continue the great relay terminology shift
Roger Dingledine

Roger Dingledine commited on 2007-10-21 12:04:33
Zeige 14 geänderte Dateien mit 106 Einfügungen und 103 Löschungen.

... ...
@@ -14,7 +14,7 @@
14 14
 <b>Note that these are the installation instructions for running a Tor client on
15 15
   Mac OS X. If you want to relay traffic for others to help the network
16 16
   grow (please do), read the <a
17
-  href="<page docs/tor-doc-server>">Configuring a server</a> guide.</b>
17
+  href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b>
18 18
 </p>
19 19
 
20 20
 <hr />
... ...
@@ -174,25 +174,26 @@ FAQ entry</a> for hints.</p>
174 174
 
175 175
 <hr />
176 176
 <a id="server"></a>
177
-<h2><a class="anchor" href="#server">Step Four: Configure it as a server</a></h2>
177
+<a id="relay"></a>
178
+<h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2>
178 179
 <br />
179 180
 
180 181
 <p>The Tor network relies on volunteers to donate bandwidth. The more
181
-people who run servers, the faster the Tor network will be. If you have
182
+people who run relays, the faster the Tor network will be. If you have
182 183
 at least 20 kilobytes/s each way, please help out Tor by configuring your
183
-Tor to be a server too. We have many features that make Tor servers easy
184
+Tor to be a relay too. We have many features that make Tor relays easy
184 185
 and convenient, including rate limiting for bandwidth, exit policies so
185 186
 you can limit your exposure to abuse complaints, and support for dynamic
186 187
 IP addresses.</p>
187 188
 
188
-<p>Having servers in many different places on the Internet is what
189
+<p>Having relays in many different places on the Internet is what
189 190
 makes Tor users secure. <a
190 191
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You
191 192
 may also get stronger anonymity yourself</a>,
192 193
 since remote sites can't know whether connections originated at your
193 194
 computer or were relayed from others.</p>
194 195
 
195
-<p>Read more at our <a href="<page docs/tor-doc-server>">Configuring a server</a>
196
+<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
196 197
 guide.</p>
197 198
 
198 199
 <hr />
... ...
@@ -14,7 +14,7 @@
14 14
 <b>Note that these are the installation instructions for running a Tor
15 15
 client. If you want to relay traffic for others to help the network grow
16 16
 (please do), read the <a
17
-href="<page docs/tor-doc-server>">Configuring a server</a> guide.</b>
17
+href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b>
18 18
 </p>
19 19
 
20 20
 <hr />
... ...
@@ -171,25 +171,26 @@ FAQ entry</a> for hints.</p>
171 171
 
172 172
 <hr />
173 173
 <a id="server"></a>
174
-<h2><a class="anchor" href="#server">Step Five: Configure it as a server</a></h2>
174
+<a id="relay"></a>
175
+<h2><a class="anchor" href="#relay">Step Five: Configure it as a relay</a></h2>
175 176
 <br />
176 177
 
177 178
 <p>The Tor network relies on volunteers to donate bandwidth. The more
178
-people who run servers, the faster the Tor network will be. If you have
179
+people who run relays, the faster the Tor network will be. If you have
179 180
 at least 20 kilobytes/s each way, please help out Tor by configuring your
180
-Tor to be a server too. We have many features that make Tor servers easy
181
+Tor to be a relay too. We have many features that make Tor relays easy
181 182
 and convenient, including rate limiting for bandwidth, exit policies so
182 183
 you can limit your exposure to abuse complaints, and support for dynamic
183 184
 IP addresses.</p>
184 185
 
185
-<p>Having servers in many different places on the Internet is what
186
+<p>Having relays in many different places on the Internet is what
186 187
 makes Tor users secure. <a
187 188
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You
188 189
 may also get stronger anonymity yourself</a>,
189 190
 since remote sites can't know whether connections originated at your
190 191
 computer or were relayed from others.</p>
191 192
 
192
-<p>Read more at our <a href="<page docs/tor-doc-server>">Configuring a server</a>
193
+<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
193 194
 guide.</p>
194 195
 
195 196
 <hr />
... ...
@@ -14,7 +14,7 @@
14 14
 <b>Note that these are the installation instructions for running a Tor
15 15
 client on MS Windows (98, 98SE, NT4, 2000, XP, Server).
16 16
 If you want to relay traffic for others to help the network grow (please
17
-do), read the <a href="<page docs/tor-doc-server>">Configuring a server</a>
17
+do), read the <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
18 18
 guide.</b>
19 19
 </p>
20 20
 
... ...
@@ -157,25 +157,26 @@ FAQ entry</a> for hints.</p>
157 157
 
158 158
 <hr />
159 159
 <a id="server"></a>
160
-<h2><a class="anchor" href="#server">Step Four: Configure it as a server</a></h2>
160
+<a id="relay"></a>
161
+<h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2>
161 162
 <br />
162 163
 
163 164
 <p>The Tor network relies on volunteers to donate bandwidth. The more
164
-people who run servers, the faster the Tor network will be. If you have
165
+people who run relays, the faster the Tor network will be. If you have
165 166
 at least 20 kilobytes/s each way, please help out Tor by configuring your
166
-Tor to be a server too. We have many features that make Tor servers easy
167
+Tor to be a relay too. We have many features that make Tor relays easy
167 168
 and convenient, including rate limiting for bandwidth, exit policies so
168 169
 you can limit your exposure to abuse complaints, and support for dynamic
169 170
 IP addresses.</p>
170 171
 
171
-<p>Having servers in many different places on the Internet is what
172
+<p>Having relays in many different places on the Internet is what
172 173
 makes Tor users secure. <a
173 174
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You
174 175
 may also get stronger anonymity yourself</a>,
175 176
 since remote sites can't know whether connections originated at your
176 177
 computer or were relayed from others.</p>
177 178
 
178
-<p>Read more at our <a href="<page docs/tor-doc-server>">Configuring a server</a>
179
+<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a>
179 180
 guide.</p>
180 181
 
181 182
 <hr />
... ...
@@ -10,7 +10,7 @@
10 10
 <h1>Configuring Hidden Services for <a href="<page index>">Tor</a></h1>
11 11
 <hr />
12 12
 
13
-<p>Tor allows clients and servers to offer hidden services. That is,
13
+<p>Tor allows clients and relays to offer hidden services. That is,
14 14
 you can offer a web server, SSH server, etc., without revealing your
15 15
 IP address to its users. In fact, because you don't use any public address,
16 16
 you can run a hidden service from behind your firewall.
... ...
@@ -1,25 +1,25 @@
1 1
 ## translation metadata
2 2
 # Revision: $Revision$
3 3
 
4
-#include "head.wmi" TITLE="Response template for Tor server operator to ISP"
4
+#include "head.wmi" TITLE="Response template for Tor relay operator to ISP"
5 5
 
6 6
 <div class="main-column">
7 7
 
8 8
 <!-- PUT CONTENT AFTER THIS TAG -->
9 9
 
10
-<h2>Response template for Tor node maintainer to ISP</h2>
10
+<h2>Response template for Tor relay maintainer to ISP</h2>
11 11
 <hr />
12 12
 <p>Written by the Electronic Frontier
13 13
 Foundation (<a href="http://www.eff.org/">EFF</a>). Last updated 19 Feb 2005.</p>
14 14
 
15
-<p>Note to Tor server operators:   In this litigous era, anyone
15
+<p>Note to Tor relay operators:   In this litigous era, anyone
16 16
 providing routing services may face copyright complaints under the
17 17
 Digital Millennium Copyright Act. Thankfully, the DMCA safe harbors
18 18
 provide immunity from many of them -- both to you and to your
19 19
 upstream provider.  If your Internet host forwards a DMCA complaint
20 20
 to you, here's a template you can use to write a response.  You can
21 21
 tailor this to your own circumstances: if you think your host would
22
-be disturbed to hear you're running a server on the network, you may
22
+be disturbed to hear you're running a relay on the network, you may
23 23
 want to take that part out.  Of course it's up to you to comply with
24 24
 your ISP's terms of service.  If you're not comfortable including so
25 25
 much legal explanation, feel free to invite the ISP to contact EFF
... ...
@@ -1,13 +1,13 @@
1 1
 ## translation metadata
2 2
 # Revision: $Revision$
3 3
 
4
-#include "head.wmi" TITLE="Legal FAQ for Tor Server Operators"
4
+#include "head.wmi" TITLE="Legal FAQ for Tor Relay Operators"
5 5
 
