-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathtorrc
1395 lines (1352 loc) · 34.7 KB
/
torrc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
## Configuration file for a typical Tor user
## Last updated 9 October 2013 for Tor 0.2.5.2-alpha.
## (may or may not work for much older or much newer versions of Tor.)
##
## Lines that begin with "## " try to explain what's going on. Lines
## that begin with just "#" are disabled commands: you can enable them
## by removing the "#" symbol.
##
## See 'man tor', or https://www.torproject.org/docs/tor-manual.html,
## for more options you can use in this file.
##
## Tor will look for this file in various places based on your platform:
## https://www.torproject.org/docs/faq#torrc
## Tor opens a socks proxy on port 9050 by default -- even if you don't
## configure one below. Set "SocksPort 0" if you plan to run Tor only
## as a relay, and not make any local application connections yourself.
#SocksPort 9050 # Default: Bind to localhost:9050 for local connections.
SocksPort 192.168.0.1:9100 # Bind to this address:port too.
## Entry policies to allow/deny SOCKS requests based on IP address.
## First entry that matches wins. If no SocksPolicy is set, we accept
## all (and only) requests that reach a SocksPort. Untrusted users who
## can access your SocksPort may be able to learn about the connections
## you make.
SocksPolicy accept 192.168.0.0/16
SocksPolicy reject *
## Logs go to stdout at level "notice" unless redirected by something
## else, like one of the below lines. You can have as many Log lines as
## you want.
##
## We advise using "notice" in most cases, since anything more verbose
## may provide sensitive information to an attacker who obtains the logs.
##
## Send all messages of level 'notice' or higher to /var/log/tor/notices.log
Log notice file /var/log/tor/notices.log
## Send every possible message to /var/log/tor/debug.log
#Log debug file /var/log/tor/debug.log
## Use the system log instead of Tor's logfiles
#Log notice syslog
## To send all messages to stderr:
#Log debug stderr
## Uncomment this to start the process in the background... or use
## --runasdaemon 1 on the command line. This is ignored on Windows;
## see the FAQ entry if you want Tor to run as an NT service.
RunAsDaemon 1
## The directory for keeping all the keys/etc. By default, we store
## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
DataDirectory /var/lib/tor
## The port on which Tor will listen for local connections from Tor
## controller applications, as documented in control-spec.txt.
##ControlPort 9051
## If you enable the controlport, be sure to enable one of these
## authentication methods, to prevent attackers from accessing it.
#HashedControlPassword 16:872860B76453A77D60CA2BB8C1A7042072093276A3D701AD684053EC4C
CookieAuthentication 1
############### This section is just for location-hidden services ###
## Once you have configured a hidden service, you can look at the
## contents of the file ".../hidden_service/hostname" for the address
## to tell people.
##
## HiddenServicePort x y:z says to redirect requests on port x to the
## address y:z.
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:80
HiddenServiceDir /var/lib/tor/other_hidden_service/
HiddenServicePort 80 127.0.0.1:80
HiddenServicePort 22 127.0.0.1:22
################ This section is just for relays #####################
#
## See https://www.torproject.org/docs/tor-doc-relay for details.
## Required: what port to advertise for incoming Tor connections.
#ORPort 9001
## If you want to listen on a port other than the one advertised in
## ORPort (e.g. to advertise 443 but bind to 9090), you can do it as
## follows. You'll need to do ipchains or other port forwarding
## yourself to make this work.
ORPort 443 NoListen
#ORPort 127.0.0.1:9090 NoAdvertise
## The IP address or full DNS name for incoming connections to your
## relay. Leave commented out and Tor will guess.
#Address noname.example.com
## If you have multiple network interfaces, you can specify one for
## outgoing traffic to use.
# OutboundBindAddress 10.0.0.5
## A handle for your relay, so people don't have to refer to it by key.
#Nickname ididnteditheconfig
## Define these to limit how much relayed traffic you will allow. Your
## own traffic is still unthrottled. Note that RelayBandwidthRate must
## be at least 20 KB.
## Note that units for these config options are bytes per second, not bits
## per second, and that prefixes are binary prefixes, i.e. 2^10, 2^20, etc.
RelayBandwidthRate 100 KB # Throttle traffic to 100KB/s (800Kbps)
RelayBandwidthBurst 200 KB # But allow bursts up to 200KB/s (1600Kbps)
