+<dd>
657
+<p>
658
+    If set to 1, Tor will under no circumstances run as a server or serve
659
+    directory requests. The default is to run as a client unless ORPort is
660
+    configured. (Usually, you don&#8217;t need to set this; Tor is pretty smart at
661
+    figuring out whether you are reliable and high-bandwidth enough to be a
662
+    useful server.) (Default: 0)
663
+</p>
664
+</dd>
665
+<dt class="hdlist1">
666
+<strong>ExcludeNodes</strong> <em>node</em>,<em>node</em>,<em>&#8230;</em>
667
+</dt>
668
+<dd>
669
+<p>
670
+    A list of identity fingerprints, nicknames, country codes and address
671
+    patterns of nodes to never use when building a circuit. (Example:
672
+    ExcludeNodes SlowServer, $ EFFFFFFFFFFFFFFF, {cc}, 255.254.0.0/8)
673
+</p>
674
+</dd>
675
+<dt class="hdlist1">
676
+<strong>ExcludeExitNodes</strong> <em>node</em>,<em>node</em>,<em>&#8230;</em>
677
+</dt>
678
+<dd>
679
+<p>
680
+    A list of identity fingerprints, nicknames, country codes and address
681
+    patterns of nodes to never use when picking an exit node. Note that any
682
+    node listed in ExcludeNodes is automatically considered to be part of this
683
+    list.
684
+</p>
685
+</dd>
686
+<dt class="hdlist1">
687
+<strong>EntryNodes</strong> <em>node</em>,<em>node</em>,<em>&#8230;</em>
688
+</dt>
689
+<dd>
690
+<p>
691
+    A list of identity fingerprints, nicknames and address
692
+    patterns of nodes to use for the first hop in normal circuits. These are
693
+    treated only as preferences unless StrictNodes (see below) is also set.
694
+</p>
695
+</dd>
696
+<dt class="hdlist1">
697
+<strong>ExitNodes</strong> <em>node</em>,<em>node</em>,<em>&#8230;</em>
698
+</dt>
699
+<dd>
700
+<p>
701
+    A list of identity fingerprints, nicknames, country codes and address
702
+    patterns of nodes to use for the last hop in normal exit circuits. These
703
+    are treated only as preferences unless StrictNodes (see below) is also set.
704
+</p>
705
+</dd>
706
+<dt class="hdlist1">
707
+<strong>StrictEntryNodes</strong> <strong>0</strong>|<strong>1</strong>
708
+</dt>
709
+<dd>
710
+<p>
711
+    If 1, Tor will never use any nodes besides those listed in "EntryNodes" for
712
+    the first hop of a circuit.
713
+</p>
714
+</dd>
715
+<dt class="hdlist1">
716
+<strong>StrictExitNodes</strong> <strong>0</strong>|<strong>1</strong>
717
+</dt>
718
+<dd>
719
+<p>
720
+    If 1, Tor will never use any nodes besides those listed in "ExitNodes" for
721
+    the last hop of a circuit.
722
+</p>
723
+</dd>
724
+<dt class="hdlist1">
725
+<strong>FascistFirewall</strong> <strong>0</strong>|<strong>1</strong>
726
+</dt>
727
+<dd>
728
+<p>
729
+    If 1, Tor will only create outgoing connections to ORs running on ports
730
+    that your firewall allows (defaults to 80 and 443; see <strong>FirewallPorts</strong>).
731
+    This will allow you to run Tor as a client behind a firewall with
732
+    restrictive policies, but will not allow you to run as a server behind such
733
+    a firewall. If you prefer more fine-grained control, use
734
+    ReachableAddresses instead.
735
+</p>
736
+</dd>
737
+<dt class="hdlist1">
738
+<strong>FirewallPorts</strong> <em>PORTS</em>
739
+</dt>
740
+<dd>
741
+<p>
742
+    A list of ports that your firewall allows you to connect to. Only used when
743
+    <strong>FascistFirewall</strong> is set. This option is deprecated; use ReachableAddresses
744
+    instead. (Default: 80, 443)
745
+</p>
746
+</dd>
747
+<dt class="hdlist1">
748
+<strong>HidServAuth</strong> <em>onion-address</em> <em>auth-cookie</em> [<em>service-name</em>]
749
+</dt>
750
+<dd>
751
+<p>
752
+    Client authorization for a hidden service. Valid onion addresses contain 16
753
+    characters in a-z2-7 plus ".onion", and valid auth cookies contain 22
754
+    characters in A-Za-z0-9+/. The service name is only used for internal
755
+    purposes, e.g., for Tor controllers. This option may be used multiple times
756
+    for different hidden services. If a hidden service uses authorization and
757
+    this option is not set, the hidden service is not accessible. Hidden
758
+    services can be configured to require authorization using the
759
+    <strong>HiddenServiceAuthorizeClient</strong> option.
760
+</p>
761
+</dd>
762
+<dt class="hdlist1">
763
+<strong>ReachableAddresses</strong> <em>ADDR</em>[/<em>MASK</em>][:<em>PORT</em>]&#8230;
764
+</dt>
765
+<dd>
766
+<p>
767
+    A comma-separated list of IP addresses and ports that your firewall allows
768
+    you to connect to. The format is as for the addresses in ExitPolicy, except
769
+    that "accept" is understood unless "reject" is explicitly provided. For
770
+    example, 'ReachableAddresses 99.0.0.0/8, reject 18.0.0.0/8:80, accept
771
+    *:80' means that your firewall allows connections to everything inside net
772
+    99, rejects port 80 connections to net 18, and accepts connections to port
773
+    80 otherwise. (Default: 'accept *:*'.)
774
+</p>
775
+</dd>
776
+<dt class="hdlist1">
777
+<strong>ReachableDirAddresses</strong> <em>ADDR</em>[/<em>MASK</em>][:<em>PORT</em>]&#8230;
778
+</dt>
779
+<dd>
780
+<p>
781
+    Like <strong>ReachableAddresses</strong>, a list of addresses and ports. Tor will obey
782
+    these restrictions when fetching directory information, using standard HTTP
783
+    GET requests. If not set explicitly then the value of
784
+    <strong>ReachableAddresses</strong> is used. If <strong>HTTPProxy</strong> is set then these
785
+    connections will go through that proxy.
786
+</p>
787
+</dd>
788
+<dt class="hdlist1">
789
+<strong>ReachableORAddresses</strong> <em>ADDR</em>[/<em>MASK</em>][:<em>PORT</em>]&#8230;
790
+</dt>
791
+<dd>
792
+<p>
793
+    Like <strong>ReachableAddresses</strong>, a list of addresses and ports. Tor will obey
794
+    these restrictions when connecting to Onion Routers, using TLS/SSL. If not
795
+    set explicitly then the value of <strong>ReachableAddresses</strong> is used. If
796
+    <strong>HTTPSProxy</strong> is set then these connections will go through that proxy.<br />
797
+<br />
798
+    The separation between <strong>ReachableORAddresses</strong> and
799
+    <strong>ReachableDirAddresses</strong> is only interesting when you are connecting
800
+    through proxies (see <strong>HTTPProxy</strong> and <strong>HTTPSProxy</strong>). Most proxies limit
801
+    TLS connections (which Tor uses to connect to Onion Routers) to port 443,
802
+    and some limit HTTP GET requests (which Tor uses for fetching directory
803
+    information) to port 80.
804
+</p>
805
+</dd>
806
+<dt class="hdlist1">
807
+<strong>LongLivedPorts</strong> <em>PORTS</em>
808
+</dt>
809
+<dd>
810
+<p>
811
+    A list of ports for services that tend to have long-running connections
812
+    (e.g. chat and interactive shells). Circuits for streams that use these
813
+    ports will contain only high-uptime nodes, to reduce the chance that a node
814
+    will go down before the stream is finished. (Default: 21, 22, 706, 1863,
815
+    5050, 5190, 5222, 5223, 6667, 6697, 8300)
816
+</p>
817
+</dd>
818
+<dt class="hdlist1">
819
+<strong>MapAddress</strong> <em>address</em> <em>newaddress</em>
820
+</dt>
821
+<dd>
822
+<p>
823
+    When a request for address arrives to Tor, it will rewrite it to newaddress
824
+    before processing it. For example, if you always want connections to
825
+    www.indymedia.org to exit via <em>torserver</em> (where <em>torserver</em> is the
826
+    nickname of the server), use "MapAddress www.indymedia.org
827
+    www.indymedia.org.torserver.exit".
828
+</p>
829
+</dd>
830
+<dt class="hdlist1">
831
+<strong>NewCircuitPeriod</strong> <em>NUM</em>
832
+</dt>
833
+<dd>
834
+<p>
835
+    Every NUM seconds consider whether to build a new circuit. (Default: 30
836
+    seconds)
837
+</p>
838
+</dd>
839
+<dt class="hdlist1">
840
+<strong>MaxCircuitDirtiness</strong> <em>NUM</em>
841
+</dt>
842
+<dd>
843
+<p>
844
+    Feel free to reuse a circuit that was first used at most NUM seconds ago,
845
+    but never attach a new stream to a circuit that is too old. (Default: 10
846
+    minutes)
847
+</p>
848
+</dd>
849
+<dt class="hdlist1">
850
+<strong>NodeFamily</strong> <em>node</em>,<em>node</em>,<em>&#8230;</em>
851
+</dt>
852
+<dd>
853
+<p>
854
+    The Tor servers, defined by their identity fingerprints or nicknames,
855
+    constitute a "family" of similar or co-administered servers, so never use
856
+    any two of them in the same circuit. Defining a NodeFamily is only needed
857
+    when a server doesn&#8217;t list the family itself (with MyFamily). This option
858
+    can be used multiple times.
859
+</p>
860
+</dd>
861
+<dt class="hdlist1">
862
+<strong>EnforceDistinctSubnets</strong> <strong>0</strong>|<strong>1</strong>
863
+</dt>
864
+<dd>
865
+<p>
866
+    If 1, Tor will not put two servers whose IP addresses are "too close" on
867
+    the same circuit. Currently, two addresses are "too close" if they lie in
868
+    the same /16 range. (Default: 1)
869
+</p>
870
+</dd>
871
+<dt class="hdlist1">
872
+<strong>SocksPort</strong> <em>PORT</em>
873
+</dt>
874
+<dd>
875
+<p>
876
+    Advertise this port to listen for connections from Socks-speaking
877
+    applications. Set this to 0 if you don&#8217;t want to allow application
878
+    connections. (Default: 9050)
879
+</p>
880
+</dd>
881
+<dt class="hdlist1">
882
+<strong>SocksListenAddress</strong> <em>IP</em>[:<em>PORT</em>]
883
+</dt>
884
+<dd>
885
+<p>
886
+    Bind to this address to listen for connections from Socks-speaking
887
+    applications. (Default: 127.0.0.1) You can also specify a port (e.g.
888
+    192.168.0.1:9100). This directive can be specified multiple times to bind
889
+    to multiple addresses/ports.
890
+</p>
891
+</dd>
892
+<dt class="hdlist1">
893
+<strong>SocksPolicy</strong> <em>policy</em>,<em>policy</em>,<em>&#8230;</em>
894
+</dt>
895
+<dd>
896
+<p>
897
+    Set an entrance policy for this server, to limit who can connect to the
898
+    SocksPort and DNSPort ports. The policies have the same form as exit
899
+    policies below.
900
+</p>
901
+</dd>
902
+<dt class="hdlist1">
903
+<strong>SocksTimeout</strong> <em>NUM</em>
904
+</dt>
905
+<dd>
906
+<p>
907
+    Let a socks connection wait NUM seconds handshaking, and NUM seconds
908
+    unattached waiting for an appropriate circuit, before we fail it. (Default:
909
+    2 minutes.)
910
+</p>
911
+</dd>
912
+<dt class="hdlist1">
913
+<strong>TrackHostExits</strong> <em>host</em>,<em>.domain</em>,<em>&#8230;</em>
914
+</dt>
915
+<dd>
916
+<p>
917
+    For each value in the comma separated list, Tor will track recent
918
+    connections to hosts that match this value and attempt to reuse the same
919
+    exit node for each. If the value is prepended with a '.', it is treated as
920
+    matching an entire domain. If one of the values is just a '.', it means
921
+    match everything. This option is useful if you frequently connect to sites
922
+    that will expire all your authentication cookies (i.e. log you out) if
923
+    your IP address changes. Note that this option does have the disadvantage
924
+    of making it more clear that a given history is associated with a single
925
+    user. However, most people who would wish to observe this will observe it
926
+    through cookies or other protocol-specific means anyhow.
927
+</p>
928
+</dd>
929
+<dt class="hdlist1">
930
+<strong>TrackHostExitsExpire</strong> <em>NUM</em>
931
+</dt>
932
+<dd>
933
+<p>
934
+    Since exit servers go up and down, it is desirable to expire the
935
+    association between host and exit server after NUM seconds. The default is
936
+    1800 seconds (30 minutes).
937
+</p>
938
+</dd>
939
+<dt class="hdlist1">
940
+<strong>UpdateBridgesFromAuthority</strong> <strong>0</strong>|<strong>1</strong>
941
+</dt>
942
+<dd>
943
+<p>
944
+    When set (along with UseBridges), Tor will try to fetch bridge descriptors
945
+    from the configured bridge authorities when feasible. It will fall back to
946
+    a direct request if the authority responds with a 404. (Default: 0)
947
+</p>
948
+</dd>
949
+<dt class="hdlist1">
950
+<strong>UseBridges</strong> <strong>0</strong>|<strong>1</strong>
951
+</dt>
952
+<dd>
953
+<p>
954
+    When set, Tor will fetch descriptors for each bridge listed in the "Bridge"
955
+    config lines, and use these relays as both entry guards and directory
956
+    guards. (Default: 0)
957
+</p>
958
+</dd>
959
+<dt class="hdlist1">
960
+<strong>UseEntryGuards</strong> <strong>0</strong>|<strong>1</strong>
961
+</dt>
962
+<dd>
963
+<p>
964
+    If this option is set to 1, we pick a few long-term entry servers, and try
965
+    to stick with them. This is desirable because constantly changing servers
966
+    increases the odds that an adversary who owns some servers will observe a
967
+    fraction of your paths. (Defaults to 1.)
968
+</p>
969
+</dd>
970
+<dt class="hdlist1">
971
+<strong>NumEntryGuards</strong> <em>NUM</em>
972
+</dt>
973
+<dd>
974
+<p>
975
+    If UseEntryGuards is set to 1, we will try to pick a total of NUM routers
976
+    as long-term entries for our circuits. (Defaults to 3.)
977
+</p>
978
+</dd>
979
+<dt class="hdlist1">
980
+<strong>SafeSocks</strong> <strong>0</strong>|<strong>1</strong>
981
+</dt>
982
+<dd>
983
+<p>
984
+    When this option is enabled, Tor will reject application connections that
985
+    use unsafe variants of the socks protocol&#8201;&#8212;&#8201;ones that only provide an IP
986
+    address, meaning the application is doing a DNS resolve first.
987
+    Specifically, these are socks4 and socks5 when not doing remote DNS.
988
+    (Defaults to 0.)
989
+</p>
990
+</dd>
991
+<dt class="hdlist1">
992
+<strong>TestSocks</strong> <strong>0</strong>|<strong>1</strong>
993
+</dt>
994
+<dd>
995
+<p>
996
+    When this option is enabled, Tor will make a notice-level log entry for
997
+    each connection to the Socks port indicating whether the request used a
998
+    safe socks protocol or an unsafe one (see above entry on SafeSocks). This
999
+    helps to determine whether an application using Tor is possibly leaking
1000
+    DNS requests. (Default: 0)
1001
+</p>
1002
+</dd>
1003
+<dt class="hdlist1">
1004
+<strong>VirtualAddrNetwork</strong> <em>Address</em>/<em>bits</em>
1005
+</dt>
1006
+<dd>
1007
+<p>
1008
+    When Tor needs to assign a virtual (unused) address because of a MAPADDRESS
1009
+    command from the controller or the AutomapHostsOnResolve feature, Tor
1010
+    picks an unassigned address from this range. (Default:
1011
+    127.192.0.0/10)<br />
1012
+<br />
1013
+    When providing proxy server service to a network of computers using a tool
1014
+    like dns-proxy-tor, change this address to "10.192.0.0/10" or
1015
+    "172.16.0.0/12". The default <strong>VirtualAddrNetwork</strong> address range on a
1016
+    properly configured machine will route to the loopback interface. For
1017
+    local use, no change to the default VirtualAddrNetwork setting is needed.
1018
+</p>
1019
+</dd>
1020
+<dt class="hdlist1">
1021
+<strong>AllowNonRFC953Hostnames</strong> <strong>0</strong>|<strong>1</strong>
1022
+</dt>
1023
+<dd>
1024
+<p>
1025
+    When this option is disabled, Tor blocks hostnames containing illegal
1026
+    characters (like @ and :) rather than sending them to an exit node to be
1027
+    resolved. This helps trap accidental attempts to resolve URLs and so on.
1028
+    (Default: 0)
1029
+</p>
1030
+</dd>
1031
+<dt class="hdlist1">
1032
+<strong>FastFirstHopPK</strong> <strong>0</strong>|<strong>1</strong>
1033
+</dt>
1034
+<dd>
1035
+<p>
1036
+    When this option is disabled, Tor uses the public key step for the first
1037
+    hop of creating circuits. Skipping it is generally safe since we have
1038
+    already used TLS to authenticate the relay and to establish forward-secure
1039
+    keys. Turning this option off makes circuit building slower.<br />
1040
+<br />
1041
+    Note that Tor will always use the public key step for the first hop if it&#8217;s
1042
+    operating as a relay, and it will never use the public key step if it
1043
+    doesn&#8217;t yet know the onion key of the first hop. (Default: 1)
1044
+</p>
1045
+</dd>
1046
+<dt class="hdlist1">
1047
+<strong>TransPort</strong> <em>PORT</em>
1048
+</dt>
1049
+<dd>
1050
+<p>
1051
+    If non-zero, enables transparent proxy support on <em>PORT</em> (by convention,
1052
+    9040). Requires OS support for transparent proxies, such as BSDs' pf or
1053
+    Linux&#8217;s IPTables. If you&#8217;re planning to use Tor as a transparent proxy for
1054
+    a network, you&#8217;ll want to examine and change VirtualAddrNetwork from the
1055
+    default setting. You&#8217;ll also want to set the TransListenAddress option for
1056
+    the network you&#8217;d like to proxy. (Default: 0).
1057
+</p>
1058
+</dd>
1059
+<dt class="hdlist1">
1060
+<strong>TransListenAddress</strong> <em>IP</em>[:<em>PORT</em>]
1061
+</dt>
1062
+<dd>
1063
+<p>
1064
+    Bind to this address to listen for transparent proxy connections. (Default:
1065
+    127.0.0.1). This is useful for exporting a transparent proxy server to an
1066
+    entire network.
1067
+</p>
1068
+</dd>
1069
+<dt class="hdlist1">
1070
+<strong>NATDPort</strong> <em>PORT</em>
1071
+</dt>
1072
+<dd>
1073
+<p>
1074
+    Allow old versions of ipfw (as included in old versions of FreeBSD, etc.)
1075
+    to send connections through Tor using the NATD protocol. This option is
1076
+    only for people who cannot use TransPort.
1077
+</p>
1078
+</dd>
1079
+<dt class="hdlist1">
1080
+<strong>NATDListenAddress</strong> <em>IP</em>[:<em>PORT</em>]
1081
+</dt>
1082
+<dd>
1083
+<p>
1084
+    Bind to this address to listen for NATD connections. (Default: 127.0.0.1).
1085
+</p>
1086
+</dd>
1087
+<dt class="hdlist1">
1088
+<strong>AutomapHostsOnResolve</strong> <strong>0</strong>|<strong>1</strong>
1089
+</dt>
1090
+<dd>
1091
+<p>
1092
+    When this option is enabled, and we get a request to resolve an address
1093
+    that ends with one of the suffixes in <strong>AutomapHostsSuffixes</strong>, we map an
1094
+    unused virtual address to that address, and return the new virtual address.
1095
+    This is handy for making ".onion" addresses work with applications that
1096
+    resolve an address and then connect to it. (Default: 0).
1097
+</p>
1098
+</dd>
1099
+<dt class="hdlist1">
1100
+<strong>AutomapHostsSuffixes</strong> <em>SUFFIX</em>,<em>SUFFIX</em>,<em>&#8230;</em>
1101
+</dt>
1102
+<dd>
1103
+<p>
1104
+    A comma-separated list of suffixes to use with <strong>AutomapHostsOnResolve</strong>.
1105
+    The "." suffix is equivalent to "all addresses." (Default: .exit,.onion).
1106
+</p>
1107
+</dd>
1108
+<dt class="hdlist1">
1109
+<strong>DNSPort</strong> <em>PORT</em>
1110
+</dt>
1111
+<dd>
1112
+<p>
1113
+    If non-zero, Tor listens for UDP DNS requests on this port and resolves
1114
+    them anonymously. (Default: 0).
1115
+</p>
1116
+</dd>
1117
+<dt class="hdlist1">
1118
+<strong>DNSListenAddress</strong> <em>IP</em>[:<em>PORT</em>]
1119
+</dt>
1120
+<dd>
1121
+<p>
1122
+    Bind to this address to listen for DNS connections. (Default: 127.0.0.1).
1123
+</p>
1124
+</dd>
1125
+<dt class="hdlist1">
1126
+<strong>ClientDNSRejectInternalAddresses</strong> <strong>0</strong>|<strong>1</strong>
1127
+</dt>
1128
+<dd>
1129
+<p>
1130
+    If true, Tor does not believe any anonymously retrieved DNS answer that
1131
+    tells it that an address resolves to an internal address (like 127.0.0.1 or
1132
+    192.168.0.1). This option prevents certain browser-based attacks; don&#8217;t
1133
+    turn it off unless you know what you&#8217;re doing. (Default: 1).
1134
+</p>
1135
+</dd>
1136
+<dt class="hdlist1">
1137
+<strong>DownloadExtraInfo</strong> <strong>0</strong>|<strong>1</strong>
1138
+</dt>
1139
+<dd>
1140
+<p>
1141
+    If true, Tor downloads and caches "extra-info" documents. These documents
1142
+    contain information about servers other than the information in their
1143
+    regular router descriptors. Tor does not use this information for anything
1144
+    itself; to save bandwidth, leave this option turned off. (Default: 0).
1145
+</p>
1146
+</dd>
1147
+<dt class="hdlist1">
1148
+<strong>FallbackNetworkstatusFile</strong> <em>FILENAME</em>
1149
+</dt>
1150
+<dd>
1151
+<p>
1152
+    If Tor doesn&#8217;t have a cached networkstatus file, it starts out using this
1153
+    one instead. Even if this file is out of date, Tor can still use it to
1154
+    learn about directory mirrors, so it doesn&#8217;t need to put load on the
1155
+    authorities. (Default: None).
1156
+</p>
1157
+</dd>
1158
+<dt class="hdlist1">
1159
+<strong>WarnPlaintextPorts</strong> <em>port</em>,<em>port</em>,<em>&#8230;</em>
1160
+</dt>
1161
+<dd>
1162
+<p>
1163
+    Tells Tor to issue a warnings whenever the user tries to make an anonymous
1164
+    connection to one of these ports. This option is designed to alert users
1165
+    to services that risk sending passwords in the clear. (Default:
1166
+    23,109,110,143).
1167
+</p>
1168
+</dd>
1169
+<dt class="hdlist1">
1170
+<strong>RejectPlaintextPorts</strong> <em>port</em>,<em>port</em>,<em>&#8230;</em>
1171
+</dt>
1172
+<dd>
1173
+<p>
1174
+    Like WarnPlaintextPorts, but instead of warning about risky port uses, Tor
1175
+    will instead refuse to make the connection. (Default: None).
1176
+</p>
1177
+</dd>
1178
+</dl></div>
1179
+</div>
1180
+<h2 id="_server_options">SERVER OPTIONS</h2>
1181
+<div class="sectionbody">
1182
+<div class="paragraph"><p>The following options are useful only for servers (that is, if ORPort
1183
+is non-zero):</p></div>
1184
+<div class="dlist"><dl>
1185
+<dt class="hdlist1">
1186
+<strong>Address</strong> <em>address</em>
1187
+</dt>
1188
+<dd>
1189
+<p>
1190
+    The IP address or fully qualified domain name of this server (e.g.
1191
+    moria.mit.edu). You can leave this unset, and Tor will guess your IP
1192
+    address.
1193
+</p>
1194
+</dd>
1195
+<dt class="hdlist1">
1196
+<strong>AllowSingleHopExits</strong> <strong>0</strong>|<strong>1</strong>
1197
+</dt>
1198
+<dd>
1199
+<p>
1200
+    This option controls whether clients can use this server as a single hop
1201
+    proxy. If set to 1, clients can use this server as an exit even if it is
1202
+    the only hop in the circuit. Note that most clients will refuse to use
1203
+    servers that set this option, since most clients have
1204
+    ExcludeSingleHopRelays set. (Default: 0)
1205
+</p>
1206
+</dd>
1207
+<dt class="hdlist1">
1208
+<strong>AssumeReachable</strong> <strong>0</strong>|<strong>1</strong>
1209
+</dt>
1210
+<dd>
1211
+<p>
1212
+    This option is used when bootstrapping a new Tor network. If set to 1,
1213
+    don&#8217;t do self-reachability testing; just upload your server descriptor
1214
+    immediately. If <strong>AuthoritativeDirectory</strong> is also set, this option
1215
+    instructs the dirserver to bypass remote reachability testing too and list
1216
+    all connected servers as running.
1217
+</p>
1218
+</dd>
1219
+<dt class="hdlist1">
1220
+<strong>BridgeRelay</strong> <strong>0</strong>|<strong>1</strong>
1221
+</dt>
1222
+<dd>
1223
+<p>
1224
+    Sets the relay to act as a "bridge" with respect to relaying connections
1225
+    from bridge users to the Tor network. It mainly causes Tor to publish a
1226
+    server descriptor to the bridge database, rather than publishing a relay
1227
+    descriptor to the public directory authorities.
1228
+</p>
1229
+</dd>
1230
+<dt class="hdlist1">
1231
+<strong>ContactInfo</strong> <em>email_address</em>
1232
+</dt>
1233
+<dd>
1234
+<p>
1235
+    Administrative contact information for server. This line might get picked
1236
+    up by spam harvesters, so you may want to obscure the fact that it&#8217;s an
1237
+    email address.
1238
+</p>
1239
+</dd>
1240
+<dt class="hdlist1">
1241
+<strong>ExitPolicy</strong> <em>policy</em>,<em>policy</em>,<em>&#8230;</em>
1242
+</dt>
1243
+<dd>
1244
+<p>
1245
+    Set an exit policy for this server. Each policy is of the form
1246
+    "<strong>accept</strong>|<strong>reject</strong> <em>ADDR</em>[/<em>MASK</em>][:<em>PORT</em>]". If /<em>MASK</em> is
1247
+    omitted then this policy just applies to the host given. Instead of giving
1248
+    a host or network you can also use "*" to denote the universe (0.0.0.0/0).
1249
+    <em>PORT</em> can be a single port number, an interval of ports
1250
+    "<em>FROM_PORT</em>-<em>TO_PORT</em>", or "*". If <em>PORT</em> is omitted, that means
1251
+    "*".<br />
1252
+<br />
1253
+    For example, "accept 18.7.22.69:*,reject 18.0.0.0/8:*,accept *:*" would
1254
+    reject any traffic destined for MIT except for web.mit.edu, and accept
1255
+    anything else.<br />
1256
+<br />
1257
+    To specify all internal and link-local networks (including 0.0.0.0/8,
1258
+    169.254.0.0/16, 127.0.0.0/8, 192.168.0.0/16, 10.0.0.0/8, and
1259
+    172.16.0.0/12), you can use the "private" alias instead of an address.
1260
+    These addresses are rejected by default (at the beginning of your exit
1261
+    policy), along with your public IP address, unless you set the
1262
+    ExitPolicyRejectPrivate config option to 0. For example, once you&#8217;ve done
1263
+    that, you could allow HTTP to 127.0.0.1 and block all other connections to
1264
+    internal networks with "accept 127.0.0.1:80,reject private:*", though that
1265
+    may also allow connections to your own computer that are addressed to its
1266
+    public (external) IP address. See RFC 1918 and RFC 3330 for more details
1267
+    about internal and reserved IP address space.<br />
1268
+<br />
1269
+    This directive can be specified multiple times so you don&#8217;t have to put it
1270
+    all on one line.<br />
1271
+<br />
1272
+    Policies are considered first to last, and the first match wins. If you
1273
+    want to _replace_ the default exit policy, end your exit policy with
1274
+    either a reject *:* or an accept *:*. Otherwise, you&#8217;re _augmenting_
1275
+    (prepending to) the default exit policy. The default exit policy is:<br />
1276
+</p>
1277
+<div class="literalblock">
1278
+<div class="content">
1279
+<pre><tt>reject *:25^M
1280
+reject *:119^M
1281
+reject *:135-139^M
1282
+reject *:445^M
1283
+reject *:563^M
1284
+reject *:1214^M
1285
+reject *:4661-4666^M
1286
+reject *:6346-6429^M
1287
+reject *:6699^M
1288
+reject *:6881-6999^M
1289
+accept *:*</tt></pre>
1290
+</div></div>
1291
+</dd>
1292
+<dt class="hdlist1">
1293
+<strong>ExitPolicyRejectPrivate</strong> <strong>0</strong>|<strong>1</strong>
1294
+</dt>
1295
+<dd>
1296
+<p>
1297
+    Reject all private (local) networks, along with your own public IP address,
1298
+    at the beginning of your exit policy. See above entry on ExitPolicy.
