2010-01-19 14:53:38 +01:00
|
|
|
// Copyright (c) The Tor Project, Inc.
|
|
|
|
// See LICENSE for licensing information
|
|
|
|
// This is an asciidoc file used to generate the manpage/html reference.
|
|
|
|
// Learn asciidoc on http://www.methods.co.nz/asciidoc/userguide.html
|
2012-08-23 19:19:54 +02:00
|
|
|
:man source: Tor
|
|
|
|
:man manual: Tor Manual
|
2010-01-19 14:53:38 +01:00
|
|
|
TOR(1)
|
|
|
|
======
|
|
|
|
|
|
|
|
NAME
|
|
|
|
----
|
|
|
|
tor - The second-generation onion router
|
|
|
|
|
|
|
|
|
|
|
|
SYNOPSIS
|
|
|
|
--------
|
|
|
|
**tor** [__OPTION__ __value__]...
|
|
|
|
|
|
|
|
DESCRIPTION
|
|
|
|
-----------
|
2013-10-31 15:55:18 +01:00
|
|
|
Tor is a connection-oriented anonymizing communication
|
2010-01-19 14:53:38 +01:00
|
|
|
service. Users choose a source-routed path through a set of nodes, and
|
|
|
|
negotiate a "virtual circuit" through the network, in which each node
|
|
|
|
knows its predecessor and successor, but no others. Traffic flowing down
|
|
|
|
the circuit is unwrapped by a symmetric key at each node, which reveals
|
|
|
|
the downstream node. +
|
|
|
|
|
2013-10-31 15:55:18 +01:00
|
|
|
Basically, Tor provides a distributed network of servers or relays ("onion routers").
|
|
|
|
Users bounce their TCP streams -- web traffic, ftp, ssh, etc. -- around the
|
|
|
|
network, and recipients, observers, and even the relays themselves have
|
2010-01-19 14:53:38 +01:00
|
|
|
difficulty tracking the source of the stream.
|
|
|
|
|
2016-03-27 22:22:29 +02:00
|
|
|
By default, **tor** will act as a client only. To help the network
|
2013-10-31 16:08:21 +01:00
|
|
|
by providing bandwidth as a relay, change the **ORPort** configuration
|
|
|
|
option -- see below. Please also consult the documentation on the Tor
|
|
|
|
Project's website.
|
|
|
|
|
2012-06-15 22:41:30 +02:00
|
|
|
COMMAND-LINE OPTIONS
|
|
|
|
--------------------
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-h]] **-h**, **-help**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Display a short help message and exit.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-f]] **-f** __FILE__::
|
2012-06-15 22:41:30 +02:00
|
|
|
Specify a new configuration file to contain further Tor configuration
|
2015-01-26 20:33:19 +01:00
|
|
|
options OR pass *-* to make Tor read its configuration from standard
|
|
|
|
input. (Default: @CONFDIR@/torrc, or $HOME/.torrc if that file is not
|
2012-06-15 22:41:30 +02:00
|
|
|
found)
|
|
|
|
|
2013-11-03 17:53:41 +01:00
|
|
|
[[opt-allow-missing-torrc]] **--allow-missing-torrc**::
|
2013-11-07 20:52:29 +01:00
|
|
|
Do not require that configuration file specified by **-f** exist if
|
2013-11-03 17:53:41 +01:00
|
|
|
default torrc can be accessed.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-defaults-torrc]] **--defaults-torrc** __FILE__::
|
2012-06-15 22:41:30 +02:00
|
|
|
Specify a file in which to find default values for Tor options. The
|
|
|
|
contents of this file are overridden by those in the regular
|
|
|
|
configuration file, and by those on the command line. (Default:
|
|
|
|
@CONFDIR@/torrc-defaults.)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-11-07 20:42:58 +01:00
|
|
|
[[opt-ignore-missing-torrc]] **--ignore-missing-torrc**::
|
|
|
|
Specifies that Tor should treat a missing torrc file as though it
|
|
|
|
were empty. Ordinarily, Tor does this for missing default torrc files,
|
|
|
|
but not for those specified on the command line.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-hash-password]] **--hash-password** __PASSWORD__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Generates a hashed password for control port access.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-list-fingerprint]] **--list-fingerprint**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Generate your keys and output your nickname and fingerprint.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-verify-config]] **--verify-config**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Verify the configuration file is valid.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-serviceinstall]] **--service install** [**--options** __command-line options__]::
|
2012-04-11 19:10:35 +02:00
|
|
|
Install an instance of Tor as a Windows service, with the provided
|
|
|
|
command-line options. Current instructions can be found at
|
2014-10-11 02:16:32 +02:00
|
|
|
https://www.torproject.org/docs/faq#NTService
|
2012-04-11 19:10:35 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-service]] **--service** **remove**|**start**|**stop**::
|
2012-04-11 19:10:35 +02:00
|
|
|
Remove, start, or stop a configured Tor Windows service.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-nt-service]] **--nt-service**::
|
2012-04-11 19:10:35 +02:00
|
|
|
Used internally to implement a Windows service.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-list-torrc-options]] **--list-torrc-options**::
|
2010-01-19 14:53:38 +01:00
|
|
|
List all valid options.
|
|
|
|
|
2016-08-03 18:15:01 +02:00
|
|
|
[[opt-list-deprecated-options]] **--list-deprecated-options**::
|
|
|
|
List all valid options that are scheduled to become obsolete in a
|
|
|
|
future version. (This is a warning, not a promise.)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-version]] **--version**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Display Tor version and exit.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[opt-quiet]] **--quiet**|**--hush**::
|
2012-06-14 20:58:51 +02:00
|
|
|
Override the default console log. By default, Tor starts out logging
|
|
|
|
messages at level "notice" and higher to the console. It stops doing so
|
|
|
|
after it parses its configuration, if the configuration tells it to log
|
|
|
|
anywhere else. You can override this behavior with the **--hush** option,
|
|
|
|
which tells Tor to only send warnings and errors to the console, or with
|
|
|
|
the **--quiet** option, which tells Tor not to log to the console at all.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2016-01-28 17:52:48 +01:00
|
|
|
[[opt-keygen]] **--keygen** [**--newpass**]::
|
2016-01-28 16:19:29 +01:00
|
|
|
Running "tor --keygen" creates a new ed25519 master identity key for a
|
|
|
|
relay, or only a fresh temporary signing key and certificate, if you
|
|
|
|
already have a master key. Optionally you can encrypt the master identity
|
|
|
|
key with a passphrase: Tor will ask you for one. If you don't want to
|
|
|
|
encrypt the master key, just don't enter any passphrase when asked. +
|
|
|
|
+
|
|
|
|
The **--newpass** option should be used with --keygen only when you need
|
|
|
|
to add, change, or remove a passphrase on an existing ed25519 master
|
|
|
|
identity key. You will be prompted for the old passphase (if any),
|
|
|
|
and the new passphrase (if any). +
|
|
|
|
+
|
|
|
|
When generating a master key, you will probably want to use
|
|
|
|
**--DataDirectory** to control where the keys
|
|
|
|
and certificates will be stored, and **--SigningKeyLifetime** to
|
|
|
|
control their lifetimes. Their behavior is as documented in the
|
|
|
|
server options section below. (You must have write access to the specified
|
|
|
|
DataDirectory.) +
|
|
|
|
+
|
|
|
|
To use the generated files, you must copy them to the DataDirectory/keys
|
|
|
|
directory of your Tor daemon, and make sure that they are owned by the
|
|
|
|
user actually running the Tor daemon on your system.
|
|
|
|
|
2016-06-25 16:44:41 +02:00
|
|
|
**--passphrase-fd** __FILEDES__::
|
2016-06-25 16:53:07 +02:00
|
|
|
Filedescriptor to read the passphrase from. Note that unlike with the
|
|
|
|
tor-gencert program, the entire file contents are read and used as
|
|
|
|
the passphrase, including any trailing newlines.
|
|
|
|
Default: read from the terminal.
|
2016-06-25 16:44:41 +02:00
|
|
|
|
|
|
|
|
2012-06-15 22:41:30 +02:00
|
|
|
Other options can be specified on the command-line in the format "--option
|
|
|
|
value", in the format "option value", or in a configuration file. For
|
|
|
|
instance, you can tell Tor to start listening for SOCKS connections on port
|
2015-11-24 02:32:49 +01:00
|
|
|
9999 by passing --SocksPort 9999 or SocksPort 9999 to it on the command line,
|
|
|
|
or by putting "SocksPort 9999" in the configuration file. You will need to
|
2012-06-15 22:41:30 +02:00
|
|
|
quote options with spaces in them: if you want Tor to log all debugging
|
|
|
|
messages to debug.log, you will probably need to say --Log 'debug file
|
|
|
|
debug.log'.
|
|
|
|
|
|
|
|
Options on the command line override those in configuration files. See the
|
|
|
|
next section for more information.
|
|
|
|
|
|
|
|
THE CONFIGURATION FILE FORMAT
|
|
|
|
-----------------------------
|
|
|
|
|
|
|
|
All configuration options in a configuration are written on a single line by
|
|
|
|
default. They take the form of an option name and a value, or an option name
|
|
|
|
and a quoted value (option value or option "value"). Anything after a #
|
|
|
|
character is treated as a comment. Options are
|
|
|
|
case-insensitive. C-style escaped characters are allowed inside quoted
|
|
|
|
values. To split one configuration entry into multiple lines, use a single
|
|
|
|
backslash character (\) before the end of the line. Comments can be used in
|
|
|
|
such multiline entries, but they must start at the beginning of a line.
|
|
|
|
|
|
|
|
By default, an option on the command line overrides an option found in the
|
|
|
|
configuration file, and an option in a configuration file overrides one in
|
|
|
|
the defaults file.
|
|
|
|
|
|
|
|
This rule is simple for options that take a single value, but it can become
|
|
|
|
complicated for options that are allowed to occur more than once: if you
|
2015-11-24 02:32:49 +01:00
|
|
|
specify four SocksPorts in your configuration file, and one more SocksPort on
|
2012-06-15 22:41:30 +02:00
|
|
|
the command line, the option on the command line will replace __all__ of the
|
2015-11-24 02:32:49 +01:00
|
|
|
SocksPorts in the configuration file. If this isn't what you want, prefix
|
2015-11-02 01:36:19 +01:00
|
|
|
the option name with a plus sign (+), and it will be appended to the previous
|
2015-11-24 02:32:49 +01:00
|
|
|
set of options instead. For example, setting SocksPort 9100 will use only
|
|
|
|
port 9100, but setting +SocksPort 9100 will use ports 9100 and 9050 (because
|
2015-11-02 01:36:19 +01:00
|
|
|
this is the default).
|
2012-06-15 22:41:30 +02:00
|
|
|
|
|
|
|
Alternatively, you might want to remove every instance of an option in the
|
|
|
|
configuration file, and not replace it at all: you might want to say on the
|
2015-11-24 02:32:49 +01:00
|
|
|
command line that you want no SocksPorts at all. To do that, prefix the
|
2015-11-02 01:36:19 +01:00
|
|
|
option name with a forward slash (/). You can use the plus sign (+) and the
|
|
|
|
forward slash (/) in the configuration file and on the command line.
|
2012-06-15 22:41:30 +02:00
|
|
|
|
|
|
|
GENERAL OPTIONS
|
|
|
|
---------------
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[BandwidthRate]] **BandwidthRate** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2015-10-30 15:57:47 +01:00
|
|
|
A token bucket limits the average incoming bandwidth usage on this node
|
|
|
|
to the specified number of bytes per second, and the average outgoing
|
2010-07-31 00:00:43 +02:00
|
|
|
bandwidth usage to that same value. If you want to run a relay in the
|
2015-10-30 15:57:47 +01:00
|
|
|
public network, this needs to be _at the very least_ 75 KBytes for a
|
|
|
|
relay (that is, 600 kbits) or 50 KBytes for a bridge (400 kbits) -- but of
|
|
|
|
course, more is better; we recommend at least 250 KBytes (2 mbits) if
|
|
|
|
possible. (Default: 1 GByte) +
|
2014-03-04 18:10:42 +01:00
|
|
|
+
|
|
|
|
With this option, and in other options that take arguments in bytes,
|
|
|
|
KBytes, and so on, other formats are also supported. Notably, "KBytes" can
|
|
|
|
also be written as "kilobytes" or "kb"; "MBytes" can be written as
|
|
|
|
"megabytes" or "MB"; "kbits" can be written as "kilobits"; and so forth.
|
|
|
|
Tor also accepts "byte" and "bit" in the singular.
|
|
|
|
The prefixes "tera" and "T" are also recognized.
|
|
|
|
If no units are given, we default to bytes.
|
|
|
|
To avoid confusion, we recommend writing "bytes" or "bits" explicitly,
|
|
|
|
since it's easy to forget that "B" means bytes, not bits.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[BandwidthBurst]] **BandwidthBurst** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Limit the maximum token bucket size (also known as the burst) to the given
|
2012-10-06 07:57:13 +02:00
|
|
|
number of bytes in each direction. (Default: 1 GByte)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[MaxAdvertisedBandwidth]] **MaxAdvertisedBandwidth** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set, we will not advertise more than this amount of bandwidth for our
|
|
|
|
BandwidthRate. Server operators who want to reduce the number of clients
|
|
|
|
who ask to build circuits through them (since this is proportional to
|
|
|
|
advertised bandwidth rate) can thus reduce the CPU demands on their server
|
|
|
|
without impacting network performance.
|
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[RelayBandwidthRate]] **RelayBandwidthRate** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2010-10-22 23:37:54 +02:00
|
|
|
If not 0, a separate token bucket limits the average incoming bandwidth
|
2010-01-19 14:53:38 +01:00
|
|
|
usage for \_relayed traffic_ on this node to the specified number of bytes
|
|
|
|
per second, and the average outgoing bandwidth usage to that same value.
|
|
|
|
Relayed traffic currently is calculated to include answers to directory
|
|
|
|
requests, but that may change in future versions. (Default: 0)
|
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[RelayBandwidthBurst]] **RelayBandwidthBurst** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2010-10-22 23:37:54 +02:00
|
|
|
If not 0, limit the maximum token bucket size (also known as the burst) for
|
2010-01-19 14:53:38 +01:00
|
|
|
\_relayed traffic_ to the given number of bytes in each direction.
|
|
|
|
(Default: 0)
|
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[PerConnBWRate]] **PerConnBWRate** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set, do separate rate limiting for each connection from a non-relay.
|
|
|
|
You should never need to change this value, since a network-wide value is
|
|
|
|
published in the consensus and your relay will use that value. (Default: 0)
|
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[PerConnBWBurst]] **PerConnBWBurst** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set, do separate rate limiting for each connection from a non-relay.
|
|
|
|
You should never need to change this value, since a network-wide value is
|
|
|
|
published in the consensus and your relay will use that value. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ClientTransportPlugin]] **ClientTransportPlugin** __transport__ socks4|socks5 __IP__:__PORT__::
|
2012-01-21 15:28:48 +01:00
|
|
|
**ClientTransportPlugin** __transport__ exec __path-to-binary__ [options]::
|
|
|
|
In its first form, when set along with a corresponding Bridge line, the Tor
|
|
|
|
client forwards its traffic to a SOCKS-speaking proxy on "IP:PORT". It's the
|
|
|
|
duty of that proxy to properly forward the traffic to the bridge. +
|
|
|
|
+
|
|
|
|
In its second form, when set along with a corresponding Bridge line, the Tor
|
2012-07-31 16:16:03 +02:00
|
|
|
client launches the pluggable transport proxy executable in
|
2012-01-21 15:28:48 +01:00
|
|
|
__path-to-binary__ using __options__ as its command-line options, and
|
|
|
|
forwards its traffic to it. It's the duty of that proxy to properly forward
|
|
|
|
the traffic to the bridge.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerTransportPlugin]] **ServerTransportPlugin** __transport__ exec __path-to-binary__ [options]::
|
2012-01-21 15:28:48 +01:00
|
|
|
The Tor relay launches the pluggable transport proxy in __path-to-binary__
|
|
|
|
using __options__ as its command-line options, and expects to receive
|
|
|
|
proxied client traffic from it.
|
2011-11-06 00:50:22 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerTransportListenAddr]] **ServerTransportListenAddr** __transport__ __IP__:__PORT__::
|
2012-10-30 03:17:13 +01:00
|
|
|
When this option is set, Tor will suggest __IP__:__PORT__ as the
|
|
|
|
listening address of any pluggable transport proxy that tries to
|
|
|
|
launch __transport__.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerTransportOptions]] **ServerTransportOptions** __transport__ __k=v__ __k=v__ ...::
|
2013-06-12 18:01:22 +02:00
|
|
|
When this option is set, Tor will pass the __k=v__ parameters to
|
|
|
|
any pluggable transport proxy that tries to launch __transport__. +
|
|
|
|
(Example: ServerTransportOptions obfs45 shared-secret=bridgepasswd cache=/var/lib/tor/cache)
|
|
|
|
|
2015-11-24 02:23:14 +01:00
|
|
|
[[ExtORPort]] **ExtORPort** \['address':]__port__|**auto**::
|
2013-09-04 13:20:42 +02:00
|
|
|
Open this port to listen for Extended ORPort connections from your
|
|
|
|
pluggable transports.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExtORPortCookieAuthFile]] **ExtORPortCookieAuthFile** __Path__::
|
2013-09-04 13:20:42 +02:00
|
|
|
If set, this option overrides the default location and file name
|
|
|
|
for the Extended ORPort's cookie file -- the cookie file is needed
|
|
|
|
for pluggable transports to communicate through the Extended ORPort.
|
|
|
|
|
2014-08-15 14:30:44 +02:00
|
|
|
[[ExtORPortCookieAuthFileGroupReadable]] **ExtORPortCookieAuthFileGroupReadable** **0**|**1**::
|
|
|
|
If this option is set to 0, don't allow the filesystem group to read the
|
2014-08-15 22:12:06 +02:00
|
|
|
Extended OR Port cookie file. If the option is set to 1, make the cookie
|
2014-08-15 14:30:44 +02:00
|
|
|
file readable by the default GID. [Making the file readable by other
|
|
|
|
groups is not yet implemented; let us know if you need this for some
|
|
|
|
reason.] (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ConnLimit]] **ConnLimit** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
The minimum number of file descriptors that must be available to the Tor
|
|
|
|
process before it will start. Tor will ask the OS for as many file
|
|
|
|
descriptors as the OS will allow (you can find this by "ulimit -H -n").
|
|
|
|
If this number is less than ConnLimit, then Tor will refuse to start. +
|
|
|
|
+
|
|
|
|
You probably don't need to adjust this. It has no effect on Windows
|
|
|
|
since that platform lacks getrlimit(). (Default: 1000)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DisableNetwork]] **DisableNetwork** **0**|**1**::
|
2011-11-28 22:01:47 +01:00
|
|
|
When this option is set, we don't listen for or accept any connections
|
2013-10-25 22:56:20 +02:00
|
|
|
other than controller connections, and we close (and don't reattempt)
|
|
|
|
any outbound
|
2011-11-28 22:01:47 +01:00
|
|
|
connections. Controllers sometimes use this option to avoid using
|
|
|
|
the network until Tor is fully configured. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ConstrainedSockets]] **ConstrainedSockets** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set, Tor will tell the kernel to attempt to shrink the buffers for all
|
|
|
|
sockets to the size specified in **ConstrainedSockSize**. This is useful for
|
|
|
|
virtual servers and other environments where system level TCP buffers may
|
|
|
|
be limited. If you're on a virtual server, and you encounter the "Error
|
|
|
|
creating network socket: No buffer space available" message, you are
|
|
|
|
likely experiencing this problem. +
|
|
|
|
+
|
|
|
|
The preferred solution is to have the admin increase the buffer pool for
|
|
|
|
the host itself via /proc/sys/net/ipv4/tcp_mem or equivalent facility;
|
|
|
|
this configuration option is a second-resort. +
|
|
|
|
+
|
|
|
|
The DirPort option should also not be used if TCP buffers are scarce. The
|
|
|
|
cached directory requests consume additional sockets which exacerbates
|
|
|
|
the problem. +
|
|
|
|
+
|
|
|
|
You should **not** enable this feature unless you encounter the "no buffer
|
|
|
|
space available" issue. Reducing the TCP buffers affects window size for
|
|
|
|
the TCP stream and will reduce throughput in proportion to round trip
|
2012-06-11 15:48:46 +02:00
|
|
|
time on long paths. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ConstrainedSockSize]] **ConstrainedSockSize** __N__ **bytes**|**KBytes**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When **ConstrainedSockets** is enabled the receive and transmit buffers for
|
|
|
|
all sockets will be set to this limit. Must be a value between 2048 and
|
|
|
|
262144, in 1024 byte increments. Default of 8192 is recommended.
|
|
|
|
|
2015-03-11 18:26:14 +01:00
|
|
|
[[ControlPort]] **ControlPort** __PORT__|**unix:**__path__|**auto** [__flags__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set, Tor will accept connections on this port and allow those
|
|
|
|
connections to control the Tor process using the Tor Control Protocol
|
2015-10-22 19:12:46 +02:00
|
|
|
(described in control-spec.txt in
|
|
|
|
https://spec.torproject.org[torspec]). Note: unless you also
|
|
|
|
specify one or more of **HashedControlPassword** or
|
|
|
|
**CookieAuthentication**, setting this option will cause Tor to allow
|
|
|
|
any process on the local host to control it. (Setting both authentication
|
2016-08-31 12:42:40 +02:00
|
|
|
methods means either method is sufficient to authenticate to Tor.) This
|
2010-01-19 14:53:38 +01:00
|
|
|
option is required for many Tor controllers; most use the value of 9051.
|
2016-10-03 22:32:00 +02:00
|
|
|
If a unix domain socket is used, you may quote the path using standard
|
|
|
|
C escape sequences.
|
2015-11-24 02:25:26 +01:00
|
|
|
Set it to "auto" to have Tor pick a port for you. (Default: 0) +
|
2015-03-11 18:26:14 +01:00
|
|
|
+
|
2015-11-24 02:25:26 +01:00
|
|
|
Recognized flags are...
|
2015-03-11 18:26:14 +01:00
|
|
|
**GroupWritable**;;
|
|
|
|
Unix domain sockets only: makes the socket get created as
|
|
|
|
group-writable.
|
|
|
|
**WorldWritable**;;
|
|
|
|
Unix domain sockets only: makes the socket get created as
|
|
|
|
world-writable.
|
2016-03-01 17:08:14 +01:00
|
|
|
**RelaxDirModeCheck**;;
|
|
|
|
Unix domain sockets only: Do not insist that the directory
|
|
|
|
that holds the socket be read-restricted.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ControlListenAddress]] **ControlListenAddress** __IP__[:__PORT__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Bind the controller listener to this address. If you specify a port, bind
|
|
|
|
to this port rather than the one specified in ControlPort. We strongly
|
|
|
|
recommend that you leave this alone unless you know what you're doing,
|
|
|
|
since giving attackers access to your control listener is really
|
2012-06-11 15:48:46 +02:00
|
|
|
dangerous. This directive can be specified multiple
|
2012-09-19 14:18:19 +02:00
|
|
|
times to bind to multiple addresses/ports. (Default: 127.0.0.1)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ControlSocket]] **ControlSocket** __Path__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Like ControlPort, but listens on a Unix domain socket, rather than a TCP
|
2015-01-09 21:54:59 +01:00
|
|
|
socket. '0' disables ControlSocket (Unix and Unix-like systems only.)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ControlSocketsGroupWritable]] **ControlSocketsGroupWritable** **0**|**1**::
|
2011-04-23 02:35:02 +02:00
|
|
|
If this option is set to 0, don't allow the filesystem group to read and
|
|
|
|
write unix sockets (e.g. ControlSocket). If the option is set to 1, make
|
|
|
|
the control socket readable and writable by the default GID. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HashedControlPassword]] **HashedControlPassword** __hashed_password__::
|
2011-09-02 13:01:55 +02:00
|
|
|
Allow connections on the control port if they present
|
|
|
|
the password whose one-way hash is __hashed_password__. You
|
2010-01-19 14:53:38 +01:00
|
|
|
can compute the hash of a password by running "tor --hash-password
|
|
|
|
__password__". You can provide several acceptable passwords by using more
|
2010-01-19 15:06:40 +01:00
|
|
|
than one HashedControlPassword line.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CookieAuthentication]] **CookieAuthentication** **0**|**1**::
|
2011-09-02 13:01:55 +02:00
|
|
|
If this option is set to 1, allow connections on the control port
|
|
|
|
when the connecting process knows the contents of a file named
|
2010-01-19 14:53:38 +01:00
|
|
|
"control_auth_cookie", which Tor will create in its data directory. This
|
|
|
|
authentication method should only be used on systems with good filesystem
|
|
|
|
security. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CookieAuthFile]] **CookieAuthFile** __Path__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set, this option overrides the default location and file name
|
|
|
|
for Tor's cookie file. (See CookieAuthentication above.)
|
|
|
|
|
2014-08-15 14:32:54 +02:00
|
|
|
[[CookieAuthFileGroupReadable]] **CookieAuthFileGroupReadable** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If this option is set to 0, don't allow the filesystem group to read the
|
|
|
|
cookie file. If the option is set to 1, make the cookie file readable by
|
|
|
|
the default GID. [Making the file readable by other groups is not yet
|
2012-06-11 15:48:46 +02:00
|
|
|
implemented; let us know if you need this for some reason.] (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ControlPortWriteToFile]] **ControlPortWriteToFile** __Path__::
|
2011-05-09 18:13:37 +02:00
|
|
|
If set, Tor writes the address and port of any control port it opens to
|
|
|
|
this address. Usable by controllers to learn the actual control port
|
|
|
|
when ControlPort is set to "auto".
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ControlPortFileGroupReadable]] **ControlPortFileGroupReadable** **0**|**1**::
|
2011-05-13 01:17:48 +02:00
|
|
|
If this option is set to 0, don't allow the filesystem group to read the
|
|
|
|
control port file. If the option is set to 1, make the control port
|
2012-06-11 15:48:46 +02:00
|
|
|
file readable by the default GID. (Default: 0)
|
2011-05-13 01:17:48 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DataDirectory]] **DataDirectory** __DIR__::
|
2017-01-03 04:51:46 +01:00
|
|
|
Store working data in DIR. Can not be changed while tor is running.
|
|
|
|
(Default: @LOCALSTATEDIR@/lib/tor)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2015-11-13 15:18:26 +01:00
|
|
|
[[DataDirectoryGroupReadable]] **DataDirectoryGroupReadable** **0**|**1**::
|
|
|
|
If this option is set to 0, don't allow the filesystem group to read the
|
|
|
|
DataDirectory. If the option is set to 1, make the DataDirectory readable
|
|
|
|
by the default GID. (Default: 0)
|
|
|
|
|
2013-02-22 22:10:40 +01:00
|
|
|
[[FallbackDir]] **FallbackDir** __address__:__port__ orport=__port__ id=__fingerprint__ [weight=__num__] [ipv6=__address__:__orport__]::
|
2012-09-11 00:13:28 +02:00
|
|
|
When we're unable to connect to any directory cache for directory info
|
2015-12-07 08:07:44 +01:00
|
|
|
(usually because we don't know about any yet) we try a directory authority.
|
|
|
|
Clients also simultaneously try a FallbackDir, to avoid hangs on client
|
|
|
|
startup if a directory authority is down. Clients retry FallbackDirs more
|
|
|
|
often than directory authorities, to reduce the load on the directory
|
|
|
|
authorities.
|
2015-11-24 22:53:29 +01:00
|
|
|
By default, the directory authorities are also FallbackDirs. Specifying a
|
|
|
|
FallbackDir replaces Tor's default hard-coded FallbackDirs (if any).
|
2015-12-14 07:23:10 +01:00
|
|
|
(See the **DirAuthority** entry for an explanation of each flag.)
|
2015-11-24 22:53:29 +01:00
|
|
|
|
|
|
|
[[UseDefaultFallbackDirs]] **UseDefaultFallbackDirs** **0**|**1**::
|
|
|
|
Use Tor's default hard-coded FallbackDirs (if any). (When a
|
|
|
|
FallbackDir line is present, it replaces the hard-coded FallbackDirs,
|
|
|
|
regardless of the value of UseDefaultFallbackDirs.) (Default: 1)
|
2012-09-11 00:13:28 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DirAuthority]] **DirAuthority** [__nickname__] [**flags**] __address__:__port__ __fingerprint__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Use a nonstandard authoritative directory server at the provided address
|
|
|
|
and port, with the specified key fingerprint. This option can be repeated
|
|
|
|
many times, for multiple authoritative directory servers. Flags are
|
|
|
|
separated by spaces, and determine what kind of an authority this directory
|
2014-02-12 10:01:59 +01:00
|
|
|
is. By default, an authority is not authoritative for any directory style
|
2014-03-17 17:38:22 +01:00
|
|
|
or version unless an appropriate flag is given.
