Andrew Lewman commited on 2010-10-06 21:29:57
Zeige 1 geänderte Dateien mit 11 Einfügungen und 12 Löschungen.
... | ... |
@@ -34,8 +34,7 @@ for bandwidth, exit policies so you can limit your exposure to abuse |
34 | 34 |
complaints, and support for dynamic IP addresses</a>. |
35 | 35 |
</p> |
36 | 36 |
|
37 |
-<p>You can run a Tor relay on <a |
|
38 |
-href="<wiki>/TorFAQ#RelayOS">pretty |
|
37 |
+<p>You can run a Tor relay on <a href="<wiki>/TorFAQ#WhydoesntmyWindowsorotherOSTorrelayrunwell">pretty |
|
39 | 38 |
much any</a> operating system. Tor relays work best on Linux, OS X Tiger |
40 | 39 |
or later, FreeBSD 5.x+, NetBSD 5.x+, and Windows Server 2003 or later. |
41 | 40 |
</p> |
... | ... |
@@ -108,7 +107,7 @@ that the relay is working correctly.</li> |
108 | 107 |
<strong>Manual Configuration</strong>: |
109 | 108 |
<ul> |
110 | 109 |
<li>Edit the bottom part of <a |
111 |
-href="<wiki>/TorFAQ#torrc">your |
|
110 |
+href="<wiki>/TorFAQ#Imsupposedtoeditmytorrc.Whatdoesthatmean">your |
|
112 | 111 |
torrc file</a>. If you want to be a public relay (recommended), |
113 | 112 |
make sure to define ORPort and <a href="<page |
114 | 113 |
faq>#ExitPolicies">look at ExitPolicy</a>; otherwise |
... | ... |
@@ -129,7 +128,7 @@ other Tor relays. |
129 | 128 |
</li> |
130 | 129 |
|
131 | 130 |
<li>Restart your relay. If it <a |
132 |
-href="<wiki>/TorFAQ#Logs">logs |
|
131 |
+href="<wiki>/TorFAQ#WhatloglevelshouldIuse">logs |
|
133 | 132 |
any warnings</a>, address them. |
134 | 133 |
</li> |
135 | 134 |
|
... | ... |
@@ -152,7 +151,7 @@ too. |
152 | 151 |
try to determine whether the ports you configured are reachable from |
153 | 152 |
the outside. This step is usually fast, but may take up to 20 |
154 | 153 |
minutes. Look for a |
155 |
-<a href="<wiki>/TorFAQ#Logs">log |
|
154 |
+<a href="<wiki>/TorFAQ#WhatloglevelshouldIuse">log |
|
156 | 155 |
entry</a> like |
157 | 156 |
<tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt> |
158 | 157 |
If you don't see this message, it means that your relay is not reachable |
... | ... |
@@ -192,7 +191,7 @@ MyFamily option</a> in all your relays' configuration files. |
192 | 191 |
8. Decide about rate limiting. Cable modem, DSL, and other users |
193 | 192 |
who have asymmetric bandwidth (e.g. more down than up) should |
194 | 193 |
rate limit to their slower bandwidth, to avoid congestion. See the <a |
195 |
-href="<wiki>/TorFAQ#LimitBandwidth">rate |
|
194 |
+href="<wiki>/TorFAQ#HowcanIlimitthetotalamountofbandwidthusedbymyTorrelay">rate |
|
196 | 195 |
limiting FAQ entry</a> for details. |
197 | 196 |
</p> |
198 | 197 |
|
... | ... |
@@ -201,7 +200,7 @@ limiting FAQ entry</a> for details. |
201 | 200 |
in your DataDirectory). This is your relay's "identity," and |
202 | 201 |
you need to keep it safe so nobody can read the traffic that goes |
203 | 202 |
through your relay. This is the critical file to keep if you need to <a |
204 |
-href="<wiki>/TorFAQ#UpgradeRelay">move |
|
203 |
+href="<wiki>/TorFAQ#Iwanttoupgrademovemyrelay.HowdoIkeepthesamekey">move |
|
205 | 204 |
or restore your Tor relay</a> if something goes wrong. |
206 | 205 |
</p> |
207 | 206 |
|
... | ... |
@@ -226,7 +225,7 @@ relays can simply change their ORPort and DirPort directly |
226 | 225 |
in their torrc and restart Tor. OS X or Unix relays can't bind |
227 | 226 |
directly to these ports (since they don't run as root), so they will |
228 | 227 |
need to set up some sort of <a |
229 |
-href="<wiki>/TorFAQ#ServerForFirewalledClients"> |
|
228 |
+href="<wiki>/TorFAQ#HowcanImakemyrelayaccessibletopeoplestuckbehindrestrictivefirewalls"> |
|
230 | 229 |
port forwarding</a> so connections can reach their Tor relay. If you are |
231 | 230 |
using ports 80 and 443 already but still want to help out, other useful |
232 | 231 |
ports are 22, 110, and 143. |
... | ... |
@@ -237,10 +236,10 @@ ports are 22, 110, and 143. |
237 | 236 |
— such as a public webserver — make sure that connections to the |
238 | 237 |
webserver are allowed from the local host too. You need to allow these |
239 | 238 |
connections because Tor clients will detect that your Tor relay is the <a |
240 |
-href="<wiki>/TorFAQ#ExitEavesdroppers">safest |
|
241 |
-way to reach that webserver</a>, and always build a circuit that ends |
|
242 |
-at your relay. If you don't want to allow the connections, you must |
|
243 |
-explicitly reject them in your exit policy. |
|
239 |
+href="<wiki>/TorFAQ#WhatisExitEnclaving">safest way to reach that |
|
240 |
+webserver</a>, and always build a circuit that ends at your relay. If |
|
241 |
+you don't want to allow the connections, you must explicitly reject them |
|
242 |
+in your exit policy. |
|
244 | 243 |
</p> |
245 | 244 |
|
246 | 245 |
<p> |
247 | 246 |