1299
+    (Default: 1)
1300
+</p>
1301
+</dd>
1302
+<dt class="hdlist1">
1303
+<strong>MaxOnionsPending</strong> <em>NUM</em>
1304
+</dt>
1305
+<dd>
1306
+<p>
1307
+    If you have more than this number of onionskins queued for decrypt, reject
1308
+    new ones. (Default: 100)
1309
+</p>
1310
+</dd>
1311
+<dt class="hdlist1">
1312
+<strong>MyFamily</strong> <em>node</em>,<em>node</em>,<em>&#8230;</em>
1313
+</dt>
1314
+<dd>
1315
+<p>
1316
+    Declare that this Tor server is controlled or administered by a group or
1317
+    organization identical or similar to that of the other servers, defined by
1318
+    their identity fingerprints or nicknames. When two servers both declare
1319
+    that they are in the same 'family', Tor clients will not use them in the
1320
+    same circuit. (Each server only needs to list the other servers in its
1321
+    family; it doesn&#8217;t need to list itself, but it won&#8217;t hurt.)
1322
+</p>
1323
+</dd>
1324
+<dt class="hdlist1">
1325
+<strong>Nickname</strong> <em>name</em>
1326
+</dt>
1327
+<dd>
1328
+<p>
1329
+    Set the server&#8217;s nickname to 'name'. Nicknames must be between 1 and 19
1330
+    characters inclusive, and must contain only the characters [a-zA-Z0-9].
1331
+</p>
1332
+</dd>
1333
+<dt class="hdlist1">
1334
+<strong>NumCPUs</strong> <em>num</em>
1335
+</dt>
1336
+<dd>
1337
+<p>
1338
+    How many processes to use at once for decrypting onionskins. (Default: 1)
1339
+</p>
1340
+</dd>
1341
+<dt class="hdlist1">
1342
+<strong>ORPort</strong> <em>PORT</em>
1343
+</dt>
1344
+<dd>
1345
+<p>
1346
+    Advertise this port to listen for connections from Tor clients and servers.
1347
+</p>
1348
+</dd>
1349
+<dt class="hdlist1">
1350
+<strong>ORListenAddress</strong> <em>IP</em>[:<em>PORT</em>]
1351
+</dt>
1352
+<dd>
1353
+<p>
1354
+    Bind to this IP address to listen for connections from Tor clients and
1355
+    servers. If you specify a port, bind to this port rather than the one
1356
+    specified in ORPort. (Default: 0.0.0.0) This directive can be specified
1357
+    multiple times to bind to multiple addresses/ports.
1358
+</p>
1359
+</dd>
1360
+<dt class="hdlist1">
1361
+<strong>PublishServerDescriptor</strong> <strong>0</strong>|<strong>1</strong>|<strong>v1</strong>|<strong>v2</strong>|<strong>v3</strong>|<strong>bridge</strong>,<strong>&#8230;</strong>
1362
+</dt>
1363
+<dd>
1364
+<p>
1365
+    This option specifies which descriptors Tor will publish when acting as
1366
+    a relay. You can
1367
+    choose multiple arguments, separated by commas.
1368
+<br />
1369
+    If this option is set to 0, Tor will not publish its
1370
+    descriptors to any directories. (This is useful if you&#8217;re testing
1371
+    out your server, or if you&#8217;re using a Tor controller that handles directory
1372
+    publishing for you.) Otherwise, Tor will publish its descriptors of all
1373
+    type(s) specified. The default is "1",
1374
+    which means "if running as a server, publish the
1375
+    appropriate descriptors to the authorities".
1376
+</p>
1377
+</dd>
1378
+<dt class="hdlist1">
1379
+<strong>ShutdownWaitLength</strong> <em>NUM</em>
1380
+</dt>
1381
+<dd>
1382
+<p>
1383
+    When we get a SIGINT and we&#8217;re a server, we begin shutting down:
1384
+    we close listeners and start refusing new circuits. After <strong>NUM</strong>
1385
+    seconds, we exit. If we get a second SIGINT, we exit immedi-
1386
+    ately. (Default: 30 seconds)
1387
+</p>
1388
+</dd>
1389
+<dt class="hdlist1">
1390
+<strong>AccountingMax</strong> <em>N</em> <strong>bytes</strong>|<strong>KB</strong>|<strong>MB</strong>|<strong>GB</strong>|<strong>TB</strong>
1391
+</dt>
1392
+<dd>
1393
+<p>
1394
+    Never send more than the specified number of bytes in a given accounting
1395
+    period, or receive more than that number in the period. For example, with
1396
+    AccountingMax set to 1 GB, a server could send 900 MB and receive 800 MB
1397
+    and continue running. It will only hibernate once one of the two reaches 1
1398
+    GB. When the number of bytes gets low, Tor will stop accepting new
1399
+    connections and circuits. When the number of bytes
1400
+    is exhausted, Tor will hibernate until some
1401
+    time in the next accounting period. To prevent all servers from waking at
1402
+    the same time, Tor will also wait until a random point in each period
1403
+    before waking up. If you have bandwidth cost issues, enabling hibernation
1404
+    is preferable to setting a low bandwidth, since it provides users with a
1405
+    collection of fast servers that are up some of the time, which is more
1406
+    useful than a set of slow servers that are always "available".
1407
+</p>
1408
+</dd>
1409
+<dt class="hdlist1">
1410
+<strong>AccountingStart</strong> <strong>day</strong>|<strong>week</strong>|<strong>month</strong> [<em>day</em>] <em>HH:MM</em>
1411
+</dt>
1412
+<dd>
1413
+<p>
1414
+    Specify how long accounting periods last. If <strong>month</strong> is given, each
1415
+    accounting period runs from the time <em>HH:MM</em> on the <em>dayth</em> day of one
1416
+    month to the same day and time of the next. (The day must be between 1 and
1417
+    28.) If <strong>week</strong> is given, each accounting period runs from the time <em>HH:MM</em>
1418
+    of the <em>dayth</em> day of one week to the same day and time of the next week,
1419
+    with Monday as day 1 and Sunday as day 7. If <strong>day</strong> is given, each
1420
+    accounting period runs from the time <em>HH:MM</em> each day to the same time on
1421
+    the next day. All times are local, and given in 24-hour time. (Defaults to
1422
+    "month 1 0:00".)
1423
+</p>
1424
+</dd>
1425
+<dt class="hdlist1">
1426
+<strong>ServerDNSResolvConfFile</strong> <em>filename</em>
1427
+</dt>
1428
+<dd>
1429
+<p>
1430
+    Overrides the default DNS configuration with the configuration in
1431
+    <em>filename</em>. The file format is the same as the standard Unix
1432
+    "<strong>resolv.conf</strong>" file (7). This option, like all other ServerDNS options,
1433
+    only affects name lookups that your server does on behalf of clients.
1434
+    (Defaults to use the system DNS configuration.)
1435
+</p>
1436
+</dd>
1437
+<dt class="hdlist1">
1438
+<strong>ServerDNSAllowBrokenConfig</strong> <strong>0</strong>|<strong>1</strong>
1439
+</dt>
1440
+<dd>
1441
+<p>
1442
+    If this option is false, Tor exits immediately if there are problems
1443
+    parsing the system DNS configuration or connecting to nameservers.
1444
+    Otherwise, Tor continues to periodically retry the system nameservers until
1445
+    it eventually succeeds. (Defaults to "1".)
1446
+</p>
1447
+</dd>
1448
+<dt class="hdlist1">
1449
+<strong>ServerDNSSearchDomains</strong> <strong>0</strong>|<strong>1</strong>
1450
+</dt>
1451
+<dd>
1452
+<p>
1453
+    If set to 1, then we will search for addresses in the local search domain.
1454
+    For example, if this system is configured to believe it is in
1455
+    "example.com", and a client tries to connect to "www", the client will be
1456
+    connected to "www.example.com". This option only affects name lookups that
1457
+    your server does on behalf of clients. (Defaults to "0".)
1458
+</p>
1459
+</dd>
1460
+<dt class="hdlist1">
1461
+<strong>ServerDNSDetectHijacking</strong> <strong>0</strong>|<strong>1</strong>
1462
+</dt>
1463
+<dd>
1464
+<p>
1465
+    When this option is set to 1, we will test periodically to determine
1466
+    whether our local nameservers have been configured to hijack failing DNS
1467
+    requests (usually to an advertising site). If they are, we will attempt to
1468
+    correct this. This option only affects name lookups that your server does
1469
+    on behalf of clients. (Defaults to "1".)
1470
+</p>
1471
+</dd>
1472
+<dt class="hdlist1">
1473
+<strong>ServerDNSTestAddresses</strong> <em>address</em>,<em>address</em>,<em>&#8230;</em>
1474
+</dt>
1475
+<dd>
1476
+<p>
1477
+    When we&#8217;re detecting DNS hijacking, make sure that these <em>valid</em> addresses
1478
+    aren&#8217;t getting redirected. If they are, then our DNS is completely useless,
1479
+    and we&#8217;ll reset our exit policy to "reject <strong>:</strong>". This option only affects
1480
+    name lookups that your server does on behalf of clients. (Defaults to
1481
+    "www.google.com, www.mit.edu, www.yahoo.com, www.slashdot.org".)