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor will use this authority as a bridge authoritative directory if the
|
|
|
|
"bridge" flag is set. If a flag "orport=**port**" is given, Tor will use the
|
2012-09-12 19:30:09 +02:00
|
|
|
given port when opening encrypted tunnels to the dirserver. If a flag
|
|
|
|
"weight=**num**" is given, then the directory server is chosen randomly
|
2013-02-22 22:10:40 +01:00
|
|
|
with probability proportional to that weight (default 1.0). If a
|
2010-01-19 14:53:38 +01:00
|
|
|
flag "v3ident=**fp**" is given, the dirserver is a v3 directory authority
|
2013-02-22 22:10:40 +01:00
|
|
|
whose v3 long-term signing key has the fingerprint **fp**. Lastly,
|
|
|
|
if an "ipv6=__address__:__orport__" flag is present, then the directory
|
|
|
|
authority is listening for IPv6 connections on the indicated IPv6 address
|
|
|
|
and OR Port. +
|
2015-12-14 07:23:10 +01:00
|
|
|
+
|
|
|
|
Tor will contact the authority at __address__:__port__ (the DirPort) to
|
|
|
|
download directory documents. If an IPv6 address is supplied, Tor will
|
|
|
|
also download directory documents at the IPv6 address on the DirPort. +
|
2010-01-19 14:53:38 +01:00
|
|
|
+
|
2012-09-10 21:54:16 +02:00
|
|
|
If no **DirAuthority** line is given, Tor will use the default directory
|
|
|
|
authorities. NOTE: this option is intended for setting up a private Tor
|
2010-01-19 14:53:38 +01:00
|
|
|
network with its own directory authorities. If you use it, you will be
|
|
|
|
distinguishable from other users, because you won't believe the same
|
|
|
|
authorities they do.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DirAuthorityFallbackRate]] **DirAuthorityFallbackRate** __NUM__::
|
2012-09-12 19:56:36 +02:00
|
|
|
When configured to use both directory authorities and fallback
|
|
|
|
directories, the directory authorities also work as fallbacks. They are
|
|
|
|
chosen with their regular weights, multiplied by this number, which
|
|
|
|
should be 1.0 or less. (Default: 1.0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AlternateDirAuthority]] **AlternateDirAuthority** [__nickname__] [**flags**] __address__:__port__ __fingerprint__ +
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AlternateBridgeAuthority]] **AlternateBridgeAuthority** [__nickname__] [**flags**] __address__:__port__ __ fingerprint__::
|
2012-09-10 21:54:16 +02:00
|
|
|
These options behave as DirAuthority, but they replace fewer of the
|
2012-07-16 17:21:20 +02:00
|
|
|
default directory authorities. Using
|
2010-01-19 14:53:38 +01:00
|
|
|
AlternateDirAuthority replaces the default Tor directory authorities, but
|
2014-02-11 04:41:52 +01:00
|
|
|
leaves the default bridge authorities in
|
|
|
|
place. Similarly,
|
2012-07-16 17:21:20 +02:00
|
|
|
AlternateBridgeAuthority replaces the default bridge authority,
|
2014-02-11 04:41:52 +01:00
|
|
|
but leaves the directory authorities alone.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DisableAllSwap]] **DisableAllSwap** **0**|**1**::
|
2010-01-19 15:06:40 +01:00
|
|
|
If set to 1, Tor will attempt to lock all current and future memory pages,
|
|
|
|
so that memory cannot be paged out. Windows, OS X and Solaris are currently
|
|
|
|
not supported. We believe that this feature works on modern Gnu/Linux
|
|
|
|
distributions, and that it should work on *BSD systems (untested). This
|
|
|
|
option requires that you start your Tor as root, and you should use the
|
2017-01-03 04:51:46 +01:00
|
|
|
**User** option to properly reduce Tor's privileges.
|
|
|
|
Can not be changed while tor is running. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DisableDebuggerAttachment]] **DisableDebuggerAttachment** **0**|**1**::
|
2011-05-30 17:06:51 +02:00
|
|
|
If set to 1, Tor will attempt to prevent basic debugging attachment attempts
|
2013-09-19 18:14:07 +02:00
|
|
|
by other processes. This may also keep Tor from generating core files if
|
|
|
|
it crashes. It has no impact for users who wish to attach if they
|
2011-05-30 17:06:51 +02:00
|
|
|
have CAP_SYS_PTRACE or if they are root. We believe that this feature
|
|
|
|
works on modern Gnu/Linux distributions, and that it may also work on *BSD
|
|
|
|
systems (untested). Some modern Gnu/Linux systems such as Ubuntu have the
|
|
|
|
kernel.yama.ptrace_scope sysctl and by default enable it as an attempt to
|
|
|
|
limit the PTRACE scope for all user processes by default. This feature will
|
|
|
|
attempt to limit the PTRACE scope for Tor specifically - it will not attempt
|
|
|
|
to alter the system wide ptrace scope as it may not even exist. If you wish
|
|
|
|
to attach to Tor with a debugger such as gdb or strace you will want to set
|
|
|
|
this to 0 for the duration of your debugging. Normal users should leave it
|
2011-12-08 09:19:09 +01:00
|
|
|
on. Disabling this option while Tor is running is prohibited. (Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[FetchDirInfoEarly]] **FetchDirInfoEarly** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set to 1, Tor will always fetch directory information like other
|
|
|
|
directory caches, even if you don't meet the normal criteria for fetching
|
|
|
|
early. Normal users should leave it off. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[FetchDirInfoExtraEarly]] **FetchDirInfoExtraEarly** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set to 1, Tor will fetch directory information before other directory
|
|
|
|
caches. It will attempt to download directory information closer to the
|
|
|
|
start of the consensus period. Normal users should leave it off.
|
|
|
|
(Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[FetchHidServDescriptors]] **FetchHidServDescriptors** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set to 0, Tor will never fetch any hidden service descriptors from the
|
|
|
|
rendezvous directories. This option is only useful if you're using a Tor
|
|
|
|
controller that handles hidden service fetches for you. (Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[FetchServerDescriptors]] **FetchServerDescriptors** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set to 0, Tor will never fetch any network status summaries or server
|
|
|
|
descriptors from the directory servers. This option is only useful if
|
|
|
|
you're using a Tor controller that handles directory fetches for you.
|
|
|
|
(Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[FetchUselessDescriptors]] **FetchUselessDescriptors** **0**|**1**::
|
2016-11-30 01:18:38 +01:00
|
|
|
If set to 1, Tor will fetch every consensus flavor, descriptor, and
|
|
|
|
certificate that it hears about. Otherwise, it will avoid fetching useless
|
|
|
|
descriptors: flavors that it is not using to build circuits, and authority
|
|
|
|
certificates it does not trust. This option is useful if you're using a
|
|
|
|
tor client with an external parser that uses a full consensus.
|
|
|
|
This option fetches all documents, **DirCache** fetches and serves
|
|
|
|
all documents. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HTTPProxy]] **HTTPProxy** __host__[:__port__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor will make all its directory requests through this host:port (or host:80
|
|
|
|
if port is not specified), rather than connecting directly to any directory
|
|
|
|
servers.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HTTPProxyAuthenticator]] **HTTPProxyAuthenticator** __username:password__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If defined, Tor will use this username:password for Basic HTTP proxy
|
|
|
|
authentication, as in RFC 2617. This is currently the only form of HTTP
|
|
|
|
proxy authentication that Tor supports; feel free to submit a patch if you
|
|
|
|
want it to support others.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HTTPSProxy]] **HTTPSProxy** __host__[:__port__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor will make all its OR (SSL) connections through this host:port (or
|
|
|
|
host:443 if port is not specified), via HTTP CONNECT rather than connecting
|
|
|
|
directly to servers. You may want to set **FascistFirewall** to restrict
|
|
|
|
the set of ports you might try to connect to, if your HTTPS proxy only
|
|
|
|
allows connecting to certain ports.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HTTPSProxyAuthenticator]] **HTTPSProxyAuthenticator** __username:password__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If defined, Tor will use this username:password for Basic HTTPS proxy
|
|
|
|
authentication, as in RFC 2617. This is currently the only form of HTTPS
|
|
|
|
proxy authentication that Tor supports; feel free to submit a patch if you
|
|
|
|
want it to support others.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Sandbox]] **Sandbox** **0**|**1**::
|
2013-06-17 12:07:14 +02:00
|
|
|
If set to 1, Tor will run securely through the use of a syscall sandbox.
|
2013-11-07 20:52:29 +01:00
|
|
|
Otherwise the sandbox will be disabled. The option is currently an
|
2017-01-03 04:51:46 +01:00
|
|
|
experimental feature. Can not be changed while tor is running.
|
|
|
|
|
|
|
|
When the Sandbox is 1, the following options can not be changed when tor
|
|
|
|
is running:
|
|
|
|
Address
|
|
|
|
ConnLimit
|
|
|
|
CookieAuthFile
|
|
|
|
DirPortFrontPage
|
|
|
|
ExtORPortCookieAuthFile
|
|
|
|
Logs
|
|
|
|
ServerDNSResolvConfFile
|
|
|
|
Tor must remain in client or server mode (some changes to ClientOnly and
|
|
|
|
ORPort are not allowed).
|
|
|
|
(Default: 0)
|
2013-06-17 12:07:14 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Socks4Proxy]] **Socks4Proxy** __host__[:__port__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor will make all OR connections through the SOCKS 4 proxy at host:port
|
|
|
|
(or host:1080 if port is not specified).
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Socks5Proxy]] **Socks5Proxy** __host__[:__port__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor will make all OR connections through the SOCKS 5 proxy at host:port
|
|
|
|
(or host:1080 if port is not specified).
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Socks5ProxyUsername]] **Socks5ProxyUsername** __username__ +
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Socks5ProxyPassword]] **Socks5ProxyPassword** __password__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If defined, authenticate to the SOCKS 5 server using username and password
|
|
|
|
in accordance to RFC 1929. Both username and password must be between 1 and
|
|
|
|
255 characters.
|
|
|
|
|
2014-08-11 21:27:04 +02:00
|
|
|
[[SocksSocketsGroupWritable]] **SocksSocketsGroupWritable** **0**|**1**::
|
|
|
|
If this option is set to 0, don't allow the filesystem group to read and
|
|
|
|
write unix sockets (e.g. SocksSocket). If the option is set to 1, make
|
|
|
|
the SocksSocket socket readable and writable by the default GID. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[KeepalivePeriod]] **KeepalivePeriod** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
To keep firewalls from expiring connections, send a padding keepalive cell
|
|
|
|
every NUM seconds on open connections that are in use. If the connection
|
|
|
|
has no open circuits, it will instead be closed after NUM seconds of
|
|
|
|
idleness. (Default: 5 minutes)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Log]] **Log** __minSeverity__[-__maxSeverity__] **stderr**|**stdout**|**syslog**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Send all messages between __minSeverity__ and __maxSeverity__ to the standard
|
|
|
|
output stream, the standard error stream, or to the system log. (The
|
|
|
|
"syslog" value is only supported on Unix.) Recognized severity levels are
|
|
|
|
debug, info, notice, warn, and err. We advise using "notice" in most cases,
|
|
|
|
since anything more verbose may provide sensitive information to an
|
|
|
|
attacker who obtains the logs. If only one severity level is given, all
|
|
|
|
messages of that level or higher will be sent to the listed destination.
|
|
|
|
|
2014-04-28 18:07:57 +02:00
|
|
|
[[Log2]] **Log** __minSeverity__[-__maxSeverity__] **file** __FILENAME__::
|
2010-01-19 14:53:38 +01:00
|
|
|
As above, but send log messages to the listed filename. The
|
|
|
|
"Log" option may appear more than once in a configuration file.
|
|
|
|
Messages are sent to all the logs that match their severity
|
|
|
|
level.
|
|
|
|
|
2014-04-28 18:07:57 +02:00
|
|
|
[[Log3]] **Log** **[**__domain__,...**]**__minSeverity__[-__maxSeverity__] ... **file** __FILENAME__ +
|
2011-01-25 21:02:36 +01:00
|
|
|
|
2014-04-28 18:07:57 +02:00
|
|
|
[[Log4]] **Log** **[**__domain__,...**]**__minSeverity__[-__maxSeverity__] ... **stderr**|**stdout**|**syslog**::
|
2011-01-25 21:02:36 +01:00
|
|
|
As above, but select messages by range of log severity __and__ by a
|
|
|
|
set of "logging domains". Each logging domain corresponds to an area of
|
|
|
|
functionality inside Tor. You can specify any number of severity ranges
|
|
|
|
for a single log statement, each of them prefixed by a comma-separated
|
2011-02-23 00:12:46 +01:00
|
|
|
list of logging domains. You can prefix a domain with $$~$$ to indicate
|
2011-01-25 21:02:36 +01:00
|
|
|
negation, and use * to indicate "all domains". If you specify a severity
|
|
|
|
range without a list of domains, it matches all domains. +
|
|
|
|
+
|
|
|
|
This is an advanced feature which is most useful for debugging one or two
|
|
|
|
of Tor's subsystems at a time. +
|
|
|
|
+
|
|
|
|
The currently recognized domains are: general, crypto, net, config, fs,
|
|
|
|
protocol, mm, http, app, control, circ, rend, bug, dir, dirserv, or, edge,
|
|
|
|
acct, hist, and handshake. Domain names are case-insensitive. +
|
|
|
|
+
|
2011-01-25 21:03:36 +01:00
|
|
|
For example, "`Log [handshake]debug [~net,~mm]info notice stdout`" sends
|
2011-01-25 21:02:36 +01:00
|
|
|
to stdout: all handshake messages of any severity, all info-and-higher
|
|
|
|
messages from domains other than networking and memory management, and all
|
|
|
|
messages of severity notice or higher.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[LogMessageDomains]] **LogMessageDomains** **0**|**1**::
|
2011-01-25 21:53:15 +01:00
|
|
|
If 1, Tor includes message domains with each log message. Every log
|
|
|
|
message currently has at least one domain; most currently have exactly
|
|
|
|
one. This doesn't affect controller log messages. (Default: 0)
|
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[MaxUnparseableDescSizeToLog]] **MaxUnparseableDescSizeToLog** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**::
|
2016-06-25 08:31:40 +02:00
|
|
|
Unparseable descriptors (e.g. for votes, consensuses, routers) are logged
|
|
|
|
in separate files by hash, up to the specified size in total. Note that
|
|
|
|
only files logged during the lifetime of this Tor process count toward the
|
|
|
|
total; this is intended to be used to debug problems without opening live
|
|
|
|
servers to resource exhaustion attacks. (Default: 10 MB)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[OutboundBindAddress]] **OutboundBindAddress** __IP__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Make all outbound connections originate from the IP address specified. This
|
|
|
|
is only useful when you have multiple network interfaces, and you want all
|
2012-09-20 17:09:25 +02:00
|
|
|
of Tor's outgoing connections to use a single one. This option may
|
|
|
|
be used twice, once with an IPv4 address and once with an IPv6 address.
|
|
|
|
This setting will be ignored for connections to the loopback addresses
|
|
|
|
(127.0.0.0/8 and ::1).
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2017-01-27 14:05:29 +01:00
|
|
|
[[OutboundBindAddressOR]] **OutboundBindAddressOR** __IP__::
|
|
|
|
Make all outbound non-exit (=relay and other) connections originate from the IP
|
|
|
|
address specified. This option overrides **OutboundBindAddress** for the same
|
|
|
|
IP version. This option may be used twice, once with an IPv4 address and once
|
|
|
|
with an IPv6 address. This setting will be ignored for connections to the
|
|
|
|
loopback addresses (127.0.0.0/8 and ::1).
|
|
|
|
|
|
|
|
[[OutboundBindAddressExit]] **OutboundBindAddressExit** __IP__::
|
|
|
|
Make all outbound exit connections originate from the IP address specified. This
|
|
|
|
option overrides **OutboundBindAddress** for the same IP version. This option
|
|
|
|
may be used twice, once with an IPv4 address and once with an IPv6 address. This
|
|
|
|
setting will be ignored for connections to the loopback addresses (127.0.0.0/8
|
|
|
|
and ::1).
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PidFile]] **PidFile** __FILE__::
|
2010-01-19 14:53:38 +01:00
|
|
|
On startup, write our PID to FILE. On clean shutdown, remove
|
2017-01-03 04:51:46 +01:00
|
|
|
FILE. Can not be changed while tor is running.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ProtocolWarnings]] **ProtocolWarnings** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If 1, Tor will log with severity \'warn' various cases of other parties not
|
|
|
|
following the Tor specification. Otherwise, they are logged with severity
|
|
|
|
\'info'. (Default: 0)
|
|
|
|
|
2014-03-05 20:35:07 +01:00
|
|
|
[[PredictedPortsRelevanceTime]] **PredictedPortsRelevanceTime** __NUM__::
|
2014-11-09 15:34:34 +01:00
|
|
|
Set how long, after the client has made an anonymized connection to a
|
2014-03-05 20:25:38 +01:00
|
|
|
given port, we will try to make sure that we build circuits to
|
|
|
|
exits that support that port. The maximum value for this option is 1
|
|
|
|
hour. (Default: 1 hour)
|
2013-09-14 22:32:59 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[RunAsDaemon]] **RunAsDaemon** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If 1, Tor forks and daemonizes to the background. This option has no effect
|
|
|
|
on Windows; instead you should use the --service command-line option.
|
2017-01-03 04:51:46 +01:00
|
|
|
Can not be changed while tor is running.
|
2010-01-19 14:53:38 +01:00
|
|
|
(Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[LogTimeGranularity]] **LogTimeGranularity** __NUM__::
|
2010-08-27 08:13:54 +02:00
|
|
|
Set the resolution of timestamps in Tor's logs to NUM milliseconds.
|
|
|
|
NUM must be positive and either a divisor or a multiple of 1 second.
|
2010-11-08 16:37:20 +01:00
|
|
|
Note that this option only controls the granularity written by Tor to
|
|
|
|
a file or console log. Tor does not (for example) "batch up" log
|
|
|
|
messages to affect times logged by a controller, times attached to
|
|
|
|
syslog messages, or the mtime fields on log files. (Default: 1 second)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2014-03-23 17:24:26 +01:00
|
|
|
[[TruncateLogFile]] **TruncateLogFile** **0**|**1**::
|
2014-07-16 14:01:38 +02:00
|
|
|
If 1, Tor will overwrite logs at startup and in response to a HUP signal,
|
|
|
|
instead of appending to them. (Default: 0)
|
2014-03-23 17:24:26 +01:00
|
|
|
|
2015-09-30 17:54:56 +02:00
|
|
|
[[SyslogIdentityTag]] **SyslogIdentityTag** __tag__::
|
|
|
|
When logging to syslog, adds a tag to the syslog identity such that
|
2017-01-03 04:51:46 +01:00
|
|
|
log entries are marked with "Tor-__tag__". Can not be changed while tor is
|
|
|
|
running. (Default: none)
|
2015-09-30 17:54:56 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SafeLogging]] **SafeLogging** **0**|**1**|**relay**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor can scrub potentially sensitive strings from log messages (e.g.
|
|
|
|
addresses) by replacing them with the string [scrubbed]. This way logs can
|
|
|
|
still be useful, but they don't leave behind personally identifying
|
|
|
|
information about what sites a user might have visited. +
|
|
|
|
+
|
|
|
|
If this option is set to 0, Tor will not perform any scrubbing, if it is
|
|
|
|
set to 1, all potentially sensitive strings are replaced. If it is set to
|
|
|
|
relay, all log messages generated when acting as a relay are sanitized, but
|
|
|
|
all messages generated when acting as a client are not. (Default: 1)
|
|
|
|
|
2016-09-06 17:37:59 +02:00
|
|
|
[[User]] **User** __Username__::
|
2010-01-19 14:53:38 +01:00
|
|
|
On startup, setuid to this user and setgid to their primary group.
|
2017-01-03 04:51:46 +01:00
|
|
|
Can not be changed while tor is running.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2015-11-26 17:03:35 +01:00
|
|
|
[[KeepBindCapabilities]] **KeepBindCapabilities** **0**|**1**|**auto**::
|
2015-11-06 19:12:44 +01:00
|
|
|
On Linux, when we are started as root and we switch our identity using
|
2015-11-26 17:03:35 +01:00
|
|
|
the **User** option, the **KeepBindCapabilities** option tells us whether to
|
2015-11-06 19:12:44 +01:00
|
|
|
try to retain our ability to bind to low ports. If this value is 1, we
|
|
|
|
try to keep the capability; if it is 0 we do not; and if it is **auto**,
|
|
|
|
we keep the capability only if we are configured to listen on a low port.
|
2017-01-03 04:51:46 +01:00
|
|
|
Can not be changed while tor is running.
|
2015-11-06 19:12:44 +01:00
|
|
|
(Default: auto.)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HardwareAccel]] **HardwareAccel** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If non-zero, try to use built-in (static) crypto hardware acceleration when
|
2017-01-03 04:51:46 +01:00
|
|
|
available. Can not be changed while tor is running. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AccelName]] **AccelName** __NAME__::
|
2010-01-19 14:53:38 +01:00
|
|
|
When using OpenSSL hardware crypto acceleration attempt to load the dynamic
|
|
|
|
engine of this name. This must be used for any dynamic hardware engine.
|
2017-01-03 04:51:46 +01:00
|
|
|
Names can be verified with the openssl engine command. Can not be changed
|
|
|
|
while tor is running.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AccelDir]] **AccelDir** __DIR__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Specify this option if using dynamic hardware acceleration and the engine
|
|
|
|
implementation library resides somewhere other than the OpenSSL default.
|
2017-01-03 04:51:46 +01:00
|
|
|
Can not be changed while tor is running.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AvoidDiskWrites]] **AvoidDiskWrites** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If non-zero, try to write to disk less frequently than we would otherwise.
|
|
|
|
This is useful when running on flash memory or other media that support
|
|
|
|
only a limited number of writes. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CircuitPriorityHalflife]] **CircuitPriorityHalflife** __NUM1__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If this value is set, we override the default algorithm for choosing which
|
|
|
|
circuit's cell to deliver or relay next. When the value is 0, we
|
|
|
|
round-robin between the active circuits on a connection, delivering one
|
|
|
|
cell from each in turn. When the value is positive, we prefer delivering
|
|
|
|
cells from whichever connection has the lowest weighted cell count, where
|
|
|
|
cells are weighted exponentially according to the supplied
|
|
|
|
CircuitPriorityHalflife value (in seconds). If this option is not set at
|
|
|
|
all, we use the behavior recommended in the current consensus
|
|
|
|
networkstatus. This is an advanced option; you generally shouldn't have
|
2012-06-11 15:48:46 +02:00
|
|
|
to mess with it. (Default: not set)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CountPrivateBandwidth]] **CountPrivateBandwidth** **0**|**1**::
|
2011-04-05 21:01:19 +02:00
|
|
|
If this option is set, then Tor's rate-limiting applies not only to
|
|
|
|
remote connections, but also to connections to private addresses like
|
|
|
|
127.0.0.1 or 10.0.0.1. This is mostly useful for debugging
|
|
|
|
rate-limiting. (Default: 0)
|
|
|
|
|
2016-10-28 17:15:21 +02:00
|
|
|
[[ExtendByEd25519ID]] **ExtendByEd25519ID** **0**|**1**|**auto**::
|
|
|
|
If this option is set to 1, we always try to include a relay's Ed25519 ID
|
|
|
|
when telling the proceeding relay in a circuit to extend to it.
|
|
|
|
If this option is set to 0, we never include Ed25519 IDs when extending
|
|
|
|
circuits. If the option is set to "default", we obey a
|
|
|
|
parameter in the consensus document. (Default: auto)
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
CLIENT OPTIONS
|
|
|
|
--------------
|
|
|
|
|
|
|
|
The following options are useful only for clients (that is, if
|
2014-04-28 18:25:20 +02:00
|
|
|
**SocksPort**, **TransPort**, **DNSPort**, or **NATDPort** is non-zero):
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AllowInvalidNodes]] **AllowInvalidNodes** **entry**|**exit**|**middle**|**introduction**|**rendezvous**|**...**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If some Tor servers are obviously not working right, the directory
|
|
|
|
authorities can manually mark them as invalid, meaning that it's not
|
|
|
|
recommended you use them for entry or exit positions in your circuits. You
|
|
|
|
can opt to use them in some circuit positions, though. The default is
|
|
|
|
"middle,rendezvous", and other choices are not advised.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExcludeSingleHopRelays]] **ExcludeSingleHopRelays** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
This option controls whether circuits built by Tor will include relays with
|
|
|
|
the AllowSingleHopExits flag set to true. If ExcludeSingleHopRelays is set
|
|
|
|
to 0, these relays will be included. Note that these relays might be at
|
2010-11-15 20:09:32 +01:00
|
|
|
higher risk of being seized or observed, so they are not normally
|
|
|
|
included. Also note that relatively few clients turn off this option,
|
|
|
|
so using these relays might make your client stand out.
|
2010-01-19 14:53:38 +01:00
|
|
|
(Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Bridge]] **Bridge** [__transport__] __IP__:__ORPort__ [__fingerprint__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
When set along with UseBridges, instructs Tor to use the relay at
|
|
|
|
"IP:ORPort" as a "bridge" relaying into the Tor network. If "fingerprint"
|
2013-11-10 18:21:23 +01:00
|
|
|
is provided (using the same format as for DirAuthority), we will verify that
|
2010-01-19 14:53:38 +01:00
|
|
|
the relay running at that location has the right fingerprint. We also use
|
|
|
|
fingerprint to look up the bridge descriptor at the bridge authority, if
|
2011-11-06 00:50:22 +01:00
|
|
|
it's provided and if UpdateBridgesFromAuthority is set too. +
|
|
|
|
+
|
2016-03-23 03:37:35 +01:00
|
|
|
If "transport" is provided, it must match a ClientTransportPlugin line. We
|
|
|
|
then use that pluggable transport's proxy to transfer data to the bridge,
|
|
|
|
rather than connecting to the bridge directly. Some transports use a
|
|
|
|
transport-specific method to work out the remote address to connect to.
