diff options
author | Roger Dingledine <arma@torproject.org> | 2006-06-16 00:04:46 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2006-06-16 00:04:46 +0000 |
commit | 726021bb60083c66294ff1e446582bedfbdf6604 (patch) | |
tree | 56c4ebd5812e180b7804df3919628d7a0cd426da /doc/tor.1.in | |
parent | 068876eb36c763cf5d05852e25dac3c01f42c71e (diff) | |
download | tor-726021bb60083c66294ff1e446582bedfbdf6604.tar.gz tor-726021bb60083c66294ff1e446582bedfbdf6604.zip |
clean up man page. expand on contactinfo a bit.
svn:r6631
Diffstat (limited to 'doc/tor.1.in')
-rw-r--r-- | doc/tor.1.in | 14 |
1 files changed, 8 insertions, 6 deletions
diff --git a/doc/tor.1.in b/doc/tor.1.in index 4b63977ea2..17c5cdf04c 100644 --- a/doc/tor.1.in +++ b/doc/tor.1.in @@ -221,7 +221,7 @@ about what sites a user might have visited. (Default: 1) On startup, setuid to this user. .LP .TP -\fBHardwareAccel \fR\fI0|1\fP +\fBHardwareAccel \fR\fB0\fR|\fB1\fP If non-zero, try to use crypto hardware acceleration when available. This is untested and probably buggy. (Default: 0) @@ -316,7 +316,7 @@ firewall allows connections to everything inside net 99, rejects port \fBReachableDirAddresses \fR\fIADDR\fP[\fB/\fP\fIMASK\fP][:\fIPORT\fP]...\fP Like \fBReachableAddresses\fP, a list of addresses and ports. Tor will obey these restrictions when fetching directory information, using standard HTTP -GET requests. If not set explicitly then the value of \fBfBReachableAddresses\fP +GET requests. If not set explicitly then the value of \fBReachableAddresses\fP is used. If \fBHttpProxy\fR is set then these connections will go through that proxy. .LP @@ -324,7 +324,7 @@ proxy. \fBReachableORAddresses \fR\fIADDR\fP[\fB/\fP\fIMASK\fP][:\fIPORT\fP]...\fP Like \fBReachableAddresses\fP, a list of addresses and ports. Tor will obey these restrictions when connecting to Onion Routers, using TLS/SSL. If not set -explicitly then the value of \fBfBReachableAddresses\fP is used. If +explicitly then the value of \fBReachableAddresses\fP is used. If \fBHttpsProxy\fR is set then these connections will go through that proxy. The separation between \fBReachableORAddresses\fP and @@ -428,7 +428,7 @@ between host and exit server after NUM seconds. The default is 1800 seconds (30 minutes). .LP .TP -\fBUseEntryGuards \fR\fI0|1\fP +\fBUseEntryGuards \fR\fB0\fR|\fB1\fR\fP If this option is set to 1, we pick a few long-term entry servers, and try to stick with them. This is desirable because constantly changing servers increases the odds that an adversary who owns @@ -442,7 +442,7 @@ as long-term entries for our circuits. (Defaults to 3.) .LP .TP -\fBSafeSocks \fR\fI0|1\fP +\fBSafeSocks \fR\fB0\fR|\fB1\fR\fP When this option is enabled, Tor will reject application connections that use unsafe variants of the socks protocol -- ones that only provide an IP address, meaning the application is doing a DNS resolve first. @@ -483,7 +483,9 @@ list all connected servers as running. .LP .TP \fBContactInfo \fR\fIemail_address\fP -Administrative contact information for server. +Administrative contact information for server. This line might get +picked up by spam harvesters, so you may want to obscure the fact +that it's an email address. .LP .TP \fBExitPolicy \fR\fIpolicy\fR,\fIpolicy\fR,\fI...\fP |