summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorDavid Goulet <dgoulet@torproject.org>2018-12-12 13:23:46 -0500
committerDavid Goulet <dgoulet@torproject.org>2018-12-12 13:23:46 -0500
commit53855d72b71cca7c61124bbdfac0a93b1386cb43 (patch)
tree8219eb3a5b3c194e3977326bbc5562554aa4f309 /doc
parent4afc6b172a8984aad0954dd38d44dede6d007c51 (diff)
downloadtor-53855d72b71cca7c61124bbdfac0a93b1386cb43.tar.gz
tor-53855d72b71cca7c61124bbdfac0a93b1386cb43.zip
man: Add that "GETINFO address" won't work with "Sandbox 1"
Patch by "wagon". Closes #28538 Signed-off-by: David Goulet <dgoulet@torproject.org>
Diffstat (limited to 'doc')
-rw-r--r--doc/tor.1.txt31
1 files changed, 18 insertions, 13 deletions
diff --git a/doc/tor.1.txt b/doc/tor.1.txt
index c886e37613..5b73e25e16 100644
--- a/doc/tor.1.txt
+++ b/doc/tor.1.txt
@@ -598,21 +598,26 @@ GENERAL OPTIONS
Otherwise the sandbox will be disabled. The option is currently an
experimental feature. It only works on Linux-based operating systems,
and only when Tor has been built with the libseccomp library. This option
- can not be changed while tor is running.
+ can not be changed while tor is running. +
+
- When the Sandbox is 1, the following options can not be changed when tor
+ When the **Sandbox** is 1, the following options can not be changed when tor
is running:
- Address
- ConnLimit
- CookieAuthFile
- DirPortFrontPage
- ExtORPortCookieAuthFile
- Logs
- ServerDNSResolvConfFile
- Tor must remain in client or server mode (some changes to ClientOnly and
- ORPort are not allowed). Launching new Onion Services through Control
- Port is not supported with current syscall sandboxing implementation.
- ClientOnionAuthDir and any files in it won't reload on HUP signal.
+ **Address**,
+ **ConnLimit**,
+ **CookieAuthFile**,
+ **DirPortFrontPage**,
+ **ExtORPortCookieAuthFile**,
+ **Logs**,
+ **ServerDNSResolvConfFile**,
+ **ClientOnionAuthDir** (and any files in it won't reload on HUP signal).
+ +
+ Launching new Onion Services through the control port is not supported
+ with current syscall sandboxing implementation.
+ +
+ Tor must remain in client or server mode (some changes to **ClientOnly**
+ and **ORPort** are not allowed). Currently, if **Sandbox** is 1,
+ **ControlPort** command "GETINFO address" will not work.
+ +
(Default: 0)
[[Socks4Proxy]] **Socks4Proxy** __host__[:__port__]::