|
|
|
|
These transports typically ignore the "IP:ORPort" specified in the bridge
|
|
|
|
line.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[LearnCircuitBuildTimeout]] **LearnCircuitBuildTimeout** **0**|**1**::
|
2010-05-08 20:54:29 +02:00
|
|
|
If 0, CircuitBuildTimeout adaptive learning is disabled. (Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CircuitBuildTimeout]] **CircuitBuildTimeout** __NUM__::
|
2010-05-08 20:54:29 +02:00
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
Try for at most NUM seconds when building circuits. If the circuit isn't
|
2010-05-08 20:54:29 +02:00
|
|
|
open in that time, give up on it. If LearnCircuitBuildTimeout is 1, this
|
|
|
|
value serves as the initial value to use before a timeout is learned. If
|
|
|
|
LearnCircuitBuildTimeout is 0, this value is the only value used.
|
2012-06-11 15:48:46 +02:00
|
|
|
(Default: 60 seconds)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CircuitIdleTimeout]] **CircuitIdleTimeout** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If we have kept a clean (never used) circuit around for NUM seconds, then
|
|
|
|
close it. This way when the Tor client is entirely idle, it can expire all
|
|
|
|
of its circuits, and then expire its TLS connections. Also, if we end up
|
|
|
|
making a circuit that is not useful for exiting any of the requests we're
|
|
|
|
receiving, it won't forever take up a slot in the circuit list. (Default: 1
|
2012-06-11 15:48:46 +02:00
|
|
|
hour)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CircuitStreamTimeout]] **CircuitStreamTimeout** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If non-zero, this option overrides our internal timeout schedule for how
|
|
|
|
many seconds until we detach a stream from a circuit and try a new circuit.
|
|
|
|
If your network is particularly slow, you might want to set this to a
|
|
|
|
number like 60. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ClientOnly]] **ClientOnly** **0**|**1**::
|
2014-03-13 15:35:52 +01:00
|
|
|
If set to 1, Tor will not run as a relay or serve
|
|
|
|
directory requests, even if the ORPort, ExtORPort, or DirPort options are
|
|
|
|
set. (This config option is
|
|
|
|
mostly unnecessary: we added it back when we were considering having
|
|
|
|
Tor clients auto-promote themselves to being relays if they were stable
|
|
|
|
and fast enough. The current behavior is simply that Tor is a client
|
|
|
|
unless ORPort, ExtORPort, or DirPort are configured.) (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExcludeNodes]] **ExcludeNodes** __node__,__node__,__...__::
|
2014-11-06 17:10:58 +01:00
|
|
|
A list of identity fingerprints, country codes, and address
|
2016-03-23 22:49:55 +01:00
|
|
|
patterns of nodes to avoid when building a circuit. Country codes are
|
2016-03-26 07:07:48 +01:00
|
|
|
2-letter ISO3166 codes, and must
|
2014-11-06 17:10:58 +01:00
|
|
|
be wrapped in braces; fingerprints may be preceded by a dollar sign.
|
2011-03-11 00:25:51 +01:00
|
|
|
(Example:
|
2014-11-06 17:10:58 +01:00
|
|
|
ExcludeNodes ABCD1234CDEF5678ABCD1234CDEF5678ABCD1234, \{cc}, 255.254.0.0/8) +
|
2011-07-06 10:38:01 +02:00
|
|
|
+
|
2011-03-11 00:25:51 +01:00
|
|
|
By default, this option is treated as a preference that Tor is allowed
|
|
|
|
to override in order to keep working.
|
|
|
|
For example, if you try to connect to a hidden service,
|
|
|
|
but you have excluded all of the hidden service's introduction points,
|
|
|
|
Tor will connect to one of them anyway. If you do not want this
|
|
|
|
behavior, set the StrictNodes option (documented below). +
|
2011-07-06 10:38:01 +02:00
|
|
|
+
|
2011-03-11 00:25:51 +01:00
|
|
|
Note also that if you are a relay, this (and the other node selection
|
|
|
|
options below) only affects your own circuits that Tor builds for you.
|
|
|
|
Clients can still build circuits through you to any node. Controllers
|
2013-01-30 16:19:41 +01:00
|
|
|
can tell Tor to build circuits through any node. +
|
|
|
|
+
|
|
|
|
Country codes are case-insensitive. The code "\{??}" refers to nodes whose
|
|
|
|
country can't be identified. No country code, including \{??}, works if
|
|
|
|
no GeoIPFile can be loaded. See also the GeoIPExcludeUnknown option below.
|
2011-03-11 00:25:51 +01:00
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExcludeExitNodes]] **ExcludeExitNodes** __node__,__node__,__...__::
|
2014-11-06 17:10:58 +01:00
|
|
|
A list of identity fingerprints, country codes, and address
|
2011-03-11 00:25:51 +01:00
|
|
|
patterns of nodes to never use when picking an exit node---that is, a
|
2017-01-17 21:19:42 +01:00
|
|
|
node that delivers traffic for you *outside* the Tor network. Note that any
|
2010-01-19 14:53:38 +01:00
|
|
|
node listed in ExcludeNodes is automatically considered to be part of this
|
2014-11-06 17:10:58 +01:00
|
|
|
list too. See
|
|
|
|
the **ExcludeNodes** option for more information on how to specify
|
|
|
|
nodes. See also the caveats on the "ExitNodes" option below.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[GeoIPExcludeUnknown]] **GeoIPExcludeUnknown** **0**|**1**|**auto**::
|
2013-01-18 00:07:36 +01:00
|
|
|
If this option is set to 'auto', then whenever any country code is set in
|
2013-04-14 00:27:08 +02:00
|
|
|
ExcludeNodes or ExcludeExitNodes, all nodes with unknown country (\{??} and
|
2013-01-30 16:19:41 +01:00
|
|
|
possibly \{A1}) are treated as excluded as well. If this option is set to
|
2013-01-18 00:07:36 +01:00
|
|
|
'1', then all unknown countries are treated as excluded in ExcludeNodes
|
2013-04-14 00:27:08 +02:00
|
|
|
and ExcludeExitNodes. This option has no effect when a GeoIP file isn't
|
2013-01-18 00:07:36 +01:00
|
|
|
configured or can't be found. (Default: auto)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExitNodes]] **ExitNodes** __node__,__node__,__...__::
|
2014-11-06 17:10:58 +01:00
|
|
|
A list of identity fingerprints, country codes, and address
|
2011-03-11 00:25:51 +01:00
|
|
|
patterns of nodes to use as exit node---that is, a
|
2017-01-17 21:19:42 +01:00
|
|
|
node that delivers traffic for you *outside* the Tor network. See
|
2014-11-06 17:10:58 +01:00
|
|
|
the **ExcludeNodes** option for more information on how to specify nodes. +
|
2011-07-06 10:38:01 +02:00
|
|
|
+
|
2011-03-11 00:25:51 +01:00
|
|
|
Note that if you list too few nodes here, or if you exclude too many exit
|
|
|
|
nodes with ExcludeExitNodes, you can degrade functionality. For example,
|
|
|
|
if none of the exits you list allows traffic on port 80 or 443, you won't
|
|
|
|
be able to browse the web. +
|
2011-07-06 10:38:01 +02:00
|
|
|
+
|
2017-01-17 21:19:42 +01:00
|
|
|
Note also that not every circuit is used to deliver traffic *outside* of
|
2011-03-11 00:25:51 +01:00
|
|
|
the Tor network. It is normal to see non-exit circuits (such as those
|
|
|
|
used to connect to hidden services, those that do directory fetches,
|
2011-04-27 20:04:50 +02:00
|
|
|
those used for relay reachability self-tests, and so on) that end
|
|
|
|
at a non-exit node. To
|
2011-03-11 00:25:51 +01:00
|
|
|
keep a node from being used entirely, see ExcludeNodes and StrictNodes. +
|
2011-07-06 10:38:01 +02:00
|
|
|
+
|
2011-03-11 00:25:51 +01:00
|
|
|
The ExcludeNodes option overrides this option: any node listed in both
|
|
|
|
ExitNodes and ExcludeNodes is treated as excluded. +
|
2011-07-06 10:38:01 +02:00
|
|
|
+
|
2011-04-27 20:04:50 +02:00
|
|
|
The .exit address notation, if enabled via AllowDotExit, overrides
|
|
|
|
this option.
|
2011-03-11 00:25:51 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[EntryNodes]] **EntryNodes** __node__,__node__,__...__::
|
2014-11-06 17:10:58 +01:00
|
|
|
A list of identity fingerprints and country codes of nodes
|
2011-04-27 20:36:30 +02:00
|
|
|
to use for the first hop in your normal circuits.
|
2011-04-27 21:20:01 +02:00
|
|
|
Normal circuits include all
|
2011-03-11 00:25:51 +01:00
|
|
|
circuits except for direct connections to directory servers. The Bridge
|
|
|
|
option overrides this option; if you have configured bridges and
|
|
|
|
UseBridges is 1, the Bridges are used as your entry nodes. +
|
2011-07-06 10:38:01 +02:00
|
|
|
+
|
2011-03-11 00:25:51 +01:00
|
|
|
The ExcludeNodes option overrides this option: any node listed in both
|
2014-11-06 17:10:58 +01:00
|
|
|
EntryNodes and ExcludeNodes is treated as excluded. See
|
|
|
|
the **ExcludeNodes** option for more information on how to specify nodes.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[StrictNodes]] **StrictNodes** **0**|**1**::
|
2017-01-17 21:19:42 +01:00
|
|
|
If StrictNodes is set to 1, Tor will treat solely the ExcludeNodes option
|
|
|
|
as a requirement to follow for all the circuits you generate, even if
|
|
|
|
doing so will break functionality for you (StrictNodes applies to neither
|
|
|
|
ExcludeExitNodes nor to ExitNodes). If StrictNodes is set to 0, Tor will
|
2011-03-11 00:25:51 +01:00
|
|
|
still try to avoid nodes in the ExcludeNodes list, but it will err on the
|
2017-01-17 21:19:42 +01:00
|
|
|
side of avoiding unexpected errors. Specifically, StrictNodes 0 tells Tor
|
|
|
|
that it is okay to use an excluded node when it is *necessary* to perform
|
|
|
|
relay reachability self-tests, connect to a hidden service, provide a
|
|
|
|
hidden service to a client, fulfill a .exit request, upload directory
|
|
|
|
information, or download directory information. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[FascistFirewall]] **FascistFirewall** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If 1, Tor will only create outgoing connections to ORs running on ports
|
|
|
|
that your firewall allows (defaults to 80 and 443; see **FirewallPorts**).
|
|
|
|
This will allow you to run Tor as a client behind a firewall with
|
|
|
|
restrictive policies, but will not allow you to run as a server behind such
|
|
|
|
a firewall. If you prefer more fine-grained control, use
|
|
|
|
ReachableAddresses instead.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[FirewallPorts]] **FirewallPorts** __PORTS__::
|
2010-01-19 14:53:38 +01:00
|
|
|
A list of ports that your firewall allows you to connect to. Only used when
|
|
|
|
**FascistFirewall** is set. This option is deprecated; use ReachableAddresses
|
|
|
|
instead. (Default: 80, 443)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ReachableAddresses]] **ReachableAddresses** __ADDR__[/__MASK__][:__PORT__]...::
|
2010-01-19 14:53:38 +01:00
|
|
|
A comma-separated list of IP addresses and ports that your firewall allows
|
|
|
|
you to connect to. The format is as for the addresses in ExitPolicy, except
|
|
|
|
that "accept" is understood unless "reject" is explicitly provided. For
|
|
|
|
example, \'ReachableAddresses 99.0.0.0/8, reject 18.0.0.0/8:80, accept
|
|
|
|
\*:80' means that your firewall allows connections to everything inside net
|
|
|
|
99, rejects port 80 connections to net 18, and accepts connections to port
|
|
|
|
80 otherwise. (Default: \'accept \*:*'.)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ReachableDirAddresses]] **ReachableDirAddresses** __ADDR__[/__MASK__][:__PORT__]...::
|
2010-01-19 14:53:38 +01:00
|
|
|
Like **ReachableAddresses**, a list of addresses and ports. Tor will obey
|
|
|
|
these restrictions when fetching directory information, using standard HTTP
|
|
|
|
GET requests. If not set explicitly then the value of
|
|
|
|
**ReachableAddresses** is used. If **HTTPProxy** is set then these
|
|
|
|
connections will go through that proxy.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ReachableORAddresses]] **ReachableORAddresses** __ADDR__[/__MASK__][:__PORT__]...::
|
2010-01-19 14:53:38 +01:00
|
|
|
Like **ReachableAddresses**, a list of addresses and ports. Tor will obey
|
|
|
|
these restrictions when connecting to Onion Routers, using TLS/SSL. If not
|
|
|
|
set explicitly then the value of **ReachableAddresses** is used. If
|
|
|
|
**HTTPSProxy** is set then these connections will go through that proxy. +
|
|
|
|
+
|
|
|
|
The separation between **ReachableORAddresses** and
|
|
|
|
**ReachableDirAddresses** is only interesting when you are connecting
|
|
|
|
through proxies (see **HTTPProxy** and **HTTPSProxy**). Most proxies limit
|
|
|
|
TLS connections (which Tor uses to connect to Onion Routers) to port 443,
|
|
|
|
and some limit HTTP GET requests (which Tor uses for fetching directory
|
|
|
|
information) to port 80.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HidServAuth]] **HidServAuth** __onion-address__ __auth-cookie__ [__service-name__]::
|
2011-12-24 10:28:35 +01:00
|
|
|
Client authorization for a hidden service. Valid onion addresses contain 16
|
|
|
|
characters in a-z2-7 plus ".onion", and valid auth cookies contain 22
|
|
|
|
characters in A-Za-z0-9+/. The service name is only used for internal
|
|
|
|
purposes, e.g., for Tor controllers. This option may be used multiple times
|
|
|
|
for different hidden services. If a hidden service uses authorization and
|
|
|
|
this option is not set, the hidden service is not accessible. Hidden
|
2012-09-19 14:18:19 +02:00
|
|
|
services can be configured to require authorization using the
|
2011-12-24 10:28:35 +01:00
|
|
|
**HiddenServiceAuthorizeClient** option.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CloseHSClientCircuitsImmediatelyOnTimeout]] **CloseHSClientCircuitsImmediatelyOnTimeout** **0**|**1**::
|
2011-12-24 09:46:37 +01:00
|
|
|
If 1, Tor will close unfinished hidden service client circuits
|
|
|
|
which have not moved closer to connecting to their destination
|
|
|
|
hidden service when their internal state has not changed for the
|
|
|
|
duration of the current circuit-build timeout. Otherwise, such
|
|
|
|
circuits will be left open, in the hope that they will finish
|
|
|
|
connecting to their destination hidden services. In either case,
|
|
|
|
another set of introduction and rendezvous circuits for the same
|
|
|
|
destination hidden service will be launched. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CloseHSServiceRendCircuitsImmediatelyOnTimeout]] **CloseHSServiceRendCircuitsImmediatelyOnTimeout** **0**|**1**::
|
2011-12-24 13:55:20 +01:00
|
|
|
If 1, Tor will close unfinished hidden-service-side rendezvous
|
|
|
|
circuits after the current circuit-build timeout. Otherwise, such
|
|
|
|
circuits will be left open, in the hope that they will finish
|
|
|
|
connecting to their destinations. In either case, another
|
|
|
|
rendezvous circuit for the same destination client will be
|
|
|
|
launched. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[LongLivedPorts]] **LongLivedPorts** __PORTS__::
|
2010-01-19 14:53:38 +01:00
|
|
|
A list of ports for services that tend to have long-running connections
|
|
|
|
(e.g. chat and interactive shells). Circuits for streams that use these
|
|
|
|
ports will contain only high-uptime nodes, to reduce the chance that a node
|
2012-06-04 03:07:34 +02:00
|
|
|
will go down before the stream is finished. Note that the list is also
|
|
|
|
honored for circuits (both client and service side) involving hidden
|
|
|
|
services whose virtual port is in this list. (Default: 21, 22, 706,
|
|
|
|
1863, 5050, 5190, 5222, 5223, 6523, 6667, 6697, 8300)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[MapAddress]] **MapAddress** __address__ __newaddress__::
|
2011-09-08 18:19:27 +02:00
|
|
|
When a request for address arrives to Tor, it will transform to newaddress
|
2010-01-19 14:53:38 +01:00
|
|
|
before processing it. For example, if you always want connections to
|
2011-09-08 18:19:27 +02:00
|
|
|
www.example.com to exit via __torserver__ (where __torserver__ is the
|
2016-04-27 02:30:59 +02:00
|
|
|
fingerprint of the server), use "MapAddress www.example.com
|
2011-09-08 18:19:27 +02:00
|
|
|
www.example.com.torserver.exit". If the value is prefixed with a
|
|
|
|
"\*.", matches an entire domain. For example, if you
|
|
|
|
always want connections to example.com and any if its subdomains
|
|
|
|
to exit via
|
2016-04-27 02:30:59 +02:00
|
|
|
__torserver__ (where __torserver__ is the fingerprint of the server), use
|
2011-09-08 18:19:27 +02:00
|
|
|
"MapAddress \*.example.com \*.example.com.torserver.exit". (Note the
|
|
|
|
leading "*." in each part of the directive.) You can also redirect all
|
|
|
|
subdomains of a domain to a single address. For example, "MapAddress
|
|
|
|
*.example.com www.example.com". +
|
2010-12-27 18:35:16 +01:00
|
|
|
+
|
|
|
|
NOTES:
|
|
|
|
|
|
|
|
1. When evaluating MapAddress expressions Tor stops when it hits the most
|
|
|
|
recently added expression that matches the requested address. So if you
|
|
|
|
have the following in your torrc, www.torproject.org will map to 1.1.1.1:
|
|
|
|
|
|
|
|
MapAddress www.torproject.org 2.2.2.2
|
|
|
|
MapAddress www.torproject.org 1.1.1.1
|
|
|
|
|
|
|
|
2. Tor evaluates the MapAddress configuration until it finds no matches. So
|
|
|
|
if you have the following in your torrc, www.torproject.org will map to
|
|
|
|
2.2.2.2:
|
|
|
|
|
|
|
|
MapAddress 1.1.1.1 2.2.2.2
|
|
|
|
MapAddress www.torproject.org 1.1.1.1
|
|
|
|
|
|
|
|
3. The following MapAddress expression is invalid (and will be
|
2011-09-08 18:19:27 +02:00
|
|
|
ignored) because you cannot map from a specific address to a wildcard
|
2010-12-27 18:35:16 +01:00
|
|
|
address:
|
|
|
|
|
|
|
|
MapAddress www.torproject.org *.torproject.org.torserver.exit
|
|
|
|
|
2011-09-08 18:19:27 +02:00
|
|
|
4. Using a wildcard to match only part of a string (as in *ample.com) is
|
2010-12-27 18:35:16 +01:00
|
|
|
also invalid.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[NewCircuitPeriod]] **NewCircuitPeriod** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Every NUM seconds consider whether to build a new circuit. (Default: 30
|
|
|
|
seconds)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[MaxCircuitDirtiness]] **MaxCircuitDirtiness** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Feel free to reuse a circuit that was first used at most NUM seconds ago,
|
2012-05-15 17:22:06 +02:00
|
|
|
but never attach a new stream to a circuit that is too old. For hidden
|
|
|
|
services, this applies to the __last__ time a circuit was used, not the
|
2015-09-01 18:30:48 +02:00
|
|
|
first. Circuits with streams constructed with SOCKS authentication via
|
|
|
|
SocksPorts that have **KeepAliveIsolateSOCKSAuth** ignore this value.
|
|
|
|
(Default: 10 minutes)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[MaxClientCircuitsPending]] **MaxClientCircuitsPending** __NUM__::
|
2012-01-17 21:51:32 +01:00
|
|
|
Do not allow more than NUM circuits to be pending at a time for handling
|
|
|
|
client streams. A circuit is pending if we have begun constructing it,
|
|
|
|
but it has not yet been completely constructed. (Default: 32)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[NodeFamily]] **NodeFamily** __node__,__node__,__...__::
|
2014-11-06 17:10:58 +01:00
|
|
|
The Tor servers, defined by their identity fingerprints,
|
2010-01-19 14:53:38 +01:00
|
|
|
constitute a "family" of similar or co-administered servers, so never use
|
|
|
|
any two of them in the same circuit. Defining a NodeFamily is only needed
|
|
|
|
when a server doesn't list the family itself (with MyFamily). This option
|
2014-11-06 17:10:58 +01:00
|
|
|
can be used multiple times; each instance defines a separate family. In
|
|
|
|
addition to nodes, you can also list IP address and ranges and country
|
|
|
|
codes in {curly braces}. See the **ExcludeNodes** option for more
|
|
|
|
information on how to specify nodes.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[EnforceDistinctSubnets]] **EnforceDistinctSubnets** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If 1, Tor will not put two servers whose IP addresses are "too close" on
|
|
|
|
the same circuit. Currently, two addresses are "too close" if they lie in
|
|
|
|
the same /16 range. (Default: 1)
|
|
|
|
|
2015-11-24 02:32:49 +01:00
|
|
|
[[SocksPort]] **SocksPort** \['address':]__port__|**unix:**__path__|**auto** [_flags_] [_isolation flags_]::
|
2011-07-08 22:37:29 +02:00
|
|
|
Open this port to listen for connections from SOCKS-speaking
|
2010-01-19 14:53:38 +01:00
|
|
|
applications. Set this to 0 if you don't want to allow application
|
2011-05-02 21:05:10 +02:00
|
|
|
connections via SOCKS. Set it to "auto" to have Tor pick a port for
|
2011-07-08 22:37:29 +02:00
|
|
|
you. This directive can be specified multiple times to bind
|
2016-10-03 22:32:00 +02:00
|
|
|
to multiple addresses/ports. If a unix domain socket is used, you may
|
|
|
|
quote the path using standard C escape sequences.
|
|
|
|
(Default: 9050) +
|
2015-07-24 10:11:38 +02:00
|
|
|
+
|
|
|
|
NOTE: Although this option allows you to specify an IP address
|
|
|
|
other than localhost, you should do so only with extreme caution.
|
|
|
|
The SOCKS protocol is unencrypted and (as we use it)
|
|
|
|
unauthenticated, so exposing it in this way could leak your
|
|
|
|
information to anybody watching your network, and allow anybody
|
|
|
|
to use your computer as an open proxy. +
|
2011-07-08 22:37:29 +02:00
|
|
|
+
|
|
|
|
The _isolation flags_ arguments give Tor rules for which streams
|
2015-11-24 02:32:49 +01:00
|
|
|
received on this SocksPort are allowed to share circuits with one
|
2011-07-08 22:37:29 +02:00
|
|
|
another. Recognized isolation flags are:
|
|
|
|
**IsolateClientAddr**;;
|
2011-11-04 00:08:25 +01:00
|
|
|
Don't share circuits with streams from a different
|
2016-09-30 20:43:31 +02:00
|
|
|
client address. (On by default and strongly recommended when
|
|
|
|
supported; you can disable it with **NoIsolateClientAddr**.
|
|
|
|
Unsupported and force-disabled when using Unix domain sockets.)
|
2011-07-08 22:37:29 +02:00
|
|
|
**IsolateSOCKSAuth**;;
|
2011-11-04 00:08:25 +01:00
|
|
|
Don't share circuits with streams for which different
|
2011-07-08 22:37:29 +02:00
|
|
|
SOCKS authentication was provided. (On by default;
|
|
|
|
you can disable it with **NoIsolateSOCKSAuth**.)
|
|
|
|
**IsolateClientProtocol**;;
|
|
|
|
Don't share circuits with streams using a different protocol.
|
|
|
|
(SOCKS 4, SOCKS 5, TransPort connections, NATDPort connections,
|
|
|
|
and DNSPort requests are all considered to be different protocols.)
|
|
|
|
**IsolateDestPort**;;
|
2014-10-04 21:41:05 +02:00
|
|
|
Don't share circuits with streams targeting a different
|
2011-07-08 22:37:29 +02:00
|
|
|
destination port.
|
|
|
|
**IsolateDestAddr**;;
|
2014-10-04 21:41:05 +02:00
|
|
|
Don't share circuits with streams targeting a different
|
2011-07-08 22:37:29 +02:00
|
|
|
destination address.
|
2015-09-01 18:30:48 +02:00
|
|
|
**KeepAliveIsolateSOCKSAuth**;;
|
|
|
|
If **IsolateSOCKSAuth** is enabled, keep alive circuits that have
|
|
|
|
streams with SOCKS authentication set indefinitely.
|
2011-07-08 22:37:29 +02:00
|
|
|
**SessionGroup=**__INT__;;
|
|
|
|
If no other isolation rules would prevent it, allow streams
|
|
|
|
on this port to share circuits with streams from every other
|
|
|
|
port with the same session group. (By default, streams received
|
2015-11-24 02:32:49 +01:00
|
|
|
on different SocksPorts, TransPorts, etc are always isolated from one
|
2014-03-25 14:59:19 +01:00
|
|
|
another. This option overrides that behavior.)
|
|
|
|
|
2015-11-24 02:32:49 +01:00
|
|
|
[[OtherSocksPortFlags]]::
|
|
|
|
Other recognized __flags__ for a SocksPort are:
|
2012-11-15 05:35:13 +01:00
|
|
|
**NoIPv4Traffic**;;
|
|
|
|
Tell exits to not connect to IPv4 addresses in response to SOCKS
|
|
|
|
requests on this connection.
|
|
|
|
**IPv6Traffic**;;
|
|
|
|
Tell exits to allow IPv6 addresses in response to SOCKS requests on
|
|
|
|
this connection, so long as SOCKS5 is in use. (SOCKS4 can't handle
|
|
|
|
IPv6.)
|
|
|
|
**PreferIPv6**;;
|
|
|
|
Tells exits that, if a host has both an IPv4 and an IPv6 address,
|
2016-03-31 12:26:41 +02:00
|
|
|
we would prefer to connect to it via IPv6. (IPv4 is the default.)
|
|
|
|
**NoDNSRequest**;;
|
|
|
|
Do not ask exits to resolve DNS addresses in SOCKS5 requests. Tor will
|
|
|
|
connect to IPv4 addresses, IPv6 addresses (if IPv6Traffic is set) and
|
|
|
|
.onion addresses.
|
|
|
|
**NoOnionTraffic**;;
|
|
|
|
Do not connect to .onion addresses in SOCKS5 requests.
|
|
|
|
**OnionTrafficOnly**;;
|
|
|
|
Tell the tor client to only connect to .onion addresses in response to
|
|
|
|
SOCKS5 requests on this connection. This is equivalent to NoDNSRequest,
|
|
|
|
NoIPv4Traffic, NoIPv6Traffic. The corresponding NoOnionTrafficOnly
|
|
|
|
flag is not supported.
|
2012-11-25 21:30:11 +01:00
|
|
|
**CacheIPv4DNS**;;
|
|
|
|
Tells the client to remember IPv4 DNS answers we receive from exit
|
|
|
|
nodes via this connection. (On by default.)
|
|
|
|
**CacheIPv6DNS**;;
|
|
|
|
Tells the client to remember IPv6 DNS answers we receive from exit
|
|
|
|
nodes via this connection.
|
2015-03-11 18:26:14 +01:00
|
|
|
**GroupWritable**;;
|
|
|
|
Unix domain sockets only: makes the socket get created as
|
|
|
|
group-writable.
|
|
|
|
**WorldWritable**;;
|
|
|
|
Unix domain sockets only: makes the socket get created as
|
|
|
|
world-writable.
|
2012-11-25 21:30:11 +01:00
|
|
|
**CacheDNS**;;
|
|
|
|
Tells the client to remember all DNS answers we receive from exit
|
|
|
|
nodes via this connection.
|
|
|
|
**UseIPv4Cache**;;
|
|
|
|
Tells the client to use any cached IPv4 DNS answers we have when making
|
2012-11-25 21:36:35 +01:00
|
|
|
requests via this connection. (NOTE: This option, along UseIPv6Cache
|
|
|
|
and UseDNSCache, can harm your anonymity, and probably
|
|
|
|
won't help performance as much as you might expect. Use with care!)
|
2012-11-25 21:30:11 +01:00
|
|
|
**UseIPv6Cache**;;
|
|
|
|
Tells the client to use any cached IPv6 DNS answers we have when making
|
|
|
|
requests via this connection.
|
|
|
|
**UseDNSCache**;;
|
|
|
|
Tells the client to use any cached DNS answers we have when making
|
|
|
|
requests via this connection.
|
2012-11-25 21:33:07 +01:00
|
|
|
**PreferIPv6Automap**;;
|
|
|
|
When serving a hostname lookup request on this port that
|
2014-10-04 21:41:05 +02:00
|
|
|
should get automapped (according to AutomapHostsOnResolve),
|
2012-11-25 21:33:07 +01:00
|
|
|
if we could return either an IPv4 or an IPv6 answer, prefer
|
|
|
|
an IPv6 answer. (On by default.)
|
2013-03-20 21:17:06 +01:00
|
|
|
**PreferSOCKSNoAuth**;;
|
|
|
|
Ordinarily, when an application offers both "username/password
|
|
|
|
authentication" and "no authentication" to Tor via SOCKS5, Tor
|
|
|
|
selects username/password authentication so that IsolateSOCKSAuth can
|
|
|
|
work. This can confuse some applications, if they offer a
|
|
|
|
username/password combination then get confused when asked for
|
|
|
|
one. You can disable this behavior, so that Tor will select "No
|
|
|
|
authentication" when IsolateSOCKSAuth is disabled, or when this
|
|
|
|
option is set.
|
2011-07-08 22:37:29 +02:00
|
|
|
|
2016-12-04 16:55:57 +01:00
|
|
|
[[SocksPortFlagsMisc]]::
|
2016-03-31 12:26:41 +02:00
|
|
|
Flags are processed left to right. If flags conflict, the last flag on the
|
|
|
|
line is used, and all earlier flags are ignored. No error is issued for
|
|
|
|
conflicting flags.
|
|
|
|
|
2015-11-24 02:32:49 +01:00
|
|
|
[[SocksListenAddress]] **SocksListenAddress** __IP__[:__PORT__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Bind to this address to listen for connections from Socks-speaking
|
|
|
|
applications. (Default: 127.0.0.1) You can also specify a port (e.g.
|
|
|
|
192.168.0.1:9100). This directive can be specified multiple times to bind
|
2011-07-08 22:37:29 +02:00
|
|
|
to multiple addresses/ports. (DEPRECATED: As of 0.2.3.x-alpha, you can
|
2015-11-24 02:32:49 +01:00
|
|
|
now use multiple SocksPort entries, and provide addresses for SocksPort
|
|
|
|
entries, so SocksListenAddress no longer has a purpose. For backward
|
|
|
|
compatibility, SocksListenAddress is only allowed when SocksPort is just
|
2011-07-08 22:37:29 +02:00
|
|
|
a port number.)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SocksPolicy]] **SocksPolicy** __policy__,__policy__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Set an entrance policy for this server, to limit who can connect to the
|
|
|
|
SocksPort and DNSPort ports. The policies have the same form as exit
|
2014-03-06 16:21:59 +01:00
|
|
|
policies below, except that port specifiers are ignored. Any address
|
|
|
|
not matched by some entry in the policy is accepted.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SocksTimeout]] **SocksTimeout** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Let a socks connection wait NUM seconds handshaking, and NUM seconds
|
|
|
|
unattached waiting for an appropriate circuit, before we fail it. (Default:
|
2012-06-11 15:48:46 +02:00
|
|
|
2 minutes)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TokenBucketRefillInterval]] **TokenBucketRefillInterval** __NUM__ [**msec**|**second**]::
|
2011-09-08 02:21:53 +02:00
|
|
|
Set the refill interval of Tor's token bucket to NUM milliseconds.
|
2011-09-08 03:03:08 +02:00
|
|
|
NUM must be between 1 and 1000, inclusive. Note that the configured
|
|
|
|
bandwidth limits are still expressed in bytes per second: this
|
|
|
|
option only affects the frequency with which Tor checks to see whether
|
2017-01-03 04:51:46 +01:00
|
|
|
previously exhausted connections may read again.
|
|
|
|
Can not be changed while tor is running. (Default: 100 msec)
|
2011-09-08 02:21:53 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TrackHostExits]] **TrackHostExits** __host__,__.domain__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
For each value in the comma separated list, Tor will track recent
|
|
|
|
connections to hosts that match this value and attempt to reuse the same
|
|
|
|
exit node for each. If the value is prepended with a \'.\', it is treated as
|
|
|
|
matching an entire domain. If one of the values is just a \'.', it means
|
|
|
|
match everything. This option is useful if you frequently connect to sites
|
|
|
|
that will expire all your authentication cookies (i.e. log you out) if
|
|
|
|
your IP address changes. Note that this option does have the disadvantage
|
|
|
|
of making it more clear that a given history is associated with a single
|
|
|
|
user. However, most people who would wish to observe this will observe it
|
|
|
|
through cookies or other protocol-specific means anyhow.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TrackHostExitsExpire]] **TrackHostExitsExpire** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Since exit servers go up and down, it is desirable to expire the
|
|
|
|
association between host and exit server after NUM seconds. The default is
|
|
|
|
1800 seconds (30 minutes).
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[UpdateBridgesFromAuthority]] **UpdateBridgesFromAuthority** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When set (along with UseBridges), Tor will try to fetch bridge descriptors
|
|
|
|
from the configured bridge authorities when feasible. It will fall back to
|
|
|
|
a direct request if the authority responds with a 404. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[UseBridges]] **UseBridges** **0**|**1**::
|
2011-06-17 22:45:23 +02:00
|
|
|
When set, Tor will fetch descriptors for each bridge listed in the "Bridge"
|
2010-01-19 14:53:38 +01:00
|
|
|
config lines, and use these relays as both entry guards and directory
|
2011-06-17 22:45:23 +02:00
|
|
|
guards. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[UseEntryGuards]] **UseEntryGuards** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If this option is set to 1, we pick a few long-term entry servers, and try
|
|
|
|
to stick with them. This is desirable because constantly changing servers
|
|
|
|
increases the odds that an adversary who owns some servers will observe a
|
2016-09-06 08:22:07 +02:00
|
|
|
fraction of your paths. Entry Guards can not be used by Directory
|
|
|
|
Authorities, Single Onion Services, and Tor2web clients. In these cases,
|
|
|
|
the this option is ignored. (Default: 1)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2015-01-29 15:54:47 +01:00
|
|
|
[[GuardfractionFile]] **GuardfractionFile** __FILENAME__::
|
|
|
|
V3 authoritative directories only. Configures the location of the
|
|
|
|
guardfraction file which contains information about how long relays
|
|
|
|
have been guards. (Default: unset)
|
|
|
|
|
2015-01-29 15:57:00 +01:00
|
|
|
[[UseGuardFraction]] **UseGuardFraction** **0**|**1**|**auto**::
|
|
|
|
This torrc option specifies whether clients should use the
|
|
|
|
guardfraction information found in the consensus during path
|
|
|
|
selection. If it's set to 'auto', clients will do what the
|
2015-02-18 22:37:14 +01:00
|
|
|
UseGuardFraction consensus parameter tells them to do. (Default: auto)
|
2015-01-29 15:57:00 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[NumEntryGuards]] **NumEntryGuards** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If UseEntryGuards is set to 1, we will try to pick a total of NUM routers
|
2014-07-24 18:19:15 +02:00
|
|
|
as long-term entries for our circuits. If NUM is 0, we try to learn
|
|
|
|
the number from the NumEntryGuards consensus parameter, and default
|
|
|
|
to 3 if the consensus parameter isn't set. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[NumDirectoryGuards]] **NumDirectoryGuards** __NUM__::
|
2012-12-26 05:19:10 +01:00
|
|
|
If UseEntryGuardsAsDirectoryGuards is enabled, we try to make sure we
|
2013-07-30 18:05:39 +02:00
|
|
|
have at least NUM routers to use as directory guards. If this option
|
2014-07-24 18:19:15 +02:00
|
|
|
is set to 0, use the value from the NumDirectoryGuards consensus
|
|
|
|
parameter, falling back to the value from NumEntryGuards if the
|
|
|
|
consensus parameter is 0 or isn't set. (Default: 0)
|
2012-12-26 05:19:10 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[GuardLifetime]] **GuardLifetime** __N__ **days**|**weeks**|**months**::
|
2013-02-15 23:24:13 +01:00
|
|
|
If nonzero, and UseEntryGuards is set, minimum time to keep a guard before
|
|
|
|
picking a new one. If zero, we use the GuardLifetime parameter from the
|
2013-03-12 03:16:25 +01:00
|
|
|
consensus directory. No value here may be less than 1 month or greater
|
2013-02-15 23:24:13 +01:00
|
|
|
than 5 years; out-of-range values are clamped. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SafeSocks]] **SafeSocks** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is enabled, Tor will reject application connections that
|
|
|
|
use unsafe variants of the socks protocol -- ones that only provide an IP
|
|
|
|
address, meaning the application is doing a DNS resolve first.
|
|
|
|
Specifically, these are socks4 and socks5 when not doing remote DNS.
|
2012-06-11 15:48:46 +02:00
|
|
|
(Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestSocks]] **TestSocks** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is enabled, Tor will make a notice-level log entry for
|
|
|
|
each connection to the Socks port indicating whether the request used a
|
|
|
|
safe socks protocol or an unsafe one (see above entry on SafeSocks). This
|
|
|
|
helps to determine whether an application using Tor is possibly leaking
|
|
|
|
DNS requests. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[WarnUnsafeSocks]] **WarnUnsafeSocks** **0**|**1**::
|
2010-06-03 12:52:34 +02:00
|
|
|
When this option is enabled, Tor will warn whenever a request is
|
|
|
|
received that only contains an IP address instead of a hostname. Allowing
|
|
|
|
applications to do DNS resolves themselves is usually a bad idea and
|
|
|
|
can leak your location to attackers. (Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[VirtualAddrNetworkIPv4]] **VirtualAddrNetworkIPv4** __Address__/__bits__ +
|
2012-11-23 23:31:53 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[VirtualAddrNetworkIPv6]] **VirtualAddrNetworkIPv6** [__Address__]/__bits__::
|
2011-02-07 18:40:43 +01:00
|
|
|
When Tor needs to assign a virtual (unused) address because of a MAPADDRESS
|
2011-02-07 18:51:20 +01:00
|
|
|
command from the controller or the AutomapHostsOnResolve feature, Tor
|
2012-11-23 23:31:53 +01:00
|
|
|
picks an unassigned address from this range. (Defaults:
|
|
|
|
127.192.0.0/10 and [FE80::]/10 respectively.) +
|
2010-01-19 14:53:38 +01:00
|
|
|
+
|
|
|
|
When providing proxy server service to a network of computers using a tool
|
2012-11-23 23:31:53 +01:00
|
|
|
like dns-proxy-tor, change the IPv4 network to "10.192.0.0/10" or
|
2016-08-13 01:30:41 +02:00
|
|
|
"172.16.0.0/12" and change the IPv6 network to "[FC00::]/7".
|
2012-11-23 23:31:53 +01:00
|
|
|
The default **VirtualAddrNetwork** address ranges on a
|
|
|
|
properly configured machine will route to the loopback or link-local
|
2016-10-03 13:18:51 +02:00
|
|
|
interface. The maximum number of bits for the network prefix is set to 104
|
|
|
|
for IPv6 and 16 for IPv4. However, a wider network - smaller prefix length
|
|
|
|
- is preferable since it reduces the chances for an attacker to guess the
|
|
|
|
used IP. For local use, no change to the default VirtualAddrNetwork setting
|
|
|
|
is needed.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AllowNonRFC953Hostnames]] **AllowNonRFC953Hostnames** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is disabled, Tor blocks hostnames containing illegal
|
|
|
|
characters (like @ and :) rather than sending them to an exit node to be
|
|
|
|
resolved. This helps trap accidental attempts to resolve URLs and so on.
|
|
|
|
(Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AllowDotExit]] **AllowDotExit** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If enabled, we convert "www.google.com.foo.exit" addresses on the
|
2010-10-30 06:08:47 +02:00
|
|
|
SocksPort/TransPort/NATDPort into "www.google.com" addresses that exit from
|
2010-01-19 14:53:38 +01:00
|
|
|
the node "foo". Disabled by default since attacking websites and exit
|
|
|
|
relays can use it to manipulate your path selection. (Default: 0)
|
|
|
|
|
2013-10-31 21:44:14 +01:00
|
|
|
[[FastFirstHopPK]] **FastFirstHopPK** **0**|**1**|**auto**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is disabled, Tor uses the public key step for the first
|
|
|
|
hop of creating circuits. Skipping it is generally safe since we have
|
|
|
|
already used TLS to authenticate the relay and to establish forward-secure
|
2013-10-31 21:44:14 +01:00
|
|
|
keys. Turning this option off makes circuit building a little
|
|
|
|
slower. Setting this option to "auto" takes advice from the authorities
|
|
|
|
in the latest consensus about whether to use this feature. +
|
2010-01-19 14:53:38 +01:00
|
|
|
+
|
|
|
|
Note that Tor will always use the public key step for the first hop if it's
|
|
|
|
operating as a relay, and it will never use the public key step if it
|
2013-10-31 21:44:14 +01:00
|
|
|
doesn't yet know the onion key of the first hop. (Default: auto)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TransPort]] **TransPort** \['address':]__port__|**auto** [_isolation flags_]::
|
2011-07-08 22:37:29 +02:00
|
|
|
Open this port to listen for transparent proxy connections. Set this to
|
|
|
|
0 if you don't want to allow transparent proxy connections. Set the port
|
|
|
|
to "auto" to have Tor pick a port for you. This directive can be
|
2012-09-19 14:18:19 +02:00
|
|
|
specified multiple times to bind to multiple addresses/ports. See
|
2011-07-08 22:37:29 +02:00
|
|
|
SOCKSPort for an explanation of isolation flags. +
|
|
|
|
+
|
|
|
|
TransPort requires OS support for transparent proxies, such as BSDs' pf or
|
2010-01-19 14:53:38 +01:00
|
|
|
Linux's IPTables. If you're planning to use Tor as a transparent proxy for
|
|
|
|
a network, you'll want to examine and change VirtualAddrNetwork from the
|
|
|
|
default setting. You'll also want to set the TransListenAddress option for
|
2012-06-11 15:48:46 +02:00
|
|
|
the network you'd like to proxy. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TransListenAddress]] **TransListenAddress** __IP__[:__PORT__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Bind to this address to listen for transparent proxy connections. (Default:
|
|
|
|
127.0.0.1). This is useful for exporting a transparent proxy server to an
|
2011-07-08 22:37:29 +02:00
|
|
|
entire network. (DEPRECATED: As of 0.2.3.x-alpha, you can
|
|
|
|
now use multiple TransPort entries, and provide addresses for TransPort
|
|
|
|
entries, so TransListenAddress no longer has a purpose. For backward
|
|
|
|
compatibility, TransListenAddress is only allowed when TransPort is just
|
|
|
|
a port number.)
|
|
|
|
|
2014-04-28 18:24:33 +02:00
|
|
|
[[TransProxyType]] **TransProxyType** **default**|**TPROXY**|**ipfw**|**pf-divert**::
|
2014-02-03 19:56:19 +01:00
|
|
|
TransProxyType may only be enabled when there is transparent proxy listener
|
2016-12-04 16:55:57 +01:00
|
|
|
enabled. +
|
2014-01-31 18:59:35 +01:00
|
|
|
+
|
2014-02-10 11:23:51 +01:00
|
|
|
Set this to "TPROXY" if you wish to be able to use the TPROXY Linux module
|
|
|
|
to transparently proxy connections that are configured using the TransPort
|
2014-01-31 18:59:35 +01:00
|
|
|
option. This setting lets the listener on the TransPort accept connections
|
|
|
|
for all addresses, even when the TransListenAddress is configured for an
|
|
|
|
internal address. Detailed information on how to configure the TPROXY
|
2014-02-03 19:56:19 +01:00
|
|
|
feature can be found in the Linux kernel source tree in the file
|
2016-12-04 16:55:57 +01:00
|
|
|
Documentation/networking/tproxy.txt. +
|
2014-02-03 19:56:19 +01:00
|
|
|
+
|
2016-12-04 16:55:57 +01:00
|
|
|
Set this option to "ipfw" to use the FreeBSD ipfw interface. +
|
2014-02-03 20:09:07 +01:00
|
|
|
+
|
2014-02-10 11:23:51 +01:00
|
|
|
On *BSD operating systems when using pf, set this to "pf-divert" to take
|
|
|
|
advantage of +divert-to+ rules, which do not modify the packets like
|
|
|
|
+rdr-to+ rules do. Detailed information on how to configure pf to use
|
|
|
|
+divert-to+ rules can be found in the pf.conf(5) manual page. On OpenBSD,
|
|
|
|
+divert-to+ is available to use on versions greater than or equal to
|
2016-12-04 16:55:57 +01:00
|
|
|
OpenBSD 4.4. +
|
2014-02-10 11:23:51 +01:00
|
|
|
+
|
|
|
|
Set this to "default", or leave it unconfigured, to use regular IPTables
|
2016-12-04 16:55:57 +01:00
|
|
|
on Linux, or to use pf +rdr-to+ rules on *BSD systems. +
|
2014-02-03 19:56:19 +01:00
|
|
|
+
|
|
|
|
(Default: "default".)
|
2014-01-31 18:59:35 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[NATDPort]] **NATDPort** \['address':]__port__|**auto** [_isolation flags_]::
|
2011-07-08 22:37:29 +02:00
|
|
|
Open this port to listen for connections from old versions of ipfw (as
|
|
|
|
included in old versions of FreeBSD, etc) using the NATD protocol.
|
|
|
|
Use 0 if you don't want to allow NATD connections. Set the port
|
|
|
|
to "auto" to have Tor pick a port for you. This directive can be
|
|
|
|
specified multiple times to bind to multiple addresses/ports. See
|
2015-11-24 02:32:49 +01:00
|
|
|
SocksPort for an explanation of isolation flags. +
|
2011-07-08 22:37:29 +02:00
|
|
|
+
|
|
|
|
This option is only for people who cannot use TransPort. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[NATDListenAddress]] **NATDListenAddress** __IP__[:__PORT__]::
|
2011-07-08 22:37:29 +02:00
|
|
|
Bind to this address to listen for NATD connections. (DEPRECATED: As of
|
|
|
|
0.2.3.x-alpha, you can now use multiple NATDPort entries, and provide
|
|
|
|
addresses for NATDPort entries, so NATDListenAddress no longer has a
|
|
|
|
purpose. For backward compatibility, NATDListenAddress is only allowed
|
|
|
|
when NATDPort is just a port number.)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AutomapHostsOnResolve]] **AutomapHostsOnResolve** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is enabled, and we get a request to resolve an address
|
|
|
|
that ends with one of the suffixes in **AutomapHostsSuffixes**, we map an
|
2012-09-19 14:18:19 +02:00
|
|
|
unused virtual address to that address, and return the new virtual address.
|
2010-01-19 14:53:38 +01:00
|
|
|
This is handy for making ".onion" addresses work with applications that
|
2012-06-11 15:48:46 +02:00
|
|
|
resolve an address and then connect to it. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AutomapHostsSuffixes]] **AutomapHostsSuffixes** __SUFFIX__,__SUFFIX__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
A comma-separated list of suffixes to use with **AutomapHostsOnResolve**.
|
|
|
|
The "." suffix is equivalent to "all addresses." (Default: .exit,.onion).
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DNSPort]] **DNSPort** \['address':]__port__|**auto** [_isolation flags_]::
|
2011-07-08 22:37:29 +02:00
|
|
|
If non-zero, open this port to listen for UDP DNS requests, and resolve
|
2013-02-19 08:47:44 +01:00
|
|
|
them anonymously. This port only handles A, AAAA, and PTR requests---it
|
|
|
|
doesn't handle arbitrary DNS request types. Set the port to "auto" to
|
|
|
|
have Tor pick a port for
|
2011-07-08 22:37:29 +02:00
|
|
|
you. This directive can be specified multiple times to bind to multiple
|
2015-11-24 02:32:49 +01:00
|
|
|
addresses/ports. See SocksPort for an explanation of isolation
|
2012-06-11 15:48:46 +02:00
|
|
|
flags. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DNSListenAddress]] **DNSListenAddress** __IP__[:__PORT__]::
|
2011-07-08 22:37:29 +02:00
|
|
|
Bind to this address to listen for DNS connections. (DEPRECATED: As of
|
|
|
|
0.2.3.x-alpha, you can now use multiple DNSPort entries, and provide
|
|
|
|
addresses for DNSPort entries, so DNSListenAddress no longer has a
|
|
|
|
purpose. For backward compatibility, DNSListenAddress is only allowed
|
|
|
|
when DNSPort is just a port number.)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ClientDNSRejectInternalAddresses]] **ClientDNSRejectInternalAddresses** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If true, Tor does not believe any anonymously retrieved DNS answer that
|
|
|
|
tells it that an address resolves to an internal address (like 127.0.0.1 or
|
|
|
|
192.168.0.1). This option prevents certain browser-based attacks; don't
|
2012-06-11 15:48:46 +02:00
|
|
|
turn it off unless you know what you're doing. (Default: 1)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ClientRejectInternalAddresses]] **ClientRejectInternalAddresses** **0**|**1**::
|
2011-02-07 18:40:43 +01:00
|
|
|
If true, Tor does not try to fulfill requests to connect to an internal
|
2011-01-26 18:08:52 +01:00
|
|
|
address (like 127.0.0.1 or 192.168.0.1) __unless a exit node is
|
2011-02-07 18:40:43 +01:00
|
|
|
specifically requested__ (for example, via a .exit hostname, or a
|
2016-12-04 04:06:30 +01:00
|
|
|
controller request). If true, multicast DNS hostnames for machines on the
|
|
|
|
local network (of the form *.local) are also rejected. (Default: 1)
|
2011-01-26 18:08:52 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DownloadExtraInfo]] **DownloadExtraInfo** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If true, Tor downloads and caches "extra-info" documents. These documents
|
|
|
|
contain information about servers other than the information in their
|
2015-02-25 15:22:03 +01:00
|
|
|
regular server descriptors. Tor does not use this information for anything
|
2012-06-11 15:48:46 +02:00
|
|
|
itself; to save bandwidth, leave this option turned off. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[WarnPlaintextPorts]] **WarnPlaintextPorts** __port__,__port__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tells Tor to issue a warnings whenever the user tries to make an anonymous
|
|
|
|
connection to one of these ports. This option is designed to alert users
|
|
|
|
to services that risk sending passwords in the clear. (Default:
|
2012-06-11 15:48:46 +02:00
|
|
|
23,109,110,143)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[RejectPlaintextPorts]] **RejectPlaintextPorts** __port__,__port__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Like WarnPlaintextPorts, but instead of warning about risky port uses, Tor
|
2012-06-11 15:48:46 +02:00
|
|
|
will instead refuse to make the connection. (Default: None)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AllowSingleHopCircuits]] **AllowSingleHopCircuits** **0**|**1**::
|
2010-11-15 20:09:32 +01:00
|
|
|
When this option is set, the attached Tor controller can use relays
|
2010-11-04 03:10:42 +01:00
|
|
|
that have the **AllowSingleHopExits** option turned on to build
|
2010-11-15 20:09:32 +01:00
|
|
|
one-hop Tor connections. (Default: 0)
|
2010-11-04 03:10:42 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[OptimisticData]] **OptimisticData** **0**|**1**|**auto**::
|
2011-07-20 16:38:00 +02:00
|
|
|
When this option is set, and Tor is using an exit node that supports
|
|
|
|
the feature, it will try optimistically to send data to the exit node
|
|
|
|
without waiting for the exit node to report whether the connection
|
|
|
|
succeeded. This can save a round-trip time for protocols like HTTP
|
|
|
|
where the client talks first. If OptimisticData is set to **auto**,
|
|
|
|
Tor will look at the UseOptimisticData parameter in the networkstatus.
|
|
|
|
(Default: auto)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Tor2webMode]] **Tor2webMode** **0**|**1**::
|
2011-06-01 16:03:01 +02:00
|
|
|
When this option is set, Tor connects to hidden services
|
|
|
|
**non-anonymously**. This option also disables client connections to
|
2011-11-24 10:28:38 +01:00
|
|
|
non-hidden-service hostnames through Tor. It **must only** be used when
|
|
|
|
running a tor2web Hidden Service web proxy.
|
2016-06-18 01:32:44 +02:00
|
|
|
To enable this option the compile time flag --enable-tor2web-mode must be
|
2016-07-14 06:04:02 +02:00
|
|
|
specified. Since Tor2webMode is non-anonymous, you can not run an
|
|
|
|
anonymous Hidden Service on a tor version compiled with Tor2webMode.
|
|
|
|
(Default: 0)
|
2011-07-20 16:38:00 +02:00
|
|
|
|
2014-09-15 14:26:42 +02:00
|
|
|
[[Tor2webRendezvousPoints]] **Tor2webRendezvousPoints** __node__,__node__,__...__::
|
|
|
|
A list of identity fingerprints, nicknames, country codes and
|
|
|
|
address patterns of nodes that are allowed to be used as RPs
|
|
|
|
in HS circuits; any other nodes will not be used as RPs.
|
|
|
|
(Example:
|
|
|
|
Tor2webRendezvousPoints Fastyfasty, ABCD1234CDEF5678ABCD1234CDEF5678ABCD1234, \{cc}, 255.254.0.0/8) +
|
|
|
|
+
|
2016-12-04 16:55:57 +01:00
|
|
|
This feature can only be used if Tor2webMode is also enabled. +
|
2014-09-15 14:26:42 +02:00
|
|
|
+
|
|
|
|
ExcludeNodes have higher priority than Tor2webRendezvousPoints,
|
|
|
|
which means that nodes specified in ExcludeNodes will not be
|
2016-12-04 16:55:57 +01:00
|
|
|
picked as RPs. +
|
2014-09-15 14:26:42 +02:00
|
|
|
+
|
|
|
|
If no nodes in Tor2webRendezvousPoints are currently available for
|
|
|
|
use, Tor will choose a random node when building HS circuits.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[UseMicrodescriptors]] **UseMicrodescriptors** **0**|**1**|**auto**::
|
2012-01-17 21:51:32 +01:00
|
|
|
Microdescriptors are a smaller version of the information that Tor needs
|
|
|
|
in order to build its circuits. Using microdescriptors makes Tor clients
|
|
|
|
download less directory information, thus saving bandwidth. Directory
|
|
|
|
caches need to fetch regular descriptors and microdescriptors, so this
|
|
|
|
option doesn't save any bandwidth for them. If this option is set to
|
|
|
|
"auto" (recommended) then it is on for all clients that do not set
|
|
|
|
FetchUselessDescriptors. (Default: auto)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasCircThreshold]] **PathBiasCircThreshold** __NUM__ +
|
2012-05-04 05:15:34 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasNoticeRate]] **PathBiasNoticeRate** __NUM__ +
|
2012-05-04 05:15:34 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasWarnRate]] **PathBiasWarnRate** __NUM__ +
|
2012-11-01 02:50:45 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasExtremeRate]] **PathBiasExtremeRate** __NUM__ +
|
2012-11-01 02:50:45 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasDropGuards]] **PathBiasDropGuards** __NUM__ +
|
2012-05-04 05:15:34 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasScaleThreshold]] **PathBiasScaleThreshold** __NUM__::
|
2012-05-04 05:15:34 +02:00
|
|
|
These options override the default behavior of Tor's (**currently
|
|
|
|
experimental**) path bias detection algorithm. To try to find broken or
|
|
|
|
misbehaving guard nodes, Tor looks for nodes where more than a certain
|
2016-12-04 16:55:57 +01:00
|
|
|
fraction of circuits through that guard fail to get built. +
|
2012-12-10 09:13:55 +01:00
|
|
|
+
|
|
|
|
The PathBiasCircThreshold option controls how many circuits we need to build
|
2012-11-01 02:50:45 +01:00
|
|
|
through a guard before we make these checks. The PathBiasNoticeRate,
|
|
|
|
PathBiasWarnRate and PathBiasExtremeRate options control what fraction of
|
|
|
|
circuits must succeed through a guard so we won't write log messages.
