summaryrefslogtreecommitdiff
path: root/doc/tor.1.txt
AgeCommit message (Collapse)Author
2017-03-14#21720: Update "directory server options" preamble in manpageNick Mathewson
2017-01-27Outbindbindaddress variants for Exit and OR.Nick Mathewson
Allow separation of exit and relay traffic to different source IP addresses (Ticket #17975). Written by Michael Sonntag.
2017-01-23Merge branch 'feature_20956_029'Nick Mathewson
2017-01-23Add __SocksPort etc variants for non-persistent useNick Mathewson
Implements feature 20956.
2017-01-21Merge remote-tracking branch 'public/ticket18319'Nick Mathewson
2017-01-17man: Clarify options in the tor.1 man pageDavid Goulet
In addition to the comments in the ticket, couple hidden service options have been improved to clarify the maximum and minimum values they can be set to. Closes #21058 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-01-03Document options that can't be changed while tor is runningteor
Closes #21122, bug on multiple tor versions.
2017-01-02Merge remote-tracking branch 'jryans/doc-formatting'Nick Mathewson
2016-12-16Merge branch 'ticket20831_v2'Nick Mathewson
2016-12-16Remove UseDirectoryGuardsNick Mathewson
It is obsoleted in an always-on direction by prop271.
2016-12-13Remove AuthDirMaxServersPerAuthAddrNick Mathewson
Back when Roger had do do most of our testing on the moria host, we needed a higher limit for the number of relays running on a single IP address when that limit was shared with an authority. Nowadays, the idea is pretty obsolete. Also remove the router_addr_is_trusted_dir() function, which served no other purpose. Closes ticket 20960.
2016-12-13Change the default of AuthDirPinKeys to 1.Nick Mathewson
Closes ticket 18319.
2016-12-08Merge branch 'feature15056_v1_squashed'Nick Mathewson
2016-12-08Add an option to disable dirauth ed25519 link key checks.Nick Mathewson
If there is some horrible bug in our ed25519 link authentication code that causes us to label every single ed25519-having node as non-running, we'll be glad we had this. Otherwise we can remove it later.
2016-12-08Add ExtendByEd25519ID consensus parameter/torrc optionNick Mathewson
I need to be able to turn on Ed25519 support in client generation of extend cells so I can test it, but leave it off-by-default until enough clients support it for us to turn it on for a bunch at once. This is part of #15056 / prop#220.
2016-12-04Clean up formatting of tor.1 man page and HTML docJ. Ryan Stinnett
Fixes #20885.
2016-12-03Clarify that ClientRejectInternalAddresses also rejects mDNS *.local hostsJ. Ryan Stinnett
Fixes #17070.
2016-11-30Man page update and changes file for 20667teor
2016-11-14Merge branch 'maint-0.2.9'Nick Mathewson
2016-11-14Fix grammar in HiddenServiceSingleHopMode descriptionFabian Keil
2016-11-10Add "TByte" and "TBytes" units; also add "TBits" to man pageMatt Nordhoff
2016-11-07Merge branch 'maint-0.2.9'Nick Mathewson
Conflicts: src/or/rendservice.c
2016-11-07Merge remote-tracking branch 'teor/bug20484_029_v2' into maint-0.2.9Nick Mathewson
2016-11-08Add onion_service_non_anonymous file to man pageteor
2016-11-01Merge remote-tracking branch 'pastly/ticket20486'Nick Mathewson
2016-11-01Merge branch 'maint-0.2.9'Nick Mathewson
2016-11-01Update man page that HS directory does not need to existMatt Traudt
2016-10-31Add a sentence to the manpage about nonanonymous=>Socksport 0.Nick Mathewson
Closes 20487.
2016-10-23man: Fix default value of AuthDirGuardBWGuarantee to 2MBDavid Goulet
Closes #20435 Signed-off-by: David Goulet <dgoulet@torproject.org>
2016-10-14Merge remote-tracking branch 'public/spaces_in_unix_addrs'Nick Mathewson
2016-10-11Merge remote-tracking branch 'yawning-schwanenlied/bug20261'Nick Mathewson
2016-10-04Allow a unix: address to contain a C-style quoted string.Nick Mathewson
Feature 18753 -- all this to allow spaces.
