Thomas Sjögren commited on 2005-05-23 16:06:43
Zeige 1 geänderte Dateien mit 22 Einfügungen und 15 Löschungen.
| ... | ... |
@@ -80,7 +80,7 @@ Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor) |
| 80 | 80 |
Every time the specified period elapses, Tor downloads a directory. |
| 81 | 81 |
A directory contains a signed list of all known servers as well as |
| 82 | 82 |
their current liveness status. A value of "0 seconds" tells Tor to choose an |
| 83 |
-appropriate default. (Default: 1 hour for clients, 20 minutes for servers.) |
|
| 83 |
+appropriate default. (Default: 1 hour for clients, 20 minutes for servers) |
|
| 84 | 84 |
<DT><B>DirServer </B><I>address:port fingerprint</I><DD> |
| 85 | 85 |
Use a nonstandard authoritative directory server at the provided |
| 86 | 86 |
address and port, with the specified key fingerprint. This option can |
| ... | ... |
@@ -95,16 +95,17 @@ rather than connecting directly to any directory servers. |
| 95 | 95 |
<DT><B>HttpsProxy</B> <I>host</I>[:<I>port</I>]<DD> |
| 96 | 96 |
If set, Tor will make all its OR (SSL) connections through this host:port, |
| 97 | 97 |
via HTTP CONNECT, rather than connecting directly to servers. |
| 98 |
+You may want to set <B>FascistFirewall</B> to restrict the set of ports you |
|
| 99 |
+might try to connect to, if your Https proxy only allows connecting to certain |
|
| 100 |
+ports. |
|
| 98 | 101 |
<DT><B>HttpsProxyAuthenticator</B> <I>username:password</I><DD> |
| 99 | 102 |
If defined, Tor will use this username:password for Basic Https proxy |
| 100 | 103 |
authentication, as in RFC 2617. This is currently the only form of |
| 101 | 104 |
Https proxy authentication that Tor supports; feel free to submit a |
| 102 |
-patch if you want it to support others. You may want to set FascistFirewall |
|
| 103 |
-to restrict the set of ports you might try to connect to, if your Https |
|
| 104 |
-proxy only allows connecting to certain ports. |
|
| 105 |
+patch if you want it to support others. |
|
| 105 | 106 |
<DT><B>KeepalivePeriod </B><I>NUM</I><DD> |
| 106 | 107 |
To keep firewalls from expiring connections, send a padding keepalive |
| 107 |
-cell on open connections every NUM seconds. (Default: 5 minutes.) |
|
| 108 |
+cell on open connections every NUM seconds. (Default: 5 minutes) |
|
| 108 | 109 |
<DT><B>Log </B><I>minSeverity</I>[-<I>maxSeverity</I>] <B>stderr</B>|<B>stdout</B>|<B>syslog</B><DD> |
| 109 | 110 |
Send all messages between <I>minSeverity</I> and <I>maxSeverity</I> to |
| 110 | 111 |
the standard output stream, the standard error stream, or to the system |
| ... | ... |
@@ -136,7 +137,7 @@ about what sites a user might have visited. (Default: 1) |
| 136 | 137 |
Every time the specified period elapses, Tor downloads signed status |
| 137 | 138 |
information about the current state of known servers. A value of |
| 138 | 139 |
"0 seconds" tells Tor to choose an appropriate default. (Default: 30 |
| 139 |
-minutes for clients, 15 minutes for servers.) |
|
| 140 |
+minutes for clients, 15 minutes for servers) |
|
| 140 | 141 |
<DT><B>User </B><I>UID</I><DD> |
| 141 | 142 |
On startup, setuid to this user. |
| 142 | 143 |
<P> |
| ... | ... |
@@ -150,7 +151,7 @@ The following options are useful only for clients (that is, if <B>SOCKSPort</B> |
| 150 | 151 |
<DL COMPACT> |
| 151 | 152 |
<DT><B>AllowUnverifiedNodes</B> <B>entry</B>|<B>exit</B>|<B>middle</B>|<B>introduction</B>|<B>rendezvous</B>|...<DD> |
| 152 | 153 |
Where on our circuits should we allow Tor servers that the directory |
| 153 |
-servers haven't authenticated as "verified"? (Default: middle,rendezvous.) |
|
| 154 |
+servers haven't authenticated as "verified"? (Default: middle,rendezvous) |
|
| 154 | 155 |
<DT><B>ClientOnly </B><B>0</B>|<B>1</B><DD> |
| 155 | 156 |
If set to 1, Tor will under no circumstances run as a server. The default |
| 156 | 157 |
is to run as a client unless ORPort is configured. (Usually, |
| ... | ... |
@@ -175,14 +176,18 @@ allow you to run Tor as a client behind a firewall with restrictive policies, |
| 175 | 176 |
but will not allow you to run as a server behind such a firewall. |
| 176 | 177 |
<DT><B>FirewallPorts </B><I>PORTS</I><DD> |
| 177 | 178 |
A list of ports that your firewall allows you to connect to. Only used when |
| 178 |
-<B>FascistFirewall</B> is set. (Default: 80, 443.) |
|
| 179 |
+<B>FascistFirewall</B> is set. (Default: 80, 443) |
|
| 179 | 180 |
<DT><B>LongLivedPorts </B><I>PORTS</I><DD> |
| 180 | 181 |
A list of ports for services that tend to have long-running connections |
| 181 | 182 |
(e.g. chat and interactive shells). Circuits for streams that use these |
| 182 | 183 |
ports will contain only high-uptime nodes, to reduce the chance that a |
| 183 |
-node will go down before the stream is finished. |
|
| 184 |