|
|
|
|
If less than PathBiasExtremeRate circuits succeed *and* PathBiasDropGuards
|
|
|
|
is set to 1, we disable use of that guard. +
|
|
|
|
+
|
|
|
|
When we have seen more than PathBiasScaleThreshold
|
2013-01-30 23:40:46 +01:00
|
|
|
circuits through a guard, we scale our observations by 0.5 (governed by
|
|
|
|
the consensus) so that new observations don't get swamped by old ones. +
|
2012-05-04 05:15:34 +02:00
|
|
|
+
|
|
|
|
By default, or if a negative value is provided for one of these options,
|
|
|
|
Tor uses reasonable defaults from the networkstatus consensus document.
|
2012-11-01 02:50:45 +01:00
|
|
|
If no defaults are available there, these options default to 150, .70,
|
2013-01-30 23:40:46 +01:00
|
|
|
.50, .30, 0, and 300 respectively.
|
2012-05-04 05:15:34 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasUseThreshold]] **PathBiasUseThreshold** __NUM__ +
|
2013-01-19 05:54:20 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasNoticeUseRate]] **PathBiasNoticeUseRate** __NUM__ +
|
2013-01-19 05:54:20 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasExtremeUseRate]] **PathBiasExtremeUseRate** __NUM__ +
|
2013-01-19 05:54:20 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathBiasScaleUseThreshold]] **PathBiasScaleUseThreshold** __NUM__::
|
2013-01-19 05:54:20 +01:00
|
|
|
Similar to the above options, these options override the default behavior
|
2016-12-04 16:55:57 +01:00
|
|
|
of Tor's (**currently experimental**) path use bias detection algorithm. +
|
2013-01-19 05:54:20 +01:00
|
|
|
+
|
|
|
|
Where as the path bias parameters govern thresholds for successfully
|
|
|
|
building circuits, these four path use bias parameters govern thresholds
|
|
|
|
only for circuit usage. Circuits which receive no stream usage
|
|
|
|
are not counted by this detection algorithm. A used circuit is considered
|
|
|
|
successful if it is capable of carrying streams or otherwise receiving
|
2016-12-04 16:55:57 +01:00
|
|
|
well-formed responses to RELAY cells. +
|
2013-01-19 05:54:20 +01:00
|
|
|
+
|
|
|
|
By default, or if a negative value is provided for one of these options,
|
|
|
|
Tor uses reasonable defaults from the networkstatus consensus document.
|
2013-02-05 02:07:19 +01:00
|
|
|
If no defaults are available there, these options default to 20, .80,
|
|
|
|
.60, and 100, respectively.
|
2013-01-19 05:54:20 +01:00
|
|
|
|
2015-12-14 07:23:10 +01:00
|
|
|
[[ClientUseIPv4]] **ClientUseIPv4** **0**|**1**::
|
|
|
|
If this option is set to 0, Tor will avoid connecting to directory servers
|
|
|
|
and entry nodes over IPv4. Note that clients with an IPv4
|
|
|
|
address in a **Bridge**, proxy, or pluggable transport line will try
|
|
|
|
connecting over IPv4 even if **ClientUseIPv4** is set to 0. (Default: 1)
|
2012-08-27 15:03:34 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ClientUseIPv6]] **ClientUseIPv6** **0**|**1**::
|
2015-12-14 07:23:10 +01:00
|
|
|
If this option is set to 1, Tor might connect to directory servers or
|
|
|
|
entry nodes over IPv6. Note that clients configured with an IPv6 address
|
|
|
|
in a **Bridge**, proxy, or pluggable transport line will try connecting
|
|
|
|
over IPv6 even if **ClientUseIPv6** is set to 0. (Default: 0)
|
|
|
|
|
2016-01-03 14:35:22 +01:00
|
|
|
[[ClientPreferIPv6DirPort]] **ClientPreferIPv6DirPort** **0**|**1**|**auto**::
|
2015-12-14 07:23:10 +01:00
|
|
|
If this option is set to 1, Tor prefers a directory port with an IPv6
|
|
|
|
address over one with IPv4, for direct connections, if a given directory
|
|
|
|
server has both. (Tor also prefers an IPv6 DirPort if IPv4Client is set to
|
2016-02-03 13:52:39 +01:00
|
|
|
0.) If this option is set to auto, clients prefer IPv4. Other things may
|
|
|
|
influence the choice. This option breaks a tie to the favor of IPv6.
|
|
|
|
(Default: auto)
|
2012-08-27 15:03:34 +02:00
|
|
|
|
2016-01-03 14:35:22 +01:00
|
|
|
[[ClientPreferIPv6ORPort]] **ClientPreferIPv6ORPort** **0**|**1**|**auto**::
|
2012-08-27 15:03:34 +02:00
|
|
|
If this option is set to 1, Tor prefers an OR port with an IPv6
|
2015-12-14 07:23:10 +01:00
|
|
|
address over one with IPv4 if a given entry node has both. (Tor also
|
2016-01-03 14:35:22 +01:00
|
|
|
prefers an IPv6 ORPort if IPv4Client is set to 0.) If this option is set
|
2016-02-03 13:52:39 +01:00
|
|
|
to auto, Tor bridge clients prefer the configured bridge address, and
|
|
|
|
other clients prefer IPv4. Other things may influence the choice. This
|
|
|
|
option breaks a tie to the favor of IPv6. (Default: auto)
|
2012-08-27 15:03:34 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PathsNeededToBuildCircuits]] **PathsNeededToBuildCircuits** __NUM__::
|
2013-01-29 17:05:13 +01:00
|
|
|
Tor clients don't build circuits for user traffic until they know
|
|
|
|
about enough of the network so that they could potentially construct
|
|
|
|
enough of the possible paths through the network. If this option
|
|
|
|
is set to a fraction between 0.25 and 0.95, Tor won't build circuits
|
|
|
|
until it has enough descriptors or microdescriptors to construct
|
|
|
|
that fraction of possible paths. Note that setting this option too low
|
|
|
|
can make your Tor client less anonymous, and setting it too high can
|
|
|
|
prevent your Tor client from bootstrapping. If this option is negative,
|
2016-09-09 03:20:20 +02:00
|
|
|
Tor will use a default value chosen by the directory authorities. If the
|
|
|
|
directory authorities do not choose a value, Tor will default to 0.6.
|
|
|
|
(Default: -1.)
|
2013-01-29 17:05:13 +01:00
|
|
|
|
2016-04-05 20:43:20 +02:00
|
|
|
[[ClientBootstrapConsensusAuthorityDownloadSchedule]] **ClientBootstrapConsensusAuthorityDownloadSchedule** __N__,__N__,__...__::
|
|
|
|
Schedule for when clients should download consensuses from authorities
|
|
|
|
if they are bootstrapping (that is, they don't have a usable, reasonably
|
|
|
|
live consensus). Only used by clients fetching from a list of fallback
|
|
|
|
directory mirrors. This schedule is advanced by (potentially concurrent)
|
|
|
|
connection attempts, unlike other schedules, which are advanced by
|
|
|
|
connection failures. (Default: 10, 11, 3600, 10800, 25200, 54000,
|
|
|
|
111600, 262800)
|
|
|
|
|
|
|
|
[[ClientBootstrapConsensusFallbackDownloadSchedule]] **ClientBootstrapConsensusFallbackDownloadSchedule** __N__,__N__,__...__::
|
|
|
|
Schedule for when clients should download consensuses from fallback
|
|
|
|
directory mirrors if they are bootstrapping (that is, they don't have a
|
|
|
|
usable, reasonably live consensus). Only used by clients fetching from a
|
|
|
|
list of fallback directory mirrors. This schedule is advanced by
|
|
|
|
(potentially concurrent) connection attempts, unlike other schedules,
|
|
|
|
which are advanced by connection failures. (Default: 0, 1, 4, 11, 3600,
|
|
|
|
10800, 25200, 54000, 111600, 262800)
|
|
|
|
|
|
|
|
[[ClientBootstrapConsensusAuthorityOnlyDownloadSchedule]] **ClientBootstrapConsensusAuthorityOnlyDownloadSchedule** __N__,__N__,__...__::
|
|
|
|
Schedule for when clients should download consensuses from authorities
|
|
|
|
if they are bootstrapping (that is, they don't have a usable, reasonably
|
|
|
|
live consensus). Only used by clients which don't have or won't fetch
|
|
|
|
from a list of fallback directory mirrors. This schedule is advanced by
|
|
|
|
(potentially concurrent) connection attempts, unlike other schedules,
|
|
|
|
which are advanced by connection failures. (Default: 0, 3, 7, 3600,
|
|
|
|
10800, 25200, 54000, 111600, 262800)
|
|
|
|
|
|
|
|
[[ClientBootstrapConsensusMaxDownloadTries]] **ClientBootstrapConsensusMaxDownloadTries** __NUM__::
|
|
|
|
Try this many times to download a consensus while bootstrapping using
|
|
|
|
fallback directory mirrors before giving up. (Default: 7)
|
|
|
|
|
|
|
|
[[ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries]] **ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries** __NUM__::
|
|
|
|
Try this many times to download a consensus while bootstrapping using
|
|
|
|
authorities before giving up. (Default: 4)
|
|
|
|
|
|
|
|
[[ClientBootstrapConsensusMaxInProgressTries]] **ClientBootstrapConsensusMaxInProgressTries** __NUM__::
|
|
|
|
Try this many simultaneous connections to download a consensus before
|
|
|
|
waiting for one to complete, timeout, or error out. (Default: 4)
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
SERVER OPTIONS
|
|
|
|
--------------
|
|
|
|
|
|
|
|
The following options are useful only for servers (that is, if ORPort
|
|
|
|
is non-zero):
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Address]] **Address** __address__::
|
2010-01-19 14:53:38 +01:00
|
|
|
The IP address or fully qualified domain name of this server (e.g.
|
|
|
|
moria.mit.edu). You can leave this unset, and Tor will guess your IP
|
2010-06-01 16:53:32 +02:00
|
|
|
address. This IP address is the one used to tell clients and other
|
|
|
|
servers where to find your Tor server; it doesn't affect the IP that your
|
|
|
|
Tor client binds to. To bind to a different address, use the
|
|
|
|
*ListenAddress and OutboundBindAddress options.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AllowSingleHopExits]] **AllowSingleHopExits** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
This option controls whether clients can use this server as a single hop
|
|
|
|
proxy. If set to 1, clients can use this server as an exit even if it is
|
2010-11-15 20:09:32 +01:00
|
|
|
the only hop in the circuit. Note that most clients will refuse to use
|
|
|
|
servers that set this option, since most clients have
|
|
|
|
ExcludeSingleHopRelays set. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AssumeReachable]] **AssumeReachable** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
This option is used when bootstrapping a new Tor network. If set to 1,
|
|
|
|
don't do self-reachability testing; just upload your server descriptor
|
|
|
|
immediately. If **AuthoritativeDirectory** is also set, this option
|
|
|
|
instructs the dirserver to bypass remote reachability testing too and list
|
|
|
|
all connected servers as running.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[BridgeRelay]] **BridgeRelay** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Sets the relay to act as a "bridge" with respect to relaying connections
|
2010-10-01 08:43:19 +02:00
|
|
|
from bridge users to the Tor network. It mainly causes Tor to publish a
|
2015-02-25 15:22:03 +01:00
|
|
|
server descriptor to the bridge database, rather than
|
|
|
|
to the public directory authorities.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ContactInfo]] **ContactInfo** __email_address__::
|
2013-10-09 12:01:45 +02:00
|
|
|
Administrative contact information for this relay or bridge. This line
|
|
|
|
can be used to contact you if your relay or bridge is misconfigured or
|
|
|
|
something else goes wrong. Note that we archive and publish all
|
|
|
|
descriptors containing these lines and that Google indexes them, so
|
|
|
|
spammers might also collect them. You may want to obscure the fact
|
|
|
|
that it's an email address and/or generate a new address for this
|
|
|
|
purpose.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2014-11-13 16:48:15 +01:00
|
|
|
[[ExitRelay]] **ExitRelay** **0**|**1**|**auto**::
|
|
|
|
Tells Tor whether to run as an exit relay. If Tor is running as a
|
|
|
|
non-bridge server, and ExitRelay is set to 1, then Tor allows traffic to
|
|
|
|
exit according to the ExitPolicy option (or the default ExitPolicy if
|
2016-12-04 16:55:57 +01:00
|
|
|
none is specified). +
|
2014-11-13 16:48:15 +01:00
|
|
|
+
|
|
|
|
If ExitRelay is set to 0, no traffic is allowed to
|
|
|
|
exit, and the ExitPolicy option is ignored. +
|
|
|
|
+
|
|
|
|
If ExitRelay is set to "auto", then Tor behaves as if it were set to 1, but
|
|
|
|
warns the user if this would cause traffic to exit. In a future version,
|
|
|
|
the default value will be 0. (Default: auto)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExitPolicy]] **ExitPolicy** __policy__,__policy__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Set an exit policy for this server. Each policy is of the form
|
2015-09-22 03:50:04 +02:00
|
|
|
"**accept[6]**|**reject[6]** __ADDR__[/__MASK__][:__PORT__]". If /__MASK__ is
|
2010-01-19 14:53:38 +01:00
|
|
|
omitted then this policy just applies to the host given. Instead of giving
|
2015-09-22 03:44:13 +02:00
|
|
|
a host or network you can also use "\*" to denote the universe (0.0.0.0/0
|
|
|
|
and ::/128), or \*4 to denote all IPv4 addresses, and \*6 to denote all
|
|
|
|
IPv6 addresses.
|
2010-01-19 14:53:38 +01:00
|
|
|
__PORT__ can be a single port number, an interval of ports
|
|
|
|
"__FROM_PORT__-__TO_PORT__", or "\*". If __PORT__ is omitted, that means
|
|
|
|
"\*". +
|
|
|
|
+
|
|
|
|
For example, "accept 18.7.22.69:\*,reject 18.0.0.0/8:\*,accept \*:\*" would
|
2015-09-14 03:46:58 +02:00
|
|
|
reject any IPv4 traffic destined for MIT except for web.mit.edu, and accept
|
|
|
|
any other IPv4 or IPv6 traffic. +
|
2010-01-19 14:53:38 +01:00
|
|
|
+
|
2015-09-22 03:50:04 +02:00
|
|
|
Tor also allows IPv6 exit policy entries. For instance, "reject6 [FC00::]/7:\*"
|
2015-09-14 03:46:58 +02:00
|
|
|
rejects all destinations that share 7 most significant bit prefix with
|
2015-09-22 03:50:04 +02:00
|
|
|
address FC00::. Respectively, "accept6 [C000::]/3:\*" accepts all destinations
|
2015-09-14 03:46:58 +02:00
|
|
|
that share 3 most significant bit prefix with address C000::. +
|
|
|
|
+
|
|
|
|
accept6 and reject6 only produce IPv6 exit policy entries. Using an IPv4
|
|
|
|
address with accept6 or reject6 is ignored and generates a warning.
|
2015-09-22 03:50:04 +02:00
|
|
|
accept/reject allows either IPv4 or IPv6 addresses. Use \*4 as an IPv4
|
|
|
|
wildcard address, and \*6 as an IPv6 wildcard address. accept/reject *
|
2015-09-14 03:46:58 +02:00
|
|
|
expands to matching IPv4 and IPv6 wildcard address rules. +
|
|
|
|
+
|
|
|
|
To specify all IPv4 and IPv6 internal and link-local networks (including
|
|
|
|
0.0.0.0/8, 169.254.0.0/16, 127.0.0.0/8, 192.168.0.0/16, 10.0.0.0/8,
|
|
|
|
172.16.0.0/12, [::]/8, [FC00::]/7, [FE80::]/10, [FEC0::]/10, [FF00::]/8,
|
|
|
|
and [::]/127), you can use the "private" alias instead of an address.
|
|
|
|
("private" always produces rules for IPv4 and IPv6 addresses, even when
|
2015-09-22 03:50:04 +02:00
|
|
|
used with accept6/reject6.) +
|
|
|
|
+
|
|
|
|
Private addresses are rejected by default (at the beginning of your exit
|
2016-07-01 07:37:13 +02:00
|
|
|
policy), along with any configured primary public IPv4 and IPv6 addresses.
|
2015-09-22 03:50:04 +02:00
|
|
|
These private addresses are rejected unless you set the
|
2010-01-19 14:53:38 +01:00
|
|
|
ExitPolicyRejectPrivate config option to 0. For example, once you've done
|
|
|
|
that, you could allow HTTP to 127.0.0.1 and block all other connections to
|
|
|
|
internal networks with "accept 127.0.0.1:80,reject private:\*", though that
|
|
|
|
may also allow connections to your own computer that are addressed to its
|
|
|
|
public (external) IP address. See RFC 1918 and RFC 3330 for more details
|
2016-07-01 07:37:13 +02:00
|
|
|
about internal and reserved IP address space. See
|
|
|
|
ExitPolicyRejectLocalInterfaces if you want to block every address on the
|
|
|
|
relay, even those that aren't advertised in the descriptor. +
|
2010-01-19 14:53:38 +01:00
|
|
|
+
|
|
|
|
This directive can be specified multiple times so you don't have to put it
|
|
|
|
all on one line. +
|
|
|
|
+
|
|
|
|
Policies are considered first to last, and the first match wins. If you
|
2015-09-22 03:41:16 +02:00
|
|
|
want to allow the same ports on IPv4 and IPv6, write your rules using
|
2015-09-22 03:50:04 +02:00
|
|
|
accept/reject \*. If you want to allow different ports on IPv4 and IPv6,
|
|
|
|
write your IPv6 rules using accept6/reject6 \*6, and your IPv4 rules using
|
|
|
|
accept/reject \*4. If you want to \_replace_ the default exit policy, end
|
2015-09-22 03:41:16 +02:00
|
|
|
your exit policy with either a reject \*:* or an accept \*:*. Otherwise,
|
|
|
|
you're \_augmenting_ (prepending to) the default exit policy. The default
|
|
|
|
exit policy is: +
|
2010-01-19 14:53:38 +01:00
|
|
|
|
|
|
|
reject *:25
|
|
|
|
reject *:119
|
|
|
|
reject *:135-139
|
|
|
|
reject *:445
|
|
|
|
reject *:563
|
|
|
|
reject *:1214
|
|
|
|
reject *:4661-4666
|
|
|
|
reject *:6346-6429
|
|
|
|
reject *:6699
|
|
|
|
reject *:6881-6999
|
|
|
|
accept *:*
|
|
|
|
|
2016-12-04 16:55:57 +01:00
|
|
|
[[ExitPolicyDefault]]::
|
2015-09-14 03:46:58 +02:00
|
|
|
Since the default exit policy uses accept/reject *, it applies to both
|
|
|
|
IPv4 and IPv6 addresses.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExitPolicyRejectPrivate]] **ExitPolicyRejectPrivate** **0**|**1**::
|
2016-07-01 07:37:13 +02:00
|
|
|
Reject all private (local) networks, along with the relay's advertised
|
|
|
|
public IPv4 and IPv6 addresses, at the beginning of your exit policy.
|
2015-09-15 10:34:18 +02:00
|
|
|
See above entry on ExitPolicy.
|
2010-01-19 14:53:38 +01:00
|
|
|
(Default: 1)
|
|
|
|
|
2016-07-01 07:37:13 +02:00
|
|
|
[[ExitPolicyRejectLocalInterfaces]] **ExitPolicyRejectLocalInterfaces** **0**|**1**::
|
|
|
|
Reject all IPv4 and IPv6 addresses that the relay knows about, at the
|
|
|
|
beginning of your exit policy. This includes any OutboundBindAddress, the
|
|
|
|
bind addresses of any port options, such as ControlPort or DNSPort, and any
|
|
|
|
public IPv4 and IPv6 addresses on any interface on the relay. (If IPv6Exit
|
|
|
|
is not set, all IPv6 addresses will be rejected anyway.)
|
|
|
|
See above entry on ExitPolicy.
|
|
|
|
This option is off by default, because it lists all public relay IP
|
|
|
|
addresses in the ExitPolicy, even those relay operators might prefer not
|
|
|
|
to disclose.
|
|
|
|
(Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[IPv6Exit]] **IPv6Exit** **0**|**1**::
|
2012-11-15 05:35:13 +01:00
|
|
|
If set, and we are an exit node, allow clients to use us for IPv6
|
|
|
|
traffic. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[MaxOnionQueueDelay]] **MaxOnionQueueDelay** __NUM__ [**msec**|**second**]::
|
2012-12-27 00:08:01 +01:00
|
|
|
If we have more onionskins queued for processing than we can process in
|
|
|
|
this amount of time, reject new ones. (Default: 1750 msec)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[MyFamily]] **MyFamily** __node__,__node__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Declare that this Tor server is controlled or administered by a group or
|
|
|
|
organization identical or similar to that of the other servers, defined by
|
2014-11-06 17:10:58 +01:00
|
|
|
their identity fingerprints. When two servers both declare
|
2010-01-19 14:53:38 +01:00
|
|
|
that they are in the same \'family', Tor clients will not use them in the
|
|
|
|
same circuit. (Each server only needs to list the other servers in its
|
2012-04-01 15:36:13 +02:00
|
|
|
family; it doesn't need to list itself, but it won't hurt.) Do not list
|
2016-12-04 16:55:57 +01:00
|
|
|
any bridge relay as it would compromise its concealment. +
|
2013-03-28 02:58:07 +01:00
|
|
|
+
|
|
|
|
When listing a node, it's better to list it by fingerprint than by
|
|
|
|
nickname: fingerprints are more reliable.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[Nickname]] **Nickname** __name__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Set the server's nickname to \'name'. Nicknames must be between 1 and 19
|
|
|
|
characters inclusive, and must contain only the characters [a-zA-Z0-9].
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[NumCPUs]] **NumCPUs** __num__::
|
2010-09-28 20:36:28 +02:00
|
|
|
How many processes to use at once for decrypting onionskins and other
|
|
|
|
parallelizable operations. If this is set to 0, Tor will try to detect
|
|
|
|
how many CPUs you have, defaulting to 1 if it can't tell. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ORPort]] **ORPort** \['address':]__PORT__|**auto** [_flags_]::
|
2011-05-02 21:05:10 +02:00
|
|
|
Advertise this port to listen for connections from Tor clients and
|
|
|
|
servers. This option is required to be a Tor server.
|
2012-05-16 20:54:16 +02:00
|
|
|
Set it to "auto" to have Tor pick a port for you. Set it to 0 to not
|
2016-12-04 16:55:57 +01:00
|
|
|
run an ORPort at all. This option can occur more than once. (Default: 0) +
|
|
|
|
+
|
2012-05-16 20:54:16 +02:00
|
|
|
Tor recognizes these flags on each ORPort:
|
2016-12-04 16:55:57 +01:00
|
|
|
**NoAdvertise**;;
|
2012-05-16 20:54:16 +02:00
|
|
|
By default, we bind to a port and tell our users about it. If
|
|
|
|
NoAdvertise is specified, we don't advertise, but listen anyway. This
|
|
|
|
can be useful if the port everybody will be connecting to (for
|
|
|
|
example, one that's opened on our firewall) is somewhere else.
|
2016-12-04 16:55:57 +01:00
|
|
|
**NoListen**;;
|
2012-05-16 20:54:16 +02:00
|
|
|
By default, we bind to a port and tell our users about it. If
|
|
|
|
NoListen is specified, we don't bind, but advertise anyway. This
|
|
|
|
can be useful if something else (for example, a firewall's port
|
|
|
|
forwarding configuration) is causing connections to reach us.
|
2016-12-04 16:55:57 +01:00
|
|
|
**IPv4Only**;;
|
2012-05-16 20:54:16 +02:00
|
|
|
If the address is absent, or resolves to both an IPv4 and an IPv6
|
|
|
|
address, only listen to the IPv4 address.
|
2016-12-04 16:55:57 +01:00
|
|
|
**IPv6Only**;;
|
2012-05-16 20:54:16 +02:00
|
|
|
If the address is absent, or resolves to both an IPv4 and an IPv6
|
|
|
|
address, only listen to the IPv6 address.
|
2016-12-04 16:55:57 +01:00
|
|
|
|
|
|
|
[[ORPortFlagsExclusive]]::
|
2012-05-16 20:54:16 +02:00
|
|
|
For obvious reasons, NoAdvertise and NoListen are mutually exclusive, and
|
|
|
|
IPv4Only and IPv6Only are mutually exclusive.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ORListenAddress]] **ORListenAddress** __IP__[:__PORT__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Bind to this IP address to listen for connections from Tor clients and
|
|
|
|
servers. If you specify a port, bind to this port rather than the one
|
|
|
|
specified in ORPort. (Default: 0.0.0.0) This directive can be specified
|
2016-12-04 16:55:57 +01:00
|
|
|
multiple times to bind to multiple addresses/ports. +
|
|
|
|
+
|
2012-05-16 20:54:16 +02:00
|
|
|
This option is deprecated; you can get the same behavior with ORPort now
|
|
|
|
that it supports NoAdvertise and explicit addresses.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PortForwarding]] **PortForwarding** **0**|**1**::
|
2010-06-16 20:47:06 +02:00
|
|
|
Attempt to automatically forward the DirPort and ORPort on a NAT router
|
|
|
|
connecting this Tor server to the Internet. If set, Tor will try both
|
|
|
|
NAT-PMP (common on Apple routers) and UPnP (common on routers from other
|
|
|
|
manufacturers). (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PortForwardingHelper]] **PortForwardingHelper** __filename__|__pathname__::
|
2010-06-16 20:47:06 +02:00
|
|
|
If PortForwarding is set, use this executable to configure the forwarding.
|
|
|
|
If set to a filename, the system path will be searched for the executable.
|
|
|
|
If set to a path, only the specified path will be executed.
|
|
|
|
(Default: tor-fw-helper)
|
|
|
|
|
2014-03-17 17:38:22 +01:00
|
|
|
[[PublishServerDescriptor]] **PublishServerDescriptor** **0**|**1**|**v3**|**bridge**,**...**::
|
2010-10-04 18:58:20 +02:00
|
|
|
This option specifies which descriptors Tor will publish when acting as
|
2011-02-09 12:14:51 +01:00
|
|
|
a relay. You can
|
2016-12-04 16:55:57 +01:00
|
|
|
choose multiple arguments, separated by commas. +
|
2010-01-19 14:53:38 +01:00
|
|
|
+
|
2010-10-04 18:58:20 +02:00
|
|
|
If this option is set to 0, Tor will not publish its
|
2010-10-01 08:43:19 +02:00
|
|
|
descriptors to any directories. (This is useful if you're testing
|
2010-01-19 14:53:38 +01:00
|
|
|
out your server, or if you're using a Tor controller that handles directory
|
2010-10-01 08:43:19 +02:00
|
|
|
publishing for you.) Otherwise, Tor will publish its descriptors of all
|
|
|
|
type(s) specified. The default is "1",
|
2011-02-09 12:14:51 +01:00
|
|
|
which means "if running as a server, publish the
|
2010-10-04 18:58:20 +02:00
|
|
|
appropriate descriptors to the authorities".
