Thomas Sjögren commited on 2005-05-23 16:06:43
Zeige 1 geänderte Dateien mit 22 Einfügungen und 15 Löschungen.
... | ... |
@@ -80,7 +80,7 @@ Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor) |
80 | 80 |
Every time the specified period elapses, Tor downloads a directory. |
81 | 81 |
A directory contains a signed list of all known servers as well as |
82 | 82 |
their current liveness status. A value of "0 seconds" tells Tor to choose an |
83 |
-appropriate default. (Default: 1 hour for clients, 20 minutes for servers.) |
|
83 |
+appropriate default. (Default: 1 hour for clients, 20 minutes for servers) |
|
84 | 84 |
<DT><B>DirServer </B><I>address:port fingerprint</I><DD> |
85 | 85 |
Use a nonstandard authoritative directory server at the provided |
86 | 86 |
address and port, with the specified key fingerprint. This option can |
... | ... |
@@ -95,16 +95,17 @@ rather than connecting directly to any directory servers. |
95 | 95 |
<DT><B>HttpsProxy</B> <I>host</I>[:<I>port</I>]<DD> |
96 | 96 |
If set, Tor will make all its OR (SSL) connections through this host:port, |
97 | 97 |
via HTTP CONNECT, rather than connecting directly to servers. |
98 |
+You may want to set <B>FascistFirewall</B> to restrict the set of ports you |
|
99 |
+might try to connect to, if your Https proxy only allows connecting to certain |
|
100 |
+ports. |
|
98 | 101 |
<DT><B>HttpsProxyAuthenticator</B> <I>username:password</I><DD> |
99 | 102 |
If defined, Tor will use this username:password for Basic Https proxy |
100 | 103 |
authentication, as in RFC 2617. This is currently the only form of |
101 | 104 |
Https proxy authentication that Tor supports; feel free to submit a |
102 |
-patch if you want it to support others. You may want to set FascistFirewall |
|
103 |
-to restrict the set of ports you might try to connect to, if your Https |
|
104 |
-proxy only allows connecting to certain ports. |
|
105 |
+patch if you want it to support others. |
|
105 | 106 |
<DT><B>KeepalivePeriod </B><I>NUM</I><DD> |
106 | 107 |
To keep firewalls from expiring connections, send a padding keepalive |
107 |
-cell on open connections every NUM seconds. (Default: 5 minutes.) |
|
108 |
+cell on open connections every NUM seconds. (Default: 5 minutes) |
|
108 | 109 |
<DT><B>Log </B><I>minSeverity</I>[-<I>maxSeverity</I>] <B>stderr</B>|<B>stdout</B>|<B>syslog</B><DD> |
109 | 110 |
Send all messages between <I>minSeverity</I> and <I>maxSeverity</I> to |
110 | 111 |
the standard output stream, the standard error stream, or to the system |
... | ... |
@@ -136,7 +137,7 @@ about what sites a user might have visited. (Default: 1) |
136 | 137 |
Every time the specified period elapses, Tor downloads signed status |
137 | 138 |
information about the current state of known servers. A value of |
138 | 139 |
"0 seconds" tells Tor to choose an appropriate default. (Default: 30 |
139 |
-minutes for clients, 15 minutes for servers.) |
|
140 |
+minutes for clients, 15 minutes for servers) |
|
140 | 141 |
<DT><B>User </B><I>UID</I><DD> |
141 | 142 |
On startup, setuid to this user. |
142 | 143 |
<P> |
... | ... |
@@ -150,7 +151,7 @@ The following options are useful only for clients (that is, if <B>SOCKSPort</B> |
150 | 151 |
<DL COMPACT> |
151 | 152 |
<DT><B>AllowUnverifiedNodes</B> <B>entry</B>|<B>exit</B>|<B>middle</B>|<B>introduction</B>|<B>rendezvous</B>|...<DD> |
152 | 153 |
Where on our circuits should we allow Tor servers that the directory |
153 |
-servers haven't authenticated as "verified"? (Default: middle,rendezvous.) |
|
154 |
+servers haven't authenticated as "verified"? (Default: middle,rendezvous) |
|
154 | 155 |
<DT><B>ClientOnly </B><B>0</B>|<B>1</B><DD> |
155 | 156 |
If set to 1, Tor will under no circumstances run as a server. The default |
156 | 157 |
is to run as a client unless ORPort is configured. (Usually, |
... | ... |
@@ -175,14 +176,18 @@ allow you to run Tor as a client behind a firewall with restrictive policies, |
175 | 176 |
but will not allow you to run as a server behind such a firewall. |
176 | 177 |
<DT><B>FirewallPorts </B><I>PORTS</I><DD> |
177 | 178 |
A list of ports that your firewall allows you to connect to. Only used when |
178 |
-<B>FascistFirewall</B> is set. (Default: 80, 443.) |
|
179 |
+<B>FascistFirewall</B> is set. (Default: 80, 443) |
|
179 | 180 |
<DT><B>LongLivedPorts </B><I>PORTS</I><DD> |
180 | 181 |
A list of ports for services that tend to have long-running connections |
181 | 182 |
(e.g. chat and interactive shells). Circuits for streams that use these |
182 | 183 |
ports will contain only high-uptime nodes, to reduce the chance that a |
183 |
-node will go down before the stream is finished. |
|
184 |
