o Bugfixes:
- Fix an assertion failure in dns.c, where we were trying to dequeue
a pending dns resolve even if it wasn't pending
- - Fix a spurious socks5 warning about still trying to write after the connection is finished.
+ - Fix a spurious socks5 warning about still trying to write after the
+ connection is finished.
- Hold certain marked_for_close connections open until they're finished
flushing, rather than losing bytes by closing them too early.
- Correctly report the reason for ending a stream
tor. It even has a man page.
- The tor binary gets installed to sbin rather than bin now.
- Retry streams where the connected cell hasn't arrived in 15 seconds
- - Clean up exit policy handling -- get the default out of the torrc, so we can update it without forcing each server operator to fix
+ - Clean up exit policy handling -- get the default out of the torrc,
+ so we can update it without forcing each server operator to fix
his/her torrc.
- Allow imaps and pop3s in default exit policy
o Bugfixes:
Then run tor to generate keys. One of the files generated
in your DataDirectory is your 'fingerprint' file. Mail it to
- arma@mit.edu.
+ tor-ops@freehaven.net.
NOTE: You won't be able to use tor as a client or server
in this configuration until you've been added to the directory
edit the bottom part. Then run Tor. It will create each HiddenServiceDir
you have configured, and it will create a 'hostname' file which
specifies the url (xyz.onion) for that service. You can tell people
- the url, and they can connect to it via their Tor proxy.
+ the url, and they can connect to it via their Tor client.
Configuring tsocks: