and the s/server/relay/i
Roger Dingledine

Roger Dingledine commited on 2007-10-21 11:08:06
Zeige 1 geänderte Dateien mit 45 Einfügungen und 45 Löschungen.

... ...
@@ -1,32 +1,32 @@
1 1
 ## translation metadata
2 2
 # Revision: $Revision$
3 3
 
4
-#include "head.wmi" TITLE="Server Configuration Instructions"
4
+#include "head.wmi" TITLE="Relay Configuration Instructions"
5 5
 
6 6
 <div class="center">
7 7
 
8 8
 <div class="main-column">
9 9
 
10
-<h1>Configuring a <a href="<page index>">Tor</a> server</h1>
10
+<h1>Configuring a <a href="<page index>">Tor</a> relay</h1>
11 11
 <br />
12 12
 
13 13
 <p>
14 14
 The Tor network relies on volunteers to donate bandwidth. The more
15
-people who run servers, the faster the Tor network will be. If you have
15
+people who run relays, the faster the Tor network will be. If you have
16 16
 at least 20 kilobytes/s each way, please help out Tor by configuring your
17
-Tor to be a server too. We have many features that make Tor servers easy
17
+Tor to be a relay too. We have many features that make Tor relays easy
18 18
 and convenient, including rate limiting for bandwidth, exit policies so
19 19
 you can limit your exposure to abuse complaints, and support for dynamic
20 20
 IP addresses.</p>
21 21
 
22
-<p>Having servers in many different places on the Internet is what
22
+<p>Having relays in many different places on the Internet is what
23 23
 makes Tor users secure. <a
24 24
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You
25 25
 may also get stronger anonymity yourself</a>,
26 26
 since remote sites can't know whether connections originated at your
27 27
 computer or were relayed from others.</p>
28 28
 
29
-<p>Setting up a Tor server is easy and convenient:
29
+<p>Setting up a Tor relay is easy and convenient:
30 30
 <ul>
31 31
 <li>Tor has built-in support for <a
32 32
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate
... ...
@@ -36,34 +36,34 @@ but want to limit the number of bytes per day
36 36
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Hibernation">hibernation
37 37
 feature</a>.
38 38
 </li>
39
-<li>Each Tor server has an <a
39
+<li>Each Tor relay has an <a
40 40
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#RunAServerBut">exit
41 41
 policy</a> that specifies what sort of outbound connections are allowed
42
-or refused from that server. If you are uncomfortable allowing people
43
-to exit from your server, you can set it up to only allow connections
44
-to other Tor servers.
42
+or refused from that relay. If you are uncomfortable allowing people
43
+to exit from your relay, you can set it up to only allow connections
44
+to other Tor relays.
45 45
 </li>
46
-<li>It's fine if the server goes offline sometimes. The directories
47
-notice this quickly and stop advertising the server. Just try to make
48
-sure it's not too often, since connections using the server when it
46
+<li>It's fine if the relay goes offline sometimes. The directories
47
+notice this quickly and stop advertising the relay. Just try to make
48
+sure it's not too often, since connections using the relay when it
49 49
 disconnects will break.
50 50
 </li>
51
-<li>We can handle servers with dynamic IPs just fine &mdash; simply
51
+<li>We can handle relays with dynamic IPs just fine &mdash; simply
52 52
 leave the Address config option blank, and Tor will try to guess.
53 53
 </li>
54
-<li>If your server is behind a NAT and it doesn't know its public
54
+<li>If your relay is behind a NAT and it doesn't know its public
55 55
 IP (e.g. it has an IP of 192.168.x.y), you'll need to set up port
56 56
 forwarding. Forwarding TCP connections is system dependent but <a
57 57
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients">this
58 58
 FAQ entry</a> offers some examples on how to do this.
59 59
 </li>
60
-<li>Your server will passively estimate and advertise its recent
61
-bandwidth capacity, so high-bandwidth servers will attract more users than
62
-low-bandwidth ones. Therefore having low-bandwidth servers is useful too.
60
+<li>Your relay will passively estimate and advertise its recent
61
+bandwidth capacity, so high-bandwidth relays will attract more users than
62
+low-bandwidth ones. Therefore having low-bandwidth relays is useful too.
63 63
 </li>
64 64
 </ul>
65 65
 
66
-<p>You can run a Tor server on
66
+<p>You can run a Tor relay on
67 67
 pretty much any operating system, but see <a
68 68
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerOS">this
69 69
 FAQ entry</a> for advice about which ones work best and other problems
... ...
@@ -91,7 +91,7 @@ while to make sure it's actually working.</p>
91 91
 
92 92
 <hr />
93 93
 <a id="setup"></a>
94
-<h2><a class="anchor" href="#setup">Step One: Set it up as a server</a></h2>
94
+<h2><a class="anchor" href="#setup">Step One: Set it up as a relay</a></h2>
95 95
 <br />
96 96
 
97 97
 <p>
... ...
@@ -110,20 +110,20 @@ href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ#torrc">this
110 110
 FAQ entry</a> for help.)
111 111
 Make sure to define at least Nickname and ORPort. Create the DataDirectory
112 112
 if necessary, and make sure it's owned by the user that will be running
113
-tor. <em>If you want to run more than one server that's great, but
113
+tor. <em>If you want to run more than one relay that's great, but
114 114
 please set <a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#MultipleServers">the
115
-MyFamily option</a> in all your servers' configuration files.</em>
115
+MyFamily option</a> in all your relays' configuration files.</em>
116 116
 </p>
117 117
 
118 118
 <p>
119 119
 4. If you are using a firewall, open a hole in your firewall so
120
-incoming connections can reach the ports you configured in step 3 (ORPort, plus
120
+incoming connections can reach the ports you configured (ORPort, plus
121 121
 DirPort if you enabled it). Make sure you allow all outgoing connections,
122
-so your server can reach the other Tor servers.
122
+so your relay can reach the other Tor relays.
123 123
 </p>
124 124
 
125 125
 <p>
126
-5. Restart your server. If it <a
126
+5. Restart your relay. If it <a
127 127
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Logs">logs
128 128
 any warnings</a>, address them.
129 129
 </p>
... ...
@@ -141,7 +141,7 @@ where new development releases are announced.
141 141
 7. Have a look at the manual.
142 142
 The <a href="<page tor-manual>">manual</a> for the
143 143
 latest stable version provides a list of all the possible configuration
144
-options for both clients and servers.
144
+options for both clients and relays.
145 145
 If you are running the development version of Tor, the manual is available
146 146
 <a href="<page tor-manual-dev>">here</a>.
147 147
 </p>
... ...
@@ -151,20 +151,20 @@ If you are running the development version of Tor, the manual is available
151 151
 <h2><a class="anchor" href="#check">Step Two: Make sure it's working</a></h2>
152 152
 <br />
153 153
 
154
-<p>As soon as your server manages to connect to the network, it will
154
+<p>As soon as your relay manages to connect to the network, it will
155 155
 try to determine whether the ports you configured are reachable from
156 156
 the outside. This may take up to 20 minutes. Look for a
157 157
 <a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Logs">log
158 158
 entry</a> like
159 159
 <tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt>
160
-If you don't see this message, it means that your server is not reachable
160
+If you don't see this message, it means that your relay is not reachable
161 161
 from the outside &mdash; you should re-check your firewalls, check that it's
162 162
 testing the IP and port you think it should be testing, etc.
163 163
 </p>
164 164
 
165 165
 <p>When it decides that it's reachable, it will upload a "server
166 166
 descriptor" to the directories. This will let clients know
167
-what address, ports, keys, etc your server is using. You can <a
167
+what address, ports, keys, etc your relay is using. You can <a
168 168
 href="http://moria.seul.org:9032/tor/status/authority">load one of
169 169
 the network statuses manually</a> and
170 170
 look through it to find the nickname you configured, to make sure it's
... ...
@@ -183,11 +183,11 @@ We recommend the following steps as well:
183 183
 <p>
184 184
 8. Read
185 185
 <a href="http://wiki.noreply.org/noreply/TheOnionRouter/OperationalSecurity">this document</a>
186
-to get ideas how you can increase the security of your server.
186
+to get ideas how you can increase the security of your relay.
187 187
 </p>
188 188
 
