Merge remote-tracking branch 'tor-github/pr/1761/head'

This commit is contained in:
Nick Mathewson 2020-02-24 08:06:42 -05:00
commit b6d9484fa7
2 changed files with 50 additions and 43 deletions

4
changes/ticket33369 Normal file
View File

@ -0,0 +1,4 @@
o Documentation (manpage):
- Add cross reference links and a table of contents to the HTML
tor manpage. Closes ticket 33369. Work by Swati Thacker as
part of Google Season of Docs.

View File

@ -9,12 +9,12 @@
// attribute to make it easier to write names containing double underscores // attribute to make it easier to write names containing double underscores
:dbl_: __ :dbl_: __
= TOR(1) = TOR(1)
:toc:
== NAME == NAME
tor - The second-generation onion router tor - The second-generation onion router
== SYNOPSIS == SYNOPSIS
**tor** [__OPTION__ __value__]... **tor** [__OPTION__ __value__]...
@ -158,7 +158,7 @@ The following options in this section are only recognized on the
When generating a master key, you may want to use When generating a master key, you may want to use
**`--DataDirectory`** to control where the keys and certificates **`--DataDirectory`** to control where the keys and certificates
will be stored, and **`--SigningKeyLifetime`** to control their will be stored, and **`--SigningKeyLifetime`** to control their
lifetimes. See the server options section to learn more about the lifetimes. See <<server-options,SERVER OPTIONS>> to learn more about the
behavior of these options. You must have write access to the behavior of these options. You must have write access to the
specified DataDirectory. specified DataDirectory.
+ +
@ -427,7 +427,7 @@ forward slash (/) in the configuration file and on the command line.
[[CookieAuthFile]] **CookieAuthFile** __Path__:: [[CookieAuthFile]] **CookieAuthFile** __Path__::
If set, this option overrides the default location and file name If set, this option overrides the default location and file name
for Tor's cookie file. (See CookieAuthentication above.) for Tor's cookie file. (See <<CookieAuthentication,CookieAuthentication>>.)
[[CookieAuthFileGroupReadable]] **CookieAuthFileGroupReadable** **0**|**1**:: [[CookieAuthFileGroupReadable]] **CookieAuthFileGroupReadable** **0**|**1**::
If this option is set to 0, don't allow the filesystem group to read the If this option is set to 0, don't allow the filesystem group to read the
@ -561,7 +561,7 @@ forward slash (/) in the configuration file and on the command line.
+ +
By default, the directory authorities are also FallbackDirs. Specifying a By default, the directory authorities are also FallbackDirs. Specifying a
FallbackDir replaces Tor's default hard-coded FallbackDirs (if any). FallbackDir replaces Tor's default hard-coded FallbackDirs (if any).
(See the **DirAuthority** entry for an explanation of each flag.) (See <<DirAuthority,DirAuthority>> for an explanation of each flag.)
[[FetchDirInfoEarly]] **FetchDirInfoEarly** **0**|**1**:: [[FetchDirInfoEarly]] **FetchDirInfoEarly** **0**|**1**::
If set to 1, Tor will always fetch directory information like other If set to 1, Tor will always fetch directory information like other
@ -859,7 +859,7 @@ forward slash (/) in the configuration file and on the command line.
**KIST**: Kernel-Informed Socket Transport. Tor will use TCP information **KIST**: Kernel-Informed Socket Transport. Tor will use TCP information
from the kernel to make informed decisions regarding how much data to send from the kernel to make informed decisions regarding how much data to send
and when to send it. KIST also handles traffic in batches (see and when to send it. KIST also handles traffic in batches (see
KISTSchedRunInterval) in order to improve traffic prioritization decisions. <<KISTSchedRunInterval,KISTSchedRunInterval>>) in order to improve traffic prioritization decisions.
As implemented, KIST will only work on Linux kernel version 2.6.39 or As implemented, KIST will only work on Linux kernel version 2.6.39 or
higher. + higher. +
+ +
@ -1140,7 +1140,7 @@ The following options are useful only for clients (that is, if
doesn't handle arbitrary DNS request types. Set the port to "auto" to doesn't handle arbitrary DNS request types. Set the port to "auto" to
have Tor pick a port for have Tor pick a port for
you. This directive can be specified multiple times to bind to multiple you. This directive can be specified multiple times to bind to multiple
addresses/ports. See SocksPort for an explanation of isolation addresses/ports. See <<SocksPort,SocksPort>> for an explanation of isolation
flags. (Default: 0) flags. (Default: 0)
[[DownloadExtraInfo]] **DownloadExtraInfo** **0**|**1**:: [[DownloadExtraInfo]] **DownloadExtraInfo** **0**|**1**::
@ -1156,7 +1156,7 @@ The following options are useful only for clients (that is, if
[[FascistFirewall]] **FascistFirewall** **0**|**1**:: [[FascistFirewall]] **FascistFirewall** **0**|**1**::
If 1, Tor will only create outgoing connections to ORs running on ports If 1, Tor will only create outgoing connections to ORs running on ports
that your firewall allows (defaults to 80 and 443; see **FirewallPorts**). that your firewall allows (defaults to 80 and 443; see <<FirewallPorts,FirewallPorts>>).
This will allow you to run Tor as a client behind a firewall with This will allow you to run Tor as a client behind a firewall with
restrictive policies, but will not allow you to run as a server behind such restrictive policies, but will not allow you to run as a server behind such
a firewall. If you prefer more fine-grained control, use a firewall. If you prefer more fine-grained control, use
@ -1185,7 +1185,7 @@ The following options are useful only for clients (that is, if
specified multiple times to bind to multiple addresses/ports. If multiple specified multiple times to bind to multiple addresses/ports. If multiple
entries of this option are present in your configuration file, Tor will entries of this option are present in your configuration file, Tor will
perform stream isolation between listeners by default. See perform stream isolation between listeners by default. See
SOCKSPort for an explanation of isolation flags. (Default: 0) <<SocksPort,SocksPort>> for an explanation of isolation flags. (Default: 0)
[[LongLivedPorts]] **LongLivedPorts** __PORTS__:: [[LongLivedPorts]] **LongLivedPorts** __PORTS__::
A list of ports for services that tend to have long-running connections A list of ports for services that tend to have long-running connections
@ -1270,7 +1270,7 @@ The following options are useful only for clients (that is, if
specified multiple times to bind to multiple addresses/ports. If multiple specified multiple times to bind to multiple addresses/ports. If multiple
entries of this option are present in your configuration file, Tor will entries of this option are present in your configuration file, Tor will
perform stream isolation between listeners by default. See perform stream isolation between listeners by default. See
SocksPort for an explanation of isolation flags. + <<SocksPort,SocksPort>> for an explanation of isolation flags. +
+ +
This option is only for people who cannot use TransPort. (Default: 0) This option is only for people who cannot use TransPort. (Default: 0)
@ -1381,7 +1381,7 @@ The following options are useful only for clients (that is, if
+ +
The separation between **ReachableORAddresses** and The separation between **ReachableORAddresses** and
**ReachableDirAddresses** is only interesting when you are connecting **ReachableDirAddresses** is only interesting when you are connecting
through proxies (see **HTTPProxy** and **HTTPSProxy**). Most proxies limit through proxies (see <<HTTPProxy,HTTPProxy>> and <<HTTPSProxy,HTTPSProxy>>). Most proxies limit
TLS connections (which Tor uses to connect to Onion Routers) to port 443, TLS connections (which Tor uses to connect to Onion Routers) to port 443,
and some limit HTTP GET requests (which Tor uses for fetching directory and some limit HTTP GET requests (which Tor uses for fetching directory
information) to port 80. information) to port 80.
