mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 21:23:58 +01:00
Document changed options; tweak formatting slightly
svn:r2937
This commit is contained in:
parent
956b463dfe
commit
0343f4e907
86
doc/tor.1.in
86
doc/tor.1.in
@ -41,11 +41,12 @@ As above, but send log messages to the listed filename. The "Log"
|
||||
option may appear more than once in a configuration file. Messages
|
||||
are sent to all the logs that match their severity level.
|
||||
.TP
|
||||
\fBBandwidthRateBytes \fR\fINUM\fP
|
||||
A token bucket limits the average incoming bandwidth on this node to NUM bytes per second. (Default: 800000)
|
||||
\fBBandwidthRate \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
|
||||
A token bucket limits the average incoming bandwidth on this node to
|
||||
the specified number of bytes second. (Default: 780 KB)
|
||||
.TP
|
||||
\fBBandwidthBurstBytes \fR\fINUM\fP
|
||||
Limit the maximum token bucket size (also known as the burst) to NUM bytes. (Default: 50000000)
|
||||
\fBBandwidthBurst \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
|
||||
Limit the maximum token bucket size (also known as the burst) to the given number of bytes. (Default: 48 MB)
|
||||
.TP
|
||||
\fBDataDirectory \fR\fIDIR\fP
|
||||
Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor)
|
||||
@ -106,6 +107,19 @@ except when the connecting process knows the contents of a file named
|
||||
"control_auth_cookie", which Tor will create in its data directory. This
|
||||
authentication methods should only be used on systems with good filesystem
|
||||
security.
|
||||
\fBDirFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
||||
Every time the specified period elapses, Tor downloads a directory.
|
||||
A directory contains a signed list of all known servers as well as
|
||||
their current their liveness status. (Default: 1 hour)
|
||||
.TP
|
||||
\fBStatusFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
||||
Every time the specified period elapses, Tor downloads signed status
|
||||
information about the current state of known servers. (Default: 20 minutes.)
|
||||
.TP
|
||||
\fBRendPostPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
||||
Every time the specified period elapses, Tor uploads any rendezvous
|
||||
service descriptors to the directory servers. This information is also
|
||||
uploaded whenever it changes. (Default: 10 minutes.)
|
||||
|
||||
.SH CLIENT OPTIONS
|
||||
.PP
|
||||
@ -115,25 +129,18 @@ The following options are useful only for clients (that is, if \fBSOCKSPort\fP i
|
||||
Where on our circuits should we allow Tor servers that the directory
|
||||
servers haven't authenticated as "verified"? (Default: middle,rendezvous.)
|
||||
.TP
|
||||
\fBDirFetchPostPeriod \fR\fIseconds\fP
|
||||
Every N seconds, Tor downloads a fresh directory, and re-uploads
|
||||
information about hidden services to the directory servers. If
|
||||
running as a server, Tor also re-uploads information about itself to
|
||||
the directory servers. (Tor also uploads this information whenever it
|
||||
changes.) (Default: 600.)
|
||||
.TP
|
||||
\fBClientOnly \fR\fB0\fR|\fB1\fR\fP
|
||||
If set to 1, Tor will under no circumstances run as a server. (Usually,
|
||||
you don't need to set this; Tor is pretty smart at figuring out whether
|
||||
you are reliable and high-bandwidth enough to be a good server.)
|
||||
.TP
|
||||
\fBEntryNodes \fR\fInickname,nickname,...\fP
|
||||
\fBEntryNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
A list of preferred nodes to use for the first hop in the circuit, if possible.
|
||||
.TP
|
||||
\fBExitNodes \fR\fInickname,nickname,...\fP
|
||||
\fBExitNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
A list of preferred nodes to use for the last hop in the circuit, if possible.
|
||||
.TP
|
||||
\fBExcludeNodes \fR\fInickname,nickname,...\fP
|
||||
\fBExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
A list of nodes to never use when building a circuit.
