summaryrefslogtreecommitdiff
path: root/doc/tor.1.in
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-02-13 06:25:16 +0000
committerRoger Dingledine <arma@torproject.org>2006-02-13 06:25:16 +0000
commit350313d77a1b9dc20abae088ca9db7662dd8a80b (patch)
treeb1722b63b6331fcff7e81fd7e75eb618892e95ec /doc/tor.1.in
parent1181ae61aef77aa505542433c801791b9b13a522 (diff)
downloadtor-350313d77a1b9dc20abae088ca9db7662dd8a80b.tar.gz
tor-350313d77a1b9dc20abae088ca9db7662dd8a80b.zip
Let the users set ControlListenAddress in the torrc.
This can be dangerous, but there are some cases (like a secured LAN) where it makes sense. svn:r5997
Diffstat (limited to 'doc/tor.1.in')
-rw-r--r--doc/tor.1.in10
1 files changed, 9 insertions, 1 deletions
diff --git a/doc/tor.1.in b/doc/tor.1.in
index 4b61025b1b..2ffbc9e175 100644
--- a/doc/tor.1.in
+++ b/doc/tor.1.in
@@ -61,7 +61,7 @@ Windows since that platform lacks getrlimit(). (Default: 1024)
.LP
.TP
\fBControlPort \fR\fIPort\fP
-If set, Tor will accept connections from the same machine (localhost only) on
+If set, Tor will accept connections on
this port, and allow those connections to control the Tor process using the
Tor Control Protocol (described in control-spec.txt). Note: unless you also
specify one of \fBHashedControlPassword\fP or \fBCookieAuthentication\fP,
@@ -69,6 +69,14 @@ setting this option will cause Tor to allow any process on the local host to
control it.
.LP
.TP
+\fBControlListenAddress \fR\fIIP\fR[:\fIPORT\fR]\fP
+Bind the controller listener to this address. If you specify a port,
+bind to this port rather than the one specified in ControlPort. We
+strongly recommend that you leave this alone unless you know what you're
+doing, since giving attackers access to your control listener is really
+dangerous. (Default: 127.0.0.1)
+.LP
+.TP
\fBHashedControlPassword \fR\fIhashed_password\fP
Don't allow any connections on the control port except when the other process
knows the password whose one-way hash is \fIhashed_password\fP. You can