mirror repository of the tor core protocol in case of issues
Go to file
Roger Dingledine f860b490be When we're connecting to an OR and he's got a different nickname/key
than we were expecting, only complain loudly if we're an OP or an
authdirserver. Complaining loudly to OR admins just confuses people.


svn:r4014
2005-04-06 00:50:40 +00:00
contrib Update TorControl to handle new event types. EVENT_WARN is obsolete, so rename it to EVENT_TYPE.OBSOLETE_LOG. 2005-04-05 22:57:39 +00:00
debian debian snapshot: 0.1.0.2-rc-cvs-200504032300-1 2005-04-03 23:09:15 +00:00
doc Revise control spec and implementation to allow all log messages to be sent to controller with their severities intact. 2005-04-05 22:56:17 +00:00
src When we're connecting to an OR and he's got a different nickname/key 2005-04-06 00:50:40 +00:00
Win32Build Fix a couple of win32-related build issues when using latest libevent. 2005-04-01 16:48:22 +00:00
.cvsignore Add several files to cvsignores 2005-04-01 08:25:05 +00:00
AUTHORS add jbash and weasel to the AUTHORS list 2004-02-17 05:05:34 +00:00
autogen.sh make our autogen.sh work on ksh as well as bash 2004-11-01 06:40:49 +00:00
ChangeLog add a changelog for 0.1.0.2-rc 2005-04-01 16:29:52 +00:00
configure.in bump to 0.1.0.2-rc-cvs 2005-04-01 20:30:09 +00:00
Doxyfile Add Doxygen config file and make target, along with section in HACKING document 2004-05-07 17:03:52 +00:00
INSTALL Mention libevent in more docs. 2005-03-29 01:03:07 +00:00
LICENSE update our license for 2005, and also include the licenses of tree.h 2005-01-03 23:45:18 +00:00
Makefile.am update copyright notices. 2005-04-01 20:15:56 +00:00
README migrate to the new URL 2005-01-05 00:06:51 +00:00
tor.spec.in migrate to the new URL 2005-01-05 00:06:51 +00:00

'tor' is an implementation of The Onion Routing system, as
described in a bit more detail at http://www.onion-router.net/. You
can read list archives, and subscribe to the mailing list, at
http://archives.seul.org/or/dev/.

Is your question in the FAQ? Should it be?

**************************************************************************
See the INSTALL file for a quickstart. That is all you will probably need.
**************************************************************************

**************************************************************************
You only need to look beyond this point if the quickstart in the INSTALL
doesn't work for you.
**************************************************************************

Do you want to run a tor server?

  See http://tor.eff.org/doc/tor-doc.html#server

Do you want to run a hidden service?

  See http://tor.eff.org/doc/tor-doc.html#hidden-service

Configuring tsocks:

  If you want to use Tor for protocols that can't use Privoxy, or
  with applications that are not socksified, then download tsocks
  (tsocks.sourceforge.net) and configure it to talk to localhost:9050
  as a socks4 server. My /etc/tsocks.conf simply has:
    server_port = 9050
    server = 127.0.0.1
  (I had to "cd /usr/lib; ln -s /lib/libtsocks.so" to get the tsocks
   library working after install, since my libpath didn't include /lib.)
  Then you can do "tsocks ssh arma@moria.mit.edu". But note that if
  ssh is suid root, you either need to do this as root, or cp a local
  version of ssh that isn't suid.

  (On Windows, you may want to look at the Hummingbird SOCKS client,
  or at SocksCap, instead.)