## Use these to restrict the maximum traffic per day, week, or month.
## Note that this threshold applies separately to sent and received bytes,
## not to their sum: setting "4 GB" may allow up to 8 GB total before
## hibernating.
##
## Set a maximum of 4 gigabytes each way per period.
AccountingMax 4 GB
## Each period starts daily at midnight (AccountingMax is per day)
#AccountingStart day 00:00
## Each period starts on the 3rd of the month at 15:00 (AccountingMax
## is per month)
#AccountingStart month 3 15:00
## Administrative contact information for this relay or bridge. This line
## can be used to contact you if your relay or bridge is misconfigured or
## something else goes wrong. Note that we archive and publish all
## descriptors containing these lines and that Google indexes them, so
## spammers might also collect them. You may want to obscure the fact that
## it's an email address and/or generate a new address for this purpose.
#ContactInfo Random Person <nobody AT example dot com>
## You might also include your PGP or GPG fingerprint if you have one:
#ContactInfo 0xFFFFFFFF Random Person <nobody AT example dot com>
## Uncomment this to mirror directory information for others. Please do
## if you have enough bandwidth.
#DirPort 9030 # what port to advertise for directory connections
## If you want to listen on a port other than the one advertised in
## DirPort (e.g. to advertise 80 but bind to 9091), you can do it as
## follows. below too. You'll need to do ipchains or other port
## forwarding yourself to make this work.
#DirPort 80 NoListen
DirPort 127.0.0.1:9091 NoAdvertise
## Uncomment to return an arbitrary blob of html on your DirPort. Now you
## can explain what Tor is if anybody wonders why your IP address is
## contacting them. See contrib/tor-exit-notice.html in Tor's source
## distribution for a sample.
#DirPortFrontPage /etc/tor/tor-exit-notice.html
## Uncomment this if you run more than one Tor relay, and add the identity
## key fingerprint of each Tor relay you control, even if they're on
## different networks. You declare it here so Tor clients can avoid
## using more than one of your relays in a single circuit. See
## https://www.torproject.org/docs/faq#MultipleRelays
## However, you should never include a bridge's fingerprint here, as it would
## break its concealability and potentionally reveal its IP/TCP address.
#MyFamily $keyid,$keyid,...
## A comma-separated list of exit policies. They're considered first
## to last, and the first match wins. If you want to _replace_
## the default exit policy, end this with either a reject *:* or an
accept *:*. Otherwise, you're _augmenting_ (prepending to) the
## default exit policy. Leave commented to just use the default, which is
## described in the man page or at
## https://www.torproject.org/documentation.html
##
## Look at https://www.torproject.org/faq-abuse.html#TypicalAbuses
## for issues you might encounter if you use the default exit policy.
##
## If certain IPs and ports are blocked externally, e.g. by your firewall,
## you should update your exit policy to reflect this -- otherwise Tor
## users will be told that those destinations are down.
##
## For security, by default Tor rejects connections to private (local)
## networks, including to your public IP address. See the man page entry
## for ExitPolicyRejectPrivate if you want to allow "exit enclaving".
##
#ExitPolicy accept *:6660-6667,reject *:* # allow irc ports but no more
#ExitPolicy accept *:119 # accept nntp as well as default exit policy
#
ExitPolicy reject *:* # no exits allowed
BandwidthRate 100 KB
BandwidthBurst 200 KB
## Bridge relays (or "bridges") are Tor relays that aren't listed in the
## main directory. Since there is no complete public list of them, even an
## ISP that filters connections to all the known Tor relays probably
## won't be able to block all the bridges. Also, websites won't treat you
## differently because they won't know you're running Tor. If you can
## be a real relay, please do; but if not, be a bridge!
#BridgeRelay 1
## By default, Tor will advertise your bridge to users through various
## mechanisms like https://bridges.torproject.org/. If you want to run
## a private bridge, for example because you'll give out your bridge## address manually to your friends, uncomment this line:
PublishServerDescriptor 0
## Configuration file for a typical Tor user
## Last updated 9 October 2013 for Tor 0.2.5.2-alpha.
## (may or may not work for much older or much newer versions of Tor.)
##
## Lines that begin with "## " try to explain what's going on. Lines
## that begin with just "#" are disabled commands: you can enable them
## by removing the "#" symbol.
##
## See 'man tor', or https://www.torproject.org/docs/tor-manual.html,
## for more options you can use in this file.
##
## Tor will look for this file in various places based on your platform:
## https://www.torproject.org/docs/faq#torrc
## Tor opens a socks proxy on port 9050 by default -- even if you don't
## configure one below. Set "SocksPort 0" if you plan to run Tor only
## as a relay, and not make any local application connections yourself.
#SocksPort 9050 # Default: Bind to localhost:9050 for local connections.