6 6
 <div class="main-column">
7 7
 
8 8
 <!-- PUT CONTENT AFTER THIS TAG -->
9 9
 
10
-<h2>Legal FAQ for Tor Server Operators</h2>
10
+<h2>Legal FAQ for Tor Relay Operators</h2>
11 11
 <hr />
12 12
 <p>FAQ written by the Electronic Frontier
13 13
 Foundation (<a href="http://www.eff.org/">EFF</a>). Last updated 25 Apr 2005.</p>
... ...
@@ -46,34 +46,34 @@ infringement?</a></h3>
46 46
 
47 47
 <p><strong>No.</strong> Tor has been developed to be a tool for free
48 48
 speech, privacy, and human rights.  It is not a tool designed or intended
49
-to be used to break the law, either by Tor users or Tor server
49
+to be used to break the law, either by Tor users or Tor relay
50 50
 operators.</p>
51 51
 
52 52
 <p>We further recommend that you not keep any potentially illegal files
53 53
 on the same machine you use for Tor, nor use that machine for any illegal
54
-purpose.  Although no Tor server in the US has ever been seized, nor any server
54
+purpose.  Although no Tor relay in the US has ever been seized, nor any relay
55 55
 operator sued, the future possibility cannot be ruled out. If that
56 56
 happens, you will want your machine to be clean.</p>
57 57
 
58 58
 <a id="Promise"></a>
59 59
 <h3><a class="anchor" href="#Promise">Can EFF promise that I won't get
60
-in trouble for running a Tor server?</a></h3>
60
+in trouble for running a Tor relay?</a></h3>
61 61
 
62 62
 <p><strong>No.</strong> All new technologies create legal uncertainties,
63 63
 and Tor is no exception to the rule. Presently, no court has ever considered any
64 64
 case involving the Tor technology, and we therefore cannot guarantee
65 65
 that you will never face any legal liability as a result of running a
66
-Tor server. However, EFF believes so strongly that those running Tor
67
-servers shouldn't be liable for traffic that passes through the server
68
-that we're running our own Tor server.
66
+Tor relay. However, EFF believes so strongly that those running Tor
67
+relays shouldn't be liable for traffic that passes through the relay
68
+that we're running our own Tor relay.
69 69
 </p>
70 70
 
71 71
 <a id="Represent"></a>
72 72
 <h3><a class="anchor" href="#Represent">Will EFF represent me if I get
73
-in trouble for running a Tor server?</a></h3>
73
+in trouble for running a Tor relay?</a></h3>
74 74
 
75 75
 <p><strong>Maybe.</strong> While EFF cannot promise legal representation
76
-of all Tor server operators, it will assist server operators in
76
+of all Tor relay operators, it will assist relay operators in
77 77
 assessing the situation and will try to locate qualified legal counsel
78 78
 when necessary.  Inquiries to EFF for the purpose of securing legal
79 79
 representation or referrals should be directed to staff attorney Kevin
... ...
@@ -81,7 +81,7 @@ Bankston (bankston at eff.org or US +1 (415) 436-9333 x 126). Such
81 81
 inquiries will be kept
82 82
 confidential subject to the limits of the attorney/client privilege.
83 83
 Note that although EFF cannot practice law outside of the U.S., it will
84
-still try to assist non-U.S. server operators in finding local
84
+still try to assist non-U.S. relay operators in finding local
85 85
 representation.</p>
86 86
 
87 87
 <a id="DevelopersAreNotLawyers"></a>
... ...
@@ -92,7 +92,7 @@ them if I suspect Tor is being used for illegal purposes?</a></h3>
92 92
 <p><strong>No.</strong> Tor's core developers, Roger Dingledine
93 93
 and Nick Mathewson, are available to answer technical questions, but
94 94
 they are not lawyers and cannot give legal advice.  Nor do they have any
95
-ability to prevent illegal activity that may occur through Tor servers.
95
+ability to prevent illegal activity that may occur through Tor relays.
96 96
 Furthermore, your communications with Tor's core developers are
97 97
 not protected by any legal privilege, so law enforcement or civil
98 98
 litigants could subpoena and obtain any information you give to
... ...
@@ -100,15 +100,15 @@ them.</p>
100 100
 
