Update tor-manual-cvs.html to reflect changes to the man file
Thomas Sjögren

Thomas Sjögren commited on 2005-05-23 16:06:43
Zeige 1 geänderte Dateien mit 22 Einfügungen und 15 Löschungen.

... ...
@@ -80,7 +80,7 @@ Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor)
80 80
 Every time the specified period elapses, Tor downloads a directory.
81 81
 A directory contains a signed list of all known servers as well as
82 82
 their current liveness status. A value of "0 seconds" tells Tor to choose an
83
-appropriate default. (Default: 1 hour for clients, 20 minutes for servers.)
83
+appropriate default. (Default: 1 hour for clients, 20 minutes for servers)
84 84
 <DT><B>DirServer </B><I>address:port fingerprint</I><DD>
85 85
 Use a nonstandard authoritative directory server at the provided
86 86
 address and port, with the specified key fingerprint.  This option can
... ...
@@ -95,16 +95,17 @@ rather than connecting directly to any directory servers.
95 95
 <DT><B>HttpsProxy</B> <I>host</I>[:<I>port</I>]<DD>
96 96
 If set, Tor will make all its OR (SSL) connections through this host:port,
97 97
 via HTTP CONNECT, rather than connecting directly to servers.
98
+You may want to set <B>FascistFirewall</B> to restrict the set of ports you
99
+might try to connect to, if your Https proxy only allows connecting to certain
100
+ports.
98 101
 <DT><B>HttpsProxyAuthenticator</B> <I>username:password</I><DD>
99 102
 If defined, Tor will use this username:password for Basic Https proxy
100 103
 authentication, as in RFC 2617. This is currently the only form of
101 104
 Https proxy authentication that Tor supports; feel free to submit a
102
-patch if you want it to support others. You may want to set FascistFirewall
103
-to restrict the set of ports you might try to connect to, if your Https
104
-proxy only allows connecting to certain ports.
105
+patch if you want it to support others.
105 106
 <DT><B>KeepalivePeriod </B><I>NUM</I><DD>
106 107
 To keep firewalls from expiring connections, send a padding keepalive
107
-cell on open connections every NUM seconds. (Default: 5 minutes.)
108
+cell on open connections every NUM seconds. (Default: 5 minutes)
108 109
 <DT><B>Log </B><I>minSeverity</I>[-<I>maxSeverity</I>] <B>stderr</B>|<B>stdout</B>|<B>syslog</B><DD>
109 110
 Send all messages between <I>minSeverity</I> and <I>maxSeverity</I> to
110 111
 the standard output stream, the standard error stream, or to the system
... ...
@@ -136,7 +137,7 @@ about what sites a user might have visited. (Default: 1)
136 137
 Every time the specified period elapses, Tor downloads signed status
137 138
 information about the current state of known servers.  A value of
138 139
 &quot;0 seconds&quot; tells Tor to choose an appropriate default. (Default: 30
139
-minutes for clients, 15 minutes for servers.)
140
+minutes for clients, 15 minutes for servers)
140 141
 <DT><B>User </B><I>UID</I><DD>
141 142
 On startup, setuid to this user.
142 143
 <P>
... ...
@@ -150,7 +151,7 @@ The following options are useful only for clients (that is, if <B>SOCKSPort</B>
150 151
 <DL COMPACT>
151 152
 <DT><B>AllowUnverifiedNodes</B> <B>entry</B>|<B>exit</B>|<B>middle</B>|<B>introduction</B>|<B>rendezvous</B>|...<DD>
152 153
 Where on our circuits should we allow Tor servers that the directory
153
-servers haven't authenticated as &quot;verified&quot;?  (Default: middle,rendezvous.)
154
+servers haven't authenticated as &quot;verified&quot;?  (Default: middle,rendezvous)
154 155
 <DT><B>ClientOnly </B><B>0</B>|<B>1</B><DD>
155 156
 If set to 1, Tor will under no circumstances run as a server. The default
156 157
 is to run as a client unless ORPort is configured.  (Usually,
... ...
@@ -175,14 +176,18 @@ allow you to run Tor as a client behind a firewall with restrictive policies,
175 176
 but will not allow you to run as a server behind such a firewall.
176 177
 <DT><B>FirewallPorts </B><I>PORTS</I><DD>
177 178
 A list of ports that your firewall allows you to connect to.  Only used when
178
-<B>FascistFirewall</B> is set. (Default: 80, 443.)
179
+<B>FascistFirewall</B> is set. (Default: 80, 443)
179 180
 <DT><B>LongLivedPorts </B><I>PORTS</I><DD>
180 181
 A list of ports for services that tend to have long-running connections
181 182
 (e.g. chat and interactive shells). Circuits for streams that use these
182 183
 ports will contain only high-uptime nodes, to reduce the chance that a
183
-node will go down before the stream is finished.
184