SocksPort 192.168.0.1:9100 # Bind to this address:port too.
## Entry policies to allow/deny SOCKS requests based on IP address.
## First entry that matches wins. If no SocksPolicy is set, we accept
## all (and only) requests that reach a SocksPort. Untrusted users who
## can access your SocksPort may be able to learn about the connections
## you make.
SocksPolicy accept 192.168.0.0/16
SocksPolicy reject *
## Logs go to stdout at level "notice" unless redirected by something
## else, like one of the below lines. You can have as many Log lines as
## you want.
##
## We advise using "notice" in most cases, since anything more verbose
## may provide sensitive information to an attacker who obtains the logs.
##
## Send all messages of level 'notice' or higher to /var/log/tor/notices.log
Log notice file /var/log/tor/notices.log
## Send every possible message to /var/log/tor/debug.log
#Log debug file /var/log/tor/debug.log
## Use the system log instead of Tor's logfiles
#Log notice syslog
## To send all messages to stderr:
#Log debug stderr
## Uncomment this to start the process in the background... or use
## --runasdaemon 1 on the command line. This is ignored on Windows;
## see the FAQ entry if you want Tor to run as an NT service.
RunAsDaemon 1
## The directory for keeping all the keys/etc. By default, we store
## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
DataDirectory /var/lib/tor
## The port on which Tor will listen for local connections from Tor
## controller applications, as documented in control-spec.txt.
##ControlPort 9051
## If you enable the controlport, be sure to enable one of these
## authentication methods, to prevent attackers from accessing it.
#HashedControlPassword 16:872860B76453A77D60CA2BB8C1A7042072093276A3D701AD684053EC4C
CookieAuthentication 1
############### This section is just for location-hidden services ###
## Once you have configured a hidden service, you can look at the
## contents of the file ".../hidden_service/hostname" for the address
## to tell people.
##
## HiddenServicePort x y:z says to redirect requests on port x to the
## address y:z.
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:80
HiddenServiceDir /var/lib/tor/other_hidden_service/
HiddenServicePort 80 127.0.0.1:80
HiddenServicePort 22 127.0.0.1:22
################ This section is just for relays #####################
#
## See https://www.torproject.org/docs/tor-doc-relay for details.
## Required: what port to advertise for incoming Tor connections.
#ORPort 9001
## If you want to listen on a port other than the one advertised in
## ORPort (e.g. to advertise 443 but bind to 9090), you can do it as
## follows. You'll need to do ipchains or other port forwarding
## yourself to make this work.
ORPort 443 NoListen
#ORPort 127.0.0.1:9090 NoAdvertise
## The IP address or full DNS name for incoming connections to your
## relay. Leave commented out and Tor will guess.
#Address noname.example.com
## If you have multiple network interfaces, you can specify one for
## outgoing traffic to use.
# OutboundBindAddress 10.0.0.5
## A handle for your relay, so people don't have to refer to it by key.
#Nickname ididnteditheconfig
## Define these to limit how much relayed traffic you will allow. Your
## own traffic is still unthrottled. Note that RelayBandwidthRate must
## be at least 20 KB.
## Note that units for these config options are bytes per second, not bits
## per second, and that prefixes are binary prefixes, i.e. 2^10, 2^20, etc.
RelayBandwidthRate 100 KB # Throttle traffic to 100KB/s (800Kbps)
RelayBandwidthBurst 200 KB # But allow bursts up to 200KB/s (1600Kbps)
## Use these to restrict the maximum traffic per day, week, or month.
## Note that this threshold applies separately to sent and received bytes,
## not to their sum: setting "4 GB" may allow up to 8 GB total before
## hibernating.
##
## Set a maximum of 4 gigabytes each way per period.
AccountingMax 4 GB
## Each period starts daily at midnight (AccountingMax is per day)
#AccountingStart day 00:00
## Each period starts on the 3rd of the month at 15:00 (AccountingMax
## is per month)
#AccountingStart month 3 15:00
## Administrative contact information for this relay or bridge. This line
## can be used to contact you if your relay or bridge is misconfigured or
## something else goes wrong. Note that we archive and publish all
## descriptors containing these lines and that Google indexes them, so
## spammers might also collect them. You may want to obscure the fact that
## it's an email address and/or generate a new address for this purpose.
#ContactInfo Random Person <nobody AT example dot com>
## You might also include your PGP or GPG fingerprint if you have one:
#ContactInfo 0xFFFFFFFF Random Person <nobody AT example dot com>
## Uncomment this to mirror directory information for others. Please do
## if you have enough bandwidth.
#DirPort 9030 # what port to advertise for directory connections
## If you want to listen on a port other than the one advertised in
## DirPort (e.g. to advertise 80 but bind to 9091), you can do it as
## follows. below too. You'll need to do ipchains or other port
## forwarding yourself to make this work.
#DirPort 80 NoListen
DirPort 127.0.0.1:9091 NoAdvertise
## Uncomment to return an arbitrary blob of html on your DirPort. Now you
## can explain what Tor is if anybody wonders why your IP address is
## contacting them. See contrib/tor-exit-notice.html in Tor's source
## distribution for a sample.
#DirPortFrontPage /etc/tor/tor-exit-notice.html
## Uncomment this if you run more than one Tor relay, and add the identity
## key fingerprint of each Tor relay you control, even if they're on
## different networks. You declare it here so Tor clients can avoid
## using more than one of your relays in a single circuit. See
## https://www.torproject.org/docs/faq#MultipleRelays
## However, you should never include a bridge's fingerprint here, as it would
## break its concealability and potentionally reveal its IP/TCP address.
#MyFamily $keyid,$keyid,...