|
||||
.TP
|
||||
\fBStrictExitNodes \fR\fB0\fR|\fB1\fR\fP
|
||||
@ -158,7 +165,7 @@ A list of ports that your firewall allows you to connect to. Only used when
|
||||
\fBNewCircuitPeriod \fR\fINUM\fP
|
||||
Every NUM seconds consider whether to build a new circuit. (Default: 60)
|
||||
.TP
|
||||
\fBNodeFamily \fR\fInickname,nickname,...\fP
|
||||
\fBNodeFamily \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
The named Tor servers constitute a "family" of similar or co-administered
|
||||
servers, so never use any two of them in the same circuit. Defining a
|
||||
NodeFamily is only needed when a server doesn't list the family itself
|
||||
@ -167,10 +174,10 @@ NodeFamily is only needed when a server doesn't list the family itself
|
||||
.\" \fBPathlenCoinWeight \fR\fI0.0-1.0\fP
|
||||
.\" Paths are 3 hops plus a geometric distribution centered around this coinweight. Must be >=0.0 and <1.0. (Default: 0.3) NOT USED CURRENTLY
|
||||
.\" .TP
|
||||
\fBRendNodes \fR\fInickname,nickname,...\fP
|
||||
\fBRendNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
A list of preferred nodes to use for the rendezvous point, if possible.
|
||||
.TP
|
||||
\fBRendExcludeNodes \fR\fInickname,nickname,...\fP
|
||||
\fBRendExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
A list of nodes to never use when choosing a rendezvous point.
|
||||
.TP
|
||||
\fBSOCKSPort \fR\fIPORT\fP
|
||||
@ -181,7 +188,7 @@ Set this to 0 if you don't want to allow application connections. (Default:
|
||||
\fBSOCKSBindAddress \fR\fIIP\fP
|
||||
Bind to this address to listen for connections from socks-speaking applications. (Default: 127.0.0.1) You can also specify a port (e.g. 192.168.0.1:9100). This directive can be specified multiple times to bind to multiple addresses/ports.
|
||||
.TP
|
||||
\fBSOCKSPolicy \fR\fIpolicy,policy,...\fP
|
||||
\fBSOCKSPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
|
||||
Set an entrance policy for this server, to limit who can connect to the socks ports. The policies have the same form as exit policies below.
|
||||
|
||||
.SH SERVER OPTIONS
|
||||
@ -192,10 +199,10 @@ The following options are useful only for servers (that is, if \fBORPort\fP is n
|
||||
The IP or fqdn of this server (e.g. moria.mit.edu). You can leave this
|
||||
unset, and Tor will guess your IP.
|
||||
.TP
|
||||
\fBContactInfo \fR\fIemail address\fP
|
||||
\fBContactInfo \fR\fIemail_address\fP
|
||||
Administrative contact information for server.
|
||||
.TP
|
||||
\fBExitPolicy \fR\fIpolicy,policy,...\fP
|
||||
\fBExitPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
|
||||
Set an exit policy for this server. Each policy is of the form
|
||||
"\fBreject\fP \fIADDR\fP\fB/\fP\fIMASK\fP\fB:\fP\fIPORT\fP".
|
||||
If \fB/\fP\fIMASK\fP is omitted then this policy just applies to the host
|
||||
@ -240,7 +247,7 @@ space. The default exit policy is:
|
||||
\fBMaxOnionsPending \fR\fINUM\fP
|
||||
If you have more than this number of onionskins queued for decrypt, reject new ones. (Default: 100)
|
||||
.TP
|
||||
\fBMyFamily \fR\fInickname,nickname,...\fP
|
||||
\fBMyFamily \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
Declare that this Tor server is controlled or administered by a group
|
||||
or organization identical or similar to that of the other named servers.
|
||||
When two servers both declare that they are in the same 'family', Tor clients
|
||||
@ -271,20 +278,33 @@ redirection is to be performed on a given set of addresses by using the
|
||||
special target string "pass", which prevents subsequent rules from being
|
||||
considered.
