mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
doc: Explain how to limit Tor's sockets in the man page
Closes 22747.
This commit is contained in:
parent
34083f00ab
commit
40d5b573a4
@ -303,8 +303,15 @@ GENERAL OPTIONS
|
||||
descriptors as the OS will allow (you can find this by "ulimit -H -n").
|
||||
If this number is less than ConnLimit, then Tor will refuse to start. +
|
||||
+
|
||||
You probably don't need to adjust this. It has no effect on Windows
|
||||
since that platform lacks getrlimit(). (Default: 1000)
|
||||
Tor relays need thousands of sockets, to connect to every other relay.
|
||||
If you are running a private bridge, you can reduce the number of sockets
|
||||
that Tor uses. For example, to limit Tor to 500 sockets, run
|
||||
"ulimit -n 500" in a shell. Then start tor in the same shell, with
|
||||
**ConnLimit 500**. You may also need to set **DisableOOSCheck 0**. +
|
||||
+
|
||||
Unless you have severely limited sockets, you probably don't need to
|
||||
adjust **ConnLimit** itself. It has no effect on Windows, since that
|
||||
platform lacks getrlimit(). (Default: 1000)
|
||||
|
||||
[[DisableNetwork]] **DisableNetwork** **0**|**1**::
|
||||
When this option is set, we don't listen for or accept any connections
|
||||
|
Loading…
Reference in New Issue
Block a user