mirror of
https://gitlab.com/hacklab01/pivilion.git
synced 2026-02-04 07:40:48 +00:00
first Pivivlion config and scripts
This commit is contained in:
parent
e046535f8c
commit
1599a2b753
61 changed files with 7014 additions and 0 deletions
30
etc/tor/torsocks.conf
Normal file
30
etc/tor/torsocks.conf
Normal file
|
|
@ -0,0 +1,30 @@
|
|||
# This is the configuration for libtorsocks (transparent socks) for use
|
||||
# with tor, which is providing a socks server on port 9050 by default.
|
||||
#
|
||||
# Lines beginning with # and blank lines are ignored
|
||||
# Much more documentation than provided in these comments can be found in
|
||||
#
|
||||
# torsocks.conf(5), torsocks(1) and torsocks(8) manpages.
|
||||
|
||||
# Default Tor address and port. By default, Tor will listen on localhost for
|
||||
# any SOCKS connection and relay the traffic on the Tor network.
|
||||
TorAddress 127.0.0.1
|
||||
TorPort 9050
|
||||
|
||||
# Tor hidden sites do not have real IP addresses. This specifies what range of
|
||||
# IP addresses will be handed to the application as "cookies" for .onion names.
|
||||
# Of course, you should pick a block of addresses which you aren't going to
|
||||
# ever need to actually connect to. This is similar to the MapAddress feature
|
||||
# of the main tor daemon.
|
||||
OnionAddrRange 127.42.42.0/24
|
||||
|
||||
# SOCKS5 Username and Password. This is used to isolate the torsocks connection
|
||||
# circuit from other streams in Tor. Use with option IsolateSOCKSAuth (on by
|
||||
# default) in tor(1). TORSOCKS_USERNAME and TORSOCKS_PASSWORD environment
|
||||
# variable overrides these options.
|
||||
#SOCKS5Username <username>
|
||||
#SOCKS5Password <password>
|
||||
|
||||
# Set Torsocks to accept inbound connections. If set to 1, listen() and
|
||||
# accept() will be allowed to be used with non localhost address. (Default: 0)
|
||||
#AllowInbound 1
|
||||
Loading…
Add table
Add a link
Reference in a new issue