1482
+</p>
1483
+</dd>
1484
+<dt class="hdlist1">
1485
+<strong>ServerDNSAllowNonRFC953Hostnames</strong> <strong>0</strong>|<strong>1</strong>
1486
+</dt>
1487
+<dd>
1488
+<p>
1489
+    When this option is disabled, Tor does not try to resolve hostnames
1490
+    containing illegal characters (like @ and :) rather than sending them to an
1491
+    exit node to be resolved. This helps trap accidental attempts to resolve
1492
+    URLs and so on. This option only affects name lookups that your server does
1493
+    on behalf of clients. (Default: 0)
1494
+</p>
1495
+</dd>
1496
+<dt class="hdlist1">
1497
+<strong>BridgeRecordUsageByCountry</strong> <strong>0</strong>|<strong>1</strong>
1498
+</dt>
1499
+<dd>
1500
+<p>
1501
+    When this option is enabled and BridgeRelay is also enabled, and we have
1502
+    GeoIP data, Tor keeps a keep a per-country count of how many client
1503
+    addresses have contacted it so that it can help the bridge authority guess
1504
+    which countries have blocked access to it. (Default: 1)
1505
+</p>
1506
+</dd>
1507
+<dt class="hdlist1">
1508
+<strong>ServerDNSRandomizeCase</strong> <strong>0</strong>|<strong>1</strong>
1509
+</dt>
1510
+<dd>
1511
+<p>
1512
+    When this option is set, Tor sets the case of each character randomly in
1513
+    outgoing DNS requests, and makes sure that the case matches in DNS replies.
1514
+    This so-called "0x20 hack" helps resist some types of DNS poisoning attack.
1515
+    For more information, see "Increased DNS Forgery Resistance through
1516
+    0x20-Bit Encoding". This option only affects name lookups that your server
1517
+    does on behalf of clients. (Default: 1)
1518
+</p>
1519
+</dd>
1520
+<dt class="hdlist1">
1521
+<strong>GeoIPFile</strong> <em>filename</em>
1522
+</dt>
1523
+<dd>
1524
+<p>
1525
+    A filename containing GeoIP data, for use with BridgeRecordUsageByCountry.
1526
+</p>
1527
+</dd>
1528
+</dl></div>
1529
+</div>
1530
+<h2 id="_directory_server_options">DIRECTORY SERVER OPTIONS</h2>
1531
+<div class="sectionbody">
1532
+<div class="paragraph"><p>The following options are useful only for directory servers (that is,
1533
+if DirPort is non-zero):</p></div>
1534
+<div class="dlist"><dl>
1535
+<dt class="hdlist1">
1536
+<strong>AuthoritativeDirectory</strong> <strong>0</strong>|<strong>1</strong>
1537
+</dt>
1538
+<dd>
1539
+<p>
1540
+    When this option is set to 1, Tor operates as an authoritative directory
1541
+    server. Instead of caching the directory, it generates its own list of
1542
+    good servers, signs it, and sends that to the clients. Unless the clients
1543
+    already have you listed as a trusted directory, you probably do not want
1544
+    to set this option. Please coordinate with the other admins at
1545
+    <a href="mailto:tor-ops@torproject.org">tor-ops@torproject.org</a> if you think you should be a directory.
1546
+</p>
1547
+</dd>
1548
+<dt class="hdlist1">
1549
+<strong>DirPortFrontPage</strong> <em>FILENAME</em>
1550
+</dt>
1551
+<dd>
1552
+<p>
1553
+    When this option is set, it takes an HTML file and publishes it as "/" on
1554
+    the DirPort. Now relay operators can provide a disclaimer without needing
1555
+    to set up a separate webserver. There&#8217;s a sample disclaimer in
1556
+    contrib/tor-exit-notice.html.
1557
+</p>
1558
+</dd>
1559
+<dt class="hdlist1">
1560
+<strong>V1AuthoritativeDirectory</strong> <strong>0</strong>|<strong>1</strong>
1561
+</dt>
1562
+<dd>
1563
+<p>
1564
+    When this option is set in addition to <strong>AuthoritativeDirectory</strong>, Tor
1565
+    generates version 1 directory and running-routers documents (for legacy
1566
+    Tor clients up to 0.1.0.x).
1567
+</p>
1568
+</dd>
1569
+<dt class="hdlist1">
1570
+<strong>V2AuthoritativeDirectory</strong> <strong>0</strong>|<strong>1</strong>
1571
+</dt>
1572
+<dd>
1573
+<p>
1574
+    When this option is set in addition to <strong>AuthoritativeDirectory</strong>, Tor
1575
+    generates version 2 network statuses and serves descriptors, etc as
1576
+    described in doc/spec/dir-spec-v2.txt (for Tor clients and servers running
1577
+    0.1.1.x and 0.1.2.x).
1578
+</p>
1579
+</dd>
1580
+<dt class="hdlist1">
1581
+<strong>V3AuthoritativeDirectory</strong> <strong>0</strong>|<strong>1</strong>
1582
+</dt>
1583
+<dd>
1584
+<p>
1585
+    When this option is set in addition to <strong>AuthoritativeDirectory</strong>, Tor
1586
+    generates version 3 network statuses and serves descriptors, etc as
1587
+    described in doc/spec/dir-spec.txt (for Tor clients and servers running at
1588
+    least 0.2.0.x).
1589
+</p>
1590
+</dd>
1591
+<dt class="hdlist1">
1592
+<strong>VersioningAuthoritativeDirectory</strong> <strong>0</strong>|<strong>1</strong>
1593
+</dt>
1594
+<dd>
1595
+<p>
1596
+    When this option is set to 1, Tor adds information on which versions of
1597
+    Tor are still believed safe for use to the published directory. Each
1598
+    version 1 authority is automatically a versioning authority; version 2
1599
+    authorities provide this service optionally. See <strong>RecommendedVersions</strong>,
1600
+    <strong>RecommendedClientVersions</strong>, and <strong>RecommendedServerVersions</strong>.
1601
+</p>
1602
+</dd>
1603
+<dt class="hdlist1">
1604
+<strong>NamingAuthoritativeDirectory</strong> <strong>0</strong>|<strong>1</strong>
1605
+</dt>
1606
+<dd>
1607
+<p>
1608
+    When this option is set to 1, then the server advertises that it has
1609
+    opinions about nickname-to-fingerprint bindings. It will include these
1610
+    opinions in its published network-status pages, by listing servers with
1611
+    the flag "Named" if a correct binding between that nickname and fingerprint
1612
+    has been registered with the dirserver. Naming dirservers will refuse to
1613
+    accept or publish descriptors that contradict a registered binding. See
1614
+    <strong>approved-routers</strong> in the <strong>FILES</strong> section below.
1615
+</p>
1616
+</dd>
1617
+<dt class="hdlist1">
1618
+<strong>HSAuthoritativeDir</strong> <strong>0</strong>|<strong>1</strong>
1619
+</dt>
1620
+<dd>
1621
+<p>
1622
+    When this option is set in addition to
1623
+    <strong>AuthoritativeDirectory</strong>, Tor also accepts and serves hidden
1624
+    service descriptors. (Default: 0)
1625
+</p>
1626
+</dd>
1627
+<dt class="hdlist1">
1628
+<strong>HSAuthorityRecordStats</strong> <strong>0</strong>|<strong>1</strong>
1629
+</dt>
1630
+<dd>
1631
+<p>
1632
+    When this option is set in addition to <strong>HSAuthoritativeDir</strong>,
1633
+    Tor periodically (every 15 minutes) writes statistics about hidden service
1634
+    usage to a file <strong>hsusage</strong> in its data directory. (Default:
1635
+    0)
1636
+</p>
1637
+</dd>
1638
+<dt class="hdlist1">
1639
+<strong>HidServDirectoryV2</strong> <strong>0</strong>|<strong>1</strong>
1640
+</dt>
1641
+<dd>
1642
+<p>
1643
+    When this option is set, Tor accepts and serves v2 hidden service
1644
+    descriptors. Setting DirPort is not required for this, because clients
1645
+    connect via the ORPort by default. (Default: 1)
1646
+</p>
1647
+</dd>
1648
+<dt class="hdlist1">
1649
+<strong>BridgeAuthoritativeDir</strong> <strong>0</strong>|<strong>1</strong>
1650
+</dt>
1651
+<dd>
1652
+<p>
1653
+    When this option is set in addition to <strong>AuthoritativeDirectory</strong>, Tor
1654
+    accepts and serves router descriptors, but it caches and serves the main
1655
+    networkstatus documents rather than generating its own. (Default: 0)
1656
+</p>
1657
+</dd>
1658
+<dt class="hdlist1">
1659
+<strong>MinUptimeHidServDirectoryV2</strong> <em>N</em> <strong>seconds</strong>|<strong>minutes</strong>|<strong>hours</strong>|<strong>days</strong>|<strong>weeks</strong>
1660
+</dt>
1661
+<dd>
1662
+<p>
1663
+    Minimum uptime of a v2 hidden service directory to be accepted as such by
1664
+    authoritative directories. (Default: 24 hours)
1665
+</p>
1666
+</dd>
1667
+<dt class="hdlist1">
1668
+<strong>DirPort</strong> <em>PORT</em>
1669
+</dt>
1670
+<dd>
1671
+<p>
1672
+    Advertise the directory service on this port.
1673
+</p>
1674
+</dd>
1675
+<dt class="hdlist1">
1676
+<strong>DirListenAddress</strong> <em>IP</em>[:<em>PORT</em>]
1677
+</dt>
1678
+<dd>
1679
+<p>
1680
+    Bind the directory service to this address. If you specify a port, bind to
1681
+    this port rather than the one specified in DirPort. (Default: 0.0.0.0)
1682
+    This directive can be specified multiple times to bind to multiple
1683
+    addresses/ports.
1684
+</p>
1685
+</dd>
1686
+<dt class="hdlist1">
1687
+<strong>DirPolicy</strong> <em>policy</em>,<em>policy</em>,<em>&#8230;</em>
1688
+</dt>
1689
+<dd>
1690
+<p>
1691
+    Set an entrance policy for this server, to limit who can connect to the
1692
+    directory ports. The policies have the same form as exit policies above.
1693
+</p>
1694
+</dd>
1695
+</dl></div>
1696
+</div>
1697
+<h2 id="_directory_authority_server_options">DIRECTORY AUTHORITY SERVER OPTIONS</h2>
1698
+<div class="sectionbody">
1699
+<div class="dlist"><dl>
1700
+<dt class="hdlist1">
1701
+<strong>RecommendedVersions</strong> <em>STRING</em>
1702
+</dt>
1703
+<dd>
1704
+<p>
1705
+    STRING is a comma-separated list of Tor versions currently believed to be
1706
+    safe. The list is included in each directory, and nodes which pull down the
1707
+    directory learn whether they need to upgrade. This option can appear
1708
+    multiple times: the values from multiple lines are spliced together. When
1709
+    this is set then <strong>VersioningAuthoritativeDirectory</strong> should be set too.