@ -1397,7 +1397,7 @@ The following options are useful only for clients (that is, if
[[TestSocks]] **TestSocks** **0**|**1**:: [[TestSocks]] **TestSocks** **0**|**1**::
When this option is enabled, Tor will make a notice-level log entry for When this option is enabled, Tor will make a notice-level log entry for
each connection to the Socks port indicating whether the request used a each connection to the Socks port indicating whether the request used a
safe socks protocol or an unsafe one (see above entry on SafeSocks). This safe socks protocol or an unsafe one (see <<SafeSocks,SafeSocks>>). This
helps to determine whether an application using Tor is possibly leaking helps to determine whether an application using Tor is possibly leaking
DNS requests. (Default: 0) DNS requests. (Default: 0)
@ -1627,7 +1627,7 @@ The following options are useful only for clients (that is, if
specified multiple times to bind to multiple addresses/ports. If multiple specified multiple times to bind to multiple addresses/ports. If multiple
entries of this option are present in your configuration file, Tor will entries of this option are present in your configuration file, Tor will
perform stream isolation between listeners by default. See perform stream isolation between listeners by default. See
SOCKSPort for an explanation of isolation flags. + <<SocksPort,SocksPort>> for an explanation of isolation flags. +
+ +
TransPort requires OS support for transparent proxies, such as BSDs' pf or TransPort requires OS support for transparent proxies, such as BSDs' pf or
Linux's IPTables. If you're planning to use Tor as a transparent proxy for Linux's IPTables. If you're planning to use Tor as a transparent proxy for
@ -1842,7 +1842,7 @@ different from other Tor clients:
+ +
The ExcludeNodes option overrides this option: any node listed in both The ExcludeNodes option overrides this option: any node listed in both
EntryNodes and ExcludeNodes is treated as excluded. See EntryNodes and ExcludeNodes is treated as excluded. See
the **ExcludeNodes** option for more information on how to specify nodes. <<ExcludeNodes,ExcludeNodes>> for more information on how to specify nodes.
[[ExcludeNodes]] **ExcludeNodes** __node__,__node__,__...__:: [[ExcludeNodes]] **ExcludeNodes** __node__,__node__,__...__::
A list of identity fingerprints, country codes, and address A list of identity fingerprints, country codes, and address
@ -1866,7 +1866,7 @@ different from other Tor clients:
+ +
Country codes are case-insensitive. The code "\{??}" refers to nodes whose Country codes are case-insensitive. The code "\{??}" refers to nodes whose
country can't be identified. No country code, including \{??}, works if country can't be identified. No country code, including \{??}, works if
no GeoIPFile can be loaded. See also the GeoIPExcludeUnknown option below. no GeoIPFile can be loaded. See also the <<GeoIPExcludeUnknown,GeoIPExcludeUnknown>> option below.
// Out of order because it logically belongs after the ExcludeNodes option // Out of order because it logically belongs after the ExcludeNodes option
[[ExcludeExitNodes]] **ExcludeExitNodes** __node__,__node__,__...__:: [[ExcludeExitNodes]] **ExcludeExitNodes** __node__,__node__,__...__::
@ -1875,14 +1875,14 @@ different from other Tor clients:
node that delivers traffic for you *outside* the Tor network. Note that any node that delivers traffic for you *outside* the Tor network. Note that any
node listed in ExcludeNodes is automatically considered to be part of this node listed in ExcludeNodes is automatically considered to be part of this
list too. See list too. See
the **ExcludeNodes** option for more information on how to specify <<ExcludeNodes,ExcludeNodes>> for more information on how to specify
nodes. See also the caveats on the "ExitNodes" option below. nodes. See also the caveats on the <<ExitNodes,ExitNodes>> option below.