101 101
 <a id="RequestForLogs"></a>
102 102
 <h3><a class="anchor" href="#RequestForLogs">If I receive a request from
103
-law enforcement or anyone else for my Tor server's logs, what should
103
+law enforcement or anyone else for my Tor relay's logs, what should
104 104
 I do?</a></h3>
105 105
 
106 106
 <p><strong>Educate them about Tor.</strong> In most instances, properly
107
-configured Tor servers will have no useful data for inquiring parties,
107
+configured Tor relays will have no useful data for inquiring parties,
108 108
 and you should feel free to educate them on this point.  To the extent
109 109
 you do maintain logs, however, you should not disclose them to any third
110 110
 party without first consulting a lawyer.  In the U.S., such a disclosure
111
-may violate the Electronic Communications Privacy Act, and server
111
+may violate the Electronic Communications Privacy Act, and relay
112 112
 operators outside of the U.S. may be subject to similar data protection
113 113
 laws.</p>
114 114
 
... ...
@@ -142,7 +142,7 @@ will help us recognize trends and issues that the lawyers might want to
142 142
 focus on. Chilling Effects encourages submissions from people outside
143 143
 the United States too.</p>
144 144
 
145
-<p>EFF is actively seeking Tor server operators willing to stand up
145
+<p>EFF is actively seeking Tor relay operators willing to stand up
146 146
 and help set a clear legal precedent establishing that merely running
147 147
 a node does not create copyright liability for either node operators
148 148
 or their bandwidth providers. If you want to be the EFF's test case,
... ...
@@ -151,12 +151,12 @@ more here</a>.</p>
151 151
 
152 152
 <a id="ExitSnooping"></a>
153 153
 <h3><a class="anchor" href="#ExitSnooping">Should I snoop on the plaintext
154
-that exits through my Tor server?</a></h3>
154
+that exits through my Tor relay?</a></h3>
155 155
 
156 156
 <p><strong>No.</strong> You may be technically capable of modifying
157 157
 the Tor source code or installing additional software to monitor
158 158
 or log plaintext that exits your node. However,
159
-Tor server operators in the U.S. can create legal and possibly even
159
+Tor relay operators in the U.S. can create legal and possibly even
160 160
 criminal liability for themselves under state or federal wiretap laws if
161 161
 they affirmatively monitor, log, or disclose Tor users'
162 162
 communications, while non-U.S. operators may be subject to similar laws.
... ...
@@ -165,16 +165,16 @@ first talking to a lawyer.</p>
165 165
 
166 166
 <a id="DirectoryWarranty"></a>
167 167
 <h3><a class="anchor" href="#DirectoryWarranty">Do Tor's core developers
168
-make any promises about the trustworthiness or reliability of Tor servers
168
+make any promises about the trustworthiness or reliability of Tor relays
169 169
 that are listed in their directory?</a></h3>
170 170
 
171 171
 <p><strong>No.</strong> Although the developers attempt to verify that
172
-Tor servers listed in the directory the core developers maintain are
172
+Tor relays listed in the directory the core developers maintain are
173 173
 stable and have adequate bandwidth, neither they nor EFF can guarantee
174 174
 the personal trustworthiness or reliability of the individuals who run
175
-those servers.  Tor's core developers further reserve the right to
176
-refuse a Tor server operator's request to be listed in their
177
-directory or to remove any server from their directory for any
175
+those relays.  Tor's core developers further reserve the right to
176
+refuse a Tor relay operator's request to be listed in their
177
+directory or to remove any relay from their directory for any
178 178
 reason.</p>
179 179
 
