fix some links to the faq.
Andrew Lewman

Andrew Lewman commited on 2010-10-06 21:29:57
Zeige 1 geänderte Dateien mit 11 Einfügungen und 12 Löschungen.

... ...
@@ -34,8 +34,7 @@ for bandwidth, exit policies so you can limit your exposure to abuse
34 34
 complaints, and support for dynamic IP addresses</a>.
35 35
 </p>
36 36
 
37
-<p>You can run a Tor relay on <a
38
-href="<wiki>/TorFAQ#RelayOS">pretty
37
+<p>You can run a Tor relay on <a href="<wiki>/TorFAQ#WhydoesntmyWindowsorotherOSTorrelayrunwell">pretty
39 38
 much any</a> operating system. Tor relays work best on Linux, OS X Tiger
40 39
 or later, FreeBSD 5.x+, NetBSD 5.x+, and Windows Server 2003 or later.
41 40
 </p>
... ...
@@ -108,7 +107,7 @@ that the relay is working correctly.</li>
108 107
 <strong>Manual Configuration</strong>:
109 108
 <ul>
110 109
 <li>Edit the bottom part of <a
111
-href="<wiki>/TorFAQ#torrc">your
110
+href="<wiki>/TorFAQ#Imsupposedtoeditmytorrc.Whatdoesthatmean">your
112 111
 torrc file</a>. If you want to be a public relay (recommended),
113 112
 make sure to define ORPort and <a href="<page
114 113
 faq>#ExitPolicies">look at ExitPolicy</a>; otherwise
... ...
@@ -129,7 +128,7 @@ other Tor relays.
129 128
 </li>
130 129
 
131 130
 <li>Restart your relay. If it <a
132
-href="<wiki>/TorFAQ#Logs">logs
131
+href="<wiki>/TorFAQ#WhatloglevelshouldIuse">logs
133 132
 any warnings</a>, address them.
134 133
 </li>
135 134
 
... ...
@@ -152,7 +151,7 @@ too.
152 151
 try to determine whether the ports you configured are reachable from
153 152
 the outside. This step is usually fast, but may take up to 20
154 153
 minutes. Look for a
155
-<a href="<wiki>/TorFAQ#Logs">log
154
+<a href="<wiki>/TorFAQ#WhatloglevelshouldIuse">log
156 155
 entry</a> like
157 156
 <tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt>
158 157
 If you don't see this message, it means that your relay is not reachable
... ...
@@ -192,7 +191,7 @@ MyFamily option</a> in all your relays' configuration files.
192 191
 8. Decide about rate limiting. Cable modem, DSL, and other users
193 192
 who have asymmetric bandwidth (e.g. more down than up) should
194 193
 rate limit to their slower bandwidth, to avoid congestion. See the <a
195
-href="<wiki>/TorFAQ#LimitBandwidth">rate
194
+href="<wiki>/TorFAQ#HowcanIlimitthetotalamountofbandwidthusedbymyTorrelay">rate
196 195
 limiting FAQ entry</a> for details.
197 196
 </p>
198 197
 
... ...
@@ -201,7 +200,7 @@ limiting FAQ entry</a> for details.
201 200
 in your DataDirectory). This is your relay's "identity," and
202 201
 you need to keep it safe so nobody can read the traffic that goes
203 202
 through your relay. This is the critical file to keep if you need to <a
204
-href="<wiki>/TorFAQ#UpgradeRelay">move
203
+href="<wiki>/TorFAQ#Iwanttoupgrademovemyrelay.HowdoIkeepthesamekey">move
205 204
 or restore your Tor relay</a> if something goes wrong.
206 205
 </p>
207 206
 
... ...
@@ -226,7 +225,7 @@ relays can simply change their ORPort and DirPort directly
226 225
 in their torrc and restart Tor. OS X or Unix relays can't bind
227 226
 directly to these ports (since they don't run as root), so they will
228 227
 need to set up some sort of <a
229
-href="<wiki>/TorFAQ#ServerForFirewalledClients">
228
+href="<wiki>/TorFAQ#HowcanImakemyrelayaccessibletopeoplestuckbehindrestrictivefirewalls">
230 229
 port forwarding</a> so connections can reach their Tor relay. If you are
231 230
 using ports 80 and 443 already but still want to help out, other useful
232 231
 ports are 22, 110, and 143.
... ...
@@ -237,10 +236,10 @@ ports are 22, 110, and 143.
237 236
 &mdash; such as a public webserver &mdash; make sure that connections to the
238 237
 webserver are allowed from the local host too. You need to allow these
239 238
 connections because Tor clients will detect that your Tor relay is the <a
240
-href="<wiki>/TorFAQ#ExitEavesdroppers">safest
241
-way to reach that webserver</a>, and always build a circuit that ends
242
-at your relay. If you don't want to allow the connections, you must
243
-explicitly reject them in your exit policy.
239
+href="<wiki>/TorFAQ#WhatisExitEnclaving">safest way to reach that
240
+webserver</a>, and always build a circuit that ends at your relay. If
241
+you don't want to allow the connections, you must explicitly reject them
242
+in your exit policy.
244 243
 </p>
245 244
 
246 245
 <p>
247 246