+node will go down before the stream is finished. (Default: 21, 22, 706, 1863, 5050, |
|
| 185 |
+5190, 5222, 5223, 6667, 8300, 8888) |
|
| 184 | 186 |
<DT><B>MapAddress</B> <I>address</I> <I>newaddress</I><DD> |
| 185 |
-When a request for address arrives to Tor, it will rewrite it to newaddress before processing it. For example, if you always want connections to <A HREF="http://www.indymedia.org">www.indymedia.org</A> to exit via <I>torserver</I> (where <I>torserver</I> is the nickname of the server), use "MapAddress <A HREF="http://www.indymedia.org">www.indymedia.org</A> <A HREF="http://www.indymedia.org.torserver.exit">www.indymedia.org.torserver.exit</A>". |
|
| 187 |
+When a request for address arrives to Tor, it will rewrite it to newaddress before |
|
| 188 |
+processing it. For example, if you always want connections to <A HREF="http://www.indymedia.org">www.indymedia.org</A> to |
|
| 189 |
+exit via <I>torserver</I> (where <I>torserver</I> is the nickname of the server), |
|
| 190 |
+use "MapAddress <A HREF="http://www.indymedia.org">www.indymedia.org</A> <A HREF="http://www.indymedia.org.torserver.exit">www.indymedia.org.torserver.exit</A>". |
|
| 186 | 191 |
<DT><B>NewCircuitPeriod </B><I>NUM</I><DD> |
| 187 | 192 |
Every NUM seconds consider whether to build a new circuit. (Default: 30 seconds) |
| 188 | 193 |
<DT><B>MaxCircuitDirtiness </B><I>NUM</I><DD> |
| ... | ... |
@@ -211,7 +217,8 @@ applications. (Default: 127.0.0.1) You can also specify a port |
| 211 | 217 |
(e.g. 192.168.0.1:9100). This directive can be specified multiple times |
| 212 | 218 |
to bind to multiple addresses/ports. |
| 213 | 219 |
<DT><B>SOCKSPolicy </B><I>policy</I>,<I>policy</I>,<I>...</I><DD> |
| 214 |
-Set an entrance policy for this server, to limit who can connect to the SOCKS ports. The policies have the same form as exit policies below. |
|
| 220 |
+Set an entrance policy for this server, to limit who can connect to the SOCKS ports. |
|
| 221 |
+The policies have the same form as exit policies below. |
|
| 215 | 222 |
<DT><B>TrackHostExits </B><I>host</I>,<I>.domain</I>,<I>...</I><DD> |
| 216 | 223 |
For each value in the comma separated list, Tor will track recent connections |
| 217 | 224 |
to hosts that match this value and attempt to |
| ... | ... |
@@ -321,7 +328,7 @@ we exit. If we get a second SIGINT, we exit immediately. (Default: |
| 321 | 328 |
<DT><B>DirPostPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD> |
| 322 | 329 |
Every time the specified period elapses, Tor uploads its server |
| 323 | 330 |
descriptors to the directory servers. This information is also |
| 324 |
-uploaded whenever it changes. (Default: 20 minutes.) |
|
| 331 |
+uploaded whenever it changes. (Default: 20 minutes) |
|
| 325 | 332 |
<DT><B>AccountingMax </B><I>N</I> <B>bytes</B>|<B>KB</B>|<B>MB</B>|<B>GB</B>|<B>TB</B><DD> |
| 326 | 333 |
Never send more than the specified number of bytes in a given |
| 327 | 334 |
accounting period, or receive more than that number in the period. |
| ... | ... |
@@ -369,7 +376,8 @@ Advertise the directory service on this port. |
| 369 | 376 |
Bind the directory service to this address. If you specify a port, bind |
| 370 | 377 |
to this port rather than the one specified in DirPort. (Default: 0.0.0.0) |
| 371 | 378 |
<DT><B>DirPolicy </B><I>policy</I>,<I>policy</I>,<I>...</I><DD> |
| 372 |
-Set an entrance policy for this server, to limit who can connect to the directory ports. The policies have the same form as exit policies above. |
|
| 379 |
+Set an entrance policy for this server, to limit who can connect to the directory ports. |
|
| 380 |
+The policies have the same form as exit policies above. |
|
| 373 | 381 |
<DT><B>RecommendedVersions </B><I>STRING</I><DD> |
| 374 | 382 |
STRING is a command-separated list of Tor versions currently believed |
| 375 | 383 |
to be safe. The list is included in each directory, and nodes which |
| ... | ... |
@@ -414,7 +422,7 @@ service. In normal use there is no reason to set this. |
| 414 | 422 |
<DT><B>RendPostPeriod </B><I>N</I> <B>seconds</B>|<B>minutes</B>|<B>hours</B>|<B>days</B>|<B>weeks</B><DD> |
| 415 | 423 |
Every time the specified period elapses, Tor uploads any rendezvous |
| 416 | 424 |
service descriptors to the directory servers. This information is also |
| 417 |
-uploaded whenever it changes. (Default: 20 minutes.) |
|
| 425 |
+uploaded whenever it changes. (Default: 20 minutes) |
|
| 418 | 426 |
<P> |
| 419 | 427 |
|
| 420 | 428 |
|
| ... | ... |
@@ -508,6 +516,6 @@ Roger Dingledine <<A HREF="mailto:arma@mit.edu">arma@mit.edu</A>>, Nick Ma |
| 508 | 516 |
This document was created by |
| 509 | 517 |
<A HREF="../">man2html</A>, |
| 510 | 518 |
using the manual pages.<BR> |
| 511 |
-Time: 10:38:23 GMT, May 15, 2005 |
|
| 519 |
+Time: 14:06:07 GMT, May 23, 2005 |
|
| 512 | 520 |
</BODY> |
| 513 | 521 |
</HTML> |
| 514 | 522 |