180 180
 <a id="License"></a>
... ...
@@ -26,8 +26,8 @@ href="http://www.catb.org/~esr/faqs/smart-questions.html">helpful</a>.</p>
26 26
 #
27 27
 <ul>
28 28
 <li><tt>tor-ops</tt> gets to the people who manage the directory
29
-authorities. Use this if you run a Tor server and have a question or
30
-problem with your server.</li>
29
+authorities. Use this if you run a Tor relay and have a question or
30
+problem with your relay.</li>
31 31
 <li><tt>tor-webmaster</tt> can fix typos on the website, change wrong
32 32
 statements or directions on the website, and add new sections and
33 33
 paragraphs that you send us. You might want to make a draft of your new
... ...
@@ -16,8 +16,8 @@ Mac OS X</a></li>
16 16
 Linux/BSD/Unix</a></li>
17 17
 <li><a href="<page docs/tor-switchproxy>">Installing
18 18
 SwitchProxy for Tor</a></li>
19
-<li><a href="<page docs/tor-doc-server>">Configuring a
20
-Tor server</a></li>
19
+<li><a href="<page docs/tor-doc-relay>">Configuring a
20
+Tor relay</a></li>
21 21
 <li><a href="<page docs/tor-hidden-service>">Configuring
22 22
 a Tor hidden service</a></li>
23 23
 </ul>
... ...
@@ -32,7 +32,7 @@ to Torifying various applications</a> is also popular. (While we
32 32
 monitor the Wiki page to help ensure accuracy, the Tor developers are
33 33
 not responsible for the content.)</li>
34 34
 <li>The <a href="<page faq-abuse>">Abuse FAQ</a> is a collection of
35
-common questions and issues discussed when running a Tor server.</li>
35
+common questions and issues discussed when running a Tor relay.</li>
36 36
 <li>The <a href="<page eff/tor-legal-faq>">Tor Legal FAQ</a> is written by
37 37
 EFF lawyers. It aims to give you an overview of some of the legal issues
38 38
 that arise from the Tor project in the US.</li>
... ...
@@ -44,7 +44,7 @@ the development version of Tor</a>.</li>
44 44
 <li>The <a href="http://wiki.noreply.org/noreply/TheOnionRouter">Tor
45 45
 wiki</a> provides a plethora of helpful contributions from Tor
46 46
 users. Check it out!</li>
47
-<li>The Tor IRC channel (for users, server operators, and developers)
47
+<li>The Tor IRC channel (for users, relay operators, and developers)
48 48
 is <a href="irc://irc.oftc.net/tor">#tor on irc.oftc.net</a>.</li>
49 49
 <li>We have a <a
50 50
 href="http://bugs.torproject.org/tor">bugtracker</a>.
... ...
@@ -151,7 +151,7 @@ href="http://wiki.noreply.org/noreply/TheOnionRouter/SupportPrograms">A
151 151
 list of supporting programs you might want to use in association with
152 152
 Tor</a>.</li>
153 153
 <li><a href="http://www.noreply.org/tor-running-routers/">Weasel's graph
154
-of the number of Tor servers over time</a>.</li>
154
+of the number of Tor relays over time</a>.</li>
155 155
 <li><a href="http://check.torproject.org/">The
156 156
 Tor detector</a> or <a href="http://torcheck.xenobite.eu/">the other
157 157
 Tor detector</a> try to guess if you're using Tor or not.</li>
... ...
@@ -1,13 +1,13 @@
1 1
 ## translation metadata
2 2
 # Revision: $Revision$
3 3
 
4
-#include "head.wmi" TITLE="Abuse FAQ for Server Operators"
4
+#include "head.wmi" TITLE="Abuse FAQ for Relay Operators"
5 5
 
6 6
 <div class="main-column">
7 7
 
8 8
 <!-- PUT CONTENT AFTER THIS TAG -->
9 9
 
10
-<h2>Abuse FAQ for Tor Server Operators</h2>
10
+<h2>Abuse FAQ for Tor Relay Operators</h2>
11 11
 <hr />
12 12
 
13 13
 <a id="WhatAboutCriminals"></a>
... ...
@@ -68,11 +68,11 @@ DDoS attack can do it just fine without Tor. </p>
68 68
 
69 69
 <p>First of all, the default Tor exit policy rejects all outgoing
70 70
 port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to
71
-work by default. It's possible that some server operators will enable
71
+work by default. It's possible that some relay operators will enable
72 72
 port 25 on their particular exit node, in which case that computer will
73 73
 allow outgoing mails; but that individual could just set up an open mail
74 74
 relay too, independent of Tor. In short, Tor isn't useful for spamming,
75
-because nearly all Tor servers refuse to deliver the mail. </p>
75
+because nearly all Tor relays refuse to deliver the mail. </p>
76 76
 
77 77
 <p>Of course, it's not all about delivering the mail. Spammers can use
78 78
 Tor to connect to open HTTP proxies (and from there to SMTP servers); to
... ...
@@ -91,13 +91,13 @@ it only transports correctly-formed TCP connections.
91 91
 <a id="ExitPolicies"></a>
92 92
 <h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3>
93 93
 