189 189
 <p>
190
-9. Decide what exit policy you want. By default your server allows
190
+9. Decide what exit policy you want. By default your relay allows
191 191
 access to many popular services, but restricts some (such as port 25)
192 192
 due to abuse potential. You might want an exit policy that is
193 193
 less restrictive or more restrictive; edit your torrc appropriately.
... ...
@@ -211,12 +211,12 @@ limiting FAQ entry</a> for details.
211 211
 </p>
212 212
 
213 213
 <p>
214
-11. Back up your Tor server's private key (stored in "keys/secret_id_key"
215
-in your DataDirectory). This is your server's "identity," and
214
+11. Back up your Tor relay's private key (stored in "keys/secret_id_key"
215
+in your DataDirectory). This is your relay's "identity," and
216 216
 you need to keep it safe so nobody can read the traffic that goes
217
-through your server. This is the critical file to keep if you need to <a
217
+through your relay. This is the critical file to keep if you need to <a
218 218
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#UpgradeServer">move
219
-or restore your Tor server</a> if something goes wrong.
219
+or restore your Tor relay</a> if something goes wrong.
220 220
 </p>
221 221
 
222 222
 <p>
... ...
@@ -230,32 +230,32 @@ understand what's going on.
230 230
 13. If your computer isn't running a webserver, please consider
231 231
 changing your ORPort to 443 and your DirPort to 80. Many Tor
232 232
 users are stuck behind firewalls that only let them browse the
233
-web, and this change will let them reach your Tor server. Win32
234
-servers can simply change their ORPort and DirPort directly
235
-in their torrc and restart Tor. OS X or Unix servers can't bind
233
+web, and this change will let them reach your Tor relay. Win32
234
+relays can simply change their ORPort and DirPort directly
235
+in their torrc and restart Tor. OS X or Unix relays can't bind
236 236
 directly to these ports (since they don't run as root), so they will
237 237
 need to set up some sort of <a
238 238
 href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ#ServerForFirewalledClients">
239
-port forwarding</a> so connections can reach their Tor server. If you are
239
+port forwarding</a> so connections can reach their Tor relay. If you are
240 240
 using ports 80 and 443 already but still want to help out, other useful
241 241
 ports are 22, 110, and 143.
242 242
 </p>
243 243
 
244 244
 <p>
245
-14. If your Tor server provides other services on the same IP address
245
+14. If your Tor relay provides other services on the same IP address
246 246
 &mdash; such as a public webserver &mdash; make sure that connections to the
247 247
 webserver are allowed from the local host too. You need to allow these
248
-connections because Tor clients will detect that your Tor server is the <a
248
+connections because Tor clients will detect that your Tor relay is the <a
249 249
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">safest
250 250
 way to reach that webserver</a>, and always build a circuit that ends
251
-at your server. If you don't want to allow the connections, you must
251
+at your relay. If you don't want to allow the connections, you must
252 252
 explicitly reject them in your exit policy.
253 253
 </p>
254 254
 
255 255
 <p>
256
-15. (Unix only). Make a separate user to run the server. If you
256
+15. (Unix only). Make a separate user to run the relay. If you
257 257
 installed the OS X package or the deb or the rpm, this is already
258
-done. Otherwise, you can do it by hand. (The Tor server doesn't need to
258
+done. Otherwise, you can do it by hand. (The Tor relay doesn't need to
259 259
 be run as root, so it's good practice to not run it as root. Running
260 260
 as a 'tor' user avoids issues with identd and other services that
261 261
 detect user name. If you're the paranoid sort, feel free to <a
... ...
@@ -284,7 +284,7 @@ you may find the initscripts in contrib/tor.sh or contrib/torctl useful.
284 284
 
285 285
 <p>
286 286
 When you change your Tor configuration, remember to verify that your
287
-server still works correctly after the change. Be sure to set your
287
+relay still works correctly after the change. Be sure to set your
288 288
 "ContactInfo" line in the torrc so we can contact you if you need to
289 289
 upgrade or something goes wrong. If you have problems or questions, see
290 290
 the <a href="<page documentation>#Support">Support</a> section or
291 291