## A comma-separated list of exit policies. They're considered first
## to last, and the first match wins. If you want to _replace_
## the default exit policy, end this with either a reject *:* or an
accept *:*. Otherwise, you're _augmenting_ (prepending to) the
## default exit policy. Leave commented to just use the default, which is
## described in the man page or at
## https://www.torproject.org/documentation.html
##
## Look at https://www.torproject.org/faq-abuse.html#TypicalAbuses
## for issues you might encounter if you use the default exit policy.
##
## If certain IPs and ports are blocked externally, e.g. by your firewall,
## you should update your exit policy to reflect this -- otherwise Tor
## users will be told that those destinations are down.
##
## For security, by default Tor rejects connections to private (local)
## networks, including to your public IP address. See the man page entry
## for ExitPolicyRejectPrivate if you want to allow "exit enclaving".
##
#ExitPolicy accept *:6660-6667,reject *:* # allow irc ports but no more
#ExitPolicy accept *:119 # accept nntp as well as default exit policy
#
ExitPolicy reject *:* # no exits allowed
BandwidthRate 100 KB
BandwidthBurst 200 KB
## Bridge relays (or "bridges") are Tor relays that aren't listed in the
## main directory. Since there is no complete public list of them, even an
## ISP that filters connections to all the known Tor relays probably
## won't be able to block all the bridges. Also, websites won't treat you
## differently because they won't know you're running Tor. If you can
## be a real relay, please do; but if not, be a bridge!
#BridgeRelay 1
## By default, Tor will advertise your bridge to users through various
## mechanisms like https://bridges.torproject.org/. If you want to run
## a private bridge, for example because you'll give out your bridge
## address manually to your friends, uncomment this line:
PublishServerDescriptor 0
SocksPort 1234
SocksPort 9050
SocksPort 6789
SocksPort 3128
SocksPort 10004
SocksPort 10005
SocksPort 10006
SocksPort 10007
SocksPort 10008
SocksPort 10009
SocksPort 10010
SocksPort 10011
SocksPort 10012
SocksPort 10013
SocksPort 10014
SocksPort 10015
SocksPort 10016
SocksPort 10017
SocksPort 10018
SocksPort 10019
SocksPort 10020
SocksPort 10021
SocksPort 10022
SocksPort 10023
SocksPort 10024
SocksPort 10025
SocksPort 10026
SocksPort 10027
SocksPort 10028
SocksPort 10029
SocksPort 10030
SocksPort 10031
SocksPort 10032
SocksPort 10033
SocksPort 10034
SocksPort 10035
SocksPort 10036
SocksPort 10037
SocksPort 10038
SocksPort 10039
SocksPort 10040
SocksPort 10041
SocksPort 10042
SocksPort 10043
SocksPort 10044
SocksPort 10045
SocksPort 10046
SocksPort 10047
SocksPort 10048
SocksPort 10049
SocksPort 10050
SocksPort 10051
SocksPort 10052
SocksPort 10053
SocksPort 10054
SocksPort 10055
SocksPort 10056
SocksPort 10057
SocksPort 10058
SocksPort 10059
SocksPort 10060
SocksPort 10061
SocksPort 10062
SocksPort 10063
SocksPort 10064
SocksPort 10065
SocksPort 10066
SocksPort 10067
SocksPort 10068
SocksPort 10069
SocksPort 10070
SocksPort 10071
SocksPort 10072
SocksPort 10073
SocksPort 10074
SocksPort 10075
SocksPort 10076
SocksPort 10077
SocksPort 10078
SocksPort 10079
SocksPort 10080
SocksPort 10081
SocksPort 10082
SocksPort 10083
SocksPort 10084
SocksPort 10085
SocksPort 10086
SocksPort 10087
SocksPort 10088
SocksPort 10089
SocksPort 10090
SocksPort 10091
SocksPort 10092
SocksPort 10093
SocksPort 10094
SocksPort 10095
SocksPort 10096
SocksPort 10097
SocksPort 10098
SocksPort 10099
SocksPort 10100
SocksPort 10101
SocksPort 10102
SocksPort 10103
SocksPort 10104
SocksPort 10105
SocksPort 10106
SocksPort 10107
SocksPort 10108
SocksPort 10109
SocksPort 10110
SocksPort 10111
SocksPort 10112
SocksPort 10113
SocksPort 10114
SocksPort 10115
SocksPort 10116
SocksPort 10117
SocksPort 10118
SocksPort 10119
SocksPort 10120
SocksPort 10121
SocksPort 10122
SocksPort 10123
SocksPort 10124
