diff options
author | Nick Mathewson <nickm@torproject.org> | 2015-01-03 12:34:52 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2015-01-03 12:34:52 -0500 |
commit | 74cd57517c10fd99345ffcc90d9376f9144e675a (patch) | |
tree | 647a4743233d7cf5961a62a2c75d65a7ff9e245f /doc | |
parent | fc0febc5c62a8c5ad2373b43641a70a8d793a469 (diff) | |
download | tor-74cd57517c10fd99345ffcc90d9376f9144e675a.tar.gz tor-74cd57517c10fd99345ffcc90d9376f9144e675a.zip |
New option "HiddenServiceAllowUnknownPorts"
This allows hidden services to disable the anti-scanning feature
introduced in 0.2.6.2-alpha. With this option not set, a connection
to an unlisted port closes the circuit. With this option set, only
a RELAY_DONE cell is sent.
Closes ticket #14084.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/tor.1.txt | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/doc/tor.1.txt b/doc/tor.1.txt index 4e3e07e2d3..92a6a6ac6a 100644 --- a/doc/tor.1.txt +++ b/doc/tor.1.txt @@ -2071,6 +2071,10 @@ The following options are used to configure a hidden service. found in the hostname file. Clients need to put this authorization data in their configuration file using **HidServAuth**. +[[HiddenServiceAllowUnknownPorts]] **HiddenServiceAllowUnknownPorts** **0**|**1**:: + If set to 1, then connections to unrecognized ports do not cause the + current hidden service to close rendezvous circuits. (Default: 0) + [[RendPostPeriod]] **RendPostPeriod** __N__ **seconds**|**minutes**|**hours**|**days**|**weeks**:: Every time the specified period elapses, Tor uploads any rendezvous service descriptors to the directory servers. This information is also |