📄 torrc.complete.in
字号:
# $Id$# Last updated on $Date$###################################################################### This config file is divided into four sections. They are:## 1. Global Options (clients and servers)## 2. Client Options Only## 3. Server Options Only## 4. Directory Server Options (for running your own Tor network)## 5. Hidden Service Options (clients and servers)#### The conventions used are:## double hash (##) is for summary text about the config option;## single hash (#) is for the config option; and, ## the config option is always after the text.###################################################################### Section 1: Global Options (clients and servers)## A token bucket limits the average incoming bandwidth on this node ## to the specified number of bytes per second. (Default: 2MB)#BandwidthRate N bytes|KB|MB|GB|TB## Limit the maximum token bucket size (also known as the burst) to ## the given number of bytes. (Default: 5 MB)#BandwidthBurst N bytes|KB|MB|GB|TB## If set, we will not advertise more than this amount of bandwidth ## for our BandwidthRate. Server operators who want to reduce the ## number of clients who ask to build circuits through them (since ## this is proportional to advertised bandwidth rate) can thus ## reduce the CPU demands on their server without impacting ## network performance.#MaxAdvertisedBandwidth N bytes|KB|MB|GB|TB## If set, Tor will accept connections from the same machine## (localhost only) on this port, and allow those connections to## control the Tor process using the Tor Control Protocol## (described in control-spec.txt). Note: unless you also specify## one of HashedControlPassword or CookieAuthentication, setting## this option will cause Tor to allow any process on the local## host to control it.#ControlPort Port## Don’t allow any connections on the control port except when the## other process knows the password whose one-way hash is## hashed_password. You can compute the hash of a password by## running "tor --hash-password password".#HashedControlPassword hashed_password## If this option is set to 1, don’t allow any connections on the## control port except when the connecting process knows the ## contents of a file named "control_auth_cookie", which Tor will## create in its data directory. This authentication method## should only be used on systems with good filesystem security.## (Default: 0)#CookieAuthentication 0|1## Store working data in DIR (Default: /usr/local/var/lib/tor)#DataDirectory DIR## Every time the specified period elapses, Tor downloads a direc-## tory. A directory contains a signed list of all known servers## as well as their current liveness status. A value of "0 sec-## onds" tells Tor to choose an appropriate default. ## (Default: 1 hour for clients, 20 minutes for servers)#DirFetchPeriod N seconds|minutes|hours|days|weeks## Tor only trusts directories signed with one of these keys, and## uses the given addresses to connect to the trusted directory## servers. If no DirServer lines are specified, Tor uses the built-in## defaults (moria1, moria2, tor26), so you can leave this alone unless## you need to change it.#### WARNING! Changing these options will make your Tor behave## differently from everyone else's, and hurt your anonymity. Even## uncommenting these lines is a bad idea. They are the defaults now,## but the defaults may change in the future, leaving you behind.###DirServer moria1 v1 18.244.0.188:9031 FFCB 46DB 1339 DA84 674C 70D7 CB58 6434 C437 0441#DirServer moria2 v1 18.244.0.114:80 719B E45D E224 B607 C537 07D0 E214 3E2D 423E 74CF#DirServer tor26 v1 86.59.21.38:80 847B 1F85 0344 D787 6491 A548 92F9 0493 4E4E B85D## On startup, setgid to this user.#Group GID## Tor will make all its directory requests through this host:port## (or host:80 if port is not specified), rather than connecting## directly to any directory servers.#HttpProxy host[:port]## If defined, Tor will use this username:password for Basic Http## proxy authentication, as in RFC 2617. This is currently the## only form of Http proxy authentication that Tor supports; feel## free to submit a patch if you want it to support others.#HttpProxyAuthenticator username:password## Tor will make all its OR (SSL) connections through this## host:port (or host:443 if port is not specified), via HTTP CON-## NECT rather than connecting directly to servers. You may want## to set FascistFirewall to restrict the set of ports you might## try to connect to, if your Https proxy only allows connecting## to certain ports.#HttpsProxy host[:port]## If defined, Tor will use this username:password for Basic Https## proxy authentication, as in RFC 2617. This is currently the## only form of Https proxy authentication that Tor supports; feel## free to submit a patch if you want it to support others.#HttpsProxyAuthenticator username:password## To keep firewalls from expiring connections, send a padding## keepalive cell every NUM seconds on open connections that are## in use. If the connection has no open circuits, it will instead## be closed after NUM seconds of idleness. (Default: 5 minutes)#KeepalivePeriod NUM## Send all messages between minSeverity and maxSeverity to the## standard output stream, the standard error stream, or to the## system log. (The "syslog" value is only supported on Unix.)## Recognized severity levels are debug, info, notice, warn, and## err. If only one severity level is given, all messages of that## level or higher will be sent to the listed destination.