mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-20 10:12:15 +01:00
man page entries for addressmap and trackhostexits
svn:r3642
This commit is contained in:
parent
8727acf2f1
commit
6d85627bc9
20
doc/tor.1.in
20
doc/tor.1.in
@ -125,6 +125,9 @@ uploaded whenever it changes. (Default: 20 minutes.)
|
|||||||
.PP
|
.PP
|
||||||
The following options are useful only for clients (that is, if \fBSOCKSPort\fP is non-zero):
|
The following options are useful only for clients (that is, if \fBSOCKSPort\fP is non-zero):
|
||||||
.TP
|
.TP
|
||||||
|
\fBAddressMap\fR \fIaddress\fR \fInewaddress\fR
|
||||||
|
When a request for address arrives to Tor, it will rewrite it to newaddress before processing it. For example, if you always want connections to www.indymedia.org to exit via yourtorserver, use "AddressMap www.indymedia.org www.indymedia.org.yourtorserver.exit".
|
||||||
|
.TP
|
||||||
\fBAllowUnverifiedNodes\fR \fBentry\fR|\fBexit\fR|\fBmiddle\fR|\fBintroduction\fR|\fBrendezvous\fR|...\fP
|
\fBAllowUnverifiedNodes\fR \fBentry\fR|\fBexit\fR|\fBmiddle\fR|\fBintroduction\fR|\fBrendezvous\fR|...\fP
|
||||||
Where on our circuits should we allow Tor servers that the directory
|
Where on our circuits should we allow Tor servers that the directory
|
||||||
servers haven't authenticated as "verified"? (Default: middle,rendezvous.)
|
servers haven't authenticated as "verified"? (Default: middle,rendezvous.)
|
||||||
@ -151,6 +154,23 @@ the last hop of a circuit.
|
|||||||
If 1, Tor will never use any nodes besides those listed in "entrynodes" for
|
If 1, Tor will never use any nodes besides those listed in "entrynodes" for
|
||||||
the first hop of a circuit.
|
the first hop of a circuit.
|
||||||
.TP
|
.TP
|
||||||
|
\fBTrackHostExits \fR\fIhost1\fR,\fI.domain1\fR|\fI.\fR\fP
|
||||||
|
For each value in the comma separated list, Tor will track recent connections
|
||||||
|
to hosts that match this value and attempt to
|
||||||
|
reuse the same exit node for each. If the value is prepended with a '.', it is
|
||||||
|
treated as matching an entire domain. If one of the values is just a '.', it
|
||||||
|
means match everything. This option is useful if you frequently connect to
|
||||||
|
sites that will expire all your authentication cookies (ie log you out) if
|
||||||
|
your IP address changes. Note that this option does have the disadvantage of
|
||||||
|
making it more clear that a given history is
|
||||||
|
associated with a single user. However, most people who would wish to observe
|
||||||
|
this will observe it through cookies or other protocol-specific means anyhow.
|
||||||
|
.TP
|
||||||
|
\fBTrackHostExitsExpire \fR\fINUM\fP
|
||||||
|
Since exit servers go up and down, it is desirable to expire the association
|
||||||
|
between host and exit server after NUM seconds of inactivity. The default
|
||||||
|
is 1800 seconds (30 minutes).
|
||||||
|
.TP
|
||||||
\fBFascistFirewall \fR\fB0\fR|\fB1\fR\fP
|
\fBFascistFirewall \fR\fB0\fR|\fB1\fR\fP
|
||||||
If 1, Tor will only create outgoing connections to ORs running on ports that
|
If 1, Tor will only create outgoing connections to ORs running on ports that
|
||||||
your firewall allows (defaults to 80 and 443; see \fBFirewallPorts\fR). This will
|
your firewall allows (defaults to 80 and 443; see \fBFirewallPorts\fR). This will
|
||||||
|
Loading…
Reference in New Issue
Block a user