1710
+</p>
1711
+</dd>
1712
+<dt class="hdlist1">
1713
+<strong>RecommendedClientVersions</strong> <em>STRING</em>
1714
+</dt>
1715
+<dd>
1716
+<p>
1717
+    STRING is a comma-separated list of Tor versions currently believed to be
1718
+    safe for clients to use. This information is included in version 2
1719
+    directories. If this is not set then the value of <strong>RecommendedVersions</strong>
1720
+    is used. When this is set then <strong>VersioningAuthoritativeDirectory</strong> should
1721
+    be set too.
1722
+</p>
1723
+</dd>
1724
+<dt class="hdlist1">
1725
+<strong>RecommendedServerVersions</strong> <em>STRING</em>
1726
+</dt>
1727
+<dd>
1728
+<p>
1729
+    STRING is a comma-separated list of Tor versions currently believed to be
1730
+    safe for servers to use. This information is included in version 2
1731
+    directories. If this is not set then the value of <strong>RecommendedVersions</strong>
1732
+    is used. When this is set then <strong>VersioningAuthoritativeDirectory</strong> should
1733
+    be set too.
1734
+</p>
1735
+</dd>
1736
+<dt class="hdlist1">
1737
+<strong>DirAllowPrivateAddresses</strong> <strong>0</strong>|<strong>1</strong>
1738
+</dt>
1739
+<dd>
1740
+<p>
1741
+    If set to 1, Tor will accept router descriptors with arbitrary "Address"
1742
+    elements. Otherwise, if the address is not an IP address or is a private IP
1743
+    address, it will reject the router descriptor. Defaults to 0.
1744
+</p>
1745
+</dd>
1746
+<dt class="hdlist1">
1747
+<strong>AuthDirBadDir</strong> <em>AddressPattern&#8230;</em>
1748
+</dt>
1749
+<dd>
1750
+<p>
1751
+    Authoritative directories only. A set of address patterns for servers that
1752
+    will be listed as bad directories in any network status document this
1753
+    authority publishes, if <strong>AuthDirListBadDirs</strong> is set.
1754
+</p>
1755
+</dd>
1756
+<dt class="hdlist1">
1757
+<strong>AuthDirBadExit</strong> <em>AddressPattern&#8230;</em>
1758
+</dt>
1759
+<dd>
1760
+<p>
1761
+    Authoritative directories only. A set of address patterns for servers that
1762
+    will be listed as bad exits in any network status document this authority
1763
+    publishes, if <strong>AuthDirListBadExits</strong> is set.
1764
+</p>
1765
+</dd>
1766
+<dt class="hdlist1">
1767
+<strong>AuthDirInvalid</strong> <em>AddressPattern&#8230;</em>
1768
+</dt>
1769
+<dd>
1770
+<p>
1771
+    Authoritative directories only. A set of address patterns for servers that
1772
+    will never be listed as "valid" in any network status document that this
1773
+    authority publishes.
1774
+</p>
1775
+</dd>
1776
+<dt class="hdlist1">
1777
+<strong>AuthDirReject</strong> <em>AddressPattern</em>&#8230;
1778
+</dt>
1779
+<dd>
1780
+<p>
1781
+    Authoritative directories only. A set of address patterns for servers that
1782
+    will never be listed at all in any network status document that this
1783
+    authority publishes, or accepted as an OR address in any descriptor
1784
+    submitted for publication by this authority.
1785
+</p>
1786
+</dd>
1787
+<dt class="hdlist1">
1788
+<strong>AuthDirListBadDirs</strong> <strong>0</strong>|<strong>1</strong>
1789
+</dt>
1790
+<dd>
1791
+<p>
1792
+    Authoritative directories only. If set to 1, this directory has some
1793
+    opinion about which nodes are unsuitable as directory caches. (Do not set
1794
+    this to 1 unless you plan to list non-functioning directories as bad;
1795
+    otherwise, you are effectively voting in favor of every declared
1796
+    directory.)
1797
+</p>
1798
+</dd>
1799
+<dt class="hdlist1">
1800
+<strong>AuthDirListBadExits</strong> <strong>0</strong>|<strong>1</strong>
1801
+</dt>
1802
+<dd>
1803
+<p>
1804
+    Authoritative directories only. If set to 1, this directory has some
1805
+    opinion about which nodes are unsuitable as exit nodes. (Do not set this to
1806
+    1 unless you plan to list non-functioning exits as bad; otherwise, you are
1807
+    effectively voting in favor of every declared exit as an exit.)
1808
+</p>
1809
+</dd>
1810
+<dt class="hdlist1">
1811
+<strong>AuthDirRejectUnlisted</strong> <strong>0</strong>|<strong>1</strong>
1812
+</dt>
1813
+<dd>
1814
+<p>
1815
+    Authoritative directories only. If set to 1, the directory server rejects
1816
+    all uploaded server descriptors that aren&#8217;t explicitly listed in the
1817
+    fingerprints file. This acts as a "panic button" if we get hit with a Sybil
1818
+    attack. (Default: 0)
1819
+</p>
1820
+</dd>
1821
+<dt class="hdlist1">
1822
+<strong>AuthDirMaxServersPerAddr</strong> <em>NUM</em>
1823
+</dt>
1824
+<dd>
1825
+<p>
1826
+    Authoritative directories only. The maximum number of servers that we will
1827
+    list as acceptable on a single IP address. Set this to "0" for "no limit".
1828
+    (Default: 2)
1829
+</p>
1830
+</dd>
1831
+<dt class="hdlist1">
1832
+<strong>AuthDirMaxServersPerAuthAddr</strong> <em>NUM</em>
1833
+</dt>
1834
+<dd>
1835
+<p>
1836
+    Authoritative directories only. Like AuthDirMaxServersPerAddr, but applies
1837
+    to addresses shared with directory authorities. (Default: 5)
1838
+</p>
1839
+</dd>
1840
+<dt class="hdlist1">
1841
+<strong>V3AuthVotingInterval</strong> <em>N</em> <strong>minutes</strong>|<strong>hours</strong>
1842
+</dt>
1843
+<dd>
1844
+<p>
1845
+    V3 authoritative directories only. Configures the server&#8217;s preferred voting
1846
+    interval. Note that voting will <em>actually</em> happen at an interval chosen
1847
+    by consensus from all the authorities' preferred intervals. This time
1848
+    SHOULD divide evenly into a day. (Default: 1 hour)
1849
+</p>
1850
+</dd>
1851
+<dt class="hdlist1">
1852
+<strong>V3AuthVoteDelay</strong> <em>N</em> <strong>minutes</strong>|<strong>hours</strong>
1853
+</dt>
1854
+<dd>
1855
+<p>
1856
+    V3 authoritative directories only. Configures the server&#8217;s preferred delay
1857
+    between publishing its vote and assuming it has all the votes from all the
1858
+    other authorities. Note that the actual time used is not the server&#8217;s
1859
+    preferred time, but the consensus of all preferences. (Default: 5 minutes.)
1860
+</p>
1861
+</dd>
1862
+<dt class="hdlist1">
1863
+<strong>V3AuthDistDelay</strong> <em>N</em> <strong>minutes</strong>|<strong>hours</strong>
1864
+</dt>
1865
+<dd>
1866
+<p>
1867
+    V3 authoritative directories only. Configures the server&#8217;s preferred delay
1868
+    between publishing its consensus and signature and assuming it has all the
1869
+    signatures from all the other authorities. Note that the actual time used
1870
+    is not the server&#8217;s preferred time, but the consensus of all preferences.
1871
+    (Default: 5 minutes.)
1872
+</p>
1873
+</dd>
1874
+<dt class="hdlist1">
1875
+<strong>V3AuthNIntervalsValid</strong> <em>NUM</em>
1876
+</dt>
1877
+<dd>
1878
+<p>
1879
+    V3 authoritative directories only. Configures the number of VotingIntervals
1880
+    for which each consensus should be valid for. Choosing high numbers
1881
+    increases network partitioning risks; choosing low numbers increases
1882
+    directory traffic. Note that the actual number of intervals used is not the
1883
+    server&#8217;s preferred number, but the consensus of all preferences. Must be at
1884
+    least 2. (Default: 3.)
1885
+</p>
1886
+</dd>
1887
+</dl></div>
1888
+</div>
1889
+<h2 id="_hidden_service_options">HIDDEN SERVICE OPTIONS</h2>
1890
+<div class="sectionbody">
1891
+<div class="paragraph"><p>The following options are used to configure a hidden service.</p></div>
1892
+<div class="dlist"><dl>
1893
+<dt class="hdlist1">
1894
+<strong>HiddenServiceDir</strong> <em>DIRECTORY</em>
1895
+</dt>
1896
+<dd>
1897
+<p>
1898
+    Store data files for a hidden service in DIRECTORY. Every hidden service
1899
+    must have a separate directory. You may use this option multiple times to
1900
+    specify multiple services.
1901
+</p>
1902
+</dd>
1903
+<dt class="hdlist1">
1904
+<strong>HiddenServicePort</strong> <em>VIRTPORT</em> [<em>TARGET</em>]
1905
+</dt>
1906
+<dd>
1907
+<p>
1908
+    Configure a virtual port VIRTPORT for a hidden service. You may use this
1909
+    option multiple times; each time applies to the service using the most
1910
+    recent hiddenservicedir. By default, this option maps the virtual port to
1911
+    the same port on 127.0.0.1. You may override the target port, address, or
1912
+    both by specifying a target of addr, port, or addr:port. You may also have
1913
+    multiple lines with the same VIRTPORT: when a user connects to that
1914
+    VIRTPORT, one of the TARGETs from those lines will be chosen at random.
