added the rest of the anchors to faq-abuse.html
Thomas Sjögren

Thomas Sjögren commited on 2005-06-08 04:37:51
Zeige 1 geänderte Dateien mit 20 Einfügungen und 20 Löschungen.

... ...
@@ -57,8 +57,8 @@ machines around the world. </p>
57 57
 <p>Tor aims to provide protection for ordinary people who want to follow
58 58
 the law. Only criminals have privacy right now; we need to fix that. </p>
59 59
 
60
-<a name="Tradeoff"></a>
61
-<h3>Isn't it just a tradeoff: accepting the bad uses for the good ones?</h3>
60
+<a id="Tradeoff"></a>
61
+<h3><a class="anchor" href="#Tradeoff">Isn't it just a tradeoff: accepting the bad uses for the good ones?</a></h3>
62 62
 
63 63
 <p>No, we don't think that's how it works in the case of Tor. </p>
64 64
 
... ...
@@ -81,8 +81,8 @@ world will stop them from doing their bad things. At the same time, Tor
81 81
 and other privacy measures can <em>fight</em> identity theft, physical
82 82
 crimes like stalking, and so on. </p>
83 83
 
84
-<a name="DDoS"></a>
85
-<h3>What about distributed denial of service attacks?</h3>
84
+<a id="DDoS"></a>
85
+<h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3>
86 86
 
87 87
 <p>Distributed denial of service attacks typically rely on having a group
88 88
 of thousands of computers all sending floods of traffic to a victim. Since
... ...
@@ -102,8 +102,8 @@ DDoS attack can do it just fine without Tor. </p>
102 102
 much aggregate throughput you can eke out of it, then come back to us
103 103
 if you're still worried. </p>
104 104
 
105
-<a name="WhatAboutSpammers"></a>
106
-<h3>What about spammers?</h3>
105
+<a id="WhatAboutSpammers"></a>
106
+<h3><a class="anchor" href="#WhatAboutSpammers">What about spammers?</a></h3>
107 107
 
108 108
 <p>The simple answer: The default Tor exit policy rejects all outgoing
109 109
 port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to
... ...
@@ -120,8 +120,8 @@ complexity of getting new software installed and configured, and doing
120 120
 Tor's public key operations, etc, makes it not economically worthwhile
121 121
 for them to use Tor. </p>
122 122
 
123
-<a name="ExitPolicies"></a>
124
-<h3>How do Tor exit policies work?</h3>
123
+<a id="ExitPolicies"></a>
124
+<h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3>
125 125
 
126 126
 <p>Each Tor server has an exit policy that specifies what sort of
127 127
 outbound connections are allowed or refused from that server. The exit
... ...
@@ -132,8 +132,8 @@ to their intended destination. </p>
132 132
 <p>This way each server can decide the services he wants to allow
133 133
 connections to, based on abuse potential and his own situation. </p>
134 134
 
135
-<a name="HowMuchAbuse"></a>
136
-<h3>Does Tor get much abuse?</h3>
135
+<a id="HowMuchAbuse"></a>
136
+<h3><a class="anchor" href="#HowMuchAbuse">Does Tor get much abuse?</a></h3>
137 137
 
138 138
 <p>Not much, in the grand scheme of things. We've been running the network
139 139
 since October 2003, and it's only generated a handful of complaints. Of
... ...
@@ -148,8 +148,8 @@ href="http://tor.eff.org/cvs/tor/doc/tor-doc.html">many good uses as
148 148
 well</a>, we feel that we're doing pretty well at striking a balance
149 149
 currently. </p>
150 150
 
151
-<a name="TypicalAbuses"></a>
152
-<h3>So what should I expect if I run a server?</h3>
151
+<a id="TypicalAbuses"></a>
152
+<h3><a class="anchor" href="#TypicalAbuses">So what should I expect if I run a server?</a></h3>
153 153
 
154 154
 <p>If you run a Tor server that allows exit connections (such as the
155 155
 default exit policy), it's probably safe to say that you will eventually
... ...
@@ -193,8 +193,8 @@ that not all software works this way. Until then, we recommend you avoid
193 193
 them, and teach your friends (if they use them) to avoid them too.</li>
194 194
 </ul>
195 195
 
196
-<a name="IrcBans"></a>
197
-<h3>Tor is banned from the IRC network I want to use.</h3>
196
+<a id="IrcBans"></a>
197
+<h3><a class="anchor" href="#IrcBans">Tor is banned from the IRC network I want to use.</a></h3>
198 198
 
199 199
 <p>Sometimes jerks make use of Tor to troll IRC channels. This abuse
200 200
 results in IP-specific temporary bans ("klines" in IRC lingo), as the
... ...
@@ -247,8 +247,8 @@ IRC block tracker</a>
247 247
 so that others can share.  At least one IRC network consults that page
248 248
 to unblock exit nodes that have been blocked inadvertently. </p>
249 249
 
250
-<a name="SMTPBans"></a>
251
-<h3>Your nodes are banned from the mail server I want to use.</h3>
250
+<a id="SMTPBans"></a>
251
+<h3><a class="anchor" href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></h3>
252 252
 
253 253
 <p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for
254 254
 spamming</a>, some over-zealous blacklisters seem to think that all
... ...
@@ -258,8 +258,8 @@ understand it. If your server administrators decide to make use of these
258 258
 blacklists to refuse incoming mail, you should have a conversation with
259 259
 them and explain how Tor works. </p>
260 260
 
261
-<a name="Bans"></a>
262
-<h3>I want to ban the Tor network from my service.</h3>
261
+<a id="Bans"></a>
262
+<h3><a class="anchor" href="#Bans">I want to ban the Tor network from my service.</a></h3>
263 263
 
264 264
 <p>First, ask yourself if there's a way to do application-level decisions
265 265
 to separate the legitimate users from the jerks. For example, you might
... ...
@@ -292,8 +292,8 @@ the overall list of nodes in the network). </p>
292 292
 python script to parse the Tor directory <a
293 293
 href="http://tor.eff.org/cvs/tor/contrib/exitlist">here</a>. </p>
294 294
 
295
-<a name="LegalQuestions"></a>
296
-<h3>I have legal questions about Tor abuse.</h3>
295
+<a id="LegalQuestions"></a>
296
+<h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
297 297
 
298 298
 <p>We're only the developers. We can answer technical questions, but
299 299
 we're not the ones to talk to about legal questions or concerns. </p>
300 300