[[ExitNodes]] **ExitNodes** __node__,__node__,__...__:: [[ExitNodes]] **ExitNodes** __node__,__node__,__...__::
A list of identity fingerprints, country codes, and address A list of identity fingerprints, country codes, and address
patterns of nodes to use as exit node---that is, a patterns of nodes to use as exit node---that is, a
node that delivers traffic for you *outside* the Tor network. See node that delivers traffic for you *outside* the Tor network. See
the **ExcludeNodes** option for more information on how to specify nodes. + <<ExcludeNodes,ExcludeNodes>> for more information on how to specify nodes. +
+ +
Note that if you list too few nodes here, or if you exclude too many exit Note that if you list too few nodes here, or if you exclude too many exit
nodes with ExcludeExitNodes, you can degrade functionality. For example, nodes with ExcludeExitNodes, you can degrade functionality. For example,
@ -1894,7 +1894,7 @@ different from other Tor clients:
used to connect to hidden services, those that do directory fetches, used to connect to hidden services, those that do directory fetches,
those used for relay reachability self-tests, and so on) that end those used for relay reachability self-tests, and so on) that end
at a non-exit node. To at a non-exit node. To
keep a node from being used entirely, see ExcludeNodes and StrictNodes. + keep a node from being used entirely, see <<ExcludeNodes,ExcludeNodes>> and <<StrictNodes,StrictNodes>>. +
+ +
The ExcludeNodes option overrides this option: any node listed in both The ExcludeNodes option overrides this option: any node listed in both
ExitNodes and ExcludeNodes is treated as excluded. + ExitNodes and ExcludeNodes is treated as excluded. +
@ -2038,7 +2038,7 @@ different from other Tor clients:
+ +
The ExcludeNodes option overrides this option: any node listed in both The ExcludeNodes option overrides this option: any node listed in both
MiddleNodes and ExcludeNodes is treated as excluded. See MiddleNodes and ExcludeNodes is treated as excluded. See
the **ExcludeNodes** option for more information on how to specify nodes. the <<ExcludeNodes,ExcludeNodes>> for more information on how to specify nodes.
[[NodeFamily]] **NodeFamily** __node__,__node__,__...__:: [[NodeFamily]] **NodeFamily** __node__,__node__,__...__::
The Tor servers, defined by their identity fingerprints, The Tor servers, defined by their identity fingerprints,
@ -2047,7 +2047,7 @@ different from other Tor clients:
when a server doesn't list the family itself (with MyFamily). This option when a server doesn't list the family itself (with MyFamily). This option
can be used multiple times; each instance defines a separate family. In can be used multiple times; each instance defines a separate family. In
addition to nodes, you can also list IP address and ranges and country addition to nodes, you can also list IP address and ranges and country
codes in {curly braces}. See the **ExcludeNodes** option for more codes in {curly braces}. See <<ExcludeNodes,ExcludeNodes>> for more
information on how to specify nodes. information on how to specify nodes.
[[StrictNodes]] **StrictNodes** **0**|**1**:: [[StrictNodes]] **StrictNodes** **0**|**1**::
@ -2063,6 +2063,7 @@ different from other Tor clients:
fulfill a .exit request, upload directory information, or download fulfill a .exit request, upload directory information, or download
directory information. (Default: 0) directory information. (Default: 0)
[[server-options]]
== SERVER OPTIONS == SERVER OPTIONS
// These options are in alphabetical order, with exceptions as noted. // These options are in alphabetical order, with exceptions as noted.
@ -2073,7 +2074,7 @@ is non-zero):
[[AccountingMax]] **AccountingMax** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**:: [[AccountingMax]] **AccountingMax** __N__ **bytes**|**KBytes**|**MBytes**|**GBytes**|**TBytes**|**KBits**|**MBits**|**GBits**|**TBits**::
Limits the max number of bytes sent and received within a set time period Limits the max number of bytes sent and received within a set time period
using a given calculation rule (see: AccountingStart, AccountingRule). using a given calculation rule (see <<AccountingStart,AccountingStart>> and <<AccountingRule,AccountingRule>>).
Useful if you need to stay under a specific bandwidth. By default, the Useful if you need to stay under a specific bandwidth. By default, the
number used for calculation is the max of either the bytes sent or number used for calculation is the max of either the bytes sent or
received. For example, with AccountingMax set to 1 TByte, a server received. For example, with AccountingMax set to 1 TByte, a server
@ -2219,7 +2220,7 @@ is non-zero):
may also allow connections to your own computer that are addressed to its may also allow connections to your own computer that are addressed to its
public (external) IP address. See RFC 1918 and RFC 3330 for more details public (external) IP address. See RFC 1918 and RFC 3330 for more details
about internal and reserved IP address space. See about internal and reserved IP address space. See
ExitPolicyRejectLocalInterfaces if you want to block every address on the <<ExitPolicyRejectLocalInterfaces,ExitPolicyRejectLocalInterfaces>> if you want to block every address on the
relay, even those that aren't advertised in the descriptor. + relay, even those that aren't advertised in the descriptor. +
+ +
This directive can be specified multiple times so you don't have to put it This directive can be specified multiple times so you don't have to put it
@ -2264,7 +2265,7 @@ is non-zero):
bind addresses of any port options, such as ControlPort or DNSPort, and any bind addresses of any port options, such as ControlPort or DNSPort, and any
public IPv4 and IPv6 addresses on any interface on the relay. (If IPv6Exit public IPv4 and IPv6 addresses on any interface on the relay. (If IPv6Exit
is not set, all IPv6 addresses will be rejected anyway.) is not set, all IPv6 addresses will be rejected anyway.)
See above entry on ExitPolicy. See above entry on <<ExitPolicy,ExitPolicy>>.
This option is off by default, because it lists all public relay IP This option is off by default, because it lists all public relay IP
addresses in the ExitPolicy, even those relay operators might prefer not addresses in the ExitPolicy, even those relay operators might prefer not
to disclose. to disclose.
@ -2273,7 +2274,7 @@ is non-zero):
[[ExitPolicyRejectPrivate]] **ExitPolicyRejectPrivate** **0**|**1**:: [[ExitPolicyRejectPrivate]] **ExitPolicyRejectPrivate** **0**|**1**::
Reject all private (local) networks, along with the relay's advertised Reject all private (local) networks, along with the relay's advertised
public IPv4 and IPv6 addresses, at the beginning of your exit policy. public IPv4 and IPv6 addresses, at the beginning of your exit policy.
See above entry on ExitPolicy. See above entry on <<ExitPolicy,ExitPolicy>>.
(Default: 1) (Default: 1)
[[ExitRelay]] **ExitRelay** **0**|**1**|**auto**:: [[ExitRelay]] **ExitRelay** **0**|**1**|**auto**::
@ -2684,7 +2685,7 @@ types of statistics that Tor relays collect and publish:
== DIRECTORY SERVER OPTIONS == DIRECTORY SERVER OPTIONS
The following options are useful only for directory servers. (Relays with The following options are useful only for directory servers. (Relays with
enough bandwidth automatically become directory servers; see DirCache for enough bandwidth automatically become directory servers; see <<DirCache,DirCache>> for
details.) details.)
[[DirCache]] **DirCache** **0**|**1**:: [[DirCache]] **DirCache** **0**|**1**::
@ -2740,9 +2741,11 @@ and are as follows:
+ +
2. If a single client IP address (v4 or v6) makes circuits too quickly 2. If a single client IP address (v4 or v6) makes circuits too quickly
(default values are more than 3 per second, with an allowed burst of 90, (default values are more than 3 per second, with an allowed burst of 90,
see DoSCircuitCreationRate and DoSCircuitCreationBurst) while also having see <<DoSCircuitCreationRate,DoSCircuitCreationRate>> and
<<DoSCircuitCreationBurst,DoSCircuitCreationBurst>>) while also having
too many connections open (default is 3, see too many connections open (default is 3, see
DoSCircuitCreationMinConnections), tor will refuse any new circuit (CREATE <<DoSCircuitCreationMinConnections,DoSCircuitCreationMinConnections>>),
tor will refuse any new circuit (CREATE
cells) for the next while (random value between 1 and 2 hours). cells) for the next while (random value between 1 and 2 hours).
+ +
3. If a client asks to establish a rendezvous point to you directly (ex: 3. If a client asks to establish a rendezvous point to you directly (ex:
@ -2770,8 +2773,8 @@ Denial of Service mitigation subsystem described above.