+node will go down before the stream is finished. (Default: 21, 22, 706, 1863, 5050, |
|
185 |
+5190, 5222, 5223, 6667, 8300, 8888) |
|
184 | 186 |
<DT><B>MapAddress</B> <I>address</I> <I>newaddress</I><DD> |
185 |
-When a request for address arrives to Tor, it will rewrite it to newaddress before processing it. For example, if you always want connections to <A HREF="http://www.indymedia.org">www.indymedia.org</A> to exit via <I>torserver</I> (where <I>torserver</I> is the nickname of the server), use "MapAddress <A HREF="http://www.indymedia.org">www.indymedia.org</A> <A HREF="http://www.indymedia.org.torserver.exit">www.indymedia.org.torserver.exit</A>". |
|
187 |
+When a request for address arrives to Tor, it will rewrite it to newaddress before |
|
188 |
+processing it. For example, if you always want connections to <A HREF="http://www.indymedia.org">www.indymedia.org</A> to |
|
189 |
+exit via <I>torserver</I> (where <I>torserver</I> is the nickname of the server), |
|
190 |
+use "MapAddress <A HREF="http://www.indymedia.org">www.indymedia.org</A> <A HREF="http://www.indymedia.org.torserver.exit">www.indymedia.org.torserver.exit</A>". |
|
186 | 191 |
<DT><B>NewCircuitPeriod </B><I>NUM</I><DD> |
187 | 192 |
Every NUM seconds consider whether to build a new circuit. (Default: 30 seconds) |
188 | 193 |
<DT><B>MaxCircuitDirtiness </B><I>NUM</I><DD> |
... | ... |
@@ -211,7 +217,8 @@ applications. (Default: 127.0.0.1) You can also specify a port |
211 | 217 |
(e.g. 192.168.0.1:9100). This directive can be specified multiple times |
212 | 218 |
to bind to multiple addresses/ports. |
213 | 219 |
<DT><B>SOCKSPolicy </B><I>policy</I>,<I>policy</I>,<I>...</I><DD> |
214 |
-Set an entrance policy for this server, to limit who can connect to the SOCKS ports. The policies have the same form as exit policies below. |
|
220 |
+Set an entrance policy for this server, to limit who can connect to the SOCKS ports. |
|
221 |
+The policies have the same form as exit policies below. |
|
215 | 222 |
<DT><B>TrackHostExits </B><I>host</I>,<I>.domain</I>,<I>...</I><DD> |
216 | 223 |
For each value in the comma separated list, Tor will track recent connections |
217 | 224 |
to hosts that match this value and attempt to |
... | ... |
@@ -321,7 +328,7 @@ we exit. If we get a second SIGINT, we exit immediately. (Default: |
321 | 328 |
<DT><B>DirPostPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD> |
322 | 329 |
Every time the specified period elapses, Tor uploads its server |
323 | 330 |
descriptors to the directory servers. This information is also |
324 |
-uploaded whenever it changes. (Default: 20 minutes.) |
|
331 |
+uploaded whenever it changes. (Default: 20 minutes) |
|
325 | 332 |
<DT><B>AccountingMax </B><I>N</I> <B>bytes</B>|<B>KB</B>|<B>MB</B>|<B>GB</B>|<B>TB</B><DD> |
326 | 333 |
Never send more than the specified number of bytes in a given |
327 | 334 |
accounting period, or receive more than that number in the period. |
... | ... |
@@ -369,7 +376,8 @@ Advertise the directory service on this port. |
369 | 376 |
Bind the directory service to this address. If you specify a port, bind |
370 | 377 |
to this port rather than the one specified in DirPort. (Default: 0.0.0.0) |
371 | 378 |
<DT><B>DirPolicy </B><I>policy</I>,<I>policy</I>,<I>...</I><DD> |
372 |
-Set an entrance policy for this server, to limit who can connect to the directory ports. The policies have the same form as exit policies above. |
|
379 |
+Set an entrance policy for this server, to limit who can connect to the directory ports. |
|
380 |
+The policies have the same form as exit policies above. |
|
373 | 381 |
<DT><B>RecommendedVersions </B><I>STRING</I><DD> |
374 | 382 |
STRING is a command-separated list of Tor versions currently believed |
375 | 383 |
to be safe. The list is included in each directory, and nodes which |
... | ... |
@@ -414,7 +422,7 @@ service. In normal use there is no reason to set this. |
414 | 422 |
<DT><B>RendPostPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD> |
415 | 423 |
Every time the specified period elapses, Tor uploads any rendezvous |
416 | 424 |
service descriptors to the directory servers. This information is also |
417 |
-uploaded whenever it changes. (Default: 20 minutes.) |
|
425 |
+uploaded whenever it changes. (Default: 20 minutes) |
|
418 | 426 |
<P> |
419 | 427 |
|
420 | 428 |
|
... | ... |
@@ -508,6 +516,6 @@ Roger Dingledine <<A HREF="mailto:arma@mit.edu">arma@mit.edu</A>>, Nick Ma |
508 | 516 |
This document was created by |
509 | 517 |
<A HREF="../">man2html</A>, |
510 | 518 |
using the manual pages.<BR> |
511 |
-Time: 10:38:23 GMT, May 15, 2005 |
|
519 |
+Time: 14:06:07 GMT, May 23, 2005 |
|
512 | 520 |
</BODY> |
513 | 521 |
</HTML> |
514 | 522 |