+node will go down before the stream is finished. (Default: 21, 22, 706, 1863, 5050, 
185
+5190, 5222, 5223, 6667, 8300, 8888)
184 186
 <DT><B>MapAddress</B> <I>address</I> <I>newaddress</I><DD>
185
-When a request for address arrives to Tor, it will rewrite it to newaddress before processing it. For example, if you always want connections to <A HREF="http://www.indymedia.org">www.indymedia.org</A> to exit via <I>torserver</I> (where <I>torserver</I> is the nickname of the server), use &quot;MapAddress <A HREF="http://www.indymedia.org">www.indymedia.org</A> <A HREF="http://www.indymedia.org.torserver.exit">www.indymedia.org.torserver.exit</A>&quot;.
187
+When a request for address arrives to Tor, it will rewrite it to newaddress before 
188
+processing it. For example, if you always want connections to <A HREF="http://www.indymedia.org">www.indymedia.org</A> to 
189
+exit via <I>torserver</I> (where <I>torserver</I> is the nickname of the server), 
190
+use &quot;MapAddress <A HREF="http://www.indymedia.org">www.indymedia.org</A> <A HREF="http://www.indymedia.org.torserver.exit">www.indymedia.org.torserver.exit</A>&quot;.
186 191
 <DT><B>NewCircuitPeriod </B><I>NUM</I><DD>
187 192
 Every NUM seconds consider whether to build a new circuit. (Default: 30 seconds)
188 193
 <DT><B>MaxCircuitDirtiness </B><I>NUM</I><DD>
... ...
@@ -211,7 +217,8 @@ applications. (Default: 127.0.0.1) You can also specify a port
211 217
 (e.g. 192.168.0.1:9100). This directive can be specified multiple times
212 218
 to bind to multiple addresses/ports.
213 219
 <DT><B>SOCKSPolicy </B><I>policy</I>,<I>policy</I>,<I>...</I><DD>
214
-Set an entrance policy for this server, to limit who can connect to the SOCKS ports. The policies have the same form as exit policies below.
220
+Set an entrance policy for this server, to limit who can connect to the SOCKS ports. 
221
+The policies have the same form as exit policies below.
215 222
 <DT><B>TrackHostExits </B><I>host</I>,<I>.domain</I>,<I>...</I><DD>
216 223
 For each value in the comma separated list, Tor will track recent connections
217 224
 to hosts that match this value and attempt to
... ...
@@ -321,7 +328,7 @@ we exit. If we get a second SIGINT, we exit immediately.  (Default:
321 328
 <DT><B>DirPostPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD>
322 329
 Every time the specified period elapses, Tor uploads its server
323 330
 descriptors to the directory servers.  This information is also
324
-uploaded whenever it changes.  (Default: 20 minutes.)
331
+uploaded whenever it changes.  (Default: 20 minutes)
325 332
 <DT><B>AccountingMax </B><I>N</I> <B>bytes</B>|<B>KB</B>|<B>MB</B>|<B>GB</B>|<B>TB</B><DD>
326 333
 Never send more than the specified number of bytes in a given
327 334
 accounting period, or receive more than that number in the period.
... ...
@@ -369,7 +376,8 @@ Advertise the directory service on this port.
369 376
 Bind the directory service to this address. If you specify a port, bind
370 377
 to this port rather than the one specified in DirPort. (Default: 0.0.0.0)
371 378
 <DT><B>DirPolicy </B><I>policy</I>,<I>policy</I>,<I>...</I><DD>
372
-Set an entrance policy for this server, to limit who can connect to the directory ports. The policies have the same form as exit policies above.
379
+Set an entrance policy for this server, to limit who can connect to the directory ports. 
380
+The policies have the same form as exit policies above.
373 381
 <DT><B>RecommendedVersions </B><I>STRING</I><DD>
374 382
 STRING is a command-separated list of Tor versions currently believed
375 383
 to be safe. The list is included in each directory, and nodes which
... ...
@@ -414,7 +422,7 @@ service. In normal use there is no reason to set this.
414 422
 <DT><B>RendPostPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD>
415 423
 Every time the specified period elapses, Tor uploads any rendezvous
416 424
 service descriptors to the directory servers.  This information is also
417
-uploaded whenever it changes.  (Default: 20 minutes.)
425
+uploaded whenever it changes.  (Default: 20 minutes)
418 426
 <P>
419 427
 
420 428
 
... ...
@@ -508,6 +516,6 @@ Roger Dingledine &lt;<A HREF="mailto:arma@mit.edu">arma@mit.edu</A>&gt;, Nick Ma
508 516
 This document was created by
509 517
 <A HREF="../">man2html</A>,
510 518
 using the manual pages.<BR>
511
-Time: 10:38:23 GMT, May 15, 2005
519
+Time: 14:06:07 GMT, May 23, 2005
512 520
 </BODY>
513 521
 </HTML>
514 522