Document changed options; tweak formatting slightly

svn:r2937
This commit is contained in:
Nick Mathewson 2004-11-22 21:58:55 +00:00
parent 956b463dfe
commit 0343f4e907

View File

@ -41,11 +41,12 @@ As above, but send log messages to the listed filename. The "Log"
option may appear more than once in a configuration file. Messages
are sent to all the logs that match their severity level.
.TP
\fBBandwidthRateBytes \fR\fINUM\fP
A token bucket limits the average incoming bandwidth on this node to NUM bytes per second. (Default: 800000)
\fBBandwidthRate \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
A token bucket limits the average incoming bandwidth on this node to
the specified number of bytes second. (Default: 780 KB)
.TP
\fBBandwidthBurstBytes \fR\fINUM\fP
Limit the maximum token bucket size (also known as the burst) to NUM bytes. (Default: 50000000)
\fBBandwidthBurst \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
Limit the maximum token bucket size (also known as the burst) to the given number of bytes. (Default: 48 MB)
.TP
\fBDataDirectory \fR\fIDIR\fP
Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor)
@ -106,6 +107,19 @@ except when the connecting process knows the contents of a file named
"control_auth_cookie", which Tor will create in its data directory. This
authentication methods should only be used on systems with good filesystem
security.
\fBDirFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
Every time the specified period elapses, Tor downloads a directory.
A directory contains a signed list of all known servers as well as
their current their liveness status. (Default: 1 hour)
.TP
\fBStatusFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
Every time the specified period elapses, Tor downloads signed status
information about the current state of known servers. (Default: 20 minutes.)
.TP
\fBRendPostPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
Every time the specified period elapses, Tor uploads any rendezvous
service descriptors to the directory servers. This information is also
uploaded whenever it changes. (Default: 10 minutes.)
.SH CLIENT OPTIONS
.PP
@ -115,25 +129,18 @@ The following options are useful only for clients (that is, if \fBSOCKSPort\fP i
Where on our circuits should we allow Tor servers that the directory
servers haven't authenticated as "verified"? (Default: middle,rendezvous.)
.TP
\fBDirFetchPostPeriod \fR\fIseconds\fP
Every N seconds, Tor downloads a fresh directory, and re-uploads
information about hidden services to the directory servers. If
running as a server, Tor also re-uploads information about itself to
the directory servers. (Tor also uploads this information whenever it
changes.) (Default: 600.)
.TP
\fBClientOnly \fR\fB0\fR|\fB1\fR\fP
If set to 1, Tor will under no circumstances run as a server. (Usually,
you don't need to set this; Tor is pretty smart at figuring out whether
you are reliable and high-bandwidth enough to be a good server.)
.TP
\fBEntryNodes \fR\fInickname,nickname,...\fP
\fBEntryNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of preferred nodes to use for the first hop in the circuit, if possible.
.TP
\fBExitNodes \fR\fInickname,nickname,...\fP
\fBExitNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of preferred nodes to use for the last hop in the circuit, if possible.
.TP
\fBExcludeNodes \fR\fInickname,nickname,...\fP
\fBExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of nodes to never use when building a circuit.
.TP
\fBStrictExitNodes \fR\fB0\fR|\fB1\fR\fP
@ -158,7 +165,7 @@ A list of ports that your firewall allows you to connect to. Only used when
\fBNewCircuitPeriod \fR\fINUM\fP
Every NUM seconds consider whether to build a new circuit. (Default: 60)
.TP
\fBNodeFamily \fR\fInickname,nickname,...\fP
\fBNodeFamily \fR\fInickname\fR,\fInickname\fR,\fI...\fP
The named Tor servers constitute a "family" of similar or co-administered
servers, so never use any two of them in the same circuit. Defining a
NodeFamily is only needed when a server doesn't list the family itself
@ -167,10 +174,10 @@ NodeFamily is only needed when a server doesn't list the family itself
.\" \fBPathlenCoinWeight \fR\fI0.0-1.0\fP
.\" Paths are 3 hops plus a geometric distribution centered around this coinweight. Must be >=0.0 and <1.0. (Default: 0.3) NOT USED CURRENTLY
.\" .TP
\fBRendNodes \fR\fInickname,nickname,...\fP
\fBRendNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of preferred nodes to use for the rendezvous point, if possible.
.TP
\fBRendExcludeNodes \fR\fInickname,nickname,...\fP
\fBRendExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of nodes to never use when choosing a rendezvous point.
.TP
\fBSOCKSPort \fR\fIPORT\fP
@ -181,7 +188,7 @@ Set this to 0 if you don't want to allow application connections. (Default:
\fBSOCKSBindAddress \fR\fIIP\fP
Bind to this address to listen for connections from socks-speaking applications. (Default: 127.0.0.1) You can also specify a port (e.g. 192.168.0.1:9100). This directive can be specified multiple times to bind to multiple addresses/ports.
