summaryrefslogtreecommitdiff
path: root/doc/tor.1.in
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2006-09-21 21:48:22 +0000
committerNick Mathewson <nickm@torproject.org>2006-09-21 21:48:22 +0000
commite4a9b4de4ec0573721b5e0e0969c9ea2f9e70baf (patch)
tree7c58d803ea7de0ca2f4dd2806b20b259036c25a6 /doc/tor.1.in
parent04bec6757494a7ac3a798bde068abf151c8a8242 (diff)
downloadtor-e4a9b4de4ec0573721b5e0e0969c9ea2f9e70baf.tar.gz
tor-e4a9b4de4ec0573721b5e0e0969c9ea2f9e70baf.zip
r8875@Kushana: nickm | 2006-09-21 16:46:28 -0400
Resolve bug 330: detect ISPs that want to hijack failing DNS requests and basically domain-squat the entire internet. svn:r8440
Diffstat (limited to 'doc/tor.1.in')
-rw-r--r--doc/tor.1.in9
1 files changed, 9 insertions, 0 deletions
diff --git a/doc/tor.1.in b/doc/tor.1.in
index a162137c62..d73f1436a9 100644
--- a/doc/tor.1.in
+++ b/doc/tor.1.in
@@ -647,6 +647,15 @@ domain. For example, if this system is configured to believe it is in
connected to "www.example.com".
This option only effects name lookup for addresses requested by clients.
(Defaults to "0".)
+.LP
+.TP
+\fBServerDNSDetectHijacking \fR\fB0\fR|\fB1\fR\fP
+When this option is set to 1, we will test periodically to determine whether
+our local nameservers have been configured to hijack failing DNS requests
+(usually to an advertising site). If they are, we will attempt to correct
+this. This option only effects name lookup for addresses requested by
+clients; and only takes effect if Tor was built with eventdns support.
+(Defaults to "1".)
.SH DIRECTORY SERVER OPTIONS
.PP