Enable circuit creation DoS mitigation. If set to 1 (enabled), tor will Enable circuit creation DoS mitigation. If set to 1 (enabled), tor will
cache client IPs along with statistics in order to detect circuit DoS cache client IPs along with statistics in order to detect circuit DoS
attacks. If an address is positively identified, tor will activate attacks. If an address is positively identified, tor will activate
defenses against the address. See the DoSCircuitCreationDefenseType option defenses against the address. See <<DoSCircuitCreationDefenseType,DoSCircuitCreationDefenseType>>
for more details. This is a client to relay detection only. "auto" means option for more details. This is a client to relay detection only. "auto" means
use the consensus parameter. If not defined in the consensus, the value is 0. use the consensus parameter. If not defined in the consensus, the value is 0.
(Default: auto) (Default: auto)
@ -3091,8 +3094,8 @@ on the public Tor network.
When this option is set to 1, Tor adds information on which versions of When this option is set to 1, Tor adds information on which versions of
Tor are still believed safe for use to the published directory. Each Tor are still believed safe for use to the published directory. Each
version 1 authority is automatically a versioning authority; version 2 version 1 authority is automatically a versioning authority; version 2
authorities provide this service optionally. See **RecommendedVersions**, authorities provide this service optionally. See <<RecommendedVersions,RecommendedVersions>>,
**RecommendedClientVersions**, and **RecommendedServerVersions**. <<RecommendedClientVersions,RecommendedClientVersions>>, and <<RecommendedServerVersions,RecommendedServerVersions>>.
== HIDDEN SERVICE OPTIONS == HIDDEN SERVICE OPTIONS
@ -3122,7 +3125,7 @@ The next section describes the per service options that can only be set
found in the hostname file. Clients need to put this authorization data in found in the hostname file. Clients need to put this authorization data in
their configuration file using **HidServAuth**. This option is only for v2 their configuration file using **HidServAuth**. This option is only for v2
services; v3 services configure client authentication in a subdirectory of services; v3 services configure client authentication in a subdirectory of
HiddenServiceDir instead (see the **Client Authorization** section). HiddenServiceDir instead (see <<client-authorization,CLIENT AUTHORIZATION>>).
[[HiddenServiceDir]] **HiddenServiceDir** __DIRECTORY__:: [[HiddenServiceDir]] **HiddenServiceDir** __DIRECTORY__::
Store data files for a hidden service in DIRECTORY. Every hidden service Store data files for a hidden service in DIRECTORY. Every hidden service
@ -3288,8 +3291,8 @@ The next section describes the per service options that can only be set
you're using a Tor controller that handles hidserv publishing for you. you're using a Tor controller that handles hidserv publishing for you.
(Default: 1) (Default: 1)
[[client-authorization]]
== Client Authorization == CLIENT AUTHORIZATION
(Version 3 only) (Version 3 only)
@ -3414,11 +3417,11 @@ The following options are used for running a testing Tor network.
[[TestingDirAuthVoteExit]] **TestingDirAuthVoteExit** __node__,__node__,__...__:: [[TestingDirAuthVoteExit]] **TestingDirAuthVoteExit** __node__,__node__,__...__::
A list of identity fingerprints, country codes, and A list of identity fingerprints, country codes, and
address patterns of nodes to vote Exit for regardless of their address patterns of nodes to vote Exit for regardless of their
uptime, bandwidth, or exit policy. See the **ExcludeNodes** uptime, bandwidth, or exit policy. See <<ExcludeNodes,ExcludeNodes>>
option for more information on how to specify nodes. + for more information on how to specify nodes. +
+ +
In order for this option to have any effect, **TestingTorNetwork** In order for this option to have any effect, **TestingTorNetwork**
has to be set. See the **ExcludeNodes** option for more has to be set. See <<ExcludeNodes,ExcludeNodes>> for more
information on how to specify nodes. information on how to specify nodes.