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ShutdownWaitLength]] **ShutdownWaitLength** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
When we get a SIGINT and we're a server, we begin shutting down:
|
|
|
|
we close listeners and start refusing new circuits. After **NUM**
|
2013-03-09 23:16:11 +01:00
|
|
|
seconds, we exit. If we get a second SIGINT, we exit immediately.
|
|
|
|
(Default: 30 seconds)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SSLKeyLifetime]] **SSLKeyLifetime** __N__ **minutes**|**hours**|**days**|**weeks**::
|
2013-03-09 23:16:11 +01:00
|
|
|
When creating a link certificate for our outermost SSL handshake,
|
|
|
|
set its lifetime to this amount of time. If set to 0, Tor will choose
|
|
|
|
some reasonable random defaults. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HeartbeatPeriod]] **HeartbeatPeriod** __N__ **minutes**|**hours**|**days**|**weeks**::
|
2010-12-01 02:24:03 +01:00
|
|
|
Log a heartbeat message every **HeartbeatPeriod** seconds. This is
|
2013-08-17 03:58:50 +02:00
|
|
|
a log level __notice__ message, designed to let you know your Tor
|
2010-12-01 02:32:42 +01:00
|
|
|
server is still alive and doing useful things. Settings this
|
2015-12-22 17:10:37 +01:00
|
|
|
to 0 will disable the heartbeat. Otherwise, it must be at least 30
|
|
|
|
minutes. (Default: 6 hours)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[AccountingMax]] **AccountingMax** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2014-09-23 14:34:22 +02:00
|
|
|
Limits the max number of bytes sent and received within a set time period
|
|
|
|
using a given calculation rule (see: AccountingStart, AccountingRule).
|
|
|
|
Useful if you need to stay under a specific bandwidth. By default, the
|
2015-10-22 19:12:46 +02:00
|
|
|
number used for calculation is the max of either the bytes sent or
|
2014-09-23 14:34:22 +02:00
|
|
|
received. For example, with AccountingMax set to 1 GByte, a server
|
|
|
|
could send 900 MBytes and receive 800 MBytes and continue running.
|
|
|
|
It will only hibernate once one of the two reaches 1 GByte. This can
|
|
|
|
be changed to use the sum of the both bytes received and sent by setting
|
|
|
|
the AccountingRule option to "sum" (total bandwidth in/out). When the
|
|
|
|
number of bytes remaining gets low, Tor will stop accepting new connections
|
|
|
|
and circuits. When the number of bytes is exhausted, Tor will hibernate
|
|
|
|
until some time in the next accounting period. To prevent all servers
|
|
|
|
from waking at the same time, Tor will also wait until a random point
|
|
|
|
in each period before waking up. If you have bandwidth cost issues,
|
|
|
|
enabling hibernation is preferable to setting a low bandwidth, since
|
|
|
|
it provides users with a collection of fast servers that are up some
|
|
|
|
of the time, which is more useful than a set of slow servers that are
|
|
|
|
always "available".
|
|
|
|
|
2016-01-04 05:02:44 +01:00
|
|
|
[[AccountingRule]] **AccountingRule** **sum**|**max**|**in**|**out**::
|
2014-09-23 14:34:22 +02:00
|
|
|
How we determine when our AccountingMax has been reached (when we
|
|
|
|
should hibernate) during a time interval. Set to "max" to calculate
|
|
|
|
using the higher of either the sent or received bytes (this is the
|
|
|
|
default functionality). Set to "sum" to calculate using the sent
|
2016-01-04 05:02:44 +01:00
|
|
|
plus received bytes. Set to "in" to calculate using only the
|
|
|
|
received bytes. Set to "out" to calculate using only the sent bytes.
|
|
|
|
(Default: max)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AccountingStart]] **AccountingStart** **day**|**week**|**month** [__day__] __HH:MM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Specify how long accounting periods last. If **month** is given, each
|
|
|
|
accounting period runs from the time __HH:MM__ on the __dayth__ day of one
|
|
|
|
month to the same day and time of the next. (The day must be between 1 and
|
|
|
|
28.) If **week** is given, each accounting period runs from the time __HH:MM__
|
|
|
|
of the __dayth__ day of one week to the same day and time of the next week,
|
|
|
|
with Monday as day 1 and Sunday as day 7. If **day** is given, each
|
|
|
|
accounting period runs from the time __HH:MM__ each day to the same time on
|
2012-06-11 15:48:46 +02:00
|
|
|
the next day. All times are local, and given in 24-hour time. (Default:
|
|
|
|
"month 1 0:00")
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[RefuseUnknownExits]] **RefuseUnknownExits** **0**|**1**|**auto**::
|
2010-09-18 14:48:21 +02:00
|
|
|
Prevent nodes that don't appear in the consensus from exiting using this
|
|
|
|
relay. If the option is 1, we always block exit attempts from such
|
|
|
|
nodes; if it's 0, we never do, and if the option is "auto", then we do
|
2013-02-12 21:20:12 +01:00
|
|
|
whatever the authorities suggest in the consensus (and block if the consensus
|
|
|
|
is quiet on the issue). (Default: auto)
|
2010-09-18 14:48:21 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerDNSResolvConfFile]] **ServerDNSResolvConfFile** __filename__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Overrides the default DNS configuration with the configuration in
|
|
|
|
__filename__. The file format is the same as the standard Unix
|
|
|
|
"**resolv.conf**" file (7). This option, like all other ServerDNS options,
|
|
|
|
only affects name lookups that your server does on behalf of clients.
|
|
|
|
(Defaults to use the system DNS configuration.)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerDNSAllowBrokenConfig]] **ServerDNSAllowBrokenConfig** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If this option is false, Tor exits immediately if there are problems
|
|
|
|
parsing the system DNS configuration or connecting to nameservers.
|
|
|
|
Otherwise, Tor continues to periodically retry the system nameservers until
|
2012-06-11 15:48:46 +02:00
|
|
|
it eventually succeeds. (Default: 1)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerDNSSearchDomains]] **ServerDNSSearchDomains** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set to 1, then we will search for addresses in the local search domain.
|
|
|
|
For example, if this system is configured to believe it is in
|
|
|
|
"example.com", and a client tries to connect to "www", the client will be
|
|
|
|
connected to "www.example.com". This option only affects name lookups that
|
2012-06-11 15:48:46 +02:00
|
|
|
your server does on behalf of clients. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerDNSDetectHijacking]] **ServerDNSDetectHijacking** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is set to 1, we will test periodically to determine
|
|
|
|
whether our local nameservers have been configured to hijack failing DNS
|
|
|
|
requests (usually to an advertising site). If they are, we will attempt to
|
|
|
|
correct this. This option only affects name lookups that your server does
|
2012-06-11 15:48:46 +02:00
|
|
|
on behalf of clients. (Default: 1)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerDNSTestAddresses]] **ServerDNSTestAddresses** __address__,__address__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
When we're detecting DNS hijacking, make sure that these __valid__ addresses
|
|
|
|
aren't getting redirected. If they are, then our DNS is completely useless,
|
2015-12-09 03:23:43 +01:00
|
|
|
and we'll reset our exit policy to "reject \*:*". This option only affects
|
2012-06-11 15:48:46 +02:00
|
|
|
name lookups that your server does on behalf of clients. (Default:
|
|
|
|
"www.google.com, www.mit.edu, www.yahoo.com, www.slashdot.org")
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerDNSAllowNonRFC953Hostnames]] **ServerDNSAllowNonRFC953Hostnames** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is disabled, Tor does not try to resolve hostnames
|
|
|
|
containing illegal characters (like @ and :) rather than sending them to an
|
|
|
|
exit node to be resolved. This helps trap accidental attempts to resolve
|
|
|
|
URLs and so on. This option only affects name lookups that your server does
|
|
|
|
on behalf of clients. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[BridgeRecordUsageByCountry]] **BridgeRecordUsageByCountry** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is enabled and BridgeRelay is also enabled, and we have
|
2014-08-09 21:40:40 +02:00
|
|
|
GeoIP data, Tor keeps a per-country count of how many client
|
2010-01-19 14:53:38 +01:00
|
|
|
addresses have contacted it so that it can help the bridge authority guess
|
|
|
|
which countries have blocked access to it. (Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ServerDNSRandomizeCase]] **ServerDNSRandomizeCase** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is set, Tor sets the case of each character randomly in
|
|
|
|
outgoing DNS requests, and makes sure that the case matches in DNS replies.
|
|
|
|
This so-called "0x20 hack" helps resist some types of DNS poisoning attack.
|
|
|
|
For more information, see "Increased DNS Forgery Resistance through
|
|
|
|
0x20-Bit Encoding". This option only affects name lookups that your server
|
|
|
|
does on behalf of clients. (Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[GeoIPFile]] **GeoIPFile** __filename__::
|
2012-03-28 15:52:33 +02:00
|
|
|
A filename containing IPv4 GeoIP data, for use with by-country statistics.
|
2012-03-01 02:04:45 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[GeoIPv6File]] **GeoIPv6File** __filename__::
|
2012-03-28 15:52:33 +02:00
|
|
|
A filename containing IPv6 GeoIP data, for use with by-country statistics.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TLSECGroup]] **TLSECGroup** **P224**|**P256**::
|
2012-12-26 02:04:54 +01:00
|
|
|
What EC group should we try to use for incoming TLS connections?
|
|
|
|
P224 is faster, but makes us stand out more. Has no effect if
|
|
|
|
we're a client, or if our OpenSSL version lacks support for ECDHE.
|
2013-09-19 16:40:41 +02:00
|
|
|
(Default: P256)
|
2012-12-26 02:04:54 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[CellStatistics]] **CellStatistics** **0**|**1**::
|
2015-04-06 18:18:35 +02:00
|
|
|
Relays only.
|
|
|
|
When this option is enabled, Tor collects statistics about cell
|
|
|
|
processing (i.e. mean time a cell is spending in a queue, mean
|
|
|
|
number of cells in a queue and mean number of processed cells per
|
|
|
|
circuit) and writes them into disk every 24 hours. Onion router
|
|
|
|
operators may use the statistics for performance monitoring.
|
|
|
|
If ExtraInfoStatistics is enabled, it will published as part of
|
|
|
|
extra-info document. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DirReqStatistics]] **DirReqStatistics** **0**|**1**::
|
2015-04-06 18:18:35 +02:00
|
|
|
Relays and bridges only.
|
2012-06-07 19:46:51 +02:00
|
|
|
When this option is enabled, a Tor directory writes statistics on the
|
|
|
|
number and response time of network status requests to disk every 24
|
2015-04-06 18:18:35 +02:00
|
|
|
hours. Enables relay and bridge operators to monitor how much their
|
|
|
|
server is being used by clients to learn about Tor network.
|
|
|
|
If ExtraInfoStatistics is enabled, it will published as part of
|
|
|
|
extra-info document. (Default: 1)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[EntryStatistics]] **EntryStatistics** **0**|**1**::
|
2015-04-06 18:18:35 +02:00
|
|
|
Relays only.
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is enabled, Tor writes statistics on the number of
|
2015-04-06 18:18:35 +02:00
|
|
|
directly connecting clients to disk every 24 hours. Enables relay
|
|
|
|
operators to monitor how much inbound traffic that originates from
|
|
|
|
Tor clients passes through their server to go further down the
|
|
|
|
Tor network. If ExtraInfoStatistics is enabled, it will be published
|
|
|
|
as part of extra-info document. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExitPortStatistics]] **ExitPortStatistics** **0**|**1**::
|
2015-04-06 18:18:35 +02:00
|
|
|
Exit relays only.
|
|
|
|
When this option is enabled, Tor writes statistics on the number of
|
|
|
|
relayed bytes and opened stream per exit port to disk every 24 hours.
|
|
|
|
Enables exit relay operators to measure and monitor amounts of traffic
|
|
|
|
that leaves Tor network through their exit node. If ExtraInfoStatistics
|
|
|
|
is enabled, it will be published as part of extra-info document.
|
|
|
|
(Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ConnDirectionStatistics]] **ConnDirectionStatistics** **0**|**1**::
|
2015-04-06 18:18:35 +02:00
|
|
|
Relays only.
|
|
|
|
When this option is enabled, Tor writes statistics on the amounts of
|
|
|
|
traffic it passes between itself and other relays to disk every 24
|
|
|
|
hours. Enables relay operators to monitor how much their relay is
|
|
|
|
being used as middle node in the circuit. If ExtraInfoStatistics is
|
|
|
|
enabled, it will be published as part of extra-info document.
|
|
|
|
(Default: 0)
|
2010-08-15 15:25:09 +02:00
|
|
|
|
2014-12-02 13:20:35 +01:00
|
|
|
[[HiddenServiceStatistics]] **HiddenServiceStatistics** **0**|**1**::
|
2015-04-06 18:18:35 +02:00
|
|
|
Relays only.
|
2014-12-18 16:44:47 +01:00
|
|
|
When this option is enabled, a Tor relay writes obfuscated
|
|
|
|
statistics on its role as hidden-service directory, introduction
|
|
|
|
point, or rendezvous point to disk every 24 hours. If
|
|
|
|
ExtraInfoStatistics is also enabled, these statistics are further
|
2015-09-02 13:52:56 +02:00
|
|
|
published to the directory authorities. (Default: 1)
|
2014-12-02 13:20:35 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExtraInfoStatistics]] **ExtraInfoStatistics** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is enabled, Tor includes previously gathered statistics in
|
|
|
|
its extra-info documents that it uploads to the directory authorities.
|
2012-06-07 19:46:51 +02:00
|
|
|
(Default: 1)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ExtendAllowPrivateAddresses]] **ExtendAllowPrivateAddresses** **0**|**1**::
|
2016-03-23 03:37:35 +01:00
|
|
|
When this option is enabled, Tor will connect to relays on localhost,
|
|
|
|
RFC1918 addresses, and so on. In particular, Tor will make direct OR
|
|
|
|
connections, and Tor routers allow EXTEND requests, to these private
|
|
|
|
addresses. (Tor will always allow connections to bridges, proxies, and
|
|
|
|
pluggable transports configured on private addresses.) Enabling this
|
|
|
|
option can create security issues; you should probably leave it off.
|
2015-11-24 17:11:15 +01:00
|
|
|
(Default: 0)
|
2012-08-27 17:16:44 +02:00
|
|
|
|
2014-01-03 16:53:22 +01:00
|
|
|
[[MaxMemInQueues]] **MaxMemInQueues** __N__ **bytes**|**KB**|**MB**|**GB**::
|
2013-06-16 15:55:44 +02:00
|
|
|
This option configures a threshold above which Tor will assume that it
|
2013-11-20 18:08:14 +01:00
|
|
|
needs to stop queueing or buffering data because it's about to run out of
|
|
|
|
memory. If it hits this threshold, it will begin killing circuits until
|
|
|
|
it has recovered at least 10% of this memory. Do not set this option too
|
2013-06-16 15:55:44 +02:00
|
|
|
low, or your relay may be unreliable under load. This option only
|
2013-11-20 18:08:14 +01:00
|
|
|
affects some queues, so the actual process size will be larger than
|
2014-04-03 18:06:44 +02:00
|
|
|
this. If this option is set to 0, Tor will try to pick a reasonable
|
|
|
|
default based on your system's physical memory. (Default: 0)
|
2012-08-27 17:16:44 +02:00
|
|
|
|
2016-08-25 20:32:10 +02:00
|
|
|
[[DisableOOSCheck]] **DisableOOSCheck** **0**|**1**::
|
|
|
|
This option disables the code that closes connections when Tor notices
|
|
|
|
that it is running low on sockets. Right now, it is on by default,
|
|
|
|
since the existing out-of-sockets mechanism tends to kill OR connections
|
|
|
|
more than it should. (Default: 1)
|
|
|
|
|
2015-05-28 16:18:42 +02:00
|
|
|
[[SigningKeyLifetime]] **SigningKeyLifetime** __N__ **days**|**weeks**|**months**::
|
|
|
|
For how long should each Ed25519 signing key be valid? Tor uses a
|
|
|
|
permanent master identity key that can be kept offline, and periodically
|
|
|
|
generates new "signing" keys that it uses online. This option
|
|
|
|
configures their lifetime.
|
|
|
|
(Default: 30 days)
|
|
|
|
|
2015-09-01 16:22:24 +02:00
|
|
|
[[OfflineMasterKey]] **OfflineMasterKey** **0**|**1**::
|
|
|
|
If non-zero, the Tor relay will never generate or load its master secret
|
2016-01-28 16:19:29 +01:00
|
|
|
key. Instead, you'll have to use "tor --keygen" to manage the permanent
|
|
|
|
ed25519 master identity key, as well as the corresponding temporary
|
|
|
|
signing keys and certificates. (Default: 0)
|
2015-09-01 16:22:24 +02:00
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
DIRECTORY SERVER OPTIONS
|
|
|
|
------------------------
|
|
|
|
|
2017-03-14 16:25:54 +01:00
|
|
|
The following options are useful only for directory servers. (Relays with
|
|
|
|
enough bandwidth automatically become directory servers; see DirCache for
|
|
|
|
details.)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DirPortFrontPage]] **DirPortFrontPage** __FILENAME__::
|
2010-01-19 14:53:38 +01:00
|
|
|
When this option is set, it takes an HTML file and publishes it as "/" on
|
|
|
|
the DirPort. Now relay operators can provide a disclaimer without needing
|
|
|
|
to set up a separate webserver. There's a sample disclaimer in
|
2014-04-28 17:59:55 +02:00
|
|
|
contrib/operator-tools/tor-exit-notice.html.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DirPort]] **DirPort** \['address':]__PORT__|**auto** [_flags_]::
|
2011-05-02 21:05:10 +02:00
|
|
|
If this option is nonzero, advertise the directory service on this port.
|
2012-05-16 21:45:20 +02:00
|
|
|
Set it to "auto" to have Tor pick a port for you. This option can occur
|
2013-12-24 01:00:46 +01:00
|
|
|
more than once, but only one advertised DirPort is supported: all
|
2016-12-04 16:55:57 +01:00
|
|
|
but one DirPort must have the **NoAdvertise** flag set. (Default: 0) +
|
|
|
|
+
|
2012-05-16 21:07:54 +02:00
|
|
|
The same flags are supported here as are supported by ORPort.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DirListenAddress]] **DirListenAddress** __IP__[:__PORT__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Bind the directory service to this address. If you specify a port, bind to
|
|
|
|
this port rather than the one specified in DirPort. (Default: 0.0.0.0)
|
|
|
|
This directive can be specified multiple times to bind to multiple
|
2016-12-04 16:55:57 +01:00
|
|
|
addresses/ports. +
|
|
|
|
+
|
2012-05-16 21:07:54 +02:00
|
|
|
This option is deprecated; you can get the same behavior with DirPort now
|
|
|
|
that it supports NoAdvertise and explicit addresses.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DirPolicy]] **DirPolicy** __policy__,__policy__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Set an entrance policy for this server, to limit who can connect to the
|
2014-03-03 16:45:39 +01:00
|
|
|
directory ports. The policies have the same form as exit policies above,
|
2014-03-06 16:21:59 +01:00
|
|
|
except that port specifiers are ignored. Any address not matched by
|
|
|
|
some entry in the policy is accepted.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2015-02-08 07:51:51 +01:00
|
|
|
[[DirCache]] **DirCache** **0**|**1**::
|
|
|
|
When this option is set, Tor caches all current directory documents and
|
|
|
|
accepts client requests for them. Setting DirPort is not required for this,
|
|
|
|
because clients connect via the ORPort by default. Setting either DirPort
|
|
|
|
or BridgeRelay and setting DirCache to 0 is not supported. (Default: 1)
|
|
|
|
|
2011-04-28 16:05:32 +02:00
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
DIRECTORY AUTHORITY SERVER OPTIONS
|
|
|
|
----------------------------------
|
|
|
|
|
2014-06-16 17:15:47 +02:00
|
|
|
The following options enable operation as a directory authority, and
|
|
|
|
control how Tor behaves as a directory authority. You should not need
|
|
|
|
to adjust any of them if you're running a regular relay or exit server
|
|
|
|
on the public Tor network.
|
|
|
|
|
|
|
|
[[AuthoritativeDirectory]] **AuthoritativeDirectory** **0**|**1**::
|
|
|
|
When this option is set to 1, Tor operates as an authoritative directory
|
|
|
|
server. Instead of caching the directory, it generates its own list of
|
|
|
|
good servers, signs it, and sends that to the clients. Unless the clients
|
|
|
|
already have you listed as a trusted directory, you probably do not want
|
2016-05-27 17:31:34 +02:00
|
|
|
to set this option.
|
2014-06-16 17:15:47 +02:00
|
|
|
|
|
|
|
[[V3AuthoritativeDirectory]] **V3AuthoritativeDirectory** **0**|**1**::
|
|
|
|
When this option is set in addition to **AuthoritativeDirectory**, Tor
|
|
|
|
generates version 3 network statuses and serves descriptors, etc as
|
2015-10-22 19:12:46 +02:00
|
|
|
described in dir-spec.txt file of https://spec.torproject.org/[torspec]
|
2016-09-06 09:48:31 +02:00
|
|
|
(for Tor clients and servers running at least 0.2.0.x).
|
2014-06-16 17:15:47 +02:00
|
|
|
|
|
|
|
[[VersioningAuthoritativeDirectory]] **VersioningAuthoritativeDirectory** **0**|**1**::
|
|
|
|
When this option is set to 1, Tor adds information on which versions of
|
|
|
|
Tor are still believed safe for use to the published directory. Each
|
|
|
|
version 1 authority is automatically a versioning authority; version 2
|
|
|
|
authorities provide this service optionally. See **RecommendedVersions**,
|
|
|
|
**RecommendedClientVersions**, and **RecommendedServerVersions**.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[RecommendedVersions]] **RecommendedVersions** __STRING__::
|
2010-01-19 14:53:38 +01:00
|
|
|
STRING is a comma-separated list of Tor versions currently believed to be
|
|
|
|
safe. The list is included in each directory, and nodes which pull down the
|
|
|
|
directory learn whether they need to upgrade. This option can appear
|
|
|
|
multiple times: the values from multiple lines are spliced together. When
|
|
|
|
this is set then **VersioningAuthoritativeDirectory** should be set too.
|
|
|
|
|
2015-11-24 02:44:52 +01:00
|
|
|
[[RecommendedPackages]] **RecommendedPackages** __PACKAGENAME__ __VERSION__ __URL__ __DIGESTTYPE__**=**__DIGEST__ ::
|
2015-01-10 21:44:32 +01:00
|
|
|
Adds "package" line to the directory authority's vote. This information
|
|
|
|
is used to vote on the correct URL and digest for the released versions
|
|
|
|
of different Tor-related packages, so that the consensus can certify
|
|
|
|
them. This line may appear any number of times.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[RecommendedClientVersions]] **RecommendedClientVersions** __STRING__::
|
2010-01-19 14:53:38 +01:00
|
|
|
STRING is a comma-separated list of Tor versions currently believed to be
|
|
|
|
safe for clients to use. This information is included in version 2
|
|
|
|
directories. If this is not set then the value of **RecommendedVersions**
|
|
|
|
is used. When this is set then **VersioningAuthoritativeDirectory** should
|
|
|
|
be set too.
|
|
|
|
|
2014-06-16 17:15:47 +02:00
|
|
|
[[BridgeAuthoritativeDir]] **BridgeAuthoritativeDir** **0**|**1**::
|
|
|
|
When this option is set in addition to **AuthoritativeDirectory**, Tor
|
2015-02-25 15:22:03 +01:00
|
|
|
accepts and serves server descriptors, but it caches and serves the main
|
2014-06-16 17:15:47 +02:00
|
|
|
networkstatus documents rather than generating its own. (Default: 0)
|
|
|
|
|
|
|
|
[[MinUptimeHidServDirectoryV2]] **MinUptimeHidServDirectoryV2** __N__ **seconds**|**minutes**|**hours**|**days**|**weeks**::
|
|
|
|
Minimum uptime of a v2 hidden service directory to be accepted as such by
|
|
|
|
authoritative directories. (Default: 25 hours)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[RecommendedServerVersions]] **RecommendedServerVersions** __STRING__::
|
2010-01-19 14:53:38 +01:00
|
|
|
STRING is a comma-separated list of Tor versions currently believed to be
|
|
|
|
safe for servers to use. This information is included in version 2
|
|
|
|
directories. If this is not set then the value of **RecommendedVersions**
|
|
|
|
is used. When this is set then **VersioningAuthoritativeDirectory** should
|
|
|
|
be set too.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[ConsensusParams]] **ConsensusParams** __STRING__::
|
2010-01-19 14:53:38 +01:00
|
|
|
STRING is a space-separated list of key=value pairs that Tor will include
|
|
|
|
in the "params" line of its networkstatus vote.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[DirAllowPrivateAddresses]] **DirAllowPrivateAddresses** **0**|**1**::
|
2015-02-25 15:22:03 +01:00
|
|
|
If set to 1, Tor will accept server descriptors with arbitrary "Address"
|
2010-01-19 14:53:38 +01:00
|
|
|
elements. Otherwise, if the address is not an IP address or is a private IP
|
2016-09-06 18:38:36 +02:00
|
|
|
address, it will reject the server descriptor. Additionally, Tor
|
|
|
|
will allow exit policies for private networks to fulfill Exit flag
|
|
|
|
requirements. (Default: 0)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2014-09-05 01:37:25 +02:00
|
|
|
[[AuthDirBadExit]] **AuthDirBadExit** __AddressPattern...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Authoritative directories only. A set of address patterns for servers that
|
2014-09-05 01:37:25 +02:00
|
|
|
will be listed as bad exits in any network status document this authority
|
2016-12-04 16:55:57 +01:00
|
|
|
publishes, if **AuthDirListBadExits** is set. +
|
2014-03-03 16:45:39 +01:00
|
|
|
+
|
|
|
|
(The address pattern syntax here and in the options below
|
|
|
|
is the same as for exit policies, except that you don't need to say
|
|
|
|
"accept" or "reject", and ports are not needed.)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AuthDirInvalid]] **AuthDirInvalid** __AddressPattern...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Authoritative directories only. A set of address patterns for servers that
|
|
|
|
will never be listed as "valid" in any network status document that this
|
|
|
|
authority publishes.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AuthDirReject]] **AuthDirReject** __AddressPattern__...::
|
2010-01-19 14:53:38 +01:00
|
|
|
Authoritative directories only. A set of address patterns for servers that
|
|
|
|
will never be listed at all in any network status document that this
|
|
|
|
authority publishes, or accepted as an OR address in any descriptor
|
|
|
|
submitted for publication by this authority.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AuthDirBadExitCCs]] **AuthDirBadExitCCs** __CC__,... +
|
2012-01-13 18:28:32 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AuthDirInvalidCCs]] **AuthDirInvalidCCs** __CC__,... +
|
2012-01-13 18:28:32 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AuthDirRejectCCs]] **AuthDirRejectCCs** __CC__,...::
|
2012-01-13 18:28:32 +01:00
|
|
|
Authoritative directories only. These options contain a comma-separated
|
|
|
|
list of country codes such that any server in one of those country codes
|
2014-09-05 01:37:25 +02:00
|
|
|
will be marked as a bad exit/invalid for use, or rejected
|
2012-01-13 18:28:32 +01:00
|
|
|
entirely.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AuthDirListBadExits]] **AuthDirListBadExits** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Authoritative directories only. If set to 1, this directory has some
|
|
|
|
opinion about which nodes are unsuitable as exit nodes. (Do not set this to
|
|
|
|
1 unless you plan to list non-functioning exits as bad; otherwise, you are
|
|
|
|
effectively voting in favor of every declared exit as an exit.)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AuthDirMaxServersPerAddr]] **AuthDirMaxServersPerAddr** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Authoritative directories only. The maximum number of servers that we will
|
|
|
|
list as acceptable on a single IP address. Set this to "0" for "no limit".
