[or-cvs] r23896: {} we just need the pot files (translation/trunk/projects/manpages/po/templates)

Runa Sandvik runa.sandvik at gmail.com
Sun Dec 5 19:23:16 UTC 2010


Author: runa
Date: 2010-12-05 19:23:15 +0000 (Sun, 05 Dec 2010)
New Revision: 23896

Removed:
   translation/trunk/projects/manpages/po/templates/tor-resolve.1.po
   translation/trunk/projects/manpages/po/templates/tor.1.po
   translation/trunk/projects/manpages/po/templates/torify.1.po
Log:
we just need the pot files

Deleted: translation/trunk/projects/manpages/po/templates/tor-resolve.1.po
===================================================================
--- translation/trunk/projects/manpages/po/templates/tor-resolve.1.po	2010-12-05 19:16:01 UTC (rev 23895)
+++ translation/trunk/projects/manpages/po/templates/tor-resolve.1.po	2010-12-05 19:23:15 UTC (rev 23896)
@@ -1,154 +0,0 @@
-# SOME DESCRIPTIVE TITLE
-# Copyright (C) YEAR The Tor Project, Inc.
-# This file is distributed under the same license as the PACKAGE package.
-# FIRST AUTHOR <EMAIL at ADDRESS>, YEAR.
-#, fuzzy
-msgid ""
-msgstr ""
-"Project-Id-Version: PACKAGE VERSION\n"
-"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2010-05-27 19:09+0300\n"
-"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
-"Last-Translator: FULL NAME <EMAIL at ADDRESS>\n"
-"Language-Team: LANGUAGE <LL at li.org>\n"
-"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
-"Content-Transfer-Encoding: 8bit\n"
-"X-Generator: Translate Toolkit 1.5.3\n"
-
-# type: Plain text
-#: tor-resolve.1.txt:6
-#, no-wrap
-msgid ""
-"// Copyright (c) The Tor Project, Inc.\n"
-"// See LICENSE for licensing information\n"
-"// This is an asciidoc file used to generate the manpage/html reference.\n"
-"// Learn asciidoc on http://www.methods.co.nz/asciidoc/userguide.html\n"
-"tor-resolve(1)\n"
-"==============\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:8
-msgid "Peter Palfrader"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:10
-#, no-wrap
-msgid ""
-"NAME\n"
-"----\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:12
-msgid "tor-resolve - resolve a hostname to an IP address via tor"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:14
-#, no-wrap
-msgid ""
-"SYNOPSIS\n"
-"--------\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:16
-#, no-wrap
-msgid ""
-"**tor-resolve** [-4|-5] [-v] [-x] __hostname__ "
-"[__sockshost__[:__socksport__]]\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:18
-#, no-wrap
-msgid ""
-"DESCRIPTION\n"
-"-----------\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:21
-#, no-wrap
-msgid ""
-"**tor-resolve** is a simple script to connect to a SOCKS proxy that knows "
-"about\n"
-"the SOCKS RESOLVE command, hand it a hostname, and return an IP address.\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:23
-#, no-wrap
-msgid ""
-"OPTIONS\n"
-"-------\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:26
-#, no-wrap
-msgid ""
-"**-v**::\n"
-"    Display verbose output.\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:29
-#, no-wrap
-msgid ""
-"**-x**::\n"
-"    Perform a reverse lookup: get the PTR record for an IPv4 address.\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:32
-#, no-wrap
-msgid ""
-"**-5**::\n"
-"    Use the SOCKS5 protocol. (Default)\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:36
-#, no-wrap
-msgid ""
-"**-4**::\n"
-"    Use the SOCKS4a protocol rather than the default SOCKS5 "
-"protocol. Doesn't\n"
-"    support reverse DNS.\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:38
-#, no-wrap
-msgid ""
-"SEE ALSO\n"
-"--------\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:40
-#, no-wrap
-msgid "**tor**(1), **torify**(1). +\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:42
-msgid "See doc/socks-extensions.txt in the Tor package for protocol details."
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:44
-#, no-wrap
-msgid ""
-"AUTHORS\n"
-"-------\n"
-msgstr ""
-
-# type: Plain text
-#: tor-resolve.1.txt:45
-msgid "Roger Dingledine <arma at mit.edu>, Nick Mathewson <nickm at alum.mit.edu>."
-msgstr ""

Deleted: translation/trunk/projects/manpages/po/templates/tor.1.po
===================================================================
--- translation/trunk/projects/manpages/po/templates/tor.1.po	2010-12-05 19:16:01 UTC (rev 23895)
+++ translation/trunk/projects/manpages/po/templates/tor.1.po	2010-12-05 19:23:15 UTC (rev 23896)
@@ -1,3063 +0,0 @@
-# SOME DESCRIPTIVE TITLE
-# Copyright (C) YEAR The Tor Project, Inc.
-# This file is distributed under the same license as the PACKAGE package.
-# FIRST AUTHOR <EMAIL at ADDRESS>, YEAR.
-#, fuzzy
-msgid ""
-msgstr ""
-"Project-Id-Version: PACKAGE VERSION\n"
-"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2010-05-27 18:49+0300\n"
-"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
-"Last-Translator: FULL NAME <EMAIL at ADDRESS>\n"
-"Language-Team: LANGUAGE <LL at li.org>\n"
-"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
-"Content-Transfer-Encoding: 8bit\n"
-"X-Generator: Translate Toolkit 1.5.3\n"
-
-# type: Plain text
-#: tor.1.txt:6
-#, no-wrap
-msgid ""
-"// Copyright (c) The Tor Project, Inc.\n"
-"// See LICENSE for licensing information\n"
-"// This is an asciidoc file used to generate the manpage/html reference.\n"
-"// Learn asciidoc on http://www.methods.co.nz/asciidoc/userguide.html\n"
-"TOR(1)\n"
-"======\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:9
-#, no-wrap
-msgid ""
-"NAME\n"
-"----\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:11
-msgid "tor - The second-generation onion router"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:14
-#, no-wrap
-msgid ""
-"SYNOPSIS\n"
-"--------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:16
-#, no-wrap
-msgid "**tor** [__OPTION__ __value__]...\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:18
-#, no-wrap
-msgid ""
-"DESCRIPTION\n"
-"-----------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:25
-msgid ""
-"__tor__ is a connection-oriented anonymizing communication service. Users "
-"choose a source-routed path through a set of nodes, and negotiate a "
-"\"virtual circuit\" through the network, in which each node knows its "
-"predecessor and successor, but no others. Traffic flowing down the circuit "
-"is unwrapped by a symmetric key at each node, which reveals the downstream "
-"node. +"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:30
-msgid ""
-"Basically __tor__ provides a distributed network of servers (\"onion "
-"routers\").  Users bounce their TCP streams -- web traffic, ftp, ssh, etc -- "
-"around the routers, and recipients, observers, and even the routers "
-"themselves have difficulty tracking the source of the stream."
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:32
-#, no-wrap
-msgid ""
-"OPTIONS\n"
-"-------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:35
-#, no-wrap
-msgid ""
-"**-h**, **-help**::\n"
-"    Display a short help message and exit.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:38
-#, no-wrap
-msgid ""
-"**-f** __FILE__::\n"
-"    FILE contains further \"option value\" paris. (Default: "
-"@CONFDIR@/torrc)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:41
-#, no-wrap
-msgid ""
-"**--hash-password**::\n"
-"    Generates a hashed password for control port access.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:44
-#, no-wrap
-msgid ""
-"**--list-fingerprint**::\n"
-"    Generate your keys and output your nickname and fingerprint.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:47
-#, no-wrap
-msgid ""
-"**--verify-config**::\n"
-"    Verify the configuration file is valid.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:52
-#, no-wrap
-msgid ""
-"**--nt-service**::\n"
-"    **--service [install|remove|start|stop]** Manage the Tor Windows\n"
-"    NT/2000/XP service. Current instructions can be found at\n"
-"    https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#WinNTService\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:55
-#, no-wrap
-msgid ""
-"**--list-torrc-options**::\n"
-"    List all valid options.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:58
-#, no-wrap
-msgid ""
-"**--version**::\n"
-"    Display Tor version and exit.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:63
-#, no-wrap
-msgid ""
-"**--quiet**::\n"
-"    Do not start Tor with a console log unless explicitly requested to do "
-"so.\n"
-"    (By default, Tor starts out logging messages at level \"notice\" or "
-"higher to\n"
-"    the console, until it has parsed its configuration.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:68
-#, no-wrap
-msgid ""
-"Other options can be specified either on the command-line (--option\n"
-"    value), or in the configuration file (option value or option "
-"\"value\").\n"
-"    Options are case-insensitive. C-style escaped characters are allowed "
-"inside\n"
-"    quoted values.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:73
-#, no-wrap
-msgid ""
-"**BandwidthRate** __N__ **bytes**|**KB**|**MB**|**GB**::\n"
-"    A token bucket limits the average incoming bandwidth usage on this node "
-"to\n"
-"    the specified number of bytes per second, and the average outgoing\n"
-"    bandwidth usage to that same value. (Default: 5 MB)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:77
-#, no-wrap
-msgid ""
-"**BandwidthBurst** __N__ **bytes**|**KB**|**MB**|**GB**::\n"
-"    Limit the maximum token bucket size (also known as the burst) to the "
-"given\n"
-"    number of bytes in each direction. (Default: 10 MB)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:84
-#, no-wrap
-msgid ""
-"**MaxAdvertisedBandwidth** __N__ **bytes**|**KB**|**MB**|**GB**::\n"
-"    If set, we will not advertise more than this amount of bandwidth for "
-"our\n"
-"    BandwidthRate. Server operators who want to reduce the number of "
-"clients\n"
-"    who ask to build circuits through them (since this is proportional to\n"
-"    advertised bandwidth rate) can thus reduce the CPU demands on their "
-"server\n"
-"    without impacting network performance.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:91
-#, no-wrap
-msgid ""
-"**RelayBandwidthRate** __N__ **bytes**|**KB**|**MB**|**GB**::\n"
-"    If defined, a separate token bucket limits the average incoming "
-"bandwidth\n"
-"    usage for \\_relayed traffic_ on this node to the specified number of "
-"bytes\n"
-"    per second, and the average outgoing bandwidth usage to that same "
-"value.\n"
-"    Relayed traffic currently is calculated to include answers to "
-"directory\n"
-"    requests, but that may change in future versions. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:96
-#, no-wrap
-msgid ""
-"**RelayBandwidthBurst** __N__ **bytes**|**KB**|**MB**|**GB**::\n"
-"    Limit the maximum token bucket size (also known as the burst) for\n"
-"    \\_relayed traffic_ to the given number of bytes in each direction.\n"
-"    (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:101
-#, no-wrap
-msgid ""
-"**PerConnBWRate** __N__ **bytes**|**KB**|**MB**|**GB**::\n"
-"    If set, do separate rate limiting for each connection from a "
-"non-relay.\n"
-"    You should never need to change this value, since a network-wide value "
-"is\n"
-"    published in the consensus and your relay will use that value. (Default: "
-"0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:106
-#, no-wrap
-msgid ""
-"**PerConnBWBurst** __N__ **bytes**|**KB**|**MB**|**GB**::\n"
-"    If set, do separate rate limiting for each connection from a "
-"non-relay.\n"
-"    You should never need to change this value, since a network-wide value "
-"is\n"
-"    published in the consensus and your relay will use that value. (Default: "
-"0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:115
-#, no-wrap
-msgid ""
-"**ConLimit** __NUM__::\n"
-"    The minimum number of file descriptors that must be available to the "
-"Tor\n"
-"    process before it will start. Tor will ask the OS for as many file\n"
-"    descriptors as the OS will allow (you can find this by \"ulimit -H "
-"-n\").\n"
-"    If this number is less than ConnLimit, then Tor will refuse to "
-"start. +\n"
-" +\n"
-"    You probably don't need to adjust this. It has no effect on Windows\n"
-"    since that platform lacks getrlimit(). (Default: 1000)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:136
-#, no-wrap
-msgid ""
-"**ConstrainedSockets** **0**|**1**::\n"
-"    If set, Tor will tell the kernel to attempt to shrink the buffers for "
-"all\n"
-"    sockets to the size specified in **ConstrainedSockSize**. This is useful "