.TP
\fBSOCKSPolicy \fR\fIpolicy,policy,...\fP
\fBSOCKSPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
Set an entrance policy for this server, to limit who can connect to the socks ports. The policies have the same form as exit policies below.
.SH SERVER OPTIONS
@ -192,10 +199,10 @@ The following options are useful only for servers (that is, if \fBORPort\fP is n
The IP or fqdn of this server (e.g. moria.mit.edu). You can leave this
unset, and Tor will guess your IP.
.TP
\fBContactInfo \fR\fIemail address\fP
\fBContactInfo \fR\fIemail_address\fP
Administrative contact information for server.
.TP
\fBExitPolicy \fR\fIpolicy,policy,...\fP
\fBExitPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
Set an exit policy for this server. Each policy is of the form
"\fBreject\fP \fIADDR\fP\fB/\fP\fIMASK\fP\fB:\fP\fIPORT\fP".
If \fB/\fP\fIMASK\fP is omitted then this policy just applies to the host
@ -240,7 +247,7 @@ space. The default exit policy is:
\fBMaxOnionsPending \fR\fINUM\fP
If you have more than this number of onionskins queued for decrypt, reject new ones. (Default: 100)
.TP
\fBMyFamily \fR\fInickname,nickname,...\fP
\fBMyFamily \fR\fInickname\fR,\fInickname\fR,\fI...\fP
Declare that this Tor server is controlled or administered by a group
or organization identical or similar to that of the other named servers.
When two servers both declare that they are in the same 'family', Tor clients
@ -271,20 +278,33 @@ redirection is to be performed on a given set of addresses by using the
special target string "pass", which prevents subsequent rules from being
considered.
.TP
\fBAccountingMaxKB \fR\fInum\fP
Never send more than \fInum\fP kilobytes in a given accounting period,
or receive more than \fInum\fP kilobytes in the period (currently,
only months are supported). When the number of kilobytes is exhausted,
Tor will hibernate until some time
in the next accounting period. If you have bandwidth cost issues,
\fBDirPostPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
Every time the specified period elapses, Tor uploads its server
descriptors to the directory servers. This information is also
uploaded whenever it changes. (Default: 10 minutes.)
.TP
\fBAccountingMax \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
Never send more than the specified number of bytes in a given
accounting period,or receive more than that number in the period.
When the number of bytes is exhausted, Tor will hibernate until some
time in the next accounting period. To prevent all servers from
waking at the same time, Tor will also wait until a random point in
each period before waking up. If you have bandwidth cost issues,
using this option is preferable to setting a low bandwidth, since it
provides users with a collection of fast servers that are up some of
the time, which is more useful than a set of slow servers that are
always "available".
.TP
\fBMonthlyAccountingStart \fR\fIday\fP
Always start the accounting period on the provided day of the month,
which must be between 1 and 28. (Defaults to 1.)
\fBAccountingStart \fR\fBday\fR|\fBweek\fR|\fBmonth\fR [\fIday\fR] \fIHH:MM\fR\fP
Specify how long accounting periods last. If \fBmonth\fP is given,
each accounting period runs from the time \fIHH:MM\fR on the
\fIday\fRth day of one month to the same day and time of the next.
(The day must be between 1 and 28.) If \fBweek\fP is given, each
accounting period runs from the time \fIHH:MM\fR of the \fIday\fRth
day of one week to the same day and time of the next week, with Monday
as day 1 and Sunday as day 7. If \fBday\fR is given, each accounting
period runs from the time \fIHH:MM\fR each day to the same time on the
next day. All times are local. (Defaults to "month 1 0:00".)
.SH DIRECTORY SERVER OPTIONS
.PP
@ -304,7 +324,7 @@ Bind the directory service to this port.
\fBDirBindAddress \fR\fIIP\fP
Bind the directory service to this address. (Default: 0.0.0.0)
.TP
\fBDirPolicy \fR\fIpolicy,policy,...\fP
\fBDirPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
Set an entrance policy for this server, to limit who can connect to the directory ports. The policies have the same form as exit policies above.
.TP
\fBRecommendedVersions \fR\fISTRING\fP
@ -336,11 +356,11 @@ hiddenservicedir. By default, this option maps the virtual port to the
same port on 127.0.0.1. You may override the target port, address, or both
by specifying a target of addr, port, or addr:port.
.TP
\fBHiddenServiceNodes \fR\fInickname,nickname,...\fP
\fBHiddenServiceNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
If possible, use the specified nodes as introduction points for the hidden
service.
.TP
\fBHiddenServiceExcludeNodes \fR\fInickname,nickname,...\fP
\fBHiddenServiceExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
Do not use the specified nodes as introduction points for the hidden
service.