2016-10-03Fix parse_virtual_addr_network minimum network sizePaolo Inglese
2016-09-30Bug 20261: Disable IsolateClientAddr on AF_LOCAL SocksPorts.Yawning Angel
The client addr is essentially meaningless in this context (yes, it is possible to explicitly `bind()` AF_LOCAL client side sockets to a path, but no one does it, and there are better ways to grant that sort of feature if people want it like using `SO_PASSCRED`).
2016-09-19Merge remote-tracking branch 'teor/bug20117'Nick Mathewson
2016-09-13Merge branch 'feature-17178-v7-squashed-v2'Nick Mathewson
2016-09-13Replace OnionService* with HiddenService* in option namesteor
And make consequential line-length adjustments.
2016-09-13Refactor UseEntryNodes so the original configured value is preservedteor
Parse the value to UseEntryNodes_option, then set UseEntryNodes before validating options. This way, Authorities, Tor2web, and Single Onion Services don't write spurious "UseEntryNodes 0" lines to their configs. Document the fact that these tor configurations ignore UseEntryNodes in the manual page. Also reorder options validation so we modify UseEntryNodes first, then check its value against EntryNodes. And silence a warning about disabled UseEntryNodes for hidden services when we're actually in non-anonymous single onion service mode.
2016-09-13Implement Prop #260: Single Onion Servicesteor (Tim Wilson-Brown)
Add experimental OnionServiceSingleHopMode and OnionServiceNonAnonymousMode options. When both are set to 1, every hidden service on a tor instance becomes a non-anonymous Single Onion Service. Single Onions make one-hop (direct) connections to their introduction and renzedvous points. One-hop circuits make Single Onion servers easily locatable, but clients remain location-anonymous. This is compatible with the existing hidden service implementation, and works on the current tor network without any changes to older relays or clients. Implements proposal #260, completes ticket #17178. Patch by teor & asn. squash! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! Implement Prop #260: Single Onion Services Redesign single onion service poisoning. When in OnionServiceSingleHopMode, each hidden service key is poisoned (marked as non-anonymous) on creation by creating a poison file in the hidden service directory. Existing keys are considered non-anonymous if this file exists, and anonymous if it does not. Tor refuses to launch in OnionServiceSingleHopMode if any existing keys are anonymous. Similarly, it refuses to launch in anonymous client mode if any existing keys are non-anonymous. Rewrite the unit tests to match and be more comprehensive. Adds a bonus unit test for rend_service_load_all_keys().
2016-09-09Document the default PathsNeededToBuildCircuits valueteor
... when the directory authorities don't set min_paths_for_circs_pct. Fixes bug 20117; bugfix on 02c320916e02 in tor-0.2.4.10-alpha. Reported by Jesse V.
2016-09-07Merge remote-tracking branch 'dgoulet/ticket18693_029_01'Nick Mathewson
2016-09-07Merge remote-tracking branch 'sebastian/bug20064'Nick Mathewson
2016-09-06Document Exit flag assignment when private nets are allowedSebastian Hahn
2016-09-06Merge remote-tracking branch 'pastly/ticket19122'Nick Mathewson
2016-09-06Change UID to Username in man pageMatt Traudt
2016-09-06Fix a space error in the man pageteor
2016-09-05Bug 20038: Fix typo in ControlPort descriptionGeorg Koppen
2016-08-29Merge remote-tracking branch 'teor/reject-tap-v6'Nick Mathewson
2016-08-25changes file and docs for 18640.Nick Mathewson
2016-08-24Parse *Port flags NoDNSRequest, NoOnionTraffic & OnionTrafficOnlyteor (Tim Wilson-Brown)
OnionTrafficOnly is equivalent to NoDNSRequest, NoIPv4Traffic, and NoIPv6Traffic. Add unit tests for parsing and checking option validity. Add documentation for each flag to the man page. Add changes file for all of #18693. Parsing only: the flags do not change client behaviour (yet!)