-"for\n"
-"    virtual servers and other environments where system level TCP buffers "
-"may\n"
-"    be limited. If you're on a virtual server, and you encounter the "
-"\"Error\n"
-"    creating network socket: No buffer space available\" message, you are\n"
-"    likely experiencing this problem. +\n"
-" +\n"
-"    The preferred solution is to have the admin increase the buffer pool "
-"for\n"
-"    the host itself via /proc/sys/net/ipv4/tcp_mem or equivalent facility;\n"
-"    this configuration option is a second-resort. +\n"
-" +\n"
-"    The DirPort option should also not be used if TCP buffers are "
-"scarce. The\n"
-"    cached directory requests consume additional sockets which exacerbates\n"
-"    the problem. +\n"
-" +\n"
-"    You should **not** enable this feature unless you encounter the \"no "
-"buffer\n"
-"    space available\" issue. Reducing the TCP buffers affects window size "
-"for\n"
-"    the TCP stream and will reduce throughput in proportion to round trip\n"
-"    time on long paths. (Default: 0.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:141
-#, no-wrap
-msgid ""
-"**ConstrainedSockSize** __N__ **bytes**|**KB**::\n"
-"    When **ConstrainedSockets** is enabled the receive and transmit buffers "
-"for\n"
-"    all sockets will be set to this limit. Must be a value between 2048 "
-"and\n"
-"    262144, in 1024 byte increments. Default of 8192 is recommended.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:149
-#, no-wrap
-msgid ""
-"**ControlPort** __Port__::\n"
-"    If set, Tor will accept connections on this port and allow those\n"
-"    connections to control the Tor process using the Tor Control Protocol\n"
-"    (described in control-spec.txt). Note: unless you also specify one of\n"
-"    **HashedControlPassword** or **CookieAuthentication**, setting this "
-"option will\n"
-"    cause Tor to allow any process on the local host to control it. This\n"
-"    option is required for many Tor controllers; most use the value of "
-"9051.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:157
-#, no-wrap
-msgid ""
-"**ControlListenAddress** __IP__[:__PORT__]::\n"
-"    Bind the controller listener to this address. If you specify a port, "
-"bind\n"
-"    to this port rather than the one specified in ControlPort. We strongly\n"
-"    recommend that you leave this alone unless you know what you're doing,\n"
-"    since giving attackers access to your control listener is really\n"
-"    dangerous. (Default: 127.0.0.1) This directive can be specified "
-"multiple\n"
-"    times to bind to multiple addresses/ports.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:161
-#, no-wrap
-msgid ""
-"**ControlSocket** __Path__::\n"
-"    Like ControlPort, but listens on a Unix domain socket, rather than a "
-"TCP\n"
-"    socket. (Unix and Unix-like systems only.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:168
-#, no-wrap
-msgid ""
-"**HashedControlPassword** __hashed_password__::\n"
-"    Don't allow any connections on the control port except when the other\n"
-"    process knows the password whose one-way hash is "
-"__hashed_password__. You\n"
-"    can compute the hash of a password by running \"tor --hash-password\n"
-"    __password__\". You can provide several acceptable passwords by using "
-"more\n"
-"    than one HashedControlPassword line.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:175
-#, no-wrap
-msgid ""
-"**CookieAuthentication** **0**|**1**::\n"
-"    If this option is set to 1, don't allow any connections on the control "
-"port\n"
-"    except when the connecting process knows the contents of a file named\n"
-"    \"control_auth_cookie\", which Tor will create in its data "
-"directory. This\n"
-"    authentication method should only be used on systems with good "
-"filesystem\n"
-"    security. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:179
-#, no-wrap
-msgid ""
-"**CookieAuthFile** __Path__::\n"
-"    If set, this option overrides the default location and file name\n"
-"    for Tor's cookie file. (See CookieAuthentication above.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:185
-#, no-wrap
-msgid ""
-"**CookieAuthFileGroupReadable** **0**|**1**|__Groupname__::\n"
-"    If this option is set to 0, don't allow the filesystem group to read "
-"the\n"
-"    cookie file. If the option is set to 1, make the cookie file readable "
-"by\n"
-"    the default GID. [Making the file readable by other groups is not yet\n"
-"    implemented; let us know if you need this for some reason.] (Default: "
-"0).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:188
-#, no-wrap
-msgid ""
-"**DataDirectory** __DIR__::\n"
-"    Store working data in DIR (Default: @LOCALSTATEDIR@/lib/tor)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:211
-#, no-wrap
-msgid ""
-"**DirServer** [__nickname__] [**flags**] __address__:__port__ "
-"__fingerprint__::\n"
-"    Use a nonstandard authoritative directory server at the provided "
-"address\n"
-"    and port, with the specified key fingerprint. This option can be "
-"repeated\n"
-"    many times, for multiple authoritative directory servers. Flags are\n"
-"    separated by spaces, and determine what kind of an authority this "
-"directory\n"
-"    is. By default, every authority is authoritative for current "
-"(\"v2\")-style\n"
-"    directories, unless the \"no-v2\" flag is given. If the \"v1\" flags "
-"is\n"
-"    provided, Tor will use this server as an authority for old-style (v1)\n"
-"    directories as well. (Only directory mirrors care about this.) Tor "
-"will\n"
-"    use this server as an authority for hidden service information if the "
-"\"hs\"\n"
-"    flag is set, or if the \"v1\" flag is set and the \"no-hs\" flag is "
-"**not** set.\n"
-"    Tor will use this authority as a bridge authoritative directory if the\n"
-"    \"bridge\" flag is set. If a flag \"orport=**port**\" is given, Tor will "
-"use the\n"
-"    given port when opening encrypted tunnels to the dirserver. Lastly, if "
-"a\n"
-"    flag \"v3ident=**fp**\" is given, the dirserver is a v3 directory "
-"authority\n"
-"    whose v3 long-term signing key has the fingerprint **fp**. +\n"
-" +\n"
-"    If no **dirserver** line is given, Tor will use the default directory\n"
-"    servers. NOTE: this option is intended for setting up a private Tor\n"
-"    network with its own directory authorities. If you use it, you will be\n"
-"    distinguishable from other users, because you won't believe the same\n"
-"    authorities they do.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:213
-#, no-wrap
-msgid ""
-"**AlternateDirAuthority** [__nickname__] [**flags**] __address__:__port__ "
-"__fingerprint__ +\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:215
-#, no-wrap
-msgid ""
-"**AlternateHSAuthority** [__nickname__] [**flags**] __address__:__port__ "
-"__fingerprint__ +\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:222
-#, no-wrap
-msgid ""
-"**AlternateBridgeAuthority** [__nickname__] [**flags**] __address__:__port__ "
-"__ fingerprint__::\n"
-"    As DirServer, but replaces less of the default directory "
-"authorities. Using\n"
-"    AlternateDirAuthority replaces the default Tor directory authorities, "
-"but\n"
-"    leaves the hidden service authorities and bridge authorities in place.\n"
-"    Similarly, Using AlternateHSAuthority replaces the default hidden "
-"service\n"
-"    authorities, but not the directory or bridge authorities.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:230
-#, no-wrap
-msgid ""
-"**DisableAllSwap** **0**|**1**::\n"
-"    If set to 1, Tor will attempt to lock all current and future memory "
-"pages,\n"
-"    so that memory cannot be paged out. Windows, OS X and Solaris are "
-"currently\n"
-"    not supported. We believe that this feature works on modern Gnu/Linux\n"
-"    distributions, and that it should work on *BSD systems "
-"(untested). This\n"
-"    option requires that you start your Tor as root, and you should use "
-"the\n"
-"    **User** option to properly reduce Tor's privileges. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:235
-#, no-wrap
-msgid ""
-"**FetchDirInfoEarly** **0**|**1**::\n"
-"    If set to 1, Tor will always fetch directory information like other\n"
-"    directory caches, even if you don't meet the normal criteria for "
-"fetching\n"
-"    early. Normal users should leave it off. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:241
-#, no-wrap
-msgid ""
-"**FetchDirInfoExtraEarly** **0**|**1**::\n"
-"    If set to 1, Tor will fetch directory information before other "
-"directory\n"
-"    caches. It will attempt to download directory information closer to "
-"the\n"
-"    start of the consensus period. Normal users should leave it off.\n"
-"    (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:246
-#, no-wrap
-msgid ""
-"**FetchHidServDescriptors** **0**|**1**::\n"
-"    If set to 0, Tor will never fetch any hidden service descriptors from "
-"the\n"
-"    rendezvous directories. This option is only useful if you're using a "
-"Tor\n"
-"    controller that handles hidden service fetches for you. (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:252
-#, no-wrap
-msgid ""
-"**FetchServerDescriptors** **0**|**1**::\n"
-"    If set to 0, Tor will never fetch any network status summaries or "
-"server\n"
-"    descriptors from the directory servers. This option is only useful if\n"
-"    you're using a Tor controller that handles directory fetches for you.\n"
-"    (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:259
-#, no-wrap
-msgid ""
-"**FetchUselessDescriptors** **0**|**1**::\n"
-"    If set to 1, Tor will fetch every non-obsolete descriptor from the\n"
-"    authorities that it hears about. Otherwise, it will avoid fetching "
-"useless\n"
-"    descriptors, for example for routers that are not running. This option "
-"is\n"
-"    useful if you're using the contributed \"exitlist\" script to enumerate "
-"Tor\n"
-"    nodes that exit to certain addresses. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:264
-#, no-wrap
-msgid ""
-"**HTTPProxy** __host__[:__port__]::\n"
-"    Tor will make all its directory requests through this host:port (or "
-"host:80\n"
-"    if port is not specified), rather than connecting directly to any "
-"directory\n"
-"    servers.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:270
-#, no-wrap
-msgid ""
-"**HTTPProxyAuthenticator** __username:password__::\n"
-"    If defined, Tor will use this username:password for Basic HTTP proxy\n"
-"    authentication, as in RFC 2617. This is currently the only form of "
-"HTTP\n"
-"    proxy authentication that Tor supports; feel free to submit a patch if "
-"you\n"
-"    want it to support others.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:277
-#, no-wrap
-msgid ""
-"**HTTPSProxy** __host__[:__port__]::\n"
-"    Tor will make all its OR (SSL) connections through this host:port (or\n"
-"    host:443 if port is not specified), via HTTP CONNECT rather than "
-"connecting\n"
-"    directly to servers. You may want to set **FascistFirewall** to "
-"restrict\n"
-"    the set of ports you might try to connect to, if your HTTPS proxy only\n"
-"    allows connecting to certain ports.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:283
-#, no-wrap
-msgid ""
-"**HTTPSProxyAuthenticator** __username:password__::\n"
-"    If defined, Tor will use this username:password for Basic HTTPS proxy\n"
-"    authentication, as in RFC 2617. This is currently the only form of "
-"HTTPS\n"
-"    proxy authentication that Tor supports; feel free to submit a patch if "
-"you\n"
-"    want it to support others.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:287
-#, no-wrap
-msgid ""
-"**Socks4Proxy** __host__[:__port__]::\n"
-"    Tor will make all OR connections through the SOCKS 4 proxy at "
-"host:port\n"
-"    (or host:1080 if port is not specified).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:291
-#, no-wrap
-msgid ""
-"**Socks5Proxy** __host__[:__port__]::\n"
-"    Tor will make all OR connections through the SOCKS 5 proxy at "
-"host:port\n"
-"    (or host:1080 if port is not specified).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:293
-#, no-wrap
-msgid "**Socks5ProxyUsername** __username__ +\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:298
-#, no-wrap
-msgid ""
-"**Socks5ProxyPassword** __password__::\n"
-"    If defined, authenticate to the SOCKS 5 server using username and "
-"password\n"
-"    in accordance to RFC 1929. Both username and password must be between 1 "
-"and\n"
