[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] man page entry for safesocks. also correct the man page
Update of /home2/or/cvsroot/tor/doc
In directory moria:/home/arma/work/onion/cvs/tor/doc
Modified Files:
tor.1.in
Log Message:
man page entry for safesocks. also correct the man page
entry for testsocks.
Index: tor.1.in
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/tor.1.in,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -p -d -r1.138 -r1.139
--- tor.1.in 19 Mar 2006 01:39:10 -0000 1.138
+++ tor.1.in 19 Mar 2006 01:52:18 -0000 1.139
@@ -406,11 +406,20 @@ as long-term entries for our circuits.
(Defaults to 3.)
.LP
.TP
+\fBSafeSocks \fR\fI0|1\fP
+When this option is enabled, Tor will reject application connections that
+use unsafe variants of the socks protocol -- ones that only provide an
+IP address, meaning the application is doing a DNS resolve first.
+Specifically, these are socks4 and socks5 when not doing remote DNS.
+(Defaults to 0.)
+.LP
+.TP
\fBTestSocks \fR\fB0\fR|\fB1\fR\fP
When this option is enabled, Tor will make a notice-level log entry for
each connection to the Socks port indicating whether the request used
-a hostname (safe) or an IP address (unsafe). This helps to determine
-whether an application using Tor is possibly leaking DNS requests.
+a safe socks protocol or an unsafe one (see above entry on SafeSocks).
+This helps to determine whether an application using Tor is possibly
+leaking DNS requests.
(Default: 0)
.SH SERVER OPTIONS