[[TestingDirAuthVoteExitIsStrict]] **TestingDirAuthVoteExitIsStrict** **0**|**1** :: [[TestingDirAuthVoteExitIsStrict]] **TestingDirAuthVoteExitIsStrict** **0**|**1** ::
@ -3432,7 +3435,7 @@ The following options are used for running a testing Tor network.
[[TestingDirAuthVoteGuard]] **TestingDirAuthVoteGuard** __node__,__node__,__...__:: [[TestingDirAuthVoteGuard]] **TestingDirAuthVoteGuard** __node__,__node__,__...__::
A list of identity fingerprints and country codes and A list of identity fingerprints and country codes and
address patterns of nodes to vote Guard for regardless of their address patterns of nodes to vote Guard for regardless of their
uptime and bandwidth. See the **ExcludeNodes** option for more uptime and bandwidth. See <<ExcludeNodes,ExcludeNodes>> for more
information on how to specify nodes. + information on how to specify nodes. +
+ +
In order for this option to have any effect, **TestingTorNetwork** In order for this option to have any effect, **TestingTorNetwork**
@ -3448,7 +3451,7 @@ The following options are used for running a testing Tor network.
[[TestingDirAuthVoteHSDir]] **TestingDirAuthVoteHSDir** __node__,__node__,__...__:: [[TestingDirAuthVoteHSDir]] **TestingDirAuthVoteHSDir** __node__,__node__,__...__::
A list of identity fingerprints and country codes and A list of identity fingerprints and country codes and
address patterns of nodes to vote HSDir for regardless of their address patterns of nodes to vote HSDir for regardless of their
uptime and DirPort. See the **ExcludeNodes** option for more uptime and DirPort. See <<ExcludeNodes,ExcludeNodes>> for more
information on how to specify nodes. + information on how to specify nodes. +
+ +
In order for this option to have any effect, **TestingTorNetwork** In order for this option to have any effect, **TestingTorNetwork**
@ -3600,8 +3603,8 @@ __CacheDirectory__/**`cached-extrainfo`** and **`cached-extrainfo.new`**::
Similar to **cached-descriptors**, but holds optionally-downloaded Similar to **cached-descriptors**, but holds optionally-downloaded
"extra-info" documents. Relays use these documents to send inessential "extra-info" documents. Relays use these documents to send inessential
information about statistics, bandwidth history, and network health to the information about statistics, bandwidth history, and network health to the
authorities. They aren't fetched by default. See the DownloadExtraInfo authorities. They aren't fetched by default. See <<DownloadExtraInfo,DownloadExtraInfo>>
option for more information. for more information.
__CacheDirectory__/**`cached-microdescs`** and **`cached-microdescs.new`**:: __CacheDirectory__/**`cached-microdescs`** and **`cached-microdescs.new`**::
These files hold downloaded microdescriptors. Lines beginning with These files hold downloaded microdescriptors. Lines beginning with
@ -3668,11 +3671,11 @@ __KeyDirectory__/**`authority_signing_key`**::
__KeyDirectory__/**`legacy_certificate`**:: __KeyDirectory__/**`legacy_certificate`**::
As authority_certificate; used only when `V3AuthUseLegacyKey` is set. See As authority_certificate; used only when `V3AuthUseLegacyKey` is set. See
documentation for V3AuthUseLegacyKey. documentation for <<V3AuthUseLegacyKey,V3AuthUseLegacyKey>>.
__KeyDirectory__/**`legacy_signing_key`**:: __KeyDirectory__/**`legacy_signing_key`**::
As authority_signing_key: used only when `V3AuthUseLegacyKey` is set. See As authority_signing_key: used only when `V3AuthUseLegacyKey` is set. See
documentation for V3AuthUseLegacyKey. documentation for <<V3AuthUseLegacyKey,V3AuthUseLegacyKey>>.
__KeyDirectory__/**`secret_id_key`**:: __KeyDirectory__/**`secret_id_key`**::
A relay's RSA1024 permanent identity key, including private and public A relay's RSA1024 permanent identity key, including private and public