-"    255 characters.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:304
-#, no-wrap
-msgid ""
-"**KeepalivePeriod** __NUM__::\n"
-"    To keep firewalls from expiring connections, send a padding keepalive "
-"cell\n"
-"    every NUM seconds on open connections that are in use. If the "
-"connection\n"
-"    has no open circuits, it will instead be closed after NUM seconds of\n"
-"    idleness. (Default: 5 minutes)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:313
-#, no-wrap
-msgid ""
-"**Log** __minSeverity__[-__maxSeverity__] "
-"**stderr**|**stdout**|**syslog**::\n"
-"    Send all messages between __minSeverity__ and __maxSeverity__ to the "
-"standard\n"
-"    output stream, the standard error stream, or to the system log. (The\n"
-"    \"syslog\" value is only supported on Unix.) Recognized severity levels "
-"are\n"
-"    debug, info, notice, warn, and err. We advise using \"notice\" in most "
-"cases,\n"
-"    since anything more verbose may provide sensitive information to an\n"
-"    attacker who obtains the logs. If only one severity level is given, "
-"all\n"
-"    messages of that level or higher will be sent to the listed "
-"destination.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:319
-#, no-wrap
-msgid ""
-"**Log** __minSeverity__[-__maxSeverity__] **file** __FILENAME__::\n"
-"    As above, but send log messages to the listed filename. The\n"
-"    \"Log\" option may appear more than once in a configuration file.\n"
-"    Messages are sent to all the logs that match their severity\n"
-"    level.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:325
-#, no-wrap
-msgid ""
-"**OutboundBindAddress** __IP__::\n"
-"    Make all outbound connections originate from the IP address "
-"specified. This\n"
-"    is only useful when you have multiple network interfaces, and you want "
-"all\n"
-"    of Tor's outgoing connections to use a single one.  This setting will "
-"be\n"
-"    ignored for connections to the loopback addresses (127.0.0.0/8 and "
-"::1).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:329
-#, no-wrap
-msgid ""
-"**PidFile** __FILE__::\n"
-"    On startup, write our PID to FILE. On clean shutdown, remove\n"
-"    FILE.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:334
-#, no-wrap
-msgid ""
-"**ProtocolWarnings** **0**|**1**::\n"
-"    If 1, Tor will log with severity \\'warn' various cases of other parties "
-"not\n"
-"    following the Tor specification. Otherwise, they are logged with "
-"severity\n"
-"    \\'info'. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:339
-#, no-wrap
-msgid ""
-"**RunAsDaemon** **0**|**1**::\n"
-"    If 1, Tor forks and daemonizes to the background. This option has no "
-"effect\n"
-"    on Windows; instead you should use the --service command-line option.\n"
-"    (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:351
-#, no-wrap
-msgid ""
-"**SafeLogging** **0**|**1**|**relay**::\n"
-"    Tor can scrub potentially sensitive strings from log messages (e.g.\n"
-"    addresses) by replacing them with the string [scrubbed]. This way logs "
-"can\n"
-"    still be useful, but they don't leave behind personally identifying\n"
-"    information about what sites a user might have visited. +\n"
-" +\n"
-"    If this option is set to 0, Tor will not perform any scrubbing, if it "
-"is\n"
-"    set to 1, all potentially sensitive strings are replaced. If it is set "
-"to\n"
-"    relay, all log messages generated when acting as a relay are sanitized, "
-"but\n"
-"    all messages generated when acting as a client are not. (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:354
-#, no-wrap
-msgid ""
-"**User** __UID__::\n"
-"    On startup, setuid to this user and setgid to their primary group.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:358
-#, no-wrap
-msgid ""
-"**HardwareAccel** **0**|**1**::\n"
-"    If non-zero, try to use built-in (static) crypto hardware acceleration "
-"when\n"
-"    available. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:363
-#, no-wrap
-msgid ""
-"**AccelName** __NAME__::\n"
-"    When using OpenSSL hardware crypto acceleration attempt to load the "
-"dynamic\n"
-"    engine of this name. This must be used for any dynamic hardware "
-"engine.\n"
-"    Names can be verified with the openssl engine command.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:367
-#, no-wrap
-msgid ""
-"**AccelDir** __DIR__::\n"
-"    Specify this option if using dynamic hardware acceleration and the "
-"engine\n"
-"    implementation library resides somewhere other than the OpenSSL "
-"default.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:372
-#, no-wrap
-msgid ""
-"**AvoidDiskWrites** **0**|**1**::\n"
-"    If non-zero, try to write to disk less frequently than we would "
-"otherwise.\n"
-"    This is useful when running on flash memory or other media that "
-"support\n"
-"    only a limited number of writes. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:377
-#, no-wrap
-msgid ""
-"**TunnelDirConns** **0**|**1**::\n"
-"    If non-zero, when a directory server we contact supports it, we will "
-"build\n"
-"    a one-hop circuit and make an encrypted connection via its ORPort.\n"
-"    (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:381
-#, no-wrap
-msgid ""
-"**PreferTunneledDirConns** **0**|**1**::\n"
-"    If non-zero, we will avoid directory servers that don't support "
-"tunneled\n"
-"    directory connections, when possible. (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:393
-#, no-wrap
-msgid ""
-"**CircuitPriorityHalflife** __NUM1__::\n"
-"    If this value is set, we override the default algorithm for choosing "
-"which\n"
-"    circuit's cell to deliver or relay next. When the value is 0, we\n"
-"    round-robin between the active circuits on a connection, delivering "
-"one\n"
-"    cell from each in turn. When the value is positive, we prefer "
-"delivering\n"
-"    cells from whichever connection has the lowest weighted cell count, "
-"where\n"
-"    cells are weighted exponentially according to the supplied\n"
-"    CircuitPriorityHalflife value (in seconds). If this option is not set "
-"at\n"
-"    all, we use the behavior recommended in the current consensus\n"
-"    networkstatus. This is an advanced option; you generally shouldn't "
-"have\n"
-"    to mess with it. (Default: not set.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:395
-#, no-wrap
-msgid ""
-"CLIENT OPTIONS\n"
-"--------------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:399
-msgid ""
-"The following options are useful only for clients (that is, if **SocksPort** "
-"is non-zero):"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:406
-#, no-wrap
-msgid ""
-"**AllowInvalidNodes** "
-"**entry**|**exit**|**middle**|**introduction**|**rendezvous**|**...**::\n"
-"    If some Tor servers are obviously not working right, the directory\n"
-"    authorities can manually mark them as invalid, meaning that it's not\n"
-"    recommended you use them for entry or exit positions in your "
-"circuits. You\n"
-"    can opt to use them in some circuit positions, though. The default is\n"
-"    \"middle,rendezvous\", and other choices are not advised.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:413
-#, no-wrap
-msgid ""
-"**ExcludeSingleHopRelays** **0**|**1**::\n"
-"    This option controls whether circuits built by Tor will include relays "
-"with\n"
-"    the AllowSingleHopExits flag set to true. If ExcludeSingleHopRelays is "
-"set\n"
-"    to 0, these relays will be included. Note that these relays might be "
-"at\n"
-"    higher risk of being seized or observed, so they are not normally "
-"included.\n"
-"    (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:421
-#, no-wrap
-msgid ""
-"**Bridge** __IP__:__ORPort__ [fingerprint]::\n"
-"    When set along with UseBridges, instructs Tor to use the relay at\n"
-"    \"IP:ORPort\" as a \"bridge\" relaying into the Tor network. If "
-"\"fingerprint\"\n"
-"    is provided (using the same format as for DirServer), we will verify "
-"that\n"
-"    the relay running at that location has the right fingerprint. We also "
-"use\n"
-"    fingerprint to look up the bridge descriptor at the bridge authority, "
-"if\n"
-"    it's provided and if UpdateBridgesFromAuthority is set too.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:425
-#, no-wrap
-msgid ""
-"**CircuitBuildTimeout** __NUM__::\n"
-"    Try for at most NUM seconds when building circuits. If the circuit "
-"isn't\n"
-"    open in that time, give up on it. (Default: 1 minute.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:433
-#, no-wrap
-msgid ""
-"**CircuitIdleTimeout** __NUM__::\n"
-"    If we have kept a clean (never used) circuit around for NUM seconds, "
-"then\n"
-"    close it. This way when the Tor client is entirely idle, it can expire "
-"all\n"
-"    of its circuits, and then expire its TLS connections. Also, if we end "
-"up\n"
-"    making a circuit that is not useful for exiting any of the requests "
-"we're\n"
-"    receiving, it won't forever take up a slot in the circuit "
-"list. (Default: 1\n"
-"    hour.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:439
-#, no-wrap
-msgid ""
-"**CircuitStreamTimeout** __NUM__::\n"
-"    If non-zero, this option overrides our internal timeout schedule for "
-"how\n"
-"    many seconds until we detach a stream from a circuit and try a new "
-"circuit.\n"
-"    If your network is particularly slow, you might want to set this to a\n"
-"    number like 60. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:446
-#, no-wrap
-msgid ""
-"**ClientOnly** **0**|**1**::\n"
-"    If set to 1, Tor will under no circumstances run as a server or serve\n"
-"    directory requests. The default is to run as a client unless ORPort is\n"
-"    configured. (Usually, you don't need to set this; Tor is pretty smart "
-"at\n"
-"    figuring out whether you are reliable and high-bandwidth enough to be "
-"a\n"
-"    useful server.) (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:451
-#, no-wrap
-msgid ""
-"**ExcludeNodes** __node__,__node__,__...__::\n"
-"    A list of identity fingerprints, nicknames, country codes and address\n"
-"    patterns of nodes to never use when building a circuit. (Example:\n"
-"    ExcludeNodes SlowServer, $    EFFFFFFFFFFFFFFF, \\{cc}, 255.254.0.0/8)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:457
-#, no-wrap
-msgid ""
-"**ExcludeExitNodes** __node__,__node__,__...__::\n"
-"    A list of identity fingerprints, nicknames, country codes and address\n"
-"    patterns of nodes to never use when picking an exit node. Note that "
-"any\n"
-"    node listed in ExcludeNodes is automatically considered to be part of "
-"this\n"
-"    list.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:462
-#, no-wrap
-msgid ""
-"**EntryNodes** __node__,__node__,__...__::\n"
-"    A list of identity fingerprints, nicknames, country codes and address\n"
-"    patterns of nodes to use for the first hop in normal circuits. These "
-"are\n"
-"    treated only as preferences unless StrictNodes (see below) is also "
-"set.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:467
-#, no-wrap
-msgid ""
-"**ExitNodes** __node__,__node__,__...__::\n"
-"    A list of identity fingerprints, nicknames, country codes and address\n"
-"    patterns of nodes to use for the last hop in normal exit "
-"circuits. These\n"
-"    are treated only as preferences unless StrictNodes (see below) is also "
-"set.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:475
-#, no-wrap
-msgid ""
-"**StrictNodes** **0**|**1**::\n"
-"    If 1 and EntryNodes config option is set, Tor will never use any nodes\n"
-"    besides those listed in EntryNodes for the first hop of a normal "
-"circuit.\n"
-"    If 1 and ExitNodes config option is set, Tor will never use any nodes\n"
-"    besides those listed in ExitNodes for the last hop of a normal exit\n"
-"    circuit. Note that Tor might still use these nodes for non-exit "
-"circuits\n"
-"    such as one-hop directory fetches or hidden service support circuits.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:483
-#, no-wrap
-msgid ""
-"**FascistFirewall** **0**|**1**::\n"
-"    If 1, Tor will only create outgoing connections to ORs running on "
-"ports\n"
-"    that your firewall allows (defaults to 80 and 443; see "
-"**FirewallPorts**).\n"
-"    This will allow you to run Tor as a client behind a firewall with\n"
-"    restrictive policies, but will not allow you to run as a server behind "
-"such\n"
-"    a firewall. If you prefer more fine-grained control, use\n"
-"    ReachableAddresses instead.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:488
-#, no-wrap
-msgid ""
-"**FirewallPorts** __PORTS__::\n"
-"    A list of ports that your firewall allows you to connect to. Only used "
-"when\n"
-"    **FascistFirewall** is set. This option is deprecated; use "
-"ReachableAddresses\n"
-"    instead. (Default: 80, 443)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:498
-#, no-wrap
-msgid ""
-"**HidServAuth** __onion-address__ __auth-cookie__ [__service-name__]::\n"
-"    Client authorization for a hidden service. Valid onion addresses contain "
-"16\n"
-"    characters in a-z2-7 plus \".onion\", and valid auth cookies contain "
-"22\n"
-"    characters in A-Za-z0-9+/. The service name is only used for internal\n"
-"    purposes, e.g., for Tor controllers. This option may be used multiple "
-"times\n"
-"    for different hidden services. If a hidden service uses authorization "
-"and\n"
-"    this option is not set, the hidden service is not accessible. Hidden\n"
-"    services can be configured to require authorization using the \n"
-"    **HiddenServiceAuthorizeClient** option.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:507
-#, no-wrap
-msgid ""
-"**ReachableAddresses** __ADDR__[/__MASK__][:__PORT__]...::\n"
-"    A comma-separated list of IP addresses and ports that your firewall "
-"allows\n"
-"    you to connect to. The format is as for the addresses in ExitPolicy, "
-"except\n"
-"    that \"accept\" is understood unless \"reject\" is explicitly "
-"provided. For\n"
-"    example, \\'ReachableAddresses 99.0.0.0/8, reject 18.0.0.0/8:80, "
-"accept\n"
-"    \\*:80' means that your firewall allows connections to everything inside "
-"net\n"
-"    99, rejects port 80 connections to net 18, and accepts connections to "
-"port\n"
-"    80 otherwise. (Default: \\'accept \\*:*'.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:514
-#, no-wrap
-msgid ""
-"**ReachableDirAddresses** __ADDR__[/__MASK__][:__PORT__]...::\n"
-"    Like **ReachableAddresses**, a list of addresses and ports. Tor will "
-"obey\n"
-"    these restrictions when fetching directory information, using standard "
-"HTTP\n"
-"    GET requests. If not set explicitly then the value of\n"
-"    **ReachableAddresses** is used. If **HTTPProxy** is set then these\n"
-"    connections will go through that proxy.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:527
-#, no-wrap
-msgid ""
-"**ReachableORAddresses** __ADDR__[/__MASK__][:__PORT__]...::\n"
-"    Like **ReachableAddresses**, a list of addresses and ports. Tor will "
-"obey\n"
-"    these restrictions when connecting to Onion Routers, using TLS/SSL. If "
-"not\n"
-"    set explicitly then the value of **ReachableAddresses** is used. If\n"
-"    **HTTPSProxy** is set then these connections will go through that "
-"proxy. +\n"
-" +\n"
-"    The separation between **ReachableORAddresses** and\n"
-"    **ReachableDirAddresses** is only interesting when you are connecting\n"
-"    through proxies (see **HTTPProxy** and **HTTPSProxy**). Most proxies "
-"limit\n"
-"    TLS connections (which Tor uses to connect to Onion Routers) to port "
-"443,\n"
-"    and some limit HTTP GET requests (which Tor uses for fetching "
-"directory\n"
-"    information) to port 80.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:534
-#, no-wrap
-msgid ""
-"**LongLivedPorts** __PORTS__::\n"
-"    A list of ports for services that tend to have long-running "
-"connections\n"
-"    (e.g. chat and interactive shells). Circuits for streams that use "
-"these\n"
-"    ports will contain only high-uptime nodes, to reduce the chance that a "
-"node\n"
-"    will go down before the stream is finished. (Default: 21, 22, 706, "
-"1863,\n"
-"    5050, 5190, 5222, 5223, 6667, 6697, 8300)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:541
-#, no-wrap
-msgid ""
-"**MapAddress** __address__ __newaddress__::\n"
-"    When a request for address arrives to Tor, it will rewrite it to "
-"newaddress\n"
-"    before processing it. For example, if you always want connections to\n"
-"    www.indymedia.org to exit via __torserver__ (where __torserver__ is "
-"the\n"
-"    nickname of the server), use \"MapAddress www.indymedia.org\n"
-"    www.indymedia.org.torserver.exit\".\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:545
-#, no-wrap
-msgid ""
-"**NewCircuitPeriod** __NUM__::\n"
-"    Every NUM seconds consider whether to build a new circuit. (Default: "
-"30\n"
-"    seconds)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:550
-#, no-wrap
-msgid ""
-"**MaxCircuitDirtiness** __NUM__::\n"
-"    Feel free to reuse a circuit that was first used at most NUM seconds "
-"ago,\n"
-"    but never attach a new stream to a circuit that is too old. (Default: "
-"10\n"
-"    minutes)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:557
-#, no-wrap
-msgid ""
-"**NodeFamily** __node__,__node__,__...__::\n"
-"    The Tor servers, defined by their identity fingerprints or nicknames,\n"
-"    constitute a \"family\" of similar or co-administered servers, so never "
-"use\n"
-"    any two of them in the same circuit. Defining a NodeFamily is only "
-"needed\n"
-"    when a server doesn't list the family itself (with MyFamily). This "
-"option\n"
-"    can be used multiple times.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:562
-#, no-wrap
-msgid ""
-"**EnforceDistinctSubnets** **0**|**1**::\n"
-"    If 1, Tor will not put two servers whose IP addresses are \"too close\" "
-"on\n"
-"    the same circuit. Currently, two addresses are \"too close\" if they lie "
-"in\n"
-"    the same /16 range. (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:567
-#, no-wrap
-msgid ""
-"**SocksPort** __PORT__::\n"
-"    Advertise this port to listen for connections from Socks-speaking\n"
-"    applications. Set this to 0 if you don't want to allow application\n"
-"    connections. (Default: 9050)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:573
-#, no-wrap
-msgid ""
-"**SocksListenAddress** __IP__[:__PORT__]::\n"
-"    Bind to this address to listen for connections from Socks-speaking\n"
-"    applications. (Default: 127.0.0.1) You can also specify a port (e.g.\n"
-"    192.168.0.1:9100). This directive can be specified multiple times to "
-"bind\n"
-"    to multiple addresses/ports.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:578
-#, no-wrap
-msgid ""
-"**SocksPolicy** __policy__,__policy__,__...__::\n"
-"    Set an entrance policy for this server, to limit who can connect to "
-"the\n"
-"    SocksPort and DNSPort ports. The policies have the same form as exit\n"
-"    policies below.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:583
-#, no-wrap
-msgid ""
-"**SocksTimeout** __NUM__::\n"
-"    Let a socks connection wait NUM seconds handshaking, and NUM seconds\n"
-"    unattached waiting for an appropriate circuit, before we fail "
-"it. (Default:\n"
-"    2 minutes.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:595
-#, no-wrap
-msgid ""
-"**TrackHostExits** __host__,__.domain__,__...__::\n"
-"    For each value in the comma separated list, Tor will track recent\n"
-"    connections to hosts that match this value and attempt to reuse the "
-"same\n"
-"    exit node for each. If the value is prepended with a \\'.\\', it is "
-"treated as\n"
-"    matching an entire domain. If one of the values is just a \\'.', it "
-"means\n"
-"    match everything. This option is useful if you frequently connect to "
-"sites\n"
-"    that will expire all your authentication cookies (i.e. log you out) if\n"
-"    your IP address changes. Note that this option does have the "
-"disadvantage\n"
-"    of making it more clear that a given history is associated with a "
-"single\n"
-"    user. However, most people who would wish to observe this will observe "
-"it\n"
-"    through cookies or other protocol-specific means anyhow.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:600
-#, no-wrap
-msgid ""
-"**TrackHostExitsExpire** __NUM__::\n"
-"    Since exit servers go up and down, it is desirable to expire the\n"
-"    association between host and exit server after NUM seconds. The default "
-"is\n"
-"    1800 seconds (30 minutes).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:605
-#, no-wrap
-msgid ""
-"**UpdateBridgesFromAuthority** **0**|**1**::\n"
-"    When set (along with UseBridges), Tor will try to fetch bridge "
-"descriptors\n"
-"    from the configured bridge authorities when feasible. It will fall back "
-"to\n"
-"    a direct request if the authority responds with a 404. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:610
-#, no-wrap
-msgid ""
-"**UseBridges** **0**|**1**::\n"
-"    When set, Tor will fetch descriptors for each bridge listed in the "
-"\"Bridge\"\n"
-"    config lines, and use these relays as both entry guards and directory\n"
-"    guards. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:616
-#, no-wrap
-msgid ""
-"**UseEntryGuards** **0**|**1**::\n"
-"    If this option is set to 1, we pick a few long-term entry servers, and "
-"try\n"
-"    to stick with them. This is desirable because constantly changing "
-"servers\n"
-"    increases the odds that an adversary who owns some servers will observe "
-"a\n"
-"    fraction of your paths. (Defaults to 1.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:620
-#, no-wrap
-msgid ""
-"**NumEntryGuards** __NUM__::\n"
-"    If UseEntryGuards is set to 1, we will try to pick a total of NUM "
-"routers\n"
-"    as long-term entries for our circuits. (Defaults to 3.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:627
-#, no-wrap
-msgid ""
-"**SafeSocks** **0**|**1**::\n"
-"    When this option is enabled, Tor will reject application connections "
-"that\n"
-"    use unsafe variants of the socks protocol -- ones that only provide an "
-"IP\n"
-"    address, meaning the application is doing a DNS resolve first.\n"
-"    Specifically, these are socks4 and socks5 when not doing remote DNS.\n"
-"    (Defaults to 0.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:634
-#, no-wrap
-msgid ""
-"**TestSocks** **0**|**1**::\n"
-"    When this option is enabled, Tor will make a notice-level log entry "
-"for\n"
-"    each connection to the Socks port indicating whether the request used "
-"a\n"
-"    safe socks protocol or an unsafe one (see above entry on "
-"SafeSocks). This\n"
-"    helps to determine whether an application using Tor is possibly "
-"leaking\n"
-"    DNS requests. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:645
-#, no-wrap
-msgid ""
-"**VirtualAddrNetwork** __Address__/__bits__::\n"
-"    When a controller asks for a virtual (unused) address with the "
-"MAPADDRESS\n"
-"    command, Tor picks an unassigned address from this range. (Default:\n"
-"    127.192.0.0/10) +\n"
-" +\n"
-"    When providing proxy server service to a network of computers using a "
-"tool\n"
-"    like dns-proxy-tor, change this address to \"10.192.0.0/10\" or\n"
-"    \"172.16.0.0/12\". The default **VirtualAddrNetwork** address range on "
-"a\n"
-"    properly configured machine will route to the loopback interface. For\n"
-"    local use, no change to the default VirtualAddrNetwork setting is "
-"needed.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:651
-#, no-wrap
-msgid ""
-"**AllowNonRFC953Hostnames** **0**|**1**::\n"
-"    When this option is disabled, Tor blocks hostnames containing illegal\n"
-"    characters (like @ and :) rather than sending them to an exit node to "
-"be\n"
-"    resolved. This helps trap accidental attempts to resolve URLs and so "
-"on.\n"
-"    (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:657
-#, no-wrap
-msgid ""
-"**AllowDotExit** **0**|**1**::\n"
-"    If enabled, we convert \"www.google.com.foo.exit\" addresses on the\n"
-"    SocksPort/TransPort/NatdPort into \"www.google.com\" addresses that exit "
-"from\n"
-"    the node \"foo\". Disabled by default since attacking websites and "
-"exit\n"
-"    relays can use it to manipulate your path selection. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:667
-#, no-wrap
-msgid ""
-"**FastFirstHopPK** **0**|**1**::\n"
-"    When this option is disabled, Tor uses the public key step for the "
-"first\n"
-"    hop of creating circuits. Skipping it is generally safe since we have\n"
-"    already used TLS to authenticate the relay and to establish "
-"forward-secure\n"
-"    keys. Turning this option off makes circuit building slower. +\n"
-" +\n"
-"    Note that Tor will always use the public key step for the first hop if "
-"it's\n"
-"    operating as a relay, and it will never use the public key step if it\n"
-"    doesn't yet know the onion key of the first hop. (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:675
-#, no-wrap
-msgid ""
-"**TransPort** __PORT__::\n"
-"    If non-zero, enables transparent proxy support on __PORT__ (by "
-"convention,\n"
-"    9040). Requires OS support for transparent proxies, such as BSDs' pf "
-"or\n"
-"    Linux's IPTables. If you're planning to use Tor as a transparent proxy "
-"for\n"
-"    a network, you'll want to examine and change VirtualAddrNetwork from "
-"the\n"
-"    default setting. You'll also want to set the TransListenAddress option "
-"for\n"
-"    the network you'd like to proxy. (Default: 0).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:680
-#, no-wrap
-msgid ""
-"**TransListenAddress** __IP__[:__PORT__]::\n"
-"    Bind to this address to listen for transparent proxy "
-"connections. (Default:\n"
-"    127.0.0.1). This is useful for exporting a transparent proxy server to "
-"an\n"
-"    entire network.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:685
-#, no-wrap
-msgid ""
-"**NATDPort** __PORT__::\n"
-"    Allow old versions of ipfw (as included in old versions of FreeBSD, "
-"etc.)\n"
-"    to send connections through Tor using the NATD protocol. This option "
-"is\n"
-"    only for people who cannot use TransPort.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:688
-#, no-wrap
-msgid ""
-"**NATDListenAddress** __IP__[:__PORT__]::\n"
-"    Bind to this address to listen for NATD connections. (Default: "
-"127.0.0.1).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:695
-#, no-wrap
-msgid ""
-"**AutomapHostsOnResolve** **0**|**1**::\n"
-"    When this option is enabled, and we get a request to resolve an "
-"address\n"
-"    that ends with one of the suffixes in **AutomapHostsSuffixes**, we map "
-"an\n"
-"    unused virtual address to that address, and return the new virtual "
-"address. \n"
-"    This is handy for making \".onion\" addresses work with applications "
-"that\n"
-"    resolve an address and then connect to it. (Default: 0).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:699
-#, no-wrap
-msgid ""
-"**AutomapHostsSuffixes** __SUFFIX__,__SUFFIX__,__...__::\n"
-"    A comma-separated list of suffixes to use with "
-"**AutomapHostsOnResolve**.\n"
-"    The \".\" suffix is equivalent to \"all addresses.\" (Default: "
-".exit,.onion).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:703
-#, no-wrap
-msgid ""
-"**DNSPort** __PORT__::\n"
-"    If non-zero, Tor listens for UDP DNS requests on this port and "
-"resolves\n"
-"    them anonymously. (Default: 0).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:706
-#, no-wrap
-msgid ""
-"**DNSListenAddress** __IP__[:__PORT__]::\n"
-"    Bind to this address to listen for DNS connections. (Default: "
-"127.0.0.1).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:712
-#, no-wrap
-msgid ""
-"**ClientDNSRejectInternalAddresses** **0**|**1**::\n"
-"    If true, Tor does not believe any anonymously retrieved DNS answer "
-"that\n"
-"    tells it that an address resolves to an internal address (like 127.0.0.1 "
-"or\n"
-"    192.168.0.1). This option prevents certain browser-based attacks; "
-"don't\n"
-"    turn it off unless you know what you're doing. (Default: 1).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:718
-#, no-wrap
-msgid ""
-"**DownloadExtraInfo** **0**|**1**::\n"
-"    If true, Tor downloads and caches \"extra-info\" documents. These "
-"documents\n"
-"    contain information about servers other than the information in their\n"
-"    regular router descriptors. Tor does not use this information for "
-"anything\n"
-"    itself; to save bandwidth, leave this option turned off. (Default: 0).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:724
-#, no-wrap
-msgid ""
-"**FallbackNetworkstatusFile** __FILENAME__::\n"
-"    If Tor doesn't have a cached networkstatus file, it starts out using "
-"this\n"
-"    one instead. Even if this file is out of date, Tor can still use it to\n"
-"    learn about directory mirrors, so it doesn't need to put load on the\n"
-"    authorities. (Default: None).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:730
-#, no-wrap
-msgid ""
-"**WarnPlaintextPorts** __port__,__port__,__...__::\n"
-"    Tells Tor to issue a warnings whenever the user tries to make an "
-"anonymous\n"
-"    connection to one of these ports. This option is designed to alert "
-"users\n"
-"    to services that risk sending passwords in the clear. (Default:\n"
-"    23,109,110,143).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:734
-#, no-wrap
-msgid ""
-"**RejectPlaintextPorts** __port__,__port__,__...__::\n"
-"    Like WarnPlaintextPorts, but instead of warning about risky port uses, "
-"Tor\n"
-"    will instead refuse to make the connection. (Default: None).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:736
-#, no-wrap
-msgid ""
-"SERVER OPTIONS\n"
-"--------------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:740
-msgid ""
-"The following options are useful only for servers (that is, if ORPort is "
-"non-zero):"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:745
-#, no-wrap
-msgid ""
-"**Address** __address__::\n"
-"    The IP address or fully qualified domain name of this server (e.g.\n"
-"    moria.mit.edu). You can leave this unset, and Tor will guess your IP\n"
-"    address.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:750
-#, no-wrap
-msgid ""
-"**AllowSingleHopExits** **0**|**1**::\n"
-"    This option controls whether clients can use this server as a single "
-"hop\n"
-"    proxy. If set to 1, clients can use this server as an exit even if it "
-"is\n"
-"    the only hop in the circuit. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:757
-#, no-wrap
-msgid ""
-"**AssumeReachable** **0**|**1**::\n"
-"    This option is used when bootstrapping a new Tor network. If set to 1,\n"
-"    don't do self-reachability testing; just upload your server descriptor\n"
-"    immediately. If **AuthoritativeDirectory** is also set, this option\n"
-"    instructs the dirserver to bypass remote reachability testing too and "
-"list\n"
-"    all connected servers as running.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:763
-#, no-wrap
-msgid ""
-"**BridgeRelay** **0**|**1**::\n"
-"    Sets the relay to act as a \"bridge\" with respect to relaying "
-"connections\n"
-"    from bridge users to the Tor network. Mainly it influences how the "
-"relay\n"
-"    will cache and serve directory information. Usually used in "
-"combination\n"
-"    with PublishServerDescriptor.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:768
-#, no-wrap
-msgid ""
-"**ContactInfo** __email_address__::\n"
-"    Administrative contact information for server. This line might get "
-"picked\n"
-"    up by spam harvesters, so you may want to obscure the fact that it's "
-"an\n"
-"    email address.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:801
-#, no-wrap
-msgid ""
-"**ExitPolicy** __policy__,__policy__,__...__::\n"
-"    Set an exit policy for this server. Each policy is of the form\n"
-"    \"**accept**|**reject** __ADDR__[/__MASK__][:__PORT__]\". If /__MASK__ "
-"is\n"
-"    omitted then this policy just applies to the host given. Instead of "
-"giving\n"
-"    a host or network you can also use \"\\*\" to denote the universe "
-"(0.0.0.0/0).\n"
-"    __PORT__ can be a single port number, an interval of ports\n"
-"    \"__FROM_PORT__-__TO_PORT__\", or \"\\*\". If __PORT__ is omitted, that "
-"means\n"
-"    \"\\*\". +\n"
-" +\n"
-"    For example, \"accept 18.7.22.69:\\*,reject 18.0.0.0/8:\\*,accept "
-"\\*:\\*\" would\n"
-"    reject any traffic destined for MIT except for web.mit.edu, and accept\n"
-"    anything else. +\n"
-" +\n"
-"    To specify all internal and link-local networks (including 0.0.0.0/8,\n"
-"    169.254.0.0/16,    127.0.0.0/8,    192.168.0.0/16, 10.0.0.0/8, and\n"
-"    172.16.0.0/12), you can use the \"private\" alias instead of an "
-"address.\n"
-"    These addresses are rejected by default (at the beginning of your exit\n"
-"    policy), along with your public IP address, unless you set the\n"
-"    ExitPolicyRejectPrivate config option to 0. For example, once you've "
-"done\n"
-"    that, you could allow HTTP to 127.0.0.1 and block all other connections "
-"to\n"
-"    internal networks with \"accept 127.0.0.1:80,reject private:\\*\", "
-"though that\n"
-"    may also allow connections to your own computer that are addressed to "
-"its\n"
-"    public (external) IP address. See RFC 1918 and RFC 3330 for more "
-"details\n"
-"    about internal and reserved IP address space. +\n"
-" +\n"
-"    This directive can be specified multiple times so you don't have to put "
-"it\n"
-"    all on one line. +\n"
-" +\n"
-"    Policies are considered first to last, and the first match wins. If "
-"you\n"
-"    want to \\_replace_ the default exit policy, end your exit policy with\n"
-"    either a reject \\*:* or an accept \\*:*. Otherwise, you're "
-"\\_augmenting_\n"
-"    (prepending to) the default exit policy. The default exit policy is: +\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:813
-#, no-wrap
-msgid ""
-"       reject *:25\n"
-"       reject *:119\n"
-"       reject *:135-139\n"
-"       reject *:445\n"
-"       reject *:563\n"
-"       reject *:1214\n"
-"       reject *:4661-4666\n"
-"       reject *:6346-6429\n"
-"       reject *:6699\n"
-"       reject *:6881-6999\n"
-"       accept *:*\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:818
-#, no-wrap
-msgid ""
-"**ExitPolicyRejectPrivate** **0**|**1**::\n"
-"    Reject all private (local) networks, along with your own public IP "
-"address,\n"
-"    at the beginning of your exit policy. See above entry on ExitPolicy.\n"
-"    (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:822
-#, no-wrap
-msgid ""
-"**MaxOnionsPending** __NUM__::\n"
-"    If you have more than this number of onionskins queued for decrypt, "
-"reject\n"
-"    new ones. (Default: 100)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:830
-#, no-wrap
-msgid ""
-"**MyFamily** __node__,__node__,__...__::\n"
-"    Declare that this Tor server is controlled or administered by a group "
-"or\n"
-"    organization identical or similar to that of the other servers, defined "
-"by\n"
-"    their identity fingerprints or nicknames. When two servers both "
-"declare\n"
-"    that they are in the same \\'family', Tor clients will not use them in "
-"the\n"
-"    same circuit. (Each server only needs to list the other servers in its\n"
-"    family; it doesn't need to list itself, but it won't hurt.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:834
-#, no-wrap
-msgid ""
-"**Nickname** __name__::\n"
-"    Set the server's nickname to \\'name'. Nicknames must be between 1 and "
-"19\n"
-"    characters inclusive, and must contain only the characters "
-"[a-zA-Z0-9].\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:837
-#, no-wrap
-msgid ""
-"**NumCPUs** __num__::\n"
-"    How many processes to use at once for decrypting onionskins. (Default: "
-"1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:840
-#, no-wrap
-msgid ""
-"**ORPort** __PORT__::\n"
-"    Advertise this port to listen for connections from Tor clients and "
-"servers.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:846
-#, no-wrap
-msgid ""
-"**ORListenAddress** __IP__[:__PORT__]::\n"
-"    Bind to this IP address to listen for connections from Tor clients and\n"
-"    servers. If you specify a port, bind to this port rather than the one\n"
-"    specified in ORPort. (Default: 0.0.0.0) This directive can be "
-"specified\n"
-"    multiple times to bind to multiple addresses/ports.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:857
-#, no-wrap
-msgid ""
-"**PublishServerDescriptor** "
-"**0**|**1**|**v1**|**v2**|**v3**|**bridge**|**hidserv**,**...**::\n"
-"    This option is only considered if you have an ORPort defined. You can\n"
-"    choose multiple arguments, separated by commas.\n"
-" +\n"
-"    If set to 0, Tor will act as a server but it will not publish its\n"
-"    descriptor to the directory authorities. (This is useful if you're "
-"testing\n"
-"    out your server, or if you're using a Tor controller that handles "
-"directory\n"
-"    publishing for you.) Otherwise, Tor will publish its descriptor to all\n"
-"    directory authorities of the type(s) specified. The value \"1\" is the\n"
-"    default, which means \"publish to the appropriate authorities\".\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:863