1915
+</p>
1916
+</dd>
1917
+<dt class="hdlist1">
1918
+<strong>PublishHidServDescriptors</strong> <strong>0</strong>|<strong>1</strong>
1919
+</dt>
1920
+<dd>
1921
+<p>
1922
+    If set to 0, Tor will run any hidden services you configure, but it won&#8217;t
1923
+    advertise them to the rendezvous directory. This option is only useful if
1924
+    you&#8217;re using a Tor controller that handles hidserv publishing for you.
1925
+    (Default: 1)
1926
+</p>
1927
+</dd>
1928
+<dt class="hdlist1">
1929
+<strong>HiddenServiceVersion</strong> <em>version</em>,<em>version</em>,<em>&#8230;</em>
1930
+</dt>
1931
+<dd>
1932
+<p>
1933
+    A list of rendezvous service descriptor versions to publish for the hidden
1934
+    service. Currently, only version 2 is supported. (Default: 2)
1935
+</p>
1936
+</dd>
1937
+<dt class="hdlist1">
1938
+<strong>HiddenServiceAuthorizeClient</strong> <em>auth-type</em> <em>client-name</em>,<em>client-name</em>,<em>&#8230;</em>
1939
+</dt>
1940
+<dd>
1941
+<p>
1942
+    If configured, the hidden service is accessible for authorized clients
1943
+    only. The auth-type can either be 'basic' for a general-purpose
1944
+    authorization protocol or 'stealth' for a less scalable protocol that also
1945
+    hides service activity from unauthorized clients. Only clients that are
1946
+    listed here are authorized to access the hidden service. Valid client names
1947
+    are 1 to 19 characters long and only use characters in A-Za-z0-9+-_ (no
1948
+    spaces). If this option is set, the hidden service is not accessible for
1949
+    clients without authorization any more. Generated authorization data can be
1950
+    found in the hostname file. Clients need to put this authorization data in
1951
+    their configuration file using <strong>HidServAuth</strong>.
1952
+</p>
1953
+</dd>
1954
+<dt class="hdlist1">
1955
+<strong>RendPostPeriod</strong> <em>N</em> <strong>seconds</strong>|<strong>minutes</strong>|<strong>hours</strong>|<strong>days</strong>|<strong>weeks</strong>
1956
+</dt>
1957
+<dd>
1958
+<p>
1959
+    Every time the specified period elapses, Tor uploads any rendezvous
1960
+    service descriptors to the directory servers. This information is also
1961
+    uploaded whenever it changes. (Default: 1 hour)
1962
+</p>
1963
+</dd>
1964
+</dl></div>
1965
+</div>
1966
+<h2 id="_testing_network_options">TESTING NETWORK OPTIONS</h2>
1967
+<div class="sectionbody">
1968
+<div class="paragraph"><p>The following options are used for running a testing Tor network.</p></div>
1969
+<div class="dlist"><dl>
1970
+<dt class="hdlist1">
1971
+<strong>TestingTorNetwork</strong> <strong>0</strong>|<strong>1</strong>
1972
+</dt>
1973
+<dd>
1974
+<p>
1975
+    If set to 1, Tor adjusts default values of the configuration options below,
1976
+    so that it is easier to set up a testing Tor network. May only be set if
1977
+    non-default set of DirServers is set. Cannot be unset while Tor is running.
1978
+    (Default: 0)<br />
1979
+</p>
1980
+<div class="literalblock">
1981
+<div class="content">
1982
+<pre><tt>ServerDNSAllowBrokenConfig 1^M
1983
+DirAllowPrivateAddresses 1^M
1984
+EnforceDistinctSubnets 0^M
1985
+AssumeReachable 1^M
1986
+AuthDirMaxServersPerAddr 0^M
1987
+AuthDirMaxServersPerAuthAddr 0^M
1988
+ClientDNSRejectInternalAddresses 0^M
1989
+ExitPolicyRejectPrivate 0^M
1990
+V3AuthVotingInterval 5 minutes^M
1991
+V3AuthVoteDelay 20 seconds^M
1992
+V3AuthDistDelay 20 seconds^M
1993
+TestingV3AuthInitialVotingInterval 5 minutes^M
1994
+TestingV3AuthInitialVoteDelay 20 seconds^M
1995
+TestingV3AuthInitialDistDelay 20 seconds^M
1996
+TestingAuthDirTimeToLearnReachability 0 minutes^M
1997
+TestingEstimatedDescriptorPropagationTime 0 minutes</tt></pre>
1998
+</div></div>
1999
+</dd>
2000
+<dt class="hdlist1">
2001
+<strong>TestingV3AuthInitialVotingInterval</strong> <em>N</em> <strong>minutes</strong>|<strong>hours</strong>
2002
+</dt>
2003
+<dd>
2004
+<p>
2005
+    Like V3AuthVotingInterval, but for initial voting interval before the first
2006
+    consensus has been created. Changing this requires that
2007
+    <strong>TestingTorNetwork</strong> is set. (Default: 30 minutes)
2008
+</p>
2009
+</dd>
2010
+<dt class="hdlist1">
2011
+<strong>TestingV3AuthInitialVoteDelay</strong> <em>N</em> <strong>minutes</strong>|<strong>hours</strong>
2012
+</dt>
2013
+<dd>
2014
+<p>
2015
+    Like TestingV3AuthInitialVoteDelay, but for initial voting interval before
2016
+    the first consensus has been created. Changing this requires that
2017
+    <strong>TestingTorNetwork</strong> is set. (Default: 5 minutes)
2018
+</p>
2019
+</dd>
2020
+<dt class="hdlist1">
2021
+<strong>TestingV3AuthInitialDistDelay</strong> <em>N</em> <strong>minutes</strong>|<strong>hours</strong>
2022
+</dt>
2023
+<dd>
2024
+<p>
2025
+    Like TestingV3AuthInitialDistDelay, but for initial voting interval before
2026
+    the first consensus has been created. Changing this requires that
2027
+    <strong>TestingTorNetwork</strong> is set. (Default: 5 minutes)
2028
+</p>
2029
+</dd>
2030
+<dt class="hdlist1">
2031
+<strong>TestingAuthDirTimeToLearnReachability</strong> <em>N</em> <strong>minutes</strong>|<strong>hours</strong>
2032
+</dt>
2033
+<dd>
2034
+<p>
2035
+    After starting as an authority, do not make claims about whether routers
2036
+    are Running until this much time has passed. Changing this requires
2037
+    that <strong>TestingTorNetwork</strong> is set. (Default: 30 minutes)
2038
+</p>
2039
+</dd>
2040
+<dt class="hdlist1">
2041
+<strong>TestingEstimatedDescriptorPropagationTime</strong> <em>N</em> <strong>minutes</strong>|<strong>hours</strong>
2042
+</dt>
2043
+<dd>
2044
+<p>
2045
+    Clients try downloading router descriptors from directory caches after this
2046
+    time. Changing this requires that <strong>TestingTorNetwork</strong> is set. (Default:
2047
+    10 minutes)
2048
+</p>
2049
+</dd>
2050
+</dl></div>
2051
+</div>
2052
+<h2 id="_signals">SIGNALS</h2>
2053
+<div class="sectionbody">
2054
+<div class="paragraph"><p>Tor catches the following signals:</p></div>
2055
+<div class="dlist"><dl>
2056
+<dt class="hdlist1">
2057
+<strong>SIGTERM</strong>
2058
+</dt>
2059
+<dd>
2060
+<p>
2061
+    Tor will catch this, clean up and sync to disk if necessary, and exit.
2062
+</p>
2063
+</dd>
2064
+<dt class="hdlist1">
2065
+<strong>SIGINT</strong>
2066
+</dt>
2067
+<dd>
2068
+<p>
2069
+    Tor clients behave as with SIGTERM; but Tor servers will do a controlled
2070
+    slow shutdown, closing listeners and waiting 30 seconds before exiting.
2071
+    (The delay can be configured with the ShutdownWaitLength config option.)
2072
+</p>
2073
+</dd>
2074
+<dt class="hdlist1">
2075
+<strong>SIGHUP</strong>
2076
+</dt>
2077
+<dd>
2078
+<p>
2079
+    The signal instructs Tor to reload its configuration (including closing and
2080
+    reopening logs), and kill and restart its helper processes if applicable.
2081
+</p>
2082
+</dd>
2083
+<dt class="hdlist1">
2084
+<strong>SIGUSR1</strong>
2085
+</dt>
2086
+<dd>
2087
+<p>
2088
+    Log statistics about current connections, past connections, and throughput.
2089
+</p>
2090
+</dd>
2091
+<dt class="hdlist1">
2092
+<strong>SIGUSR2</strong>
2093
+</dt>
2094
+<dd>
2095
+<p>
2096
+    Switch all logs to loglevel debug. You can go back to the old loglevels by
2097
+    sending a SIGHUP.
2098
+</p>
2099
+</dd>
2100
+<dt class="hdlist1">
2101
+<strong>SIGCHLD</strong>
2102
+</dt>
2103
+<dd>
2104
+<p>
2105
+    Tor receives this signal when one of its helper processes has exited, so it
2106
+    can clean up.
2107
+</p>
2108
+</dd>
2109
+<dt class="hdlist1">
2110
+<strong>SIGPIPE</strong>
2111
+</dt>
2112
+<dd>
2113
+<p>
2114
+    Tor catches this signal and ignores it.
2115
+</p>
2116
+</dd>
2117
+<dt class="hdlist1">
2118
+<strong>SIGXFSZ</strong>
2119
+</dt>
2120
+<dd>
2121
+<p>
2122
+    If this signal exists on your platform, Tor catches and ignores it.
2123
+</p>
2124
+</dd>
2125
+</dl></div>
2126
+</div>
2127
+<h2 id="_files">FILES</h2>
2128
+<div class="sectionbody">
2129
+<div class="dlist"><dl>
2130
+<dt class="hdlist1">
2131
+<strong>@CONFDIR@/torrc</strong>
2132
+</dt>
2133
+<dd>
2134
+<p>
2135
+    The configuration file, which contains "option value" pairs.
2136
+</p>
2137
+</dd>
2138
+<dt class="hdlist1">
2139
+<strong>@LOCALSTATEDIR@/lib/tor/</strong>
2140
+</dt>
2141
+<dd>
2142
+<p>
2143
+    The tor process stores keys and other data here.
2144
+</p>
2145
+</dd>
2146
+<dt class="hdlist1">
2147
+<em>DataDirectory</em><strong>/cached-status/</strong>
2148
+</dt>
2149
+<dd>
2150
+<p>
2151
+    The most recently downloaded network status document for each authority.
2152
+    Each file holds one such document; the filenames are the hexadecimal
2153
+    identity key fingerprints of the directory authorities.
2154
+</p>
2155
+</dd>
2156
+<dt class="hdlist1">
2157
+<em>DataDirectory</em><strong>/cached-descriptors</strong> and <strong>cached-descriptors.new</strong>
2158
+</dt>
2159
+<dd>
2160
+<p>
2161
+    These files hold downloaded router statuses. Some routers may appear more
2162
+    than once; if so, the most recently published descriptor is used. Lines
2163
+    beginning with @-signs are annotations that contain more information about
2164
+    a given router. The ".new" file is an append-only journal; when it gets
2165
+    too large, all entries are merged into a new cached-descriptors file.
2166
+</p>
2167
+</dd>
2168
+<dt class="hdlist1">
2169
+<em>DataDirectory</em><strong>/cached-routers</strong> and <strong>cached-routers.new</strong>
2170
+</dt>
2171
+<dd>
2172
+<p>
2173
+    Obsolete versions of cached-descriptors and cached-descriptors.new. When
2174
+    Tor can&#8217;t find the newer files, it looks here instead.
2175
+</p>
2176
+</dd>
2177
+<dt class="hdlist1">
2178
+<em>DataDirectory</em><strong>/state</strong>
2179
+</dt>
2180
+<dd>
2181
+<p>
2182
+    A set of persistent key-value mappings. These are documented in
2183
+    the file. These include:
2184
+</p>
2185
+<div class="ulist"><ul>
2186
+<li>
2187
+<p>
2188
+The current entry guards and their status.
2189
+</p>
2190
+</li>
2191
+<li>
2192
+<p>
2193
+The current bandwidth accounting values (unused so far; see
2194
+            below).
2195
+</p>
2196
+</li>
2197
+<li>
2198
+<p>
2199
+When the file was last written
2200
+</p>
2201
+</li>
2202
+<li>
2203
+<p>
2204
+What version of Tor generated the state file
2205
+</p>
2206
+</li>
2207
+<li>
2208
+<p>
2209
+A short history of bandwidth usage, as produced in the router
2210
+            descriptors.
2211
+</p>
2212
+</li>
2213
+</ul></div>
2214
+</dd>
2215
+<dt class="hdlist1">
2216
+<em>DataDirectory</em><strong>/bw_accounting</strong>
2217
+</dt>
2218
+<dd>
2219
+<p>
2220
+    Used to track bandwidth accounting values (when the current period starts
2221
+    and ends; how much has been read and written so far this period). This file
2222
+    is obsolete, and the data is now stored in the 'state' file as well. Only
2223
+    used when bandwidth accounting is enabled.
2224
+</p>
2225
+</dd>
2226
+<dt class="hdlist1">
2227
+<em>DataDirectory</em><strong>/control_auth_cookie</strong>
2228
+</dt>
2229
+<dd>
2230
+<p>
2231
+    Used for cookie authentication with the controller. Location can be
2232
+    overridden by the CookieAuthFile config option. Regenerated on startup. See
2233
+    control-spec.txt for details. Only used when cookie authentication is
2234
+    enabled.
2235
+</p>
2236
+</dd>
2237
+<dt class="hdlist1">
2238
+<em>DataDirectory</em><strong>/keys/</strong>*
2239
+</dt>
2240
+<dd>
2241
+<p>
2242
+    Only used by servers. Holds identity keys and onion keys.
2243
+</p>
2244
+</dd>
2245
+<dt class="hdlist1">
2246
+<em>DataDirectory</em><strong>/fingerprint</strong>
2247
+</dt>
2248
+<dd>
2249
+<p>
2250
+    Only used by servers. Holds the fingerprint of the server&#8217;s identity key.
2251
+</p>
2252
+</dd>
2253
+<dt class="hdlist1">
2254
+<em>DataDirectory</em><strong>/approved-routers</strong>
2255
+</dt>
2256
+<dd>
2257
+<p>
2258
+    Only for naming authoritative directory servers (see
2259
+    <strong>NamingAuthoritativeDirectory</strong>). This file lists nickname to identity
2260
+    bindings. Each line lists a nickname and a fingerprint separated by
2261
+    whitespace. See your <strong>fingerprint</strong> file in the <em>DataDirectory</em> for an
2262
+    example line. If the nickname is <strong>!reject</strong> then descriptors from the
2263
+    given identity (fingerprint) are rejected by this server. If it is
2264
+    <strong>!invalid</strong> then descriptors are accepted but marked in the directory as
2265
+    not valid, that is, not recommended.
2266
+</p>
2267
+</dd>
2268
+<dt class="hdlist1">
2269
+<em>DataDirectory</em><strong>/router-stability</strong>
2270
+</dt>
2271
+<dd>
2272
+<p>
2273
+    Only used by authoritative directory servers. Tracks measurements for
2274
+    router mean-time-between-failures so that authorities have a good idea of
2275
+    how to set their Stable flags.
2276
+</p>
2277
+</dd>
2278
+<dt class="hdlist1">
2279
+<em>HiddenServiceDirectory</em><strong>/hostname</strong>
2280
+</dt>
2281
+<dd>
2282
+<p>
2283
+    The &lt;base32-encoded-fingerprint&gt;.onion domain name for this hidden service.
2284
+    If the hidden service is restricted to authorized clients only, this file
2285
+    also contains authorization data for all clients.
2286
+</p>
2287
+</dd>
2288
+<dt class="hdlist1">
2289
+<em>HiddenServiceDirectory</em><strong>/private_key</strong>
2290
+</dt>
2291
+<dd>
2292
+<p>
2293
+    The private key for this hidden service.
2294
+</p>
2295
+</dd>
2296
+<dt class="hdlist1">
2297
+<em>HiddenServiceDirectory</em><strong>/client_keys</strong>
2298
+</dt>
2299
+<dd>
2300
+<p>
2301
+    Authorization data for a hidden service that is only accessible by
2302
+    authorized clients.
2303
+</p>
2304
+</dd>
2305
+</dl></div>
2306
+</div>
2307
+<h2 id="_see_also">SEE ALSO</h2>
2308
+<div class="sectionbody">
2309
+<div class="paragraph"><p><strong>privoxy</strong>(1), <strong>tsocks</strong>(1), <strong>torify</strong>(1)<br /></p></div>
2310
+<div class="paragraph"><p><strong>https://www.torproject.org/</strong></p></div>
2311
+</div>
2312
+<h2 id="_bugs">BUGS</h2>
2313
+<div class="sectionbody">
2314
+<div class="paragraph"><p>Plenty, probably. Tor is still in development. Please report them.</p></div>
2315
+</div>
2316
+<h2 id="_authors">AUTHORS</h2>
2317
+<div class="sectionbody">
2318
+<div class="paragraph"><p>Roger Dingledine [arma at mit.edu], Nick Mathewson [nickm at alum.mit.edu].</p></div>
2319
+</div>
21 2320
 </div>
22 2321
   <!-- END MAINCOL -->
23 2322
 <div id = "sidecol">
... ...
@@ -61,9 +61,9 @@
61 61
           {'url'  => 'docs/running-a-mirror',
62 62
            'txt'  => 'Configuring a Mirror',
63 63
           },
64
-#          {'url'  => 'docs/tor-manual',
65
-#           'txt'  => 'Tor -stable Manual',
66
-#          },
64
+          {'url'  => 'docs/tor-manual',
65
+           'txt'  => 'Tor -stable Manual',
66
+          },
67 67
           {'url'  => 'docs/tor-manual-dev',
68 68
            'txt'  => 'Tor -alpha Manual',
69 69
           },
... ...
@@ -61,9 +61,9 @@
61 61
           {'url'  => 'docs/running-a-mirror',
62 62
            'txt'  => 'Configuring a Mirror',
63 63
           },
64
-#          {'url'  => 'docs/tor-manual',
65
-#           'txt'  => 'Tor -stable Manual',
66
-#          },
64
+          {'url'  => 'docs/tor-manual',
65
+           'txt'  => 'Tor -stable Manual',
66
+          },
67 67
           {'url'  => 'docs/tor-manual-dev',
68 68
            'txt'  => 'Tor -alpha Manual',
69 69
           },
... ...
@@ -61,9 +61,9 @@
61 61
           {'url'  => 'docs/running-a-mirror',
62 62
            'txt'  => 'Configuring a Mirror',
63 63
           },
64
-#          {'url'  => 'docs/tor-manual',
65
-#           'txt'  => 'Tor -stable Manual',
66
-#          },
64
+          {'url'  => 'docs/tor-manual',
65
+           'txt'  => 'Tor -stable Manual',
66
+          },
67 67
           {'url'  => 'docs/tor-manual-dev',
68 68
            'txt'  => 'Tor -alpha Manual',
69 69
           },
... ...
@@ -61,9 +61,9 @@
61 61
           {'url'  => 'docs/running-a-mirror',
62 62
            'txt'  => 'Configuring a Mirror',
63 63
           },
64
-#          {'url'  => 'docs/tor-manual',
65
-#           'txt'  => 'Tor -stable Manual',
66
-#          },
64
+          {'url'  => 'docs/tor-manual',
65
+           'txt'  => 'Tor -stable Manual',
66
+          },
67 67
           {'url'  => 'docs/tor-manual-dev',
68 68
            'txt'  => 'Tor -alpha Manual',
69 69
           },
70 70