diff options
author | Roger Dingledine <arma@torproject.org> | 2006-02-13 06:25:16 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2006-02-13 06:25:16 +0000 |
commit | 350313d77a1b9dc20abae088ca9db7662dd8a80b (patch) | |
tree | b1722b63b6331fcff7e81fd7e75eb618892e95ec /doc/tor.1.in | |
parent | 1181ae61aef77aa505542433c801791b9b13a522 (diff) | |
download | tor-350313d77a1b9dc20abae088ca9db7662dd8a80b.tar.gz tor-350313d77a1b9dc20abae088ca9db7662dd8a80b.zip |
Let the users set ControlListenAddress in the torrc.
This can be dangerous, but there are some cases (like a secured
LAN) where it makes sense.
svn:r5997
Diffstat (limited to 'doc/tor.1.in')
-rw-r--r-- | doc/tor.1.in | 10 |
1 files changed, 9 insertions, 1 deletions
diff --git a/doc/tor.1.in b/doc/tor.1.in index 4b61025b1b..2ffbc9e175 100644 --- a/doc/tor.1.in +++ b/doc/tor.1.in @@ -61,7 +61,7 @@ Windows since that platform lacks getrlimit(). (Default: 1024) .LP .TP \fBControlPort \fR\fIPort\fP -If set, Tor will accept connections from the same machine (localhost only) on +If set, Tor will accept connections on this port, and allow those connections to control the Tor process using the Tor Control Protocol (described in control-spec.txt). Note: unless you also specify one of \fBHashedControlPassword\fP or \fBCookieAuthentication\fP, @@ -69,6 +69,14 @@ setting this option will cause Tor to allow any process on the local host to control it. .LP .TP +\fBControlListenAddress \fR\fIIP\fR[:\fIPORT\fR]\fP +Bind the controller listener to this address. If you specify a port, +bind to this port rather than the one specified in ControlPort. We +strongly recommend that you leave this alone unless you know what you're +doing, since giving attackers access to your control listener is really +dangerous. (Default: 127.0.0.1) +.LP +.TP \fBHashedControlPassword \fR\fIhashed_password\fP Don't allow any connections on the control port except when the other process knows the password whose one-way hash is \fIhashed_password\fP. You can |