-#, no-wrap
-msgid ""
-"**ShutdownWaitLength** __NUM__::\n"
-"    When we get a SIGINT and we're a server, we begin shutting down:\n"
-"    we close listeners and start refusing new circuits. After **NUM**\n"
-"    seconds, we exit. If we get a second SIGINT, we exit immedi-\n"
-"    ately. (Default: 30 seconds)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:877
-#, no-wrap
-msgid ""
-"**AccountingMax** __N__ **bytes**|**KB**|**MB**|**GB**|**TB**::\n"
-"    Never send more than the specified number of bytes in a given "
-"accounting\n"
-"    period, or receive more than that number in the period. For example, "
-"with\n"
-"    AccountingMax set to 1 GB, a server could send 900 MB and receive 800 "
-"MB\n"
-"    and continue running. It will only hibernate once one of the two reaches "
-"1\n"
-"    GB. When the number of bytes is exhausted, Tor will hibernate until "
-"some\n"
-"    time in the next accounting period. To prevent all servers from waking "
-"at\n"
-"    the same time, Tor will also wait until a random point in each period\n"
-"    before waking up. If you have bandwidth cost issues, enabling "
-"hibernation\n"
-"    is preferable to setting a low bandwidth, since it provides users with "
-"a\n"
-"    collection of fast servers that are up some of the time, which is more\n"
-"    useful than a set of slow servers that are always \"available\".\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:888
-#, no-wrap
-msgid ""
-"**AccountingStart** **day**|**week**|**month** [__day__] __HH:MM__::\n"
-"    Specify how long accounting periods last. If **month** is given, each\n"
-"    accounting period runs from the time __HH:MM__ on the __dayth__ day of "
-"one\n"
-"    month to the same day and time of the next. (The day must be between 1 "
-"and\n"
-"    28.) If **week** is given, each accounting period runs from the time "
-"__HH:MM__\n"
-"    of the __dayth__ day of one week to the same day and time of the next "
-"week,\n"
-"    with Monday as day 1 and Sunday as day 7. If **day** is given, each\n"
-"    accounting period runs from the time __HH:MM__ each day to the same time "
-"on\n"
-"    the next day. All times are local, and given in 24-hour time. (Defaults "
-"to\n"
-"    \"month 1 0:00\".)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:895
-#, no-wrap
-msgid ""
-"**ServerDNSResolvConfFile** __filename__::\n"
-"    Overrides the default DNS configuration with the configuration in\n"
-"    __filename__. The file format is the same as the standard Unix\n"
-"    \"**resolv.conf**\" file (7). This option, like all other ServerDNS "
-"options,\n"
-"    only affects name lookups that your server does on behalf of clients.\n"
-"    (Defaults to use the system DNS configuration.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:901
-#, no-wrap
-msgid ""
-"**ServerDNSAllowBrokenConfig** **0**|**1**::\n"
-"    If this option is false, Tor exits immediately if there are problems\n"
-"    parsing the system DNS configuration or connecting to nameservers.\n"
-"    Otherwise, Tor continues to periodically retry the system nameservers "
-"until\n"
-"    it eventually succeeds. (Defaults to \"1\".)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:908
-#, no-wrap
-msgid ""
-"**ServerDNSSearchDomains** **0**|**1**::\n"
-"    If set to 1, then we will search for addresses in the local search "
-"domain.\n"
-"    For example, if this system is configured to believe it is in\n"
-"    \"example.com\", and a client tries to connect to \"www\", the client "
-"will be\n"
-"    connected to \"www.example.com\". This option only affects name lookups "
-"that\n"
-"    your server does on behalf of clients. (Defaults to \"0\".)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:915
-#, no-wrap
-msgid ""
-"**ServerDNSDetectHijacking** **0**|**1**::\n"
-"    When this option is set to 1, we will test periodically to determine\n"
-"    whether our local nameservers have been configured to hijack failing "
-"DNS\n"
-"    requests (usually to an advertising site). If they are, we will attempt "
-"to\n"
-"    correct this. This option only affects name lookups that your server "
-"does\n"
-"    on behalf of clients. (Defaults to \"1\".)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:922
-#, no-wrap
-msgid ""
-"**ServerDNSTestAddresses** __address__,__address__,__...__::\n"
-"    When we're detecting DNS hijacking, make sure that these __valid__ "
-"addresses\n"
-"    aren't getting redirected. If they are, then our DNS is completely "
-"useless,\n"
-"    and we'll reset our exit policy to \"reject *:*\". This option only "
-"affects\n"
-"    name lookups that your server does on behalf of clients. (Defaults to\n"
-"    \"www.google.com, www.mit.edu, www.yahoo.com, www.slashdot.org\".)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:929
-#, no-wrap
-msgid ""
-"**ServerDNSAllowNonRFC953Hostnames** **0**|**1**::\n"
-"    When this option is disabled, Tor does not try to resolve hostnames\n"
-"    containing illegal characters (like @ and :) rather than sending them to "
-"an\n"
-"    exit node to be resolved. This helps trap accidental attempts to "
-"resolve\n"
-"    URLs and so on. This option only affects name lookups that your server "
-"does\n"
-"    on behalf of clients. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:935
-#, no-wrap
-msgid ""
-"**BridgeRecordUsageByCountry** **0**|**1**::\n"
-"    When this option is enabled and BridgeRelay is also enabled, and we "
-"have\n"
-"    GeoIP data, Tor keeps a keep a per-country count of how many client\n"
-"    addresses have contacted it so that it can help the bridge authority "
-"guess\n"
-"    which countries have blocked access to it. (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:943
-#, no-wrap
-msgid ""
-"**ServerDNSRandomizeCase** **0**|**1**::\n"
-"    When this option is set, Tor sets the case of each character randomly "
-"in\n"
-"    outgoing DNS requests, and makes sure that the case matches in DNS "
-"replies.\n"
-"    This so-called \"0x20 hack\" helps resist some types of DNS poisoning "
-"attack.\n"
-"    For more information, see \"Increased DNS Forgery Resistance through\n"
-"    0x20-Bit Encoding\". This option only affects name lookups that your "
-"server\n"
-"    does on behalf of clients. (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:946
-#, no-wrap
-msgid ""
-"**GeoIPFile** __filename__::\n"
-"    A filename containing GeoIP data, for use with "
-"BridgeRecordUsageByCountry.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:951
-#, no-wrap
-msgid ""
-"**CellStatistics** **0**|**1**::\n"
-"    When this option is enabled, Tor writes statistics on the mean time "
-"that\n"
-"    cells spend in circuit queues to disk every 24 hours. Cannot be "
-"changed\n"
-"    while Tor is running. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:956
-#, no-wrap
-msgid ""
-"**DirReqStatistics** **0**|**1**::\n"
-"    When this option is enabled, Tor writes statistics on the number and\n"
-"    response time of network status requests to disk every 24 hours. Cannot "
-"be\n"
-"    changed while Tor is running. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:961
-#, no-wrap
-msgid ""
-"**EntryStatistics** **0**|**1**::\n"
-"    When this option is enabled, Tor writes statistics on the number of\n"
-"    directly connecting clients to disk every 24 hours. Cannot be changed "
-"while\n"
-"    Tor is running. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:966
-#, no-wrap
-msgid ""
-"**ExitPortStatistics** **0**|**1**::\n"
-"    When this option is enabled, Tor writes statistics on the number of "
-"relayed\n"
-"    bytes and opened stream per exit port to disk every 24 hours. Cannot "
-"be\n"
-"    changed while Tor is running. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:971
-#, no-wrap
-msgid ""
-"**ExtraInfoStatistics** **0**|**1**::\n"
-"    When this option is enabled, Tor includes previously gathered statistics "
-"in\n"
-"    its extra-info documents that it uploads to the directory authorities.\n"
-"    (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:973
-#, no-wrap
-msgid ""
-"DIRECTORY SERVER OPTIONS\n"
-"------------------------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:977
-msgid ""
-"The following options are useful only for directory servers (that is, if "
-"DirPort is non-zero):"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:985
-#, no-wrap
-msgid ""
-"**AuthoritativeDirectory** **0**|**1**::\n"
-"    When this option is set to 1, Tor operates as an authoritative "
-"directory\n"
-"    server. Instead of caching the directory, it generates its own list of\n"
-"    good servers, signs it, and sends that to the clients. Unless the "
-"clients\n"
-"    already have you listed as a trusted directory, you probably do not "
-"want\n"
-"    to set this option. Please coordinate with the other admins at\n"
-"    tor-ops at torproject.org if you think you should be a directory.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:991
-#, no-wrap
-msgid ""
-"**DirPortFrontPage** __FILENAME__::\n"
-"    When this option is set, it takes an HTML file and publishes it as \"/\" "
-"on\n"
-"    the DirPort. Now relay operators can provide a disclaimer without "
-"needing\n"
-"    to set up a separate webserver. There's a sample disclaimer in\n"
-"    contrib/tor-exit-notice.html.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:996
-#, no-wrap
-msgid ""
-"**V1AuthoritativeDirectory** **0**|**1**::\n"
-"    When this option is set in addition to **AuthoritativeDirectory**, Tor\n"
-"    generates version 1 directory and running-routers documents (for "
-"legacy\n"
-"    Tor clients up to 0.1.0.x).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1002
-#, no-wrap
-msgid ""
-"**V2AuthoritativeDirectory** **0**|**1**::\n"
-"    When this option is set in addition to **AuthoritativeDirectory**, Tor\n"
-"    generates version 2 network statuses and serves descriptors, etc as\n"
-"    described in doc/spec/dir-spec-v2.txt (for Tor clients and servers "
-"running\n"
-"    0.1.1.x and 0.1.2.x).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1008
-#, no-wrap
-msgid ""
-"**V3AuthoritativeDirectory** **0**|**1**::\n"
-"    When this option is set in addition to **AuthoritativeDirectory**, Tor\n"
-"    generates version 3 network statuses and serves descriptors, etc as\n"
-"    described in doc/spec/dir-spec.txt (for Tor clients and servers running "
-"at\n"
-"    least 0.2.0.x).\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1015
-#, no-wrap
-msgid ""
-"**VersioningAuthoritativeDirectory** **0**|**1**::\n"
-"    When this option is set to 1, Tor adds information on which versions "
-"of\n"
-"    Tor are still believed safe for use to the published directory. Each\n"
-"    version 1 authority is automatically a versioning authority; version 2\n"
-"    authorities provide this service optionally. See "
-"**RecommendedVersions**,\n"
-"    **RecommendedClientVersions**, and **RecommendedServerVersions**.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1024
-#, no-wrap
-msgid ""
-"**NamingAuthoritativeDirectory** **0**|**1**::\n"
-"    When this option is set to 1, then the server advertises that it has\n"
-"    opinions about nickname-to-fingerprint bindings. It will include these\n"
-"    opinions in its published network-status pages, by listing servers "
-"with\n"
-"    the flag \"Named\" if a correct binding between that nickname and "
-"fingerprint\n"
-"    has been registered with the dirserver. Naming dirservers will refuse "
-"to\n"
-"    accept or publish descriptors that contradict a registered "
-"binding. See\n"
-"    **approved-routers** in the **FILES** section below.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1028
-#, no-wrap
-msgid ""
-"**HSAuthoritativeDir** **0**|**1**::\n"
-"    When this option is set in addition to **AuthoritativeDirectory**, Tor "
-"also\n"
-"    accepts and serves hidden service descriptors. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1033
-#, no-wrap
-msgid ""
-"**HidServDirectoryV2** **0**|**1**::\n"
-"    When this option is set, Tor accepts and serves v2 hidden service\n"
-"    descriptors. Setting DirPort is not required for this, because clients\n"
-"    connect via the ORPort by default. (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1038
-#, no-wrap
-msgid ""
-"**BridgeAuthoritativeDir** **0**|**1**::\n"
-"    When this option is set in addition to **AuthoritativeDirectory**, Tor\n"
