--- tor-0.2.9.10/src/config/torrc.sample.in.~1~ 2017-02-17 19:47:43.000000000 +0300 +++ tor-0.2.9.10/src/config/torrc.sample.in 2017-05-02 21:22:37.595049434 +0300 @@ -34,23 +34,23 @@ ## We advise using "notice" in most cases, since anything more verbose ## may provide sensitive information to an attacker who obtains the logs. ## -## Send all messages of level 'notice' or higher to @LOCALSTATEDIR@/log/tor/notices.log +## Send all messages of level 'notice' or higher to /var/log/tor/notices.log #Log notice file @LOCALSTATEDIR@/log/tor/notices.log -## Send every possible message to @LOCALSTATEDIR@/log/tor/debug.log -#Log debug file @LOCALSTATEDIR@/log/tor/debug.log +## Send every possible message to /var/log/tor/debug.log +Log debug file @LOCALSTATEDIR@/log/tor/debug.log ## Use the system log instead of Tor's logfiles -#Log notice syslog +Log notice syslog ## To send all messages to stderr: #Log debug stderr ## Uncomment this to start the process in the background... or use ## --runasdaemon 1 on the command line. This is ignored on Windows; ## see the FAQ entry if you want Tor to run as an NT service. -#RunAsDaemon 1 +RunAsDaemon 1 ## The directory for keeping all the keys/etc. By default, we store ## things in $HOME/.tor on Unix, and in Application Data\tor on Windows. -#DataDirectory @LOCALSTATEDIR@/lib/tor +DataDirectory @LOCALSTATEDIR@/lib/tor ## The port on which Tor will listen for local connections from Tor ## controller applications, as documented in control-spec.txt. @@ -81,7 +81,7 @@ ## See https://www.torproject.org/docs/tor-doc-relay for details. ## Required: what port to advertise for incoming Tor connections. -#ORPort 9001 +ORPort 9001 ## If you want to listen on a port other than the one advertised in ## ORPort (e.g. to advertise 443 but bind to 9090), you can do it as ## follows. You'll need to do ipchains or other port forwarding