etc/tor: disable control, document enabling for client

This commit is contained in:
Aminda Suomalainen 2019-05-04 20:17:21 +03:00
parent 8e01a42c62
commit d8ba42bdd1
No known key found for this signature in database
GPG Key ID: 0C207F07B2F32B67
2 changed files with 18 additions and 5 deletions

View File

@ -22,7 +22,16 @@ ClientUseIPv6 1
# in a DS network preventing Tor over IPv4.
#ClientPreferIPv6ORPort 1
# The default ControlPort is 9051 which is presumably used by the main Tor
# instance.
ControlPort 9052
# Disable control access
ControlPort 0
ControlSocket 0
# If these have been disabled in the main Tor or OneHopOnion and something
# should work with the Debian defaults (e.g. zeronet)
CookieAuthentication 1
#CookieAuthFileGroupReadable 1
#CookieAuthFile /run/tor/control.authcookie
#ControlPort 9051
#ControlSocket /run/tor/control GroupWritable RelaxDirModeCheck
#ControlSocketsGroupWritable 1
#SocksPort unix:/run/tor/socks WorldWritable IsolateDestAddr PreferIPv6

View File

@ -6,6 +6,10 @@ SyslogIdentityTag onehoponion
SocksPort 0
HiddenServiceSingleHopMode 1
HiddenServiceNonAnonymousMode 1
ControlPort 9053
CookieAuthentication 1
# I think hidden services running in this mode should be controlled only by
# me in this file so services like Zeronet or Ricochet don't accidentally
# create NonAnonymous hidden services
ControlPort 0
ControlSocket 0