mention that tsocks only socksifies TCP

In the torify(1) manpage explain that tsocks will only socksify
TCP connections, and that therefore it will most likely leak DNS
requests.

svn:r18160
This commit is contained in:
Peter Palfrader 2009-01-18 01:05:17 +00:00
parent 5811005442
commit 0636369b83
2 changed files with 10 additions and 1 deletions

View File

@ -24,6 +24,8 @@ Changes in version 0.2.1.11-alpha - 2009-01-??
cell back), avoid using that OR connection anymore, and also cell back), avoid using that OR connection anymore, and also
tell all the one-hop directory requests waiting for it that they tell all the one-hop directory requests waiting for it that they
should fail. Bugfix on 0.2.1.3-alpha. should fail. Bugfix on 0.2.1.3-alpha.
- In the torify(1) manpage mention that tsocks will leak your
DNS requests.
Changes in version 0.2.1.10-alpha - 2009-01-06 Changes in version 0.2.1.10-alpha - 2009-01-06

View File

@ -1,4 +1,4 @@
.TH torify 1 "" Feb-2004 "" .TH torify 1 "" Jan-2009 ""
.\" manual page by Peter Palfrader .\" manual page by Peter Palfrader
.SH NAME .SH NAME
.LP .LP
@ -17,6 +17,13 @@ that you would like to run socksified.
Please note that since tsocks uses LD_PRELOAD, torify cannot be applied Please note that since tsocks uses LD_PRELOAD, torify cannot be applied
to suid binaries. to suid binaries.
You should also be aware that the way tsocks currently works only TCP
connections are socksified. Be aware that this will in most circumstances
not include hostname lookups which would still be routed through your
normal system resolver to your usual resolving nameservers. The Tor
FAQ at https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ might
have further information on this subject.
.SH SEE ALSO .SH SEE ALSO
.BR tor (1), .BR tor (1),
.BR tsocks (1), .BR tsocks (1),