summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2004-11-22 21:58:55 +0000
committerNick Mathewson <nickm@torproject.org>2004-11-22 21:58:55 +0000
commit0343f4e90736abf0d498a76a58beb3f4d9b2a86f (patch)
tree8623b9007e1701bc616b7cc212b45285df0a3e58
parent956b463dfe0e5c4c902c1cb9c6b9dc90f7400b8c (diff)
downloadtor-0343f4e90736abf0d498a76a58beb3f4d9b2a86f.tar.gz
tor-0343f4e90736abf0d498a76a58beb3f4d9b2a86f.zip
Document changed options; tweak formatting slightly
svn:r2937
-rw-r--r--doc/tor.1.in86
1 files changed, 53 insertions, 33 deletions
diff --git a/doc/tor.1.in b/doc/tor.1.in
index 1504fcbd03..66224e6b56 100644
--- a/doc/tor.1.in
+++ b/doc/tor.1.in
@@ -41,11 +41,12 @@ As above, but send log messages to the listed filename. The "Log"
option may appear more than once in a configuration file. Messages
are sent to all the logs that match their severity level.
.TP
-\fBBandwidthRateBytes \fR\fINUM\fP
-A token bucket limits the average incoming bandwidth on this node to NUM bytes per second. (Default: 800000)
+\fBBandwidthRate \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
+A token bucket limits the average incoming bandwidth on this node to
+the specified number of bytes second. (Default: 780 KB)
.TP
-\fBBandwidthBurstBytes \fR\fINUM\fP
-Limit the maximum token bucket size (also known as the burst) to NUM bytes. (Default: 50000000)
+\fBBandwidthBurst \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
+Limit the maximum token bucket size (also known as the burst) to the given number of bytes. (Default: 48 MB)
.TP
\fBDataDirectory \fR\fIDIR\fP
Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor)
@@ -106,6 +107,19 @@ except when the connecting process knows the contents of a file named
"control_auth_cookie", which Tor will create in its data directory. This
authentication methods should only be used on systems with good filesystem
security.
+\fBDirFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
+Every time the specified period elapses, Tor downloads a directory.
+A directory contains a signed list of all known servers as well as
+their current their liveness status. (Default: 1 hour)
+.TP
+\fBStatusFetchPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
+Every time the specified period elapses, Tor downloads signed status
+information about the current state of known servers. (Default: 20 minutes.)
+.TP
+\fBRendPostPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
+Every time the specified period elapses, Tor uploads any rendezvous
+service descriptors to the directory servers. This information is also
+uploaded whenever it changes. (Default: 10 minutes.)
.SH CLIENT OPTIONS
.PP
@@ -115,25 +129,18 @@ The following options are useful only for clients (that is, if \fBSOCKSPort\fP i
Where on our circuits should we allow Tor servers that the directory
servers haven't authenticated as "verified"? (Default: middle,rendezvous.)
.TP
-\fBDirFetchPostPeriod \fR\fIseconds\fP
-Every N seconds, Tor downloads a fresh directory, and re-uploads
-information about hidden services to the directory servers. If
-running as a server, Tor also re-uploads information about itself to
-the directory servers. (Tor also uploads this information whenever it
-changes.) (Default: 600.)
-.TP
\fBClientOnly \fR\fB0\fR|\fB1\fR\fP
If set to 1, Tor will under no circumstances run as a server. (Usually,
you don't need to set this; Tor is pretty smart at figuring out whether
you are reliable and high-bandwidth enough to be a good server.)
.TP
-\fBEntryNodes \fR\fInickname,nickname,...\fP
+\fBEntryNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of preferred nodes to use for the first hop in the circuit, if possible.
.TP
-\fBExitNodes \fR\fInickname,nickname,...\fP
+\fBExitNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of preferred nodes to use for the last hop in the circuit, if possible.
.TP
-\fBExcludeNodes \fR\fInickname,nickname,...\fP
+\fBExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of nodes to never use when building a circuit.
.TP
\fBStrictExitNodes \fR\fB0\fR|\fB1\fR\fP
@@ -158,7 +165,7 @@ A list of ports that your firewall allows you to connect to. Only used when
\fBNewCircuitPeriod \fR\fINUM\fP
Every NUM seconds consider whether to build a new circuit. (Default: 60)
.TP
-\fBNodeFamily \fR\fInickname,nickname,...\fP
+\fBNodeFamily \fR\fInickname\fR,\fInickname\fR,\fI...\fP
The named Tor servers constitute a "family" of similar or co-administered
servers, so never use any two of them in the same circuit. Defining a
NodeFamily is only needed when a server doesn't list the family itself
@@ -167,10 +174,10 @@ NodeFamily is only needed when a server doesn't list the family itself
.\" \fBPathlenCoinWeight \fR\fI0.0-1.0\fP
.\" Paths are 3 hops plus a geometric distribution centered around this coinweight. Must be >=0.0 and <1.0. (Default: 0.3) NOT USED CURRENTLY
.\" .TP
-\fBRendNodes \fR\fInickname,nickname,...\fP
+\fBRendNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of preferred nodes to use for the rendezvous point, if possible.
.TP
-\fBRendExcludeNodes \fR\fInickname,nickname,...\fP
+\fBRendExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
A list of nodes to never use when choosing a rendezvous point.