SocksPort 10125
SocksPort 10126
SocksPort 10127
SocksPort 10128
SocksPort 10129
SocksPort 10130
SocksPort 10131
SocksPort 10132
SocksPort 10133
SocksPort 10134
SocksPort 10135
SocksPort 10136
SocksPort 10137
SocksPort 10138
SocksPort 10139
SocksPort 10140
SocksPort 10141
SocksPort 10142
SocksPort 10143
SocksPort 10144
SocksPort 10145
SocksPort 10146
SocksPort 10147
SocksPort 10148
SocksPort 10149
SocksPort 10150
SocksPort 10151
SocksPort 10152
SocksPort 10153
SocksPort 10154
SocksPort 10155
SocksPort 10156
SocksPort 10157
SocksPort 10158
SocksPort 10159
SocksPort 10160
SocksPort 10161
SocksPort 10162
SocksPort 10163
SocksPort 10164
SocksPort 10165
SocksPort 10166
SocksPort 10167
SocksPort 10168
SocksPort 10169
SocksPort 10170
SocksPort 10171
SocksPort 10172
SocksPort 10173
SocksPort 10174
SocksPort 10175
SocksPort 10176
SocksPort 10177
SocksPort 10178
SocksPort 10179
SocksPort 10180
SocksPort 10181
SocksPort 10182
SocksPort 10183
SocksPort 10184
SocksPort 10185
SocksPort 10186
SocksPort 10187
SocksPort 10188
SocksPort 10189
SocksPort 10190
SocksPort 10191
SocksPort 10192
SocksPort 10193
SocksPort 10194
SocksPort 10195
SocksPort 10196
SocksPort 10197
SocksPort 10198
SocksPort 10199
SocksPort 10200
SocksPort 10201
SocksPort 10202
SocksPort 10203
SocksPort 10204
SocksPort 10205
SocksPort 10206
SocksPort 10207
SocksPort 10208
SocksPort 10209
SocksPort 10210
SocksPort 10211
SocksPort 10212
SocksPort 10213
SocksPort 10214
SocksPort 10215
SocksPort 10216
SocksPort 10217
SocksPort 10218
SocksPort 10219
SocksPort 10220
SocksPort 10221
SocksPort 10222
SocksPort 10223
SocksPort 10224
SocksPort 10225
SocksPort 10226
SocksPort 10227
SocksPort 10228
SocksPort 10229
SocksPort 10230
SocksPort 10231
SocksPort 10232
SocksPort 10233
SocksPort 10234
SocksPort 10235
SocksPort 10236
SocksPort 10237
SocksPort 10238
SocksPort 10239
SocksPort 10240
SocksPort 10241
SocksPort 10242
SocksPort 10243
SocksPort 10244
SocksPort 10245
SocksPort 10246
SocksPort 10247
SocksPort 10248
SocksPort 10249
SocksPort 10250
SocksPort 10251
SocksPort 10252
SocksPort 10253
SocksPort 10254
SocksPort 10255
SocksPort 10256
SocksPort 10257
SocksPort 10258
SocksPort 10259
SocksPort 10260
SocksPort 10261
SocksPort 10262
SocksPort 10263
SocksPort 10264
SocksPort 10265
SocksPort 10266
SocksPort 10267
SocksPort 10268
SocksPort 10269
SocksPort 10270
SocksPort 10271
SocksPort 10272
SocksPort 10273
SocksPort 10274
SocksPort 10275
SocksPort 10276
SocksPort 10277
SocksPort 10278
SocksPort 10279
SocksPort 10280
SocksPort 10281
SocksPort 10282
SocksPort 10283
SocksPort 10284
SocksPort 10285
SocksPort 10286
SocksPort 10287
SocksPort 10288
SocksPort 10289
SocksPort 10290
SocksPort 10291
SocksPort 10292
SocksPort 10293
SocksPort 10294
SocksPort 10295
SocksPort 10296
SocksPort 10297
SocksPort 10298
SocksPort 10299
SocksPort 10300
SocksPort 10301
SocksPort 10302
SocksPort 10303
SocksPort 10304
SocksPort 10305
SocksPort 10306
SocksPort 10307
SocksPort 10308
SocksPort 10309
SocksPort 10310
SocksPort 10311
SocksPort 10312
SocksPort 10313
SocksPort 10314
SocksPort 10315
SocksPort 10316
SocksPort 10317
SocksPort 10318
SocksPort 10319
SocksPort 10320
SocksPort 10321
SocksPort 10322
SocksPort 10323
SocksPort 10324
SocksPort 10325
SocksPort 10326
SocksPort 10327
SocksPort 10328
SocksPort 10329
SocksPort 10330
SocksPort 10331
SocksPort 10332
SocksPort 10333
SocksPort 10334
SocksPort 10335
SocksPort 10336
SocksPort 10337
SocksPort 10338
SocksPort 10339
SocksPort 10340
SocksPort 10341
SocksPort 10342
SocksPort 10343
SocksPort 10344
SocksPort 10345
SocksPort 10346
SocksPort 10347
SocksPort 10348
SocksPort 10349
SocksPort 10350
SocksPort 10351
SocksPort 10352
SocksPort 10353
SocksPort 10354
SocksPort 10355
SocksPort 10356
SocksPort 10357
SocksPort 10358
SocksPort 10359
SocksPort 10360
SocksPort 10361
SocksPort 10362
SocksPort 10363
SocksPort 10364
SocksPort 10365
SocksPort 10366
SocksPort 10367
SocksPort 10368
SocksPort 10369
SocksPort 10370
SocksPort 10371
SocksPort 10372
SocksPort 10373
SocksPort 10374
SocksPort 10375
SocksPort 10376
SocksPort 10377
SocksPort 10378
SocksPort 10379
SocksPort 10380
SocksPort 10381
SocksPort 10382
SocksPort 10383
SocksPort 10384
SocksPort 10385
SocksPort 10386
SocksPort 10387
SocksPort 10388
SocksPort 10389
SocksPort 10390
SocksPort 10391
SocksPort 10392
SocksPort 10393
SocksPort 10394
SocksPort 10395
SocksPort 10396
SocksPort 10397
SocksPort 10398
SocksPort 10399
SocksPort 10400
SocksPort 10401
SocksPort 10402
SocksPort 10403
SocksPort 10404
SocksPort 10405
SocksPort 10406
SocksPort 10407
SocksPort 10408
SocksPort 10409
SocksPort 10410
SocksPort 10411
SocksPort 10412
SocksPort 10413
SocksPort 10414
SocksPort 10415
SocksPort 10416
SocksPort 10417
SocksPort 10418
SocksPort 10419
SocksPort 10420
SocksPort 10421
SocksPort 10422
SocksPort 10423
SocksPort 10424
SocksPort 10425
SocksPort 10426
SocksPort 10427
SocksPort 10428
SocksPort 10429
SocksPort 10430
SocksPort 10431
SocksPort 10432
SocksPort 10433
SocksPort 10434
SocksPort 10435
SocksPort 10436
SocksPort 10437
SocksPort 10438
SocksPort 10439
SocksPort 10440
SocksPort 10441
SocksPort 10442
SocksPort 10443
SocksPort 10444
SocksPort 10445
SocksPort 10446
SocksPort 10447
SocksPort 10448
SocksPort 10449
SocksPort 10450
SocksPort 10451
SocksPort 10452
SocksPort 10453
SocksPort 10454
SocksPort 10455
SocksPort 10456
SocksPort 10457
SocksPort 10458
SocksPort 10459
SocksPort 10460
SocksPort 10461
SocksPort 10462
SocksPort 10463
SocksPort 10464
SocksPort 10465
SocksPort 10466
SocksPort 10467
SocksPort 10468
SocksPort 10469
SocksPort 10470
SocksPort 10471
SocksPort 10472
SocksPort 10473
SocksPort 10474
SocksPort 10475
SocksPort 10476
SocksPort 10477
SocksPort 10478
SocksPort 10479
SocksPort 10480
SocksPort 10481
SocksPort 10482
SocksPort 10483
SocksPort 10484
SocksPort 10485
SocksPort 10486
SocksPort 10487
SocksPort 10488
SocksPort 10489
SocksPort 10490
SocksPort 10491
SocksPort 10492
SocksPort 10493
SocksPort 10494
SocksPort 10495
SocksPort 10496
SocksPort 10497
SocksPort 10498
SocksPort 10499
SocksPort 10500
SocksPort 10501
SocksPort 10502
SocksPort 10503
SocksPort 10504
SocksPort 10505
SocksPort 10506
SocksPort 10507
SocksPort 10508
SocksPort 10509
SocksPort 10510
SocksPort 10511
SocksPort 10512
SocksPort 10513
SocksPort 10514
SocksPort 10515
SocksPort 10516
SocksPort 10517
SocksPort 10518
SocksPort 10519
SocksPort 10520
SocksPort 10521
SocksPort 10522
SocksPort 10523
SocksPort 10524
SocksPort 10525
SocksPort 10526
SocksPort 10527
SocksPort 10528
SocksPort 10529
SocksPort 10530
SocksPort 10531
SocksPort 10532
SocksPort 10533
SocksPort 10534
SocksPort 10535
SocksPort 10536
SocksPort 10537
SocksPort 10538
SocksPort 10539
SocksPort 10540
SocksPort 10541
SocksPort 10542
SocksPort 10543
SocksPort 10544
SocksPort 10545
SocksPort 10546
SocksPort 10547
SocksPort 10548
SocksPort 10549
SocksPort 10550
SocksPort 10551
SocksPort 10552
SocksPort 10553
SocksPort 10554
SocksPort 10555
SocksPort 10556
SocksPort 10557
SocksPort 10558
SocksPort 10559
SocksPort 10560
SocksPort 10561
SocksPort 10562
SocksPort 10563
SocksPort 10564
SocksPort 10565
SocksPort 10566
SocksPort 10567
SocksPort 10568
SocksPort 10569
SocksPort 10570
SocksPort 10571
SocksPort 10572
SocksPort 10573
SocksPort 10574
SocksPort 10575
SocksPort 10576
SocksPort 10577
SocksPort 10578
SocksPort 10579
SocksPort 10580
SocksPort 10581
SocksPort 10582
SocksPort 10583
SocksPort 10584
SocksPort 10585
SocksPort 10586
SocksPort 10587
SocksPort 10588
SocksPort 10589
SocksPort 10590
SocksPort 10591
SocksPort 10592
SocksPort 10593
SocksPort 10594
SocksPort 10595
SocksPort 10596
SocksPort 10597
SocksPort 10598
SocksPort 10599
SocksPort 10600
SocksPort 10601
SocksPort 10602
SocksPort 10603
SocksPort 10604
SocksPort 10605
SocksPort 10606
SocksPort 10607
SocksPort 10608
SocksPort 10609
SocksPort 10610
SocksPort 10611
SocksPort 10612
SocksPort 10613
SocksPort 10614
SocksPort 10615