-"    accepts and serves router descriptors, but it caches and serves the "
-"main\n"
-"    networkstatus documents rather than generating its own. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1042
-#, no-wrap
-msgid ""
-"**MinUptimeHidServDirectoryV2** __N__ "
-"**seconds**|**minutes**|**hours**|**days**|**weeks**::\n"
-"    Minimum uptime of a v2 hidden service directory to be accepted as such "
-"by\n"
-"    authoritative directories. (Default: 24 hours)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1045
-#, no-wrap
-msgid ""
-"**DirPort** __PORT__::\n"
-"    Advertise the directory service on this port.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1051
-#, no-wrap
-msgid ""
-"**DirListenAddress** __IP__[:__PORT__]::\n"
-"    Bind the directory service to this address. If you specify a port, bind "
-"to\n"
-"    this port rather than the one specified in DirPort.  (Default: "
-"0.0.0.0)\n"
-"    This directive can be specified multiple times  to bind to multiple\n"
-"    addresses/ports.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1055
-#, no-wrap
-msgid ""
-"**DirPolicy** __policy__,__policy__,__...__::\n"
-"    Set an entrance policy for this server, to limit who can connect to "
-"the\n"
-"    directory ports. The policies have the same form as exit policies "
-"above.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1057
-#, no-wrap
-msgid ""
-"DIRECTORY AUTHORITY SERVER OPTIONS\n"
-"----------------------------------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1065
-#, no-wrap
-msgid ""
-"**RecommendedVersions** __STRING__::\n"
-"    STRING is a comma-separated list of Tor versions currently believed to "
-"be\n"
-"    safe. The list is included in each directory, and nodes which pull down "
-"the\n"
-"    directory learn whether they need to upgrade. This option can appear\n"
-"    multiple times: the values from multiple lines are spliced "
-"together. When\n"
-"    this is set then **VersioningAuthoritativeDirectory** should be set "
-"too.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1072
-#, no-wrap
-msgid ""
-"**RecommendedClientVersions** __STRING__::\n"
-"    STRING is a comma-separated list of Tor versions currently believed to "
-"be\n"
-"    safe for clients to use. This information is included in version 2\n"
-"    directories. If this is not set then the value of "
-"**RecommendedVersions**\n"
-"    is used. When this is set then **VersioningAuthoritativeDirectory** "
-"should\n"
-"    be set too.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1079
-#, no-wrap
-msgid ""
-"**RecommendedServerVersions** __STRING__::\n"
-"    STRING is a comma-separated list of Tor versions currently believed to "
-"be\n"
-"    safe for servers to use. This information is included in version 2\n"
-"    directories. If this is not set then the value of "
-"**RecommendedVersions**\n"
-"    is used. When this is set then **VersioningAuthoritativeDirectory** "
-"should\n"
-"    be set too.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1083
-#, no-wrap
-msgid ""
-"**ConsensusParams** __STRING__::\n"
-"    STRING is a space-separated list of key=value pairs that Tor will "
-"include\n"
-"    in the \"params\" line of its networkstatus vote.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1088
-#, no-wrap
-msgid ""
-"**DirAllowPrivateAddresses** **0**|**1**::\n"
-"    If set to 1, Tor will accept router descriptors with arbitrary "
-"\"Address\"\n"
-"    elements. Otherwise, if the address is not an IP address or is a private "
-"IP\n"
-"    address, it will reject the router descriptor. Defaults to 0.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1093
-#, no-wrap
-msgid ""
-"**AuthDirBadDir** __AddressPattern...__::\n"
-"    Authoritative directories only. A set of address patterns for servers "
-"that\n"
-"    will be listed as bad directories in any network status document this\n"
-"    authority publishes, if **AuthDirListBadDirs** is set.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1098
-#, no-wrap
-msgid ""
-"**AuthDirBadExit** __AddressPattern...__::\n"
-"    Authoritative directories only. A set of address patterns for servers "
-"that\n"
-"    will be listed as bad exits in any network status document this "
-"authority\n"
-"    publishes, if **AuthDirListBadExits** is set.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1103
-#, no-wrap
-msgid ""
-"**AuthDirInvalid** __AddressPattern...__::\n"
-"    Authoritative directories only. A set of address patterns for servers "
-"that\n"
-"    will never be listed as \"valid\" in any network status document that "
-"this\n"
-"    authority publishes.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1109
-#, no-wrap
-msgid ""
-"**AuthDirReject** __AddressPattern__...::\n"
-"    Authoritative directories only. A set of address patterns for servers "
-"that\n"
-"    will never be listed at all in any network status document that this\n"
-"    authority publishes, or accepted as an OR address in any descriptor\n"
-"    submitted for publication by this authority.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1116
-#, no-wrap
-msgid ""
-"**AuthDirListBadDirs** **0**|**1**::\n"
-"    Authoritative directories only. If set to 1, this directory has some\n"
-"    opinion about which nodes are unsuitable as directory caches. (Do not "
-"set\n"
-"    this to 1 unless you plan to list non-functioning directories as bad;\n"
-"    otherwise, you are effectively voting in favor  of every declared\n"
-"    directory.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1122
-#, no-wrap
-msgid ""
-"**AuthDirListBadExits** **0**|**1**::\n"
-"    Authoritative directories only. If set to 1, this directory has some\n"
-"    opinion about which nodes are unsuitable as exit nodes. (Do not set this "
-"to\n"
-"    1 unless you plan to list non-functioning exits as bad; otherwise, you "
-"are\n"
-"    effectively voting in favor of every declared exit as an exit.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1128
-#, no-wrap
-msgid ""
-"**AuthDirRejectUnlisted** **0**|**1**::\n"
-"    Authoritative directories only. If set to 1, the directory server "
-"rejects\n"
-"    all uploaded server descriptors that aren't explicitly listed in the\n"
-"    fingerprints file. This acts as a \"panic button\" if we get hit with a "
-"Sybil\n"
-"    attack. (Default: 0)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1133
-#, no-wrap
-msgid ""
-"**AuthDirMaxServersPerAddr** __NUM__::\n"
-"    Authoritative directories only. The maximum number of servers that we "
-"will\n"
-"    list as acceptable on a single IP address. Set this to \"0\" for \"no "
-"limit\".\n"
-"    (Default: 2)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1137
-#, no-wrap
-msgid ""
-"**AuthDirMaxServersPerAuthAddr** __NUM__::\n"
-"    Authoritative directories only. Like AuthDirMaxServersPerAddr, but "
-"applies\n"
-"    to addresses shared with directory authorities. (Default: 5)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1143
-#, no-wrap
-msgid ""
-"**V3AuthVotingInterval** __N__ **minutes**|**hours**::\n"
-"    V3 authoritative directories only. Configures the server's preferred "
-"voting\n"
-"    interval. Note that voting will __actually__ happen at an interval "
-"chosen\n"
-"    by consensus from all the authorities' preferred intervals. This time\n"
-"    SHOULD divide evenly into a day. (Default: 1 hour)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1149
-#, no-wrap
-msgid ""
-"**V3AuthVoteDelay** __N__ **minutes**|**hours**::\n"
-"    V3 authoritative directories only. Configures the server's preferred "
-"delay\n"
-"    between publishing its vote and assuming it has all the votes from all "
-"the\n"
-"    other authorities. Note that the actual time used is not the server's\n"
-"    preferred time, but the consensus of all preferences. (Default: 5 "
-"minutes.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1156
-#, no-wrap
-msgid ""
-"**V3AuthDistDelay** __N__ **minutes**|**hours**::\n"
-"    V3 authoritative directories only. Configures the server's preferred  "
-"delay\n"
-"    between publishing its consensus and signature and assuming  it has all "
-"the\n"
-"    signatures from all the other authorities. Note that the actual time "
-"used\n"
-"    is not the server's preferred time,  but the consensus of all "
-"preferences.\n"
-"    (Default: 5 minutes.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1164
-#, no-wrap
-msgid ""
-"**V3AuthNIntervalsValid** __NUM__::\n"
-"    V3 authoritative directories only. Configures the number of "
-"VotingIntervals\n"
-"    for which each consensus should be valid for. Choosing high numbers\n"
-"    increases network partitioning risks; choosing low numbers increases\n"
-"    directory traffic. Note that the actual number of intervals used is not "
-"the\n"
-"    server's preferred number, but the consensus of all preferences. Must be "
-"at\n"
-"    least 2. (Default: 3.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1166
-#, no-wrap
-msgid ""
-"HIDDEN SERVICE OPTIONS\n"
-"----------------------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1169
-msgid "The following options are used to configure a hidden service."
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1174
-#, no-wrap
-msgid ""
-"**HiddenServiceDir** __DIRECTORY__::\n"
-"    Store data files for a hidden service in DIRECTORY. Every hidden "
-"service\n"
-"    must have a separate directory. You may use this option  multiple times "
-"to\n"
-"    specify multiple services.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1183
-#, no-wrap
-msgid ""
-"**HiddenServicePort** __VIRTPORT__ [__TARGET__]::\n"
-"    Configure a virtual port VIRTPORT for a hidden service. You may use "
-"this\n"
-"    option multiple times; each time applies to the service using the most\n"
-"    recent hiddenservicedir. By default, this option maps the virtual port "
-"to\n"
-"    the same port on 127.0.0.1. You may override the target port, address, "
-"or\n"
-"    both by specifying a target of addr, port, or addr:port. You may also "
-"have\n"
-"    multiple lines with  the same VIRTPORT: when a user connects to that\n"
-"    VIRTPORT, one of the TARGETs from those lines will be chosen at "
-"random.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1189
-#, no-wrap
-msgid ""
-"**PublishHidServDescriptors** **0**|**1**::\n"
-"    If set to 0, Tor will run any hidden services you configure, but it "
-"won't\n"
-"    advertise them to the rendezvous directory. This option is only useful "
-"if\n"
-"    you're using a Tor controller that handles hidserv publishing for you.\n"
-"    (Default: 1)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1193
-#, no-wrap
-msgid ""
-"**HiddenServiceVersion** __version__,__version__,__...__::\n"
-"    A list of rendezvous service descriptor versions to publish for the "
-"hidden\n"
-"    service. Currently, only version 2 is supported. (Default: 2)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1205
-#, no-wrap
-msgid ""
-"**HiddenServiceAuthorizeClient** __auth-type__ "
-"__client-name__,__client-name__,__...__::\n"
-"    If configured, the hidden service is accessible for authorized clients\n"
-"    only. The auth-type can either be \\'basic' for a general-purpose\n"
-"    authorization protocol or \\'stealth' for a less scalable protocol that "
-"also\n"
-"    hides service activity from unauthorized clients. Only clients that "
-"are\n"
-"    listed here are authorized to access the hidden service. Valid client "
-"names\n"
-"    are 1 to 19 characters  long and only use characters in A-Za-z0-9+-_ "
-"(no\n"
-"    spaces). If this option is set, the hidden service is not accessible "
-"for\n"
-"    clients without authorization any more. Generated authorization data can "
-"be\n"
-"    found in the hostname file. Clients need to put this authorization data "
-"in\n"
-"    their configuration file using **HidServAuth**.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1210
-#, no-wrap
-msgid ""
-"**RendPostPeriod** __N__ "
-"**seconds**|**minutes**|**hours**|**days**|**weeks**::\n"
-"    Every time the specified period elapses, Tor uploads any rendezvous \n"
-"    service descriptors to the directory servers. This information  is "
-"also\n"
-"    uploaded whenever it changes. (Default: 20 minutes)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1212
-#, no-wrap
-msgid ""
-"TESTING NETWORK OPTIONS\n"
-"-----------------------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1215
-msgid "The following options are used for running a testing Tor network."
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1221
-#, no-wrap
-msgid ""
-"**TestingTorNetwork** **0**|**1**::\n"
-"    If set to 1, Tor adjusts default values of the configuration options "
-"below,\n"
-"    so that it is easier to set up a testing Tor network. May only be set "
-"if\n"
-"    non-default set of DirServers is set. Cannot be unset while Tor is "
-"running.\n"
-"    (Default: 0) +\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1238
-#, no-wrap
-msgid ""
-"       ServerDNSAllowBrokenConfig 1\n"
-"       DirAllowPrivateAddresses 1\n"
-"       EnforceDistinctSubnets 0\n"
-"       AssumeReachable 1\n"
-"       AuthDirMaxServersPerAddr 0\n"
-"       AuthDirMaxServersPerAuthAddr 0\n"
-"       ClientDNSRejectInternalAddresses 0\n"
-"       ExitPolicyRejectPrivate 0\n"
-"       V3AuthVotingInterval 5 minutes\n"
-"       V3AuthVoteDelay 20 seconds\n"
-"       V3AuthDistDelay 20 seconds\n"
-"       TestingV3AuthInitialVotingInterval 5 minutes\n"
-"       TestingV3AuthInitialVoteDelay 20 seconds\n"
-"       TestingV3AuthInitialDistDelay 20 seconds\n"
-"       TestingAuthDirTimeToLearnReachability 0 minutes\n"
-"       TestingEstimatedDescriptorPropagationTime 0 minutes\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1243
-#, no-wrap
-msgid ""
-"**TestingV3AuthInitialVotingInterval** __N__ **minutes**|**hours**::\n"
-"    Like V3AuthVotingInterval, but for initial voting interval before the "
-"first\n"
-"    consensus has been created. Changing this requires that\n"
-"    **TestingTorNetwork** is set. (Default: 30 minutes)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1248
-#, no-wrap
-msgid ""
-"**TestingV3AuthInitialVoteDelay** __N__ **minutes**|**hours**::\n"
-"    Like TestingV3AuthInitialVoteDelay, but for initial voting interval "
-"before\n"
-"    the first consensus has been created. Changing this requires that\n"
-"    **TestingTorNetwork** is set. (Default: 5 minutes)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1253
-#, no-wrap
-msgid ""
-"**TestingV3AuthInitialDistDelay** __N__ **minutes**|**hours**::\n"
-"    Like TestingV3AuthInitialDistDelay, but for initial voting interval "
-"before\n"
-"    the first consensus has been created. Changing this requires that\n"
-"    **TestingTorNetwork** is set. (Default: 5 minutes)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1258
-#, no-wrap
-msgid ""
-"**TestingAuthDirTimeToLearnReachability** __N__ **minutes**|**hours**::\n"
-"    After starting as an authority, do not make claims about whether "
-"routers\n"
-"    are Running until this much time has passed. Changing this requires\n"
-"    that **TestingTorNetwork** is set.  (Default: 30 minutes)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1263
-#, no-wrap
-msgid ""
-"**TestingEstimatedDescriptorPropagationTime** __N__ "
-"**minutes**|**hours**::\n"
-"    Clients try downloading router descriptors from directory caches after "
-"this\n"
-"    time. Changing this requires that **TestingTorNetwork** is "
-"set. (Default:\n"
-"    10 minutes)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1265
-#, no-wrap
-msgid ""
-"SIGNALS\n"
-"-------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1268
-msgid "Tor catches the following signals:"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1271
-#, no-wrap
-msgid ""
-"**SIGTERM**::\n"
-"    Tor will catch this, clean up and sync to disk if necessary, and exit.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1276
-#, no-wrap
-msgid ""
-"**SIGINT**::\n"
-"    Tor clients behave as with SIGTERM; but Tor servers will do a "
-"controlled\n"
-"    slow shutdown, closing listeners and waiting 30 seconds before "
-"exiting.\n"
-"    (The delay can be configured with the ShutdownWaitLength config "
-"option.)\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1281
-#, no-wrap
-msgid ""
-"**SIGHUP**:: \n"
-"    The signal instructs Tor to reload its configuration (including closing "
-"and\n"
-"    reopening logs), fetch a new directory, and kill and restart its "
-"helper\n"
-"    processes if applicable.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1284
-#, no-wrap
-msgid ""
-"**SIGUSR1**::\n"
-"    Log statistics about current connections, past connections, and "
-"throughput.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1288
-#, no-wrap
-msgid ""
-"**SIGUSR2**::\n"
-"    Switch all logs to loglevel debug. You can go back to the old loglevels "
-"by\n"
-"    sending a SIGHUP.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1292
-#, no-wrap
-msgid ""
-"**SIGCHLD**::\n"
-"    Tor receives this signal when one of its helper processes has exited, so "
-"it\n"
-"    can clean up.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1295
-#, no-wrap
-msgid ""
-"**SIGPIPE**::\n"
-"    Tor catches this signal and ignores it.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1298
-#, no-wrap
-msgid ""
-"**SIGXFSZ**::\n"
-"    If this signal exists on your platform, Tor catches and ignores it.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1300
-#, no-wrap
-msgid ""
-"FILES\n"
-"-----\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1304
-#, no-wrap
-msgid ""
-"**@CONFDIR@/torrc**::\n"
-"    The configuration file, which contains \"option value\" pairs.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1307
-#, no-wrap
-msgid ""
-"**@LOCALSTATEDIR@/lib/tor/**::\n"
-"    The tor process stores keys and other data here.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1312
-#, no-wrap
-msgid ""
-"__DataDirectory__**/cached-status/**::\n"
-"    The most recently downloaded network status document for each "
-"authority.\n"
-"    Each file holds one such document; the filenames are the hexadecimal\n"
-"    identity key fingerprints of the directory authorities.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1319
-#, no-wrap
-msgid ""
-"__DataDirectory__**/cached-descriptors** and **cached-descriptors.new**::\n"
-"    These files hold downloaded router statuses. Some routers may appear "
-"more\n"
-"    than once; if so, the most recently published descriptor is "
-"used. Lines\n"
-"    beginning with @-signs are annotations that contain more information "
-"about\n"
-"    a given router. The \".new\" file is an append-only journal; when it "
-"gets\n"
-"    too large, all entries are merged into a new cached-descriptors file.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1323
-#, no-wrap
-msgid ""
-"__DataDirectory__**/cached-routers** and **cached-routers.new**::\n"
-"    Obsolete versions of cached-descriptors and "
-"cached-descriptors.new. When\n"
-"    Tor can't find the newer files, it looks here instead.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1334
-#, no-wrap
-msgid ""
-"__DataDirectory__**/state**::\n"
-"    A set of persistent key-value mappings. These are documented in\n"
-"    the file. These include:\n"
-"            - The current entry guards and their status.\n"
-"            - The current bandwidth accounting values (unused so far; see\n"
-"            below).\n"
-"            - When the file was last written\n"
-"            - What version of Tor generated the state file\n"
-"            - A short history of bandwidth usage, as produced in the "
-"router\n"
-"            descriptors.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1340
-#, no-wrap
-msgid ""
-"__DataDirectory__**/bw_accounting**::\n"
-"    Used to track bandwidth accounting values (when the current period "
-"starts\n"
-"    and ends; how much has been read and written so far this period). This "
-"file\n"
-"    is obsolete, and the data is now stored in the \\'state' file as "
-"well. Only\n"
-"    used when bandwidth accounting is enabled.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1346
-#, no-wrap
-msgid ""
-"__DataDirectory__**/control_auth_cookie**::\n"
-"    Used for cookie authentication with the controller. Location can be\n"
-"    overridden by the CookieAuthFile config option. Regenerated on "
-"startup. See\n"
-"    control-spec.txt for details. Only used when cookie authentication is\n"
-"    enabled.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1349
-#, no-wrap
-msgid ""
-"__DataDirectory__**/keys/***::\n"
-"    Only used by servers. Holds identity keys and onion keys.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1352
-#, no-wrap
-msgid ""
-"__DataDirectory__**/fingerprint**::\n"
-"    Only used by servers. Holds the fingerprint of the server's identity "
-"key.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1362
-#, no-wrap
-msgid ""
-"__DataDirectory__**/approved-routers**::\n"
-"    Only for naming authoritative directory servers (see\n"
-"    **NamingAuthoritativeDirectory**). This file lists nickname to "
-"identity\n"
-"    bindings. Each line lists a nickname and a fingerprint separated by\n"
-"    whitespace. See your **fingerprint** file in the __DataDirectory__ for "
-"an\n"
-"    example line. If the nickname is **!reject** then descriptors from the\n"
-"    given identity (fingerprint) are rejected by this server. If it is\n"
-"    **!invalid** then descriptors are accepted but marked in the directory "
-"as\n"
-"    not valid, that is, not recommended.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1367
-#, no-wrap
-msgid ""
-"__DataDirectory__**/router-stability**::\n"
-"    Only used by authoritative directory servers. Tracks measurements for\n"
-"    router mean-time-between-failures so that authorities have a good idea "
-"of\n"
-"    how to set their Stable flags.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1372
-#, no-wrap
-msgid ""
-"__HiddenServiceDirectory__**/hostname**::\n"
-"    The <base32-encoded-fingerprint>.onion domain name for this hidden "
-"service.\n"
-"    If the hidden service is restricted to authorized clients only, this "
-"file\n"
-"    also contains authorization data for all clients.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1375
-#, no-wrap
-msgid ""
-"__HiddenServiceDirectory__**/private_key**::\n"
-"    The private key for this hidden service.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1379
-#, no-wrap
-msgid ""
-"__HiddenServiceDirectory__**/client_keys**::\n"
-"    Authorization data for a hidden service that is only accessible by\n"
-"    authorized clients.\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1381
-#, no-wrap
-msgid ""
-"SEE ALSO\n"
-"--------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1383
-#, no-wrap
-msgid "**privoxy**(1), **tsocks**(1), **torify**(1) +\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1385
-#, no-wrap
-msgid "**https://www.torproject.org/**\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1388
-#, no-wrap
-msgid ""
-"BUGS\n"
-"----\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1391
-msgid "Plenty, probably. Tor is still in development. Please report them."
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1393
-#, no-wrap
-msgid ""
-"AUTHORS\n"
-"-------\n"
-msgstr ""
-
-# type: Plain text
-#: tor.1.txt:1395
-msgid "Roger Dingledine [arma at mit.edu], Nick Mathewson [nickm at alum.mit.edu]."
-msgstr ""

Deleted: translation/trunk/projects/manpages/po/templates/torify.1.po
===================================================================
--- translation/trunk/projects/manpages/po/templates/torify.1.po	2010-12-05 19:16:01 UTC (rev 23895)
+++ translation/trunk/projects/manpages/po/templates/torify.1.po	2010-12-05 19:23:15 UTC (rev 23896)
@@ -1,147 +0,0 @@
-# SOME DESCRIPTIVE TITLE
-# Copyright (C) YEAR The Tor Project, Inc.
-# This file is distributed under the same license as the PACKAGE package.
-# FIRST AUTHOR <EMAIL at ADDRESS>, YEAR.
-#, fuzzy
-msgid ""
-msgstr ""
-"Project-Id-Version: PACKAGE VERSION\n"
-"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2010-05-27 19:08+0300\n"
-"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
-"Last-Translator: FULL NAME <EMAIL at ADDRESS>\n"
-"Language-Team: LANGUAGE <LL at li.org>\n"
-"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
-"Content-Transfer-Encoding: 8bit\n"
-"X-Generator: Translate Toolkit 1.5.3\n"
-
-# type: Plain text
-#: torify.1.txt:6
-#, no-wrap
-msgid ""
-"// Copyright (c) The Tor Project, Inc.\n"
-"// See LICENSE for licensing information\n"
-"// This is an asciidoc file used to generate the manpage/html reference.\n"
-"// Learn asciidoc on http://www.methods.co.nz/asciidoc/userguide.html\n"
-"torify(1)\n"
-"=========\n"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:9
-msgid "Peter Palfrader Jacob Appelbaum"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:11
-#, no-wrap
-msgid ""
-"NAME\n"
-"----\n"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:13
-msgid "torify - wrapper for torsocks or tsocks and tor"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:15
-#, no-wrap
-msgid ""
-"SYNOPSIS\n"
-"--------\n"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:17
-#, no-wrap
-msgid "**torify** __application__ [__application's__ __arguments__]\n"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:19
-#, no-wrap
-msgid ""
-"DESCRIPTION\n"
-"-----------\n"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:23
-#, no-wrap
-msgid ""
-"**torify** is a simple wrapper that attempts to find the best underlying "
-"Tor\n"
-"wrapper available on a system. It calls torsocks or tsocks with a tor "
-"specific\n"
-"configuration file. +\n"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:26
-msgid ""
-"torsocks is an improved wrapper that explictly rejects UDP, safely resolves "
-"DNS lookups and properly socksifies your TCP connections. +"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:29
-msgid ""
-"tsocks itself is a wrapper between the tsocks library and the application "
-"that you would like to run socksified. +"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:32
-msgid ""
-"Please note that since both method use LD_PRELOAD, torify cannot be applied "
-"to suid binaries."
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:34
-#, no-wrap
-msgid ""
-"WARNING\n"
-"-------\n"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:42
-msgid ""
-"You should also be aware that the way tsocks currently works only TCP "
-"connections are socksified. Be aware that this will in most circumstances "
-"not include hostname lookups which would still be routed through your normal "
-"system resolver to your usual resolving nameservers. The **tor-resolve**(1) "
-"tool can be useful as a workaround in some cases. The Tor FAQ at "
-"https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ might have further "
-"information on this subject. +"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:44
-msgid "When used with torsocks, torify should not leak DNS requests or UDP data. +"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:46
-msgid "Both will leak ICMP data."
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:48
-#, no-wrap
-msgid ""
-"SEE ALSO\n"
-"--------\n"
-msgstr ""
-
-# type: Plain text
-#: torify.1.txt:50
-#, no-wrap
-msgid ""
-"**tor**(1), **tor-resolve**(1), **torsocks**(1), **tsocks**(1),\n"
-"**tsocks.conf**(5).\n"
-msgstr ""



More information about the tor-commits mailing list