[tor-commits] [webwml/staging] onion services: few fixes (#24880)

hiro at torproject.org hiro at torproject.org
Mon Aug 27 11:02:58 UTC 2018


commit 760bf9a1b077b652562269b6876c80c5a57f9d39
Author: traumschule <traumschuleriebau at riseup.net>
Date:   Thu Aug 23 14:28:35 2018 +0200

    onion services: few fixes (#24880)
---
 docs/en/tor-onion-service.wml | 13 +++++++------
 1 file changed, 7 insertions(+), 6 deletions(-)

diff --git a/docs/en/tor-onion-service.wml b/docs/en/tor-onion-service.wml
index 4319ad3c..4061678d 100644
--- a/docs/en/tor-onion-service.wml
+++ b/docs/en/tor-onion-service.wml
@@ -275,7 +275,7 @@
 
 ​    <p>Since Tor 0.3.2 and
     <a href="https://blog.torproject.org/tor-browser-75a5-released">Tor Browser
-    7.5.a5</a> 56 bit long v3 onion addresses are supported and should be used
+    7.5.a5</a> 56-character long v3 onion addresses are supported and should be used
     instead. This newer version of onion services ("v3") features many
     improvements over the legacy system:
     </p>
@@ -291,7 +291,7 @@
     <a href="https://trac.torproject.org/projects/tor/wiki/doc/HiddenServiceNames">
     Why are v3 onions better?</a>. You can identify a next-generation onion
     address by its length: they are 56 characters long, as in
-    <var>4acth47i6kxnvkewtm6q7ib2s3ufpo5sqbsnzjpbi7utijcltosqemad.onion</a>.
+    <var>4acth47i6kxnvkewtm6q7ib2s3ufpo5sqbsnzjpbi7utijcltosqemad.onion</var>.
     
     The specification for next gen onion services can be found
     <a href="https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.txt">
@@ -300,8 +300,9 @@
 
     <h3>How to setup your own prop224 service</h3>
 
-    <p>It's easy! Just use your ​<a href"#two">regular onion service</a> torrc
-    and add <var>HiddenServiceVersion 3</var> in your onion service torrc block.
+    <p>It's easy! Just use your <a href"#two">regular onion service</a>
+    <a href="<page docs/faq>#torrc">torrc</a> and add
+    <var>HiddenServiceVersion 3</var> in your onion service torrc block.
     Here is an example torrc designed for testing:
     </p>
     <pre>
@@ -325,9 +326,9 @@ HiddenServicePort 6668 127.0.0.1:6667
 
     <p>Please note that tor is strict about directory permissions and does not
     like to share its files. Make sure to restrict read and write access to the
-    onion services directory before restarting tor. For most linux based systems you can use:
+    onion services directory before restarting tor. For most linux based systems
+    <pre>chmod 700 -R /var/lib/tor</pre> should be intended.
     </p>
-    <pre>chmod 700 -R /var/lib/tor</pre>
 
     <p>To restart tor it's safer to not use SIGHUP directly (see bug
     <a href="https://trac.torproject.org/projects/tor/ticket/21818">#21818</a>),





More information about the tor-commits mailing list