#Log minSeverity[-maxSeverity] stderr|stdout|syslog## As above, but send log messages to the listed filename. The## "Log" option may appear more than once in a configuration file.## Messages are sent to all the logs that match their severity## level.#Log minSeverity[-maxSeverity] file FILENAME## Maximum number of simultaneous sockets allowed. You probably## don’t need to adjust this. (Default: 1024)#MaxConn NUM## Make all outbound connections originate from the IP address## specified. This is only useful when you have multiple network## interfaces, and you want all of Tor’s outgoing connections to## use a single one.#OutboundBindAddress IP## On startup, write our PID to FILE. On clean shutdown, remove## FILE.#PIDFile FILE## If 1, Tor forks and daemonizes to the background. (Default: 0)#RunAsDaemon 0|1## If 1, Tor replaces potentially sensitive strings in the logs## (e.g. addresses) with the string [scrubbed]. This way logs can## still be useful, but they don’t leave behind personally identi-## fying information about what sites a user might have visited.## (Default: 1)#SafeLogging 0|1## Every time the specified period elapses, Tor downloads signed## status information about the current state of known servers. A## value of "0 seconds" tells Tor to choose an appropriate## default. (Default: 30 minutes for clients, 15 minutes for## servers)#StatusFetchPeriod N seconds|minutes|hours|days|weeks## On startup, setuid to this user.#User UID## If non-zero, try to use crypto hardware acceleration when## available. (Default: 1)#HardwareAccel 0|1## Section 2: Client Options Only## Where on our circuits should we allow Tor servers that the## directory servers haven’t authenticated as "verified"?## (Default: middle,rendezvous)#AllowUnverifiedNodes entry|exit|middle|introduction|rendezvous|...## If set to 1, Tor will under no circumstances run as a server.## The default is to run as a client unless ORPort is configured.## (Usually, you don’t need to set this; Tor is pretty smart at## figuring out whether you are reliable and high-bandwidth enough## to be a useful server.)## This option will likely be deprecated in the future; see the## NoPublish option below. (Default: 0)#ClientOnly 0|1## A list of preferred nodes to use for the first hop in the ## circuit, if possible.#EntryNodes nickname,nickname,...## A list of preferred nodes to use for the last hop in the ## circuit, if possible.#ExitNodes nickname,nickname,...## A list of nodes to never use when building a circuit.#ExcludeNodes nickname,nickname,...## If 1, Tor will never use any nodes besides those listed in## "exitnodes" for the last hop of a circuit.#StrictExitNodes 0|1## If 1, Tor will never use any nodes besides those listed in## "entrynodes" for the first hop of a circuit.#StrictEntryNodes 0|1## If 1, Tor will only create outgoing connections to ORs running## on ports that your firewall allows (defaults to 80 and 443; see## FirewallPorts). This will allow you to run Tor as a client## behind a firewall with restrictive policies, but will not allow## you to run as a server behind such a firewall.#FascistFirewall 0|1## A list of ports that your firewall allows you to connect to.## Only used when FascistFirewall is set. (Default: 80, 443)#FirewallPorts PORTS## A comma-separated list of IPs that your firewall allows you to## connect to. Only used when FascistFirewall is set. The format## is as for the addresses in ExitPolicy. ## For example, ’FirewallIPs 99.0.0.0/8, *:80’ means that your ## firewall allows connections to everything inside net 99, and ## to port 80 outside.#FirewallIPs ADDR[/MASK][:PORT]...## A list of ports for services that tend to have long-running## connections (e.g. chat and interactive shells). Circuits for## streams that use these ports will contain only high-uptime## nodes, to reduce the chance that a node will go down before the## stream is finished. (Default: 21, 22, 706, 1863, 5050, 5190,## 5222, 5223, 6667, 8300, 8888)#LongLivedPorts PORTS## When a request for address arrives to Tor, it will rewrite it## to newaddress before processing it. For example, if you always## want connections to www.indymedia.org to exit via torserver## (where torserver is the nickname of the server), ## use "MapAddress www.indymedia.org www.indymedia.org.torserver.exit".#MapAddress address newaddress## Every NUM seconds consider whether to build a new circuit.## (Default: 30 seconds)#NewCircuitPeriod NUM## Feel free to reuse a circuit that was first used at most NUM## seconds ago, but never attach a new stream to a circuit that is## too old. (Default: 10 minutes)#MaxCircuitDirtiness NUM## The named Tor servers constitute a "family" of similar or co-## administered servers, so never use any two of them in the same## circuit. Defining a NodeFamily is only needed when a server## doesn’t list the family itself (with MyFamily). This option can## be used multiple times.#NodeFamily nickname,nickname,...## A list of preferred nodes to use for the rendezvous point, if## possible.#RendNodes nickname,nickname,...## A list of nodes to never use when choosing a rendezvous point.#RendExcludeNodes nickname,nickname,...## Advertise this port to listen for connections from SOCKS-speak-## ing applications. Set this to 0 if you don’t want to allow## application connections. (Default: 9050)#SOCKSPort PORT
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -