2 Special Hostnames in Tor
7 Most of the time, Tor treats user-specified hostnames as opaque: When
8 the user connects to www.torproject.org, Tor picks an exit node and uses
9 that node to connect to "www.torproject.org". Some hostnames, however,
10 can be used to override Tor's default behavior and circuit-building
13 These hostnames can be passed to Tor as the address part of a SOCKS4a or
14 SOCKS5 request. If the application is connected to Tor using an IP-only
15 method (such as SOCKS4, TransPort, or NatdPort), these hostnames can be
16 substituted for certain IP addresses using the MapAddress configuration
17 option or the MAPADDRESS control command.
21 SYNTAX: [hostname].[name-or-digest].exit
24 Hostname is a valid hostname; [name-or-digest] is either the nickname of a
25 Tor node or the hex-encoded digest of that node's public key.
27 When Tor sees an address in this format, it uses the specified hostname as
28 the exit node. If no "hostname" component is given, Tor defaults to the
29 published IPv4 address of the exit node.
31 It is valid to try to resolve hostnames, and in fact upon success Tor
32 will cache an internal mapaddress of the form
33 "www.google.com.foo.exit=64.233.161.99.foo.exit" to speed subsequent
36 The .exit notation is disabled by default as of Tor 0.2.2.1-alpha, due
37 to potential application-level attacks.
40 www.example.com.exampletornode.exit
42 Connect to www.example.com from the node called "exampletornode".
46 Connect to the published IP address of "exampletornode" using
47 "exampletornode" as the exit.
51 SYNTAX: [digest].onion
53 The digest is the first eighty bits of a SHA1 hash of the identity key for
54 a hidden service, encoded in base32.
56 When Tor sees an address in this format, it tries to look up and connect to
57 the specified hidden service. See rend-spec.txt for full details.