@@ -23,10 +23,15 @@ outgoing connections, but more is possible.
23
23
24
24
-proxy=ip:port Set the proxy server. If SOCKS5 is selected (default), this proxy
25
25
server will be used to try to reach .onion addresses as well.
26
+ You need to use -noonion or -onion=0 to explicitly disable
27
+ outbound access to onion services.
26
28
27
29
-onion=ip:port Set the proxy server to use for Tor onion services. You do not
28
- need to set this if it's the same as -proxy. You can use -noonion
30
+ need to set this if it's the same as -proxy. You can use -onion=0
29
31
to explicitly disable access to onion services.
32
+ Note: Only the -proxy option sets the proxy for DNS requests;
33
+ with -onion they will not route over Tor, so use -proxy if you
34
+ have privacy concerns.
30
35
31
36
-listen When using -proxy, listening is disabled by default. If you want
32
37
to run an onion service (see next section), you'll need to enable
@@ -40,7 +45,11 @@ outgoing connections, but more is possible.
40
45
-onlynet=onion Make outgoing connections only to .onion addresses. Incoming
41
46
connections are not affected by this option. This option can be
42
47
specified multiple times to allow multiple network types, e.g.
43
- ipv4, ipv6, or onion.
48
+ ipv4, ipv6 or onion. If you use this option with values other
49
+ than onion you *cannot* disable onion connections; outgoing onion
50
+ connections will be enabled when you use -proxy or -onion. Use
51
+ -noonion or -onion=0 if you want to be sure there are no outbound
52
+ onion connections over the default proxy or your defined -proxy.
44
53
45
54
In a typical situation, this suffices to run behind a Tor proxy:
46
55
0 commit comments