[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [webwml/staging] onion services: few fixes (#24880)
commit 760bf9a1b077b652562269b6876c80c5a57f9d39
Author: traumschule <traumschuleriebau@xxxxxxxxxx>
Date: Thu Aug 23 14:28:35 2018 +0200
onion services: few fixes (#24880)
---
docs/en/tor-onion-service.wml | 13 +++++++------
1 file changed, 7 insertions(+), 6 deletions(-)
diff --git a/docs/en/tor-onion-service.wml b/docs/en/tor-onion-service.wml
index 4319ad3c..4061678d 100644
--- a/docs/en/tor-onion-service.wml
+++ b/docs/en/tor-onion-service.wml
@@ -275,7 +275,7 @@
â?? <p>Since Tor 0.3.2 and
<a href="https://blog.torproject.org/tor-browser-75a5-released">Tor Browser
- 7.5.a5</a> 56 bit long v3 onion addresses are supported and should be used
+ 7.5.a5</a> 56-character long v3 onion addresses are supported and should be used
instead. This newer version of onion services ("v3") features many
improvements over the legacy system:
</p>
@@ -291,7 +291,7 @@
<a href="https://trac.torproject.org/projects/tor/wiki/doc/HiddenServiceNames">
Why are v3 onions better?</a>. You can identify a next-generation onion
address by its length: they are 56 characters long, as in
- <var>4acth47i6kxnvkewtm6q7ib2s3ufpo5sqbsnzjpbi7utijcltosqemad.onion</a>.
+ <var>4acth47i6kxnvkewtm6q7ib2s3ufpo5sqbsnzjpbi7utijcltosqemad.onion</var>.
The specification for next gen onion services can be found
<a href="https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.txt">
@@ -300,8 +300,9 @@
<h3>How to setup your own prop224 service</h3>
- <p>It's easy! Just use your â??<a href"#two">regular onion service</a> torrc
- and add <var>HiddenServiceVersion 3</var> in your onion service torrc block.
+ <p>It's easy! Just use your <a href"#two">regular onion service</a>
+ <a href="<page docs/faq>#torrc">torrc</a> and add
+ <var>HiddenServiceVersion 3</var> in your onion service torrc block.
Here is an example torrc designed for testing:
</p>
<pre>
@@ -325,9 +326,9 @@ HiddenServicePort 6668 127.0.0.1:6667
<p>Please note that tor is strict about directory permissions and does not
like to share its files. Make sure to restrict read and write access to the
- onion services directory before restarting tor. For most linux based systems you can use:
+ onion services directory before restarting tor. For most linux based systems
+ <pre>chmod 700 -R /var/lib/tor</pre> should be intended.
</p>
- <pre>chmod 700 -R /var/lib/tor</pre>
<p>To restart tor it's safer to not use SIGHUP directly (see bug
<a href="https://trac.torproject.org/projects/tor/ticket/21818">#21818</a>),
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits