man page entries for addressmap and trackhostexits

svn:r3642
This commit is contained in:
Roger Dingledine 2005-02-22 00:53:43 +00:00
parent 8727acf2f1
commit 6d85627bc9

View File

@ -125,6 +125,9 @@ uploaded whenever it changes. (Default: 20 minutes.)
.PP
The following options are useful only for clients (that is, if \fBSOCKSPort\fP is non-zero):
.TP
\fBAddressMap\fR \fIaddress\fR \fInewaddress\fR
When a request for address arrives to Tor, it will rewrite it to newaddress before processing it. For example, if you always want connections to www.indymedia.org to exit via yourtorserver, use "AddressMap www.indymedia.org www.indymedia.org.yourtorserver.exit".
.TP
\fBAllowUnverifiedNodes\fR \fBentry\fR|\fBexit\fR|\fBmiddle\fR|\fBintroduction\fR|\fBrendezvous\fR|...\fP
Where on our circuits should we allow Tor servers that the directory
servers haven't authenticated as "verified"? (Default: middle,rendezvous.)
@ -151,6 +154,23 @@ the last hop of a circuit.
If 1, Tor will never use any nodes besides those listed in "entrynodes" for
the first hop of a circuit.
.TP
\fBTrackHostExits \fR\fIhost1\fR,\fI.domain1\fR|\fI.\fR\fP
For each value in the comma separated list, Tor will track recent connections
to hosts that match this value and attempt to
reuse the same exit node for each. If the value is prepended with a '.', it is
treated as matching an entire domain. If one of the values is just a '.', it
means match everything. This option is useful if you frequently connect to
sites that will expire all your authentication cookies (ie log you out) if
your IP address changes. Note that this option does have the disadvantage of
making it more clear that a given history is
associated with a single user. However, most people who would wish to observe
this will observe it through cookies or other protocol-specific means anyhow.
.TP
\fBTrackHostExitsExpire \fR\fINUM\fP
Since exit servers go up and down, it is desirable to expire the association
between host and exit server after NUM seconds of inactivity. The default
is 1800 seconds (30 minutes).
.TP
\fBFascistFirewall \fR\fB0\fR|\fB1\fR\fP
If 1, Tor will only create outgoing connections to ORs running on ports that
your firewall allows (defaults to 80 and 443; see \fBFirewallPorts\fR). This will