diff options
author | David Goulet <dgoulet@torproject.org> | 2018-12-12 13:23:46 -0500 |
---|---|---|
committer | David Goulet <dgoulet@torproject.org> | 2018-12-12 13:23:46 -0500 |
commit | 53855d72b71cca7c61124bbdfac0a93b1386cb43 (patch) | |
tree | 8219eb3a5b3c194e3977326bbc5562554aa4f309 /doc | |
parent | 4afc6b172a8984aad0954dd38d44dede6d007c51 (diff) | |
download | tor-53855d72b71cca7c61124bbdfac0a93b1386cb43.tar.gz tor-53855d72b71cca7c61124bbdfac0a93b1386cb43.zip |
man: Add that "GETINFO address" won't work with "Sandbox 1"
Patch by "wagon".
Closes #28538
Signed-off-by: David Goulet <dgoulet@torproject.org>
Diffstat (limited to 'doc')
-rw-r--r-- | doc/tor.1.txt | 31 |
1 files changed, 18 insertions, 13 deletions
diff --git a/doc/tor.1.txt b/doc/tor.1.txt index c886e37613..5b73e25e16 100644 --- a/doc/tor.1.txt +++ b/doc/tor.1.txt @@ -598,21 +598,26 @@ GENERAL OPTIONS Otherwise the sandbox will be disabled. The option is currently an experimental feature. It only works on Linux-based operating systems, and only when Tor has been built with the libseccomp library. This option - can not be changed while tor is running. + can not be changed while tor is running. + + - When the Sandbox is 1, the following options can not be changed when tor + When the **Sandbox** is 1, the following options can not be changed when tor is running: - Address - ConnLimit - CookieAuthFile - DirPortFrontPage - ExtORPortCookieAuthFile - Logs - ServerDNSResolvConfFile - Tor must remain in client or server mode (some changes to ClientOnly and - ORPort are not allowed). Launching new Onion Services through Control - Port is not supported with current syscall sandboxing implementation. - ClientOnionAuthDir and any files in it won't reload on HUP signal. + **Address**, + **ConnLimit**, + **CookieAuthFile**, + **DirPortFrontPage**, + **ExtORPortCookieAuthFile**, + **Logs**, + **ServerDNSResolvConfFile**, + **ClientOnionAuthDir** (and any files in it won't reload on HUP signal). + + + Launching new Onion Services through the control port is not supported + with current syscall sandboxing implementation. + + + Tor must remain in client or server mode (some changes to **ClientOnly** + and **ORPort** are not allowed). Currently, if **Sandbox** is 1, + **ControlPort** command "GETINFO address" will not work. + + (Default: 0) [[Socks4Proxy]] **Socks4Proxy** __host__[:__port__]:: |