diff options
author | Roger Dingledine <arma@torproject.org> | 2007-01-09 05:14:34 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2007-01-09 05:14:34 +0000 |
commit | 794fedb0adaaed8e4e0f071c9c8691695d7dbd80 (patch) | |
tree | 7ad6f8aa33caa1136db942441f8ca405e055f4c2 /doc | |
parent | abaf2231528aeaf9a5adfddee3971c3bbd238d7b (diff) | |
download | tor-794fedb0adaaed8e4e0f071c9c8691695d7dbd80.tar.gz tor-794fedb0adaaed8e4e0f071c9c8691695d7dbd80.zip |
some cleanups. more probably remain, but hey, it's an alpha.
time to put out the bugfix release.
svn:r9309
Diffstat (limited to 'doc')
-rw-r--r-- | doc/control-spec.txt | 21 |
1 files changed, 15 insertions, 6 deletions
diff --git a/doc/control-spec.txt b/doc/control-spec.txt index cd911b5cb0..106564c225 100644 --- a/doc/control-spec.txt +++ b/doc/control-spec.txt @@ -1089,11 +1089,12 @@ do for each. -RD] Actions for STATUS_CLIENT severity WARN events can be as follows: DANGEROUS_SOCKS - "PROTOCOL=SOCKS4/SOCKS4a/SOCKS5" + "PROTOCOL=SOCKS4/SOCKS5" "ADDRESS=IP:port" - A connection was made to Tor's SOCKS port that used a raw IP - address. If the client application got this address from - gethostbyname(), it's leaking target addresses via DNS. + A connection was made to Tor's SOCKS port using one of the SOCKS + approaches that doesn't support hostnames -- only raw IP addresses. + If the client application got this address from gethostbyname(), + it may be leaking target addresses via DNS. SOCKS_UNKNOWN_PROTOCOL "DATA=string" @@ -1102,7 +1103,13 @@ do for each. -RD] using Tor as an HTTP proxy? The DATA is the first few characters sent to Tor on the SOCKS port. - BAD_HOSTNAME + SOCKS_BAD_HOSTNAME + [unimplemented] + // Some application gave us a funny-looking hostname. Perhaps + // it is broken? In any case it won't work with Tor and the user + // should know. + + UNRECOGNIZED_ROUTER [unimplemented] // a nickname we asked for is unavailable. no need for this // quite yet, since no end-user controllers let you configure that. @@ -1118,7 +1125,7 @@ do for each. -RD] "HOSTNAME=NAME" "METHOD=CONFIGURED/DIRSERV/RESOLVED/INTERFACE/GETHOSTNAME" Our best idea for our externally visible IP has changed to 'IP'. - If 'NAME' is present, we got the new IP by resolving 'NAME'. If the + If 'HOSTNAME' is present, we got the new IP by resolving 'NAME'. If the method is 'CONFIGURED', the IP was given verbatim as a configuration option. If the method is 'RESOLVED', we resolved the Address configuration option to get the IP. If the method is 'GETHOSTNAME', @@ -1163,6 +1170,7 @@ do for each. -RD] "STATUS=" "UP" / "DOWN" "ERR=" message One of our nameservers has changed status. + // actually notice NAMESERVER_ALL_DOWN All of our nameservers have gone down. @@ -1185,6 +1193,7 @@ do for each. -RD] ACCEPTED_SERVER_DESCRIPTOR "DIRAUTH=addr:port" A single directory authority accepted our descriptor. + // actually notice Actions for STATUS_SERVER severity ERR events can be as follows: |