|
|
|
|
(Default: 2)
|
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[AuthDirFastGuarantee]] **AuthDirFastGuarantee** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2011-11-22 00:32:32 +01:00
|
|
|
Authoritative directories only. If non-zero, always vote the
|
|
|
|
Fast flag for any relay advertising this amount of capacity or
|
2012-10-06 07:57:13 +02:00
|
|
|
more. (Default: 100 KBytes)
|
2011-11-22 00:32:32 +01:00
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[AuthDirGuardBWGuarantee]] **AuthDirGuardBWGuarantee** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2011-11-22 00:32:32 +01:00
|
|
|
Authoritative directories only. If non-zero, this advertised capacity
|
|
|
|
or more is always sufficient to satisfy the bandwidth requirement
|
2016-10-23 16:57:06 +02:00
|
|
|
for the Guard flag. (Default: 2 MBytes)
|
2011-11-22 00:32:32 +01:00
|
|
|
|
2015-09-23 17:30:17 +02:00
|
|
|
[[AuthDirPinKeys]] **AuthDirPinKeys** **0**|**1**::
|
|
|
|
Authoritative directories only. If non-zero, do not allow any relay to
|
|
|
|
publish a descriptor if any other relay has reserved its <Ed25519,RSA>
|
|
|
|
identity keypair. In all cases, Tor records every keypair it accepts
|
|
|
|
in a journal if it is new, or if it differs from the most recently
|
2016-12-13 14:54:38 +01:00
|
|
|
accepted pinning for one of the keys it contains. (Default: 1)
|
2015-09-23 17:30:17 +02:00
|
|
|
|
2016-05-03 17:21:17 +02:00
|
|
|
[[AuthDirSharedRandomness]] **AuthDirSharedRandomness** **0**|**1**::
|
|
|
|
Authoritative directories only. Switch for the shared random protocol.
|
|
|
|
If zero, the authority won't participate in the protocol. If non-zero
|
|
|
|
(default), the flag "shared-rand-participate" is added to the authority
|
|
|
|
vote indicating participation in the protocol. (Default: 1)
|
|
|
|
|
2016-11-10 18:41:17 +01:00
|
|
|
[[AuthDirTestEd25519LinkKeys]] **AuthDirTestEd25519LinkKeys** **0**|**1**::
|
|
|
|
Authoritative directories only. If this option is set to 0, then we treat
|
|
|
|
relays as "Running" if their RSA key is correct when we probe them,
|
|
|
|
regardless of their Ed25519 key. We should only ever set this option to 0
|
|
|
|
if there is some major bug in Ed25519 link authentication that causes us
|
|
|
|
to label all the relays as not Running. (Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[BridgePassword]] **BridgePassword** __Password__::
|
2011-05-04 04:14:40 +02:00
|
|
|
If set, contains an HTTP authenticator that tells a bridge authority to
|
2012-04-01 21:59:00 +02:00
|
|
|
serve all requested bridge information. Used by the (only partially
|
|
|
|
implemented) "bridge community" design, where a community of bridge
|
|
|
|
relay operators all use an alternate bridge directory authority,
|
|
|
|
and their target user audience can periodically fetch the list of
|
2012-06-11 15:48:46 +02:00
|
|
|
available community bridges to stay up-to-date. (Default: not set)
|
2011-05-04 04:14:40 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[V3AuthVotingInterval]] **V3AuthVotingInterval** __N__ **minutes**|**hours**::
|
2010-01-19 14:53:38 +01:00
|
|
|
V3 authoritative directories only. Configures the server's preferred voting
|
|
|
|
interval. Note that voting will __actually__ happen at an interval chosen
|
|
|
|
by consensus from all the authorities' preferred intervals. This time
|
|
|
|
SHOULD divide evenly into a day. (Default: 1 hour)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[V3AuthVoteDelay]] **V3AuthVoteDelay** __N__ **minutes**|**hours**::
|
2010-01-19 14:53:38 +01:00
|
|
|
V3 authoritative directories only. Configures the server's preferred delay
|
|
|
|
between publishing its vote and assuming it has all the votes from all the
|
|
|
|
other authorities. Note that the actual time used is not the server's
|
2012-06-11 15:48:46 +02:00
|
|
|
preferred time, but the consensus of all preferences. (Default: 5 minutes)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[V3AuthDistDelay]] **V3AuthDistDelay** __N__ **minutes**|**hours**::
|
2010-01-19 14:53:38 +01:00
|
|
|
V3 authoritative directories only. Configures the server's preferred delay
|
|
|
|
between publishing its consensus and signature and assuming it has all the
|
|
|
|
signatures from all the other authorities. Note that the actual time used
|
|
|
|
is not the server's preferred time, but the consensus of all preferences.
|
2012-06-11 15:48:46 +02:00
|
|
|
(Default: 5 minutes)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[V3AuthNIntervalsValid]] **V3AuthNIntervalsValid** __NUM__::
|
2010-01-19 14:53:38 +01:00
|
|
|
V3 authoritative directories only. Configures the number of VotingIntervals
|
|
|
|
for which each consensus should be valid for. Choosing high numbers
|
|
|
|
increases network partitioning risks; choosing low numbers increases
|
|
|
|
directory traffic. Note that the actual number of intervals used is not the
|
|
|
|
server's preferred number, but the consensus of all preferences. Must be at
|
2012-06-11 15:48:46 +02:00
|
|
|
least 2. (Default: 3)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[V3BandwidthsFile]] **V3BandwidthsFile** __FILENAME__::
|
2010-10-30 11:04:21 +02:00
|
|
|
V3 authoritative directories only. Configures the location of the
|
2012-07-31 16:16:03 +02:00
|
|
|
bandwidth-authority generated file storing information on relays' measured
|
2012-06-11 15:48:46 +02:00
|
|
|
bandwidth capacities. (Default: unset)
|
2010-10-30 11:04:21 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[V3AuthUseLegacyKey]] **V3AuthUseLegacyKey** **0**|**1**::
|
2011-05-04 04:14:40 +02:00
|
|
|
If set, the directory authority will sign consensuses not only with its
|
|
|
|
own signing key, but also with a "legacy" key and certificate with a
|
|
|
|
different identity. This feature is used to migrate directory authority
|
2012-06-11 15:48:46 +02:00
|
|
|
keys in the event of a compromise. (Default: 0)
|
2011-05-04 04:14:40 +02:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[RephistTrackTime]] **RephistTrackTime** __N__ **seconds**|**minutes**|**hours**|**days**|**weeks**::
|
2011-05-04 04:14:40 +02:00
|
|
|
Tells an authority, or other node tracking node reliability and history,
|
|
|
|
that fine-grained information about nodes can be discarded when it hasn't
|
|
|
|
changed for a given amount of time. (Default: 24 hours)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[AuthDirHasIPv6Connectivity]] **AuthDirHasIPv6Connectivity** **0**|**1**::
|
2012-05-28 14:41:04 +02:00
|
|
|
Authoritative directories only. When set to 0, OR ports with an
|
|
|
|
IPv6 address are being accepted without reachability testing.
|
|
|
|
When set to 1, IPv6 OR ports are being tested just like IPv4 OR
|
2012-09-05 11:41:26 +02:00
|
|
|
ports. (Default: 0)
|
2012-07-19 23:23:22 +02:00
|
|
|
|
2014-04-28 18:37:47 +02:00
|
|
|
[[MinMeasuredBWsForAuthToIgnoreAdvertised]] **MinMeasuredBWsForAuthToIgnoreAdvertised** __N__::
|
|
|
|
A total value, in abstract bandwidth units, describing how much
|
|
|
|
measured total bandwidth an authority should have observed on the network
|
|
|
|
before it will treat advertised bandwidths as wholly
|
|
|
|
unreliable. (Default: 500)
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
HIDDEN SERVICE OPTIONS
|
|
|
|
----------------------
|
|
|
|
|
|
|
|
The following options are used to configure a hidden service.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HiddenServiceDir]] **HiddenServiceDir** __DIRECTORY__::
|
2010-01-19 14:53:38 +01:00
|
|
|
Store data files for a hidden service in DIRECTORY. Every hidden service
|
|
|
|
must have a separate directory. You may use this option multiple times to
|
2016-11-01 17:32:50 +01:00
|
|
|
specify multiple services. If DIRECTORY does not exist, Tor will create it.
|
2014-12-29 14:41:30 +01:00
|
|
|
(Note: in current versions of Tor, if DIRECTORY is a relative path,
|
2016-11-01 17:32:50 +01:00
|
|
|
it will be relative to the current
|
2014-12-29 14:41:30 +01:00
|
|
|
working directory of Tor instance, not to its DataDirectory. Do not
|
|
|
|
rely on this behavior; it is not guaranteed to remain the same in future
|
|
|
|
versions.)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HiddenServicePort]] **HiddenServicePort** __VIRTPORT__ [__TARGET__]::
|
2010-01-19 14:53:38 +01:00
|
|
|
Configure a virtual port VIRTPORT for a hidden service. You may use this
|
|
|
|
option multiple times; each time applies to the service using the most
|
2014-10-04 21:41:05 +02:00
|
|
|
recent HiddenServiceDir. By default, this option maps the virtual port to
|
2012-09-19 14:18:19 +02:00
|
|
|
the same port on 127.0.0.1 over TCP. You may override the target port,
|
2015-10-21 18:22:05 +02:00
|
|
|
address, or both by specifying a target of addr, port, addr:port, or
|
2016-10-03 22:32:00 +02:00
|
|
|
**unix:**__path__. (You can specify an IPv6 target as [addr]:port. Unix
|
|
|
|
paths may be quoted, and may use standard C escapes.)
|
2012-09-19 14:18:19 +02:00
|
|
|
You may also have multiple lines with the same VIRTPORT: when a user
|
|
|
|
connects to that VIRTPORT, one of the TARGETs from those lines will be
|
|
|
|
chosen at random.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[PublishHidServDescriptors]] **PublishHidServDescriptors** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set to 0, Tor will run any hidden services you configure, but it won't
|
|
|
|
advertise them to the rendezvous directory. This option is only useful if
|
|
|
|
you're using a Tor controller that handles hidserv publishing for you.
|
|
|
|
(Default: 1)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HiddenServiceVersion]] **HiddenServiceVersion** __version__,__version__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
A list of rendezvous service descriptor versions to publish for the hidden
|
|
|
|
service. Currently, only version 2 is supported. (Default: 2)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[HiddenServiceAuthorizeClient]] **HiddenServiceAuthorizeClient** __auth-type__ __client-name__,__client-name__,__...__::
|
2010-01-19 14:53:38 +01:00
|
|
|
If configured, the hidden service is accessible for authorized clients
|
|
|
|
only. The auth-type can either be \'basic' for a general-purpose
|
|
|
|
authorization protocol or \'stealth' for a less scalable protocol that also
|
|
|
|
hides service activity from unauthorized clients. Only clients that are
|
|
|
|
listed here are authorized to access the hidden service. Valid client names
|
2014-03-03 13:31:45 +01:00
|
|
|
are 1 to 16 characters long and only use characters in A-Za-z0-9+-_ (no
|
2010-01-19 14:53:38 +01:00
|
|
|
spaces). If this option is set, the hidden service is not accessible for
|
|
|
|
clients without authorization any more. Generated authorization data can be
|
|
|
|
found in the hostname file. Clients need to put this authorization data in
|
|
|
|
their configuration file using **HidServAuth**.
|
|
|
|
|
2015-01-03 18:34:52 +01:00
|
|
|
[[HiddenServiceAllowUnknownPorts]] **HiddenServiceAllowUnknownPorts** **0**|**1**::
|
|
|
|
If set to 1, then connections to unrecognized ports do not cause the
|
2015-01-20 20:07:22 +01:00
|
|
|
current hidden service to close rendezvous circuits. (Setting this to 0 is
|
|
|
|
not an authorization mechanism; it is instead meant to be a mild
|
|
|
|
inconvenience to port-scanners.) (Default: 0)
|
2015-01-03 18:34:52 +01:00
|
|
|
|
2015-05-20 19:33:59 +02:00
|
|
|
[[HiddenServiceMaxStreams]] **HiddenServiceMaxStreams** __N__::
|
|
|
|
The maximum number of simultaneous streams (connections) per rendezvous
|
2017-01-17 21:19:42 +01:00
|
|
|
circuit. The maximum value allowed is 65535. (Setting this to 0 will allow
|
|
|
|
an unlimited number of simultanous streams.) (Default: 0)
|
2015-05-20 19:33:59 +02:00
|
|
|
|
|
|
|
[[HiddenServiceMaxStreamsCloseCircuit]] **HiddenServiceMaxStreamsCloseCircuit** **0**|**1**::
|
|
|
|
If set to 1, then exceeding **HiddenServiceMaxStreams** will cause the
|
|
|
|
offending rendezvous circuit to be torn down, as opposed to stream creation
|
|
|
|
requests that exceed the limit being silently ignored. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[RendPostPeriod]] **RendPostPeriod** __N__ **seconds**|**minutes**|**hours**|**days**|**weeks**::
|
2012-09-19 14:18:19 +02:00
|
|
|
Every time the specified period elapses, Tor uploads any rendezvous
|
2017-01-17 21:19:42 +01:00
|
|
|
service descriptors to the directory servers. This information is also
|
|
|
|
uploaded whenever it changes. Minimum value allowed is 10 minutes and
|
|
|
|
maximum is 3.5 days. (Default: 1 hour)
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2014-08-30 23:14:17 +02:00
|
|
|
[[HiddenServiceDirGroupReadable]] **HiddenServiceDirGroupReadable** **0**|**1**::
|
2014-08-28 20:10:21 +02:00
|
|
|
If this option is set to 1, allow the filesystem group to read the
|
|
|
|
hidden service directory and hostname file. If the option is set to 0,
|
|
|
|
only owner is able to read the hidden service directory. (Default: 0)
|
2014-09-02 20:09:58 +02:00
|
|
|
Has no effect on Windows.
|
2014-08-28 20:10:21 +02:00
|
|
|
|
2015-05-11 21:48:04 +02:00
|
|
|
[[HiddenServiceNumIntroductionPoints]] **HiddenServiceNumIntroductionPoints** __NUM__::
|
|
|
|
Number of introduction points the hidden service will have. You can't
|
|
|
|
have more than 10. (Default: 3)
|
|
|
|
|
2016-09-13 09:28:03 +02:00
|
|
|
[[HiddenServiceSingleHopMode]] **HiddenServiceSingleHopMode** **0**|**1**::
|
2016-07-14 06:04:02 +02:00
|
|
|
**Experimental - Non Anonymous** Hidden Services on a tor instance in
|
2016-09-13 09:28:03 +02:00
|
|
|
HiddenServiceSingleHopMode make one-hop (direct) circuits between the onion
|
2016-07-14 06:04:02 +02:00
|
|
|
service server, and the introduction and rendezvous points. (Onion service
|
|
|
|
descriptors are still posted using 3-hop paths, to avoid onion service
|
|
|
|
directories blocking the service.)
|
|
|
|
This option makes every hidden service instance hosted by a tor instance a
|
|
|
|
Single Onion Service. One-hop circuits make Single Onion servers easily
|
|
|
|
locatable, but clients remain location-anonymous. However, the fact that a
|
|
|
|
client is accessing a Single Onion rather than a Hidden Service may be
|
2016-12-04 16:55:57 +01:00
|
|
|
statistically distinguishable. +
|
|
|
|
+
|
2016-07-14 06:04:02 +02:00
|
|
|
**WARNING:** Once a hidden service directory has been used by a tor
|
2016-09-13 09:28:03 +02:00
|
|
|
instance in HiddenServiceSingleHopMode, it can **NEVER** be used again for
|
2016-07-14 06:04:02 +02:00
|
|
|
a hidden service. It is best practice to create a new hidden service
|
|
|
|
directory, key, and address for each new Single Onion Service and Hidden
|
|
|
|
Service. It is not possible to run Single Onion Services and Hidden
|
|
|
|
Services from the same tor instance: they should be run on different
|
2016-12-04 16:55:57 +01:00
|
|
|
servers with different IP addresses. +
|
|
|
|
+
|
2016-09-13 09:28:03 +02:00
|
|
|
HiddenServiceSingleHopMode requires HiddenServiceNonAnonymousMode to be set
|
2016-11-11 15:46:07 +01:00
|
|
|
to 1. Since a Single Onion service is non-anonymous, you can not configure
|
|
|
|
a SOCKSPort on a tor instance that is running in
|
2017-01-03 04:51:46 +01:00
|
|
|
**HiddenServiceSingleHopMode**. Can not be changed while tor is running.
|
2016-07-14 06:04:02 +02:00
|
|
|
(Default: 0)
|
|
|
|
|
2016-09-13 09:28:03 +02:00
|
|
|
[[HiddenServiceNonAnonymousMode]] **HiddenServiceNonAnonymousMode** **0**|**1**::
|
2016-07-14 06:04:02 +02:00
|
|
|
Makes hidden services non-anonymous on this tor instance. Allows the
|
2016-09-13 09:28:03 +02:00
|
|
|
non-anonymous HiddenServiceSingleHopMode. Enables direct connections in the
|
2016-10-31 20:13:27 +01:00
|
|
|
server-side hidden service protocol. If you are using this option,
|
|
|
|
you need to disable all client-side services on your Tor instance,
|
2017-01-03 04:51:46 +01:00
|
|
|
including setting SOCKSPort to "0". Can not be changed while tor is
|
|
|
|
running. (Default: 0)
|
2016-07-14 06:04:02 +02:00
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
TESTING NETWORK OPTIONS
|
|
|
|
-----------------------
|
|
|
|
|
|
|
|
The following options are used for running a testing Tor network.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingTorNetwork]] **TestingTorNetwork** **0**|**1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If set to 1, Tor adjusts default values of the configuration options below,
|
|
|
|
so that it is easier to set up a testing Tor network. May only be set if
|
2013-11-10 18:21:23 +01:00
|
|
|
non-default set of DirAuthorities is set. Cannot be unset while Tor is
|
|
|
|
running.
|
2010-01-19 14:53:38 +01:00
|
|
|
(Default: 0) +
|
|
|
|
|
|
|
|
ServerDNSAllowBrokenConfig 1
|
|
|
|
DirAllowPrivateAddresses 1
|
|
|
|
EnforceDistinctSubnets 0
|
|
|
|
AssumeReachable 1
|
|
|
|
AuthDirMaxServersPerAddr 0
|
|
|
|
AuthDirMaxServersPerAuthAddr 0
|
2016-04-05 20:43:20 +02:00
|
|
|
ClientBootstrapConsensusAuthorityDownloadSchedule 0, 2,
|
|
|
|
4 (for 40 seconds), 8, 16, 32, 60
|
|
|
|
ClientBootstrapConsensusFallbackDownloadSchedule 0, 1,
|
|
|
|
4 (for 40 seconds), 8, 16, 32, 60
|
|
|
|
ClientBootstrapConsensusAuthorityOnlyDownloadSchedule 0, 1,
|
|
|
|
4 (for 40 seconds), 8, 16, 32, 60
|
|
|
|
ClientBootstrapConsensusMaxDownloadTries 80
|
|
|
|
ClientBootstrapConsensusAuthorityOnlyMaxDownloadTries 80
|
2010-01-19 14:53:38 +01:00
|
|
|
ClientDNSRejectInternalAddresses 0
|
2011-01-26 18:08:52 +01:00
|
|
|
ClientRejectInternalAddresses 0
|
2011-04-05 21:01:19 +02:00
|
|
|
CountPrivateBandwidth 1
|
2010-01-19 14:53:38 +01:00
|
|
|
ExitPolicyRejectPrivate 0
|
2012-08-27 17:16:44 +02:00
|
|
|
ExtendAllowPrivateAddresses 1
|
2010-01-19 14:53:38 +01:00
|
|
|
V3AuthVotingInterval 5 minutes
|
|
|
|
V3AuthVoteDelay 20 seconds
|
|
|
|
V3AuthDistDelay 20 seconds
|
2010-11-08 08:34:03 +01:00
|
|
|
MinUptimeHidServDirectoryV2 0 seconds
|
2010-01-19 14:53:38 +01:00
|
|
|
TestingV3AuthInitialVotingInterval 5 minutes
|
|
|
|
TestingV3AuthInitialVoteDelay 20 seconds
|
|
|
|
TestingV3AuthInitialDistDelay 20 seconds
|
|
|
|
TestingAuthDirTimeToLearnReachability 0 minutes
|
|
|
|
TestingEstimatedDescriptorPropagationTime 0 minutes
|
2013-05-16 12:08:48 +02:00
|
|
|
TestingServerDownloadSchedule 0, 0, 0, 5, 10, 15, 20, 30, 60
|
|
|
|
TestingClientDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60
|
|
|
|
TestingServerConsensusDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60
|
|
|
|
TestingClientConsensusDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60
|
|
|
|
TestingBridgeDownloadSchedule 60, 30, 30, 60
|
|
|
|
TestingClientMaxIntervalWithoutRequest 5 seconds
|
|
|
|
TestingDirConnectionMaxStall 30 seconds
|
|
|
|
TestingConsensusMaxDownloadTries 80
|
|
|
|
TestingDescriptorMaxDownloadTries 80
|
|
|
|
TestingMicrodescMaxDownloadTries 80
|
|
|
|
TestingCertMaxDownloadTries 80
|
2013-05-24 12:01:32 +02:00
|
|
|
TestingEnableConnBwEvent 1
|
2013-05-24 12:29:42 +02:00
|
|
|
TestingEnableCellStatsEvent 1
|
2013-05-25 12:21:09 +02:00
|
|
|
TestingEnableTbEmptyEvent 1
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingV3AuthInitialVotingInterval]] **TestingV3AuthInitialVotingInterval** __N__ **minutes**|**hours**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Like V3AuthVotingInterval, but for initial voting interval before the first
|
|
|
|
consensus has been created. Changing this requires that
|
|
|
|
**TestingTorNetwork** is set. (Default: 30 minutes)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingV3AuthInitialVoteDelay]] **TestingV3AuthInitialVoteDelay** __N__ **minutes**|**hours**::
|
2013-06-05 15:48:57 +02:00
|
|
|
Like V3AuthVoteDelay, but for initial voting interval before
|
2010-01-19 14:53:38 +01:00
|
|
|
the first consensus has been created. Changing this requires that
|
|
|
|
**TestingTorNetwork** is set. (Default: 5 minutes)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingV3AuthInitialDistDelay]] **TestingV3AuthInitialDistDelay** __N__ **minutes**|**hours**::
|
2013-06-05 15:48:57 +02:00
|
|
|
Like V3AuthDistDelay, but for initial voting interval before
|
2010-01-19 14:53:38 +01:00
|
|
|
the first consensus has been created. Changing this requires that
|
|
|
|
**TestingTorNetwork** is set. (Default: 5 minutes)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingV3AuthVotingStartOffset]] **TestingV3AuthVotingStartOffset** __N__ **seconds**|**minutes**|**hours**::
|
2013-06-05 15:48:57 +02:00
|
|
|
Directory authorities offset voting start time by this much.
|
|
|
|
Changing this requires that **TestingTorNetwork** is set. (Default: 0)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingAuthDirTimeToLearnReachability]] **TestingAuthDirTimeToLearnReachability** __N__ **minutes**|**hours**::
|
2010-01-19 14:53:38 +01:00
|
|
|
After starting as an authority, do not make claims about whether routers
|
|
|
|
are Running until this much time has passed. Changing this requires
|
|
|
|
that **TestingTorNetwork** is set. (Default: 30 minutes)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingEstimatedDescriptorPropagationTime]] **TestingEstimatedDescriptorPropagationTime** __N__ **minutes**|**hours**::
|
2015-02-25 15:22:03 +01:00
|
|
|
Clients try downloading server descriptors from directory caches after this
|
2010-01-19 14:53:38 +01:00
|
|
|
time. Changing this requires that **TestingTorNetwork** is set. (Default:
|
|
|
|
10 minutes)
|
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[TestingMinFastFlagThreshold]] **TestingMinFastFlagThreshold** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2013-03-20 18:34:57 +01:00
|
|
|
Minimum value for the Fast flag. Overrides the ordinary minimum taken
|
|
|
|
from the consensus when TestingTorNetwork is set. (Default: 0.)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingServerDownloadSchedule]] **TestingServerDownloadSchedule** __N__,__N__,__...__::
|
2013-05-16 12:08:48 +02:00
|
|
|
Schedule for when servers should download things in general. Changing this
|
|
|
|
requires that **TestingTorNetwork** is set. (Default: 0, 0, 0, 60, 60, 120,
|
|
|
|
300, 900, 2147483647)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingClientDownloadSchedule]] **TestingClientDownloadSchedule** __N__,__N__,__...__::
|
2013-05-16 12:08:48 +02:00
|
|
|
Schedule for when clients should download things in general. Changing this
|
|
|
|
requires that **TestingTorNetwork** is set. (Default: 0, 0, 60, 300, 600,
|
|
|
|
2147483647)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingServerConsensusDownloadSchedule]] **TestingServerConsensusDownloadSchedule** __N__,__N__,__...__::
|
2013-05-16 12:08:48 +02:00
|
|
|
Schedule for when servers should download consensuses. Changing this
|
|
|
|
requires that **TestingTorNetwork** is set. (Default: 0, 0, 60, 300, 600,
|
|
|
|
1800, 1800, 1800, 1800, 1800, 3600, 7200)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingClientConsensusDownloadSchedule]] **TestingClientConsensusDownloadSchedule** __N__,__N__,__...__::
|
2013-05-16 12:08:48 +02:00
|
|
|
Schedule for when clients should download consensuses. Changing this
|
|
|
|
requires that **TestingTorNetwork** is set. (Default: 0, 0, 60, 300, 600,
|
|
|
|
1800, 3600, 3600, 3600, 10800, 21600, 43200)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingBridgeDownloadSchedule]] **TestingBridgeDownloadSchedule** __N__,__N__,__...__::
|
2013-05-16 12:08:48 +02:00
|
|
|
Schedule for when clients should download bridge descriptors. Changing this
|
|
|
|
requires that **TestingTorNetwork** is set. (Default: 3600, 900, 900, 3600)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingClientMaxIntervalWithoutRequest]] **TestingClientMaxIntervalWithoutRequest** __N__ **seconds**|**minutes**::
|
2013-05-16 12:08:48 +02:00
|
|
|
When directory clients have only a few descriptors to request, they batch
|
|
|
|
them until they have more, or until this amount of time has passed.
|
|
|
|
Changing this requires that **TestingTorNetwork** is set. (Default: 10
|
|
|
|
minutes)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingDirConnectionMaxStall]] **TestingDirConnectionMaxStall** __N__ **seconds**|**minutes**::
|
2013-05-16 12:08:48 +02:00
|
|
|
Let a directory connection stall this long before expiring it.
|
|
|
|
Changing this requires that **TestingTorNetwork** is set. (Default:
|
|
|
|
5 minutes)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingConsensusMaxDownloadTries]] **TestingConsensusMaxDownloadTries** __NUM__::
|
2015-12-07 07:55:38 +01:00
|
|
|
Try this many times to download a consensus before giving up. Changing
|
2013-05-16 12:08:48 +02:00
|
|
|
this requires that **TestingTorNetwork** is set. (Default: 8)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingDescriptorMaxDownloadTries]] **TestingDescriptorMaxDownloadTries** __NUM__::
|
2015-02-25 15:22:03 +01:00
|
|
|
Try this often to download a server descriptor before giving up.
|
2013-05-16 12:08:48 +02:00
|
|
|
Changing this requires that **TestingTorNetwork** is set. (Default: 8)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingMicrodescMaxDownloadTries]] **TestingMicrodescMaxDownloadTries** __NUM__::
|
2013-05-16 12:08:48 +02:00
|
|
|
Try this often to download a microdesc descriptor before giving up.
|
|
|
|
Changing this requires that **TestingTorNetwork** is set. (Default: 8)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[TestingCertMaxDownloadTries]] **TestingCertMaxDownloadTries** __NUM__::
|
2013-05-16 12:08:48 +02:00
|
|
|
Try this often to download a v3 authority certificate before giving up.
|
|
|
|
Changing this requires that **TestingTorNetwork** is set. (Default: 8)
|
2013-03-20 18:34:57 +01:00
|
|
|
|
2014-10-01 09:44:21 +02:00
|
|
|
[[TestingDirAuthVoteExit]] **TestingDirAuthVoteExit** __node__,__node__,__...__::
|
2014-11-06 17:10:58 +01:00
|
|
|
A list of identity fingerprints, country codes, and
|
2014-10-01 09:44:21 +02:00
|
|
|
address patterns of nodes to vote Exit for regardless of their
|
|
|
|
uptime, bandwidth, or exit policy. See the **ExcludeNodes**
|
2016-12-04 16:55:57 +01:00
|
|
|
option for more information on how to specify nodes. +
|
2014-10-01 09:44:21 +02:00
|
|
|
+
|
|
|
|
In order for this option to have any effect, **TestingTorNetwork**
|
2014-11-06 17:10:58 +01:00
|
|
|
has to be set. See the **ExcludeNodes** option for more
|
|
|
|
information on how to specify nodes.
|
2014-10-01 09:44:21 +02:00
|
|
|
|
New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags
"option to prevent guard,exit,hsdir flag assignment"
"A node will never receive the corresponding flag unless
that node is specified in the
TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of
its uptime, bandwidth, exit policy, or DirPort".