|
||||
.TP
|
||||
\fBAccountingMaxKB \fR\fInum\fP
|
||||
Never send more than \fInum\fP kilobytes in a given accounting period,
|
||||
or receive more than \fInum\fP kilobytes in the period (currently,
|
||||
only months are supported). When the number of kilobytes is exhausted,
|
||||
Tor will hibernate until some time
|
||||
in the next accounting period. If you have bandwidth cost issues,
|
||||
\fBDirPostPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
|
||||
Every time the specified period elapses, Tor uploads its server
|
||||
descriptors to the directory servers. This information is also
|
||||
uploaded whenever it changes. (Default: 10 minutes.)
|
||||
.TP
|
||||
\fBAccountingMax \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
|
||||
Never send more than the specified number of bytes in a given
|
||||
accounting period,or receive more than that number in the period.
|
||||
When the number of bytes is exhausted, Tor will hibernate until some
|
||||
time in the next accounting period. To prevent all servers from
|
||||
waking at the same time, Tor will also wait until a random point in
|
||||
each period before waking up. If you have bandwidth cost issues,
|
||||
using this option is preferable to setting a low bandwidth, since it
|
||||
provides users with a collection of fast servers that are up some of
|
||||
the time, which is more useful than a set of slow servers that are
|
||||
always "available".
|
||||
.TP
|
||||
\fBMonthlyAccountingStart \fR\fIday\fP
|
||||
Always start the accounting period on the provided day of the month,
|
||||
which must be between 1 and 28. (Defaults to 1.)
|
||||
\fBAccountingStart \fR\fBday\fR|\fBweek\fR|\fBmonth\fR [\fIday\fR] \fIHH:MM\fR\fP
|
||||
Specify how long accounting periods last. If \fBmonth\fP is given,
|
||||
each accounting period runs from the time \fIHH:MM\fR on the
|
||||
\fIday\fRth day of one month to the same day and time of the next.
|
||||
(The day must be between 1 and 28.) If \fBweek\fP is given, each
|
||||
accounting period runs from the time \fIHH:MM\fR of the \fIday\fRth
|
||||
day of one week to the same day and time of the next week, with Monday
|
||||
as day 1 and Sunday as day 7. If \fBday\fR is given, each accounting
|
||||
period runs from the time \fIHH:MM\fR each day to the same time on the
|
||||
next day. All times are local. (Defaults to "month 1 0:00".)
|
||||
|
||||
.SH DIRECTORY SERVER OPTIONS
|
||||
.PP
|
||||
@ -304,7 +324,7 @@ Bind the directory service to this port.
|
||||
\fBDirBindAddress \fR\fIIP\fP
|
||||
Bind the directory service to this address. (Default: 0.0.0.0)
|
||||
.TP
|
||||
\fBDirPolicy \fR\fIpolicy,policy,...\fP
|
||||
\fBDirPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
|
||||
Set an entrance policy for this server, to limit who can connect to the directory ports. The policies have the same form as exit policies above.
|
||||
.TP
|
||||
\fBRecommendedVersions \fR\fISTRING\fP
|
||||
@ -336,11 +356,11 @@ hiddenservicedir. By default, this option maps the virtual port to the
|
||||
same port on 127.0.0.1. You may override the target port, address, or both
|
||||
by specifying a target of addr, port, or addr:port.
|
||||
.TP
|
||||
\fBHiddenServiceNodes \fR\fInickname,nickname,...\fP
|
||||
\fBHiddenServiceNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
If possible, use the specified nodes as introduction points for the hidden
|
||||
service.
|
||||
.TP
|
||||
\fBHiddenServiceExcludeNodes \fR\fInickname,nickname,...\fP
|
||||
\fBHiddenServiceExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
|
||||
Do not use the specified nodes as introduction points for the hidden
|
||||
service.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user