.TP
\fBSOCKSPort \fR\fIPORT\fP
@@ -181,7 +188,7 @@ Set this to 0 if you don't want to allow application connections. (Default:
\fBSOCKSBindAddress \fR\fIIP\fP
Bind to this address to listen for connections from socks-speaking applications. (Default: 127.0.0.1) You can also specify a port (e.g. 192.168.0.1:9100). This directive can be specified multiple times to bind to multiple addresses/ports.
.TP
-\fBSOCKSPolicy \fR\fIpolicy,policy,...\fP
+\fBSOCKSPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
Set an entrance policy for this server, to limit who can connect to the socks ports. The policies have the same form as exit policies below.
.SH SERVER OPTIONS
@@ -192,10 +199,10 @@ The following options are useful only for servers (that is, if \fBORPort\fP is n
The IP or fqdn of this server (e.g. moria.mit.edu). You can leave this
unset, and Tor will guess your IP.
.TP
-\fBContactInfo \fR\fIemail address\fP
+\fBContactInfo \fR\fIemail_address\fP
Administrative contact information for server.
.TP
-\fBExitPolicy \fR\fIpolicy,policy,...\fP
+\fBExitPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
Set an exit policy for this server. Each policy is of the form
"\fBreject\fP \fIADDR\fP\fB/\fP\fIMASK\fP\fB:\fP\fIPORT\fP".
If \fB/\fP\fIMASK\fP is omitted then this policy just applies to the host
@@ -240,7 +247,7 @@ space. The default exit policy is:
\fBMaxOnionsPending \fR\fINUM\fP
If you have more than this number of onionskins queued for decrypt, reject new ones. (Default: 100)
.TP
-\fBMyFamily \fR\fInickname,nickname,...\fP
+\fBMyFamily \fR\fInickname\fR,\fInickname\fR,\fI...\fP
Declare that this Tor server is controlled or administered by a group
or organization identical or similar to that of the other named servers.
When two servers both declare that they are in the same 'family', Tor clients
@@ -271,20 +278,33 @@ redirection is to be performed on a given set of addresses by using the
special target string "pass", which prevents subsequent rules from being
considered.
.TP
-\fBAccountingMaxKB \fR\fInum\fP
-Never send more than \fInum\fP kilobytes in a given accounting period,
-or receive more than \fInum\fP kilobytes in the period (currently,
-only months are supported). When the number of kilobytes is exhausted,
-Tor will hibernate until some time
-in the next accounting period. If you have bandwidth cost issues,
+\fBDirPostPeriod \fR\fIN\fR \fBseconds\fR|\fBminutes\fR|\fBhours\fR|\fBdays\fR|\fBweeks\fP
+Every time the specified period elapses, Tor uploads its server
+descriptors to the directory servers. This information is also
+uploaded whenever it changes. (Default: 10 minutes.)
+.TP
+\fBAccountingMax \fR\fIN\fR \fBbytes\fR|\fBKB\fR|\fBMB\fR|\fBGB\fR|\fBTB\fP
+Never send more than the specified number of bytes in a given
+accounting period,or receive more than that number in the period.
+When the number of bytes is exhausted, Tor will hibernate until some
+time in the next accounting period. To prevent all servers from
+waking at the same time, Tor will also wait until a random point in
+each period before waking up. If you have bandwidth cost issues,
using this option is preferable to setting a low bandwidth, since it
provides users with a collection of fast servers that are up some of
the time, which is more useful than a set of slow servers that are
always "available".
.TP
-\fBMonthlyAccountingStart \fR\fIday\fP
-Always start the accounting period on the provided day of the month,
-which must be between 1 and 28. (Defaults to 1.)
+\fBAccountingStart \fR\fBday\fR|\fBweek\fR|\fBmonth\fR [\fIday\fR] \fIHH:MM\fR\fP
+Specify how long accounting periods last. If \fBmonth\fP is given,
+each accounting period runs from the time \fIHH:MM\fR on the
+\fIday\fRth day of one month to the same day and time of the next.
+(The day must be between 1 and 28.) If \fBweek\fP is given, each
+accounting period runs from the time \fIHH:MM\fR of the \fIday\fRth
+day of one week to the same day and time of the next week, with Monday
+as day 1 and Sunday as day 7. If \fBday\fR is given, each accounting
+period runs from the time \fIHH:MM\fR each day to the same time on the
+next day. All times are local. (Defaults to "month 1 0:00".)
.SH DIRECTORY SERVER OPTIONS
.PP
@@ -304,7 +324,7 @@ Bind the directory service to this port.
\fBDirBindAddress \fR\fIIP\fP
Bind the directory service to this address. (Default: 0.0.0.0)
.TP
-\fBDirPolicy \fR\fIpolicy,policy,...\fP
+\fBDirPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP
Set an entrance policy for this server, to limit who can connect to the directory ports. The policies have the same form as exit policies above.
.TP
\fBRecommendedVersions \fR\fISTRING\fP
@@ -336,11 +356,11 @@ hiddenservicedir. By default, this option maps the virtual port to the
same port on 127.0.0.1. You may override the target port, address, or both
by specifying a target of addr, port, or addr:port.
.TP
-\fBHiddenServiceNodes \fR\fInickname,nickname,...\fP
+\fBHiddenServiceNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
If possible, use the specified nodes as introduction points for the hidden
service.
.TP
-\fBHiddenServiceExcludeNodes \fR\fInickname,nickname,...\fP
+\fBHiddenServiceExcludeNodes \fR\fInickname\fR,\fInickname\fR,\fI...\fP
Do not use the specified nodes as introduction points for the hidden
service.