Patch modified by "teor": VoteOnHidServDirectoriesV2
is now obsolete, so TestingDirAuthVoteHSDir always
votes on HSDirs.
Closes ticket 14882. Patch by "robgjansen".
Commit message and changes file by "teor"
with quotes from "robgjansen".
2015-05-06 15:40:23 +02:00
|
|
|
[[TestingDirAuthVoteExitIsStrict]] **TestingDirAuthVoteExitIsStrict** **0**|**1** ::
|
|
|
|
If True (1), a node will never receive the Exit flag unless it is specified
|
|
|
|
in the **TestingDirAuthVoteExit** list, regardless of its uptime, bandwidth,
|
2016-12-04 16:55:57 +01:00
|
|
|
or exit policy. +
|
New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags
"option to prevent guard,exit,hsdir flag assignment"
"A node will never receive the corresponding flag unless
that node is specified in the
TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of
its uptime, bandwidth, exit policy, or DirPort".
Patch modified by "teor": VoteOnHidServDirectoriesV2
is now obsolete, so TestingDirAuthVoteHSDir always
votes on HSDirs.
Closes ticket 14882. Patch by "robgjansen".
Commit message and changes file by "teor"
with quotes from "robgjansen".
2015-05-06 15:40:23 +02:00
|
|
|
+
|
|
|
|
In order for this option to have any effect, **TestingTorNetwork**
|
|
|
|
has to be set.
|
|
|
|
|
2014-04-28 18:07:57 +02:00
|
|
|
[[TestingDirAuthVoteGuard]] **TestingDirAuthVoteGuard** __node__,__node__,__...__::
|
2014-11-06 17:10:58 +01:00
|
|
|
A list of identity fingerprints and country codes and
|
2013-10-07 09:28:44 +02:00
|
|
|
address patterns of nodes to vote Guard for regardless of their
|
|
|
|
uptime and bandwidth. See the **ExcludeNodes** option for more
|
2016-12-04 16:55:57 +01:00
|
|
|
information on how to specify nodes. +
|
2013-10-07 09:28:44 +02:00
|
|
|
+
|
|
|
|
In order for this option to have any effect, **TestingTorNetwork**
|
|
|
|
has to be set.
|
|
|
|
|
New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags
"option to prevent guard,exit,hsdir flag assignment"
"A node will never receive the corresponding flag unless
that node is specified in the
TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of
its uptime, bandwidth, exit policy, or DirPort".
Patch modified by "teor": VoteOnHidServDirectoriesV2
is now obsolete, so TestingDirAuthVoteHSDir always
votes on HSDirs.
Closes ticket 14882. Patch by "robgjansen".
Commit message and changes file by "teor"
with quotes from "robgjansen".
2015-05-06 15:40:23 +02:00
|
|
|
[[TestingDirAuthVoteGuardIsStrict]] **TestingDirAuthVoteGuardIsStrict** **0**|**1** ::
|
|
|
|
If True (1), a node will never receive the Guard flag unless it is specified
|
2016-12-04 16:55:57 +01:00
|
|
|
in the **TestingDirAuthVoteGuard** list, regardless of its uptime and bandwidth. +
|
New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags
"option to prevent guard,exit,hsdir flag assignment"
"A node will never receive the corresponding flag unless
that node is specified in the
TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of
its uptime, bandwidth, exit policy, or DirPort".
Patch modified by "teor": VoteOnHidServDirectoriesV2
is now obsolete, so TestingDirAuthVoteHSDir always
votes on HSDirs.
Closes ticket 14882. Patch by "robgjansen".
Commit message and changes file by "teor"
with quotes from "robgjansen".
2015-05-06 15:40:23 +02:00
|
|
|
+
|
|
|
|
In order for this option to have any effect, **TestingTorNetwork**
|
|
|
|
has to be set.
|
|
|
|
|
2015-01-10 11:43:31 +01:00
|
|
|
[[TestingDirAuthVoteHSDir]] **TestingDirAuthVoteHSDir** __node__,__node__,__...__::
|
|
|
|
A list of identity fingerprints and country codes and
|
|
|
|
address patterns of nodes to vote HSDir for regardless of their
|
2015-05-06 15:37:38 +02:00
|
|
|
uptime and DirPort. See the **ExcludeNodes** option for more
|
2016-12-04 16:55:57 +01:00
|
|
|
information on how to specify nodes. +
|
2015-01-10 11:43:31 +01:00
|
|
|
+
|
|
|
|
In order for this option to have any effect, **TestingTorNetwork**
|
2015-11-24 03:27:17 +01:00
|
|
|
must be set.
|
2015-01-10 11:43:31 +01:00
|
|
|
|
New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags
"option to prevent guard,exit,hsdir flag assignment"
"A node will never receive the corresponding flag unless
that node is specified in the
TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of
its uptime, bandwidth, exit policy, or DirPort".
Patch modified by "teor": VoteOnHidServDirectoriesV2
is now obsolete, so TestingDirAuthVoteHSDir always
votes on HSDirs.
Closes ticket 14882. Patch by "robgjansen".
Commit message and changes file by "teor"
with quotes from "robgjansen".
2015-05-06 15:40:23 +02:00
|
|
|
[[TestingDirAuthVoteHSDirIsStrict]] **TestingDirAuthVoteHSDirIsStrict** **0**|**1** ::
|
|
|
|
If True (1), a node will never receive the HSDir flag unless it is specified
|
2016-12-04 16:55:57 +01:00
|
|
|
in the **TestingDirAuthVoteHSDir** list, regardless of its uptime and DirPort. +
|
New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags
"option to prevent guard,exit,hsdir flag assignment"
"A node will never receive the corresponding flag unless
that node is specified in the
TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of
its uptime, bandwidth, exit policy, or DirPort".
Patch modified by "teor": VoteOnHidServDirectoriesV2
is now obsolete, so TestingDirAuthVoteHSDir always
votes on HSDirs.
Closes ticket 14882. Patch by "robgjansen".
Commit message and changes file by "teor"
with quotes from "robgjansen".
2015-05-06 15:40:23 +02:00
|
|
|
+
|
|
|
|
In order for this option to have any effect, **TestingTorNetwork**
|
|
|
|
has to be set.
|
|
|
|
|
2013-10-28 11:30:49 +01:00
|
|
|
[[TestingEnableConnBwEvent]] **TestingEnableConnBwEvent** **0**|**1**::
|
2013-05-24 12:01:32 +02:00
|
|
|
If this option is set, then Tor controllers may register for CONN_BW
|
|
|
|
events. Changing this requires that **TestingTorNetwork** is set.
|
|
|
|
(Default: 0)
|
|
|
|
|
2013-10-28 11:30:49 +01:00
|
|
|
[[TestingEnableCellStatsEvent]] **TestingEnableCellStatsEvent** **0**|**1**::
|
2013-05-24 12:29:42 +02:00
|
|
|
If this option is set, then Tor controllers may register for CELL_STATS
|
|
|
|
events. Changing this requires that **TestingTorNetwork** is set.
|
|
|
|
(Default: 0)
|
|
|
|
|
2013-10-28 11:30:49 +01:00
|
|
|
[[TestingEnableTbEmptyEvent]] **TestingEnableTbEmptyEvent** **0**|**1**::
|
2013-05-25 12:21:09 +02:00
|
|
|
If this option is set, then Tor controllers may register for TB_EMPTY
|
|
|
|
events. Changing this requires that **TestingTorNetwork** is set.
|
|
|
|
(Default: 0)
|
|
|
|
|
2016-11-09 15:49:48 +01:00
|
|
|
[[TestingMinExitFlagThreshold]] **TestingMinExitFlagThreshold** __N__ **KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
|
2014-04-28 18:37:47 +02:00
|
|
|
Sets a lower-bound for assigning an exit flag when running as an
|
|
|
|
authority on a testing network. Overrides the usual default lower bound
|
|
|
|
of 4 KB. (Default: 0)
|
2013-03-20 18:34:57 +01:00
|
|
|
|
2015-11-24 02:51:30 +01:00
|
|
|
[[TestingLinkCertLifetime]] **TestingLinkCertLifetime** __N__ **seconds**|**minutes**|**hours**|**days**|**weeks**|**months**::
|
2015-05-28 16:18:42 +02:00
|
|
|
Overrides the default lifetime for the certificates used to authenticate
|
|
|
|
our X509 link cert with our ed25519 signing key.
|
|
|
|
(Default: 2 days)
|
|
|
|
|
|
|
|
[[TestingAuthKeyLifetime]] **TestingAuthKeyLifetime** __N__ **seconds**|**minutes**|**hours**|**days**|**weeks**|**months**::
|
|
|
|
Overrides the default lifetime for a signing Ed25519 TLS Link authentication
|
|
|
|
key.
|
|
|
|
(Default: 2 days)
|
|
|
|
|
2015-11-24 03:21:38 +01:00
|
|
|
[[TestingLinkKeySlop]] **TestingLinkKeySlop** __N__ **seconds**|**minutes**|**hours** +
|
|
|
|
|
|
|
|
[[TestingAuthKeySlop]] **TestingAuthKeySlop** __N__ **seconds**|**minutes**|**hours** +
|
|
|
|
|
2015-05-28 16:18:42 +02:00
|
|
|
[[TestingSigningKeySlop]] **TestingSigningKeySlop** __N__ **seconds**|**minutes**|**hours**::
|
|
|
|
How early before the official expiration of a an Ed25519 signing key do
|
|
|
|
we replace it and issue a new key?
|
|
|
|
(Default: 3 hours for link and auth; 1 day for signing.)
|
|
|
|
|
2017-01-18 16:21:33 +01:00
|
|
|
NON-PERSISTENT OPTIONS
|
|
|
|
----------------------
|
|
|
|
|
|
|
|
These options are not saved to the torrc file by the "SAVECONF" controller
|
|
|
|
command. Other options of this type are documented in control-spec.txt,
|
|
|
|
section 5.4. End-users should mostly ignore them.
|
|
|
|
|
|
|
|
[[UnderscorePorts]] **\_\_ControlPort**, **\_\_DirPort**, **\_\_DNSPort**, **\_\_ExtORPort**, **\_\_NATDPort**, **\_\_ORPort**, **\_\_SocksPort**, **\_\_TransPort**::
|
|
|
|
These underscore-prefixed options are variants of the regular Port
|
|
|
|
options. They behave the same, except they are not saved to the
|
|
|
|
torrc file by the controller's SAVECONF command.
|
|
|
|
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
SIGNALS
|
|
|
|
-------
|
|
|
|
|
|
|
|
Tor catches the following signals:
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SIGTERM]] **SIGTERM**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor will catch this, clean up and sync to disk if necessary, and exit.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SIGINT]] **SIGINT**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor clients behave as with SIGTERM; but Tor servers will do a controlled
|
|
|
|
slow shutdown, closing listeners and waiting 30 seconds before exiting.
|
|
|
|
(The delay can be configured with the ShutdownWaitLength config option.)
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SIGHUP]] **SIGHUP**::
|
2010-01-19 14:53:38 +01:00
|
|
|
The signal instructs Tor to reload its configuration (including closing and
|
2010-07-14 19:48:09 +02:00
|
|
|
reopening logs), and kill and restart its helper processes if applicable.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SIGUSR1]] **SIGUSR1**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Log statistics about current connections, past connections, and throughput.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SIGUSR2]] **SIGUSR2**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Switch all logs to loglevel debug. You can go back to the old loglevels by
|
|
|
|
sending a SIGHUP.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SIGCHLD]] **SIGCHLD**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor receives this signal when one of its helper processes has exited, so it
|
|
|
|
can clean up.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SIGPIPE]] **SIGPIPE**::
|
2010-01-19 14:53:38 +01:00
|
|
|
Tor catches this signal and ignores it.
|
|
|
|
|
2013-10-02 22:21:32 +02:00
|
|
|
[[SIGXFSZ]] **SIGXFSZ**::
|
2010-01-19 14:53:38 +01:00
|
|
|
If this signal exists on your platform, Tor catches and ignores it.
|
|
|
|
|
|
|
|
FILES
|
|
|
|
-----
|
|
|
|
|
|
|
|
**@CONFDIR@/torrc**::
|
|
|
|
The configuration file, which contains "option value" pairs.
|
|
|
|
|
2014-03-27 19:58:46 +01:00
|
|
|
**$HOME/.torrc**::
|
|
|
|
Fallback location for torrc, if @CONFDIR@/torrc is not found.
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
**@LOCALSTATEDIR@/lib/tor/**::
|
|
|
|
The tor process stores keys and other data here.
|
|
|
|
|
|
|
|
__DataDirectory__**/cached-status/**::
|
|
|
|
The most recently downloaded network status document for each authority.
|
|
|
|
Each file holds one such document; the filenames are the hexadecimal
|
2012-08-31 17:35:47 +02:00
|
|
|
identity key fingerprints of the directory authorities. Mostly obsolete.
|
|
|
|
|
2013-11-03 21:27:06 +01:00
|
|
|
__DataDirectory__**/cached-certs**::
|
2013-11-07 20:52:29 +01:00
|
|
|
This file holds downloaded directory key certificates that are used to
|
|
|
|
verify authenticity of documents generated by Tor directory authorities.
|
2013-11-03 21:27:06 +01:00
|
|
|
|
2012-08-31 17:35:47 +02:00
|
|
|
__DataDirectory__**/cached-consensus** and/or **cached-microdesc-consensus**::
|
|
|
|
The most recent consensus network status document we've downloaded.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
|
|
|
__DataDirectory__**/cached-descriptors** and **cached-descriptors.new**::
|
|
|
|
These files hold downloaded router statuses. Some routers may appear more
|
|
|
|
than once; if so, the most recently published descriptor is used. Lines
|
|
|
|
beginning with @-signs are annotations that contain more information about
|
|
|
|
a given router. The ".new" file is an append-only journal; when it gets
|
|
|
|
too large, all entries are merged into a new cached-descriptors file.
|
|
|
|
|
2012-08-31 17:35:47 +02:00
|
|
|
__DataDirectory__**/cached-microdescs** and **cached-microdescs.new**::
|
|
|
|
These files hold downloaded microdescriptors. Lines beginning with
|
|
|
|
@-signs are annotations that contain more information about a given
|
|
|
|
router. The ".new" file is an append-only journal; when it gets too
|
|
|
|
large, all entries are merged into a new cached-microdescs file.
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
__DataDirectory__**/cached-routers** and **cached-routers.new**::
|
|
|
|
Obsolete versions of cached-descriptors and cached-descriptors.new. When
|
|
|
|
Tor can't find the newer files, it looks here instead.
|
|
|
|
|
|
|
|
__DataDirectory__**/state**::
|
|
|
|
A set of persistent key-value mappings. These are documented in
|
|
|
|
the file. These include:
|
|
|
|
- The current entry guards and their status.
|
|
|
|
- The current bandwidth accounting values (unused so far; see
|
|
|
|
below).
|
|
|
|
- When the file was last written
|
|
|
|
- What version of Tor generated the state file
|
2015-02-25 15:22:03 +01:00
|
|
|
- A short history of bandwidth usage, as produced in the server
|
2010-01-19 14:53:38 +01:00
|
|
|
descriptors.
|
|
|
|
|
|
|
|
__DataDirectory__**/bw_accounting**::
|
|
|
|
Used to track bandwidth accounting values (when the current period starts
|
|
|
|
and ends; how much has been read and written so far this period). This file
|
|
|
|
is obsolete, and the data is now stored in the \'state' file as well. Only
|
|
|
|
used when bandwidth accounting is enabled.
|
|
|
|
|
|
|
|
__DataDirectory__**/control_auth_cookie**::
|
|
|
|
Used for cookie authentication with the controller. Location can be
|
|
|
|
overridden by the CookieAuthFile config option. Regenerated on startup. See
|
2015-10-22 19:12:46 +02:00
|
|
|
control-spec.txt in https://spec.torproject.org/[torspec] for details.
|
|
|
|
Only used when cookie authentication is enabled.
|
2015-11-02 01:36:19 +01:00
|
|
|
|
2013-11-03 21:27:06 +01:00
|
|
|
__DataDirectory__**/lock**::
|
2013-11-07 20:52:29 +01:00
|
|
|
This file is used to prevent two Tor instances from using same data
|
2013-11-03 21:27:06 +01:00
|
|
|
directory. If access to this file is locked, data directory is already
|
|
|
|
in use by Tor.
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
__DataDirectory__**/keys/***::
|
|
|
|
Only used by servers. Holds identity keys and onion keys.
|
|
|
|
|
2016-05-11 20:03:34 +02:00
|
|
|
__DataDirectory__**/keys/authority_identity_key**::
|
2016-05-11 22:35:36 +02:00
|
|
|
A v3 directory authority's master identity key, used to authenticate its
|
2016-05-11 20:03:34 +02:00
|
|
|
signing key. Tor doesn't use this while it's running. The tor-gencert
|
|
|
|
program uses this. If you're running an authority, you should keep this
|
|
|
|
key offline, and not actually put it here.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/authority_certificate**::
|
2016-05-11 22:35:36 +02:00
|
|
|
A v3 directory authority's certificate, which authenticates the authority's
|
2016-05-11 20:03:34 +02:00
|
|
|
current vote- and consensus-signing key using its master identity key.
|
|
|
|
Only directory authorities use this file.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/authority_signing_key**::
|
2016-05-11 22:35:36 +02:00
|
|
|
A v3 directory authority's signing key, used to sign votes and consensuses.
|
2016-05-11 20:03:34 +02:00
|
|
|
Only directory authorities use this file. Corresponds to the
|
|
|
|
**authority_certificate** cert.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/legacy_certificate**::
|
|
|
|
As authority_certificate: used only when V3AuthUseLegacyKey is set.
|
|
|
|
See documentation for V3AuthUseLegacyKey.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/legacy_signing_key**::
|
|
|
|
As authority_signing_key: used only when V3AuthUseLegacyKey is set.
|
|
|
|
See documentation for V3AuthUseLegacyKey.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/secret_id_key**::
|
|
|
|
A relay's RSA1024 permanent identity key, including private and public
|
|
|
|
components. Used to sign router descriptors, and to sign other keys.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/ed25519_master_id_public_key**::
|
|
|
|
The public part of a relay's Ed25519 permanent identity key.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/ed25519_master_id_secret_key**::
|
|
|
|
The private part of a relay's Ed25519 permanent identity key. This key
|
|
|
|
is used to sign the medium-term ed25519 signing key. This file can be
|
|
|
|
kept offline, or kept encrypted. If so, Tor will not be able to generate
|
|
|
|
new signing keys itself; you'll need to use tor --keygen yourself to do
|
|
|
|
so.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/ed25519_signing_secret_key**::
|
|
|
|
The private and public components of a relay's medium-term Ed25519 signing
|
|
|
|
key. This key is authenticated by the Ed25519 master key, in turn
|
|
|
|
authenticates other keys (and router descriptors).
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/ed25519_signing_cert**::
|
|
|
|
The certificate which authenticates "ed25519_signing_secret_key" as
|
|
|
|
having been signed by the Ed25519 master key.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/secret_onion_key**::
|
|
|
|
A relay's RSA1024 short-term onion key. Used to decrypt old-style ("TAP")
|
|
|
|
circuit extension requests.
|
|
|
|
|
|
|
|
__DataDirectory__**/keys/secret_onion_key_ntor**::
|
|
|
|
A relay's Curve25519 short-term onion key. Used to handle modern ("ntor")
|
|
|
|
circuit extension requests.
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
__DataDirectory__**/fingerprint**::
|
|
|
|
Only used by servers. Holds the fingerprint of the server's identity key.
|
|
|
|
|
2014-02-26 10:44:55 +01:00
|
|
|
__DataDirectory__**/hashed-fingerprint**::
|
|
|
|
Only used by bridges. Holds the hashed fingerprint of the bridge's
|
|
|
|
identity key. (That is, the hash of the hash of the identity key.)
|
|
|
|
|
2013-11-03 21:27:06 +01:00
|
|
|
__DataDirectory__**/v3-status-votes**::
|
2016-05-11 22:35:36 +02:00
|
|
|
Only for v3 authoritative directory servers. This file contains
|
|
|
|
status votes from all the authoritative directory servers.
|
2013-11-03 21:27:06 +01:00
|
|
|
|
|
|
|
__DataDirectory__**/unverified-consensus**::
|
2013-11-07 20:52:29 +01:00
|
|
|
This file contains a network consensus document that has been downloaded,
|
|
|
|
but which we didn't have the right certificates to check yet.
|
2013-11-03 21:27:06 +01:00
|
|
|
|
|
|
|
__DataDirectory__**/unverified-microdesc-consensus**::
|
2013-11-07 20:52:29 +01:00
|
|
|
This file contains a microdescriptor-flavored network consensus document
|
|
|
|
that has been downloaded, but which we didn't have the right certificates
|
|
|
|
to check yet.
|
2013-11-03 21:27:06 +01:00
|
|
|
|
|
|
|
__DataDirectory__**/unparseable-desc**::
|
2015-02-25 15:22:03 +01:00
|
|
|
Onion server descriptors that Tor was unable to parse are dumped to this
|
2013-11-03 21:27:06 +01:00
|
|
|
file. Only used for debugging.
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
__DataDirectory__**/router-stability**::
|
|
|
|
Only used by authoritative directory servers. Tracks measurements for
|
|
|
|
router mean-time-between-failures so that authorities have a good idea of
|
|
|
|
how to set their Stable flags.
|
|
|
|
|
2014-05-23 01:45:45 +02:00
|
|
|
__DataDirectory__**/stats/dirreq-stats**::
|
2013-11-07 20:52:29 +01:00
|
|
|
Only used by directory caches and authorities. This file is used to
|
|
|
|
collect directory request statistics.
|
2013-11-03 21:27:06 +01:00
|
|
|
|
2014-05-23 01:45:45 +02:00
|
|
|
__DataDirectory__**/stats/entry-stats**::
|
2013-11-03 21:27:06 +01:00
|
|
|
Only used by servers. This file is used to collect incoming connection
|
|
|
|
statistics by Tor entry nodes.
|
|
|
|
|
2014-05-23 01:45:45 +02:00
|
|
|
__DataDirectory__**/stats/bridge-stats**::
|
2013-11-03 21:27:06 +01:00
|
|
|
Only used by servers. This file is used to collect incoming connection
|
|
|
|
statistics by Tor bridges.
|
|
|
|
|
2014-05-23 01:45:45 +02:00
|
|
|
__DataDirectory__**/stats/exit-stats**::
|
2013-11-03 21:27:06 +01:00
|
|
|
Only used by servers. This file is used to collect outgoing connection
|
|
|
|
statistics by Tor exit routers.
|
|
|
|
|
2014-05-23 01:45:45 +02:00
|
|
|
__DataDirectory__**/stats/buffer-stats**::
|
2013-11-07 20:52:29 +01:00
|
|
|
Only used by servers. This file is used to collect buffer usage
|
|
|
|
history.
|
2013-11-03 21:27:06 +01:00
|
|
|
|
2014-05-23 01:45:45 +02:00
|
|
|
__DataDirectory__**/stats/conn-stats**::
|
2013-11-03 21:27:06 +01:00
|
|
|
Only used by servers. This file is used to collect approximate connection
|
2013-11-07 20:52:29 +01:00
|
|
|
history (number of active connections over time).
|
2013-11-03 21:27:06 +01:00
|
|
|
|
2014-11-10 15:03:11 +01:00
|
|
|
__DataDirectory__**/networkstatus-bridges**::
|
|
|
|
Only used by authoritative bridge directories. Contains information
|
|
|
|
about bridges that have self-reported themselves to the bridge
|
|
|
|
authority.
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
__HiddenServiceDirectory__**/hostname**::
|
|
|
|
The <base32-encoded-fingerprint>.onion domain name for this hidden service.
|
|
|
|
If the hidden service is restricted to authorized clients only, this file
|
|
|
|
also contains authorization data for all clients.
|
|
|
|
|
|
|
|
__HiddenServiceDirectory__**/private_key**::
|
|
|
|
The private key for this hidden service.
|
|
|
|
|
|
|
|
__HiddenServiceDirectory__**/client_keys**::
|
|
|
|
Authorization data for a hidden service that is only accessible by
|
|
|
|
authorized clients.
|
|
|
|
|
2016-11-04 08:25:57 +01:00
|
|
|
__HiddenServiceDirectory__**/onion_service_non_anonymous**::
|
|
|
|
This file is present if a hidden service key was created in
|
|
|
|
**HiddenServiceNonAnonymousMode**.
|
|
|
|
|
2010-01-19 14:53:38 +01:00
|
|
|
SEE ALSO
|
|
|
|
--------
|
2014-04-28 18:08:42 +02:00
|
|
|
**torsocks**(1), **torify**(1) +
|
2010-01-19 14:53:38 +01:00
|
|
|
|
|
|
|
**https://www.torproject.org/**
|
|
|
|
|
2015-10-22 19:12:46 +02:00
|
|
|
**torspec: https://spec.torproject.org **
|
2010-01-19 14:53:38 +01:00
|
|
|
|
|
|
|
BUGS
|
|
|
|
----
|
|
|
|
|
2015-11-24 02:26:46 +01:00
|
|
|
Plenty, probably. Tor is still in development. Please report them at https://trac.torproject.org/.
|
2010-01-19 14:53:38 +01:00
|
|
|
|
|
|
|
AUTHORS
|
|
|
|
-------
|
2010-02-22 22:19:35 +01:00
|
|
|
Roger Dingledine [arma at mit.edu], Nick Mathewson [nickm at alum.mit.edu].
|