94
-<p>Each Tor server has an exit policy that specifies what sort of
95
-outbound connections are allowed or refused from that server. The exit
94
+<p>Each Tor relay has an exit policy that specifies what sort of
95
+outbound connections are allowed or refused from that relay. The exit
96 96
 policies are propagated to the client via the directory, so clients
97 97
 will automatically avoid picking exit nodes that would refuse to exit
98 98
 to their intended destination. </p>
99 99
 
100
-<p>This way each server can decide the services, hosts, and networks
100
+<p>This way each relay can decide the services, hosts, and networks
101 101
 he wants to allow connections to, based on abuse potential and his own
102 102
 situation. </p>
103 103
 
... ...
@@ -118,16 +118,16 @@ well</a>, we feel that we're doing pretty well at striking a balance
118 118
 currently. </p>
119 119
 
120 120
 <a id="TypicalAbuses"></a>
121
-<h3><a class="anchor" href="#TypicalAbuses">So what should I expect if I run a server?</a></h3>
121
+<h3><a class="anchor" href="#TypicalAbuses">So what should I expect if I run a relay?</a></h3>
122 122
 
123
-<p>If you run a Tor server that allows exit connections (such as the
123
+<p>If you run a Tor relay that allows exit connections (such as the
124 124
 default exit policy), it's probably safe to say that you will eventually
125 125
 hear from somebody. Abuse
126 126
 complaints may come in a variety of forms. For example: </p>
127 127
 <ul>
128 128
 <li>Somebody connects to Hotmail, and sends a ransom note to a
129 129
 company. The
130
-FBI sends you a polite email, you explain that you run a Tor server,
130
+FBI sends you a polite email, you explain that you run a Tor relay,
131 131
 and they say "oh well" and leave you alone. [Port 80]</li>
132 132
 <li>Somebody tries to get you shut down by using Tor to connect to Google
133 133
 groups and post spam to Usenet, and then sends an angry mail to
... ...
@@ -142,15 +142,15 @@ Template</a>, which explains why your ISP can probably ignore
142 142
 the notice without any liability. [Arbitrary ports]</li>
143 143
 </ul>
144 144
 
145
-<p>You might also find that your Tor server's IP is blocked from accessing
145
+<p>You might also find that your Tor relay's IP is blocked from accessing
146 146
 some Internet sites/services. This might happen regardless of your exit
147 147
 policy, because some groups don't seem to know or care that Tor has
148 148
 exit policies. (If you have a spare IP not used for other activities,
149
-you might consider running your Tor server on it.) For example, </p>
149
+you might consider running your Tor relay on it.) For example, </p>
150 150
 
151 151
 <ul>
152 152
 <li>Because of a few cases of anonymous jerks messing with its web
153
-pages, Wikipedia is currently blocking many Tor server IPs from writing
153
+pages, Wikipedia is currently blocking many Tor relay IPs from writing
154 154
 (reading still works). We're talking to Wikipedia about how they might
155 155
 control abuse while still providing access to anonymous contributors,
156 156
 who often have hot news or inside info on a topic but don't want to risk
... ...
@@ -158,10 +158,10 @@ revealing their identities when publishing it (or don't want to reveal
158 158
 to local observers that they're accessing Wikipedia). Slashdot is also
159 159
 in the same boat.</li>
160 160
 
161
-<li>SORBS is putting some Tor server IPs on their email
161
+<li>SORBS is putting some Tor relay IPs on their email
162 162
 blacklist as well. They do this because they passively detect whether your
163
-server connects to certain IRC networks, and they conclude from this that
164
-your server is capable of spamming. We tried to work with
163
+relay connects to certain IRC networks, and they conclude from this that
164
+your relay is capable of spamming. We tried to work with
165 165
 them to teach them that not all software works this way,
166 166
 but we have given up. We recommend you avoid them, and <a
167 167
 href="http://paulgraham.com/spamhausblacklist.html">teach your friends
... ...
@@ -278,8 +278,8 @@ an impolite one.)</p>
278 278
 services that aggregate many users behind a few IP addresses. Tor is
279 279
 not so different from AOL in this respect.</p>
280 280
 
281
-<p>Lastly, please remember that Tor servers have <a
282
-href="#ExitPolicies">individual exit policies</a>. Many Tor servers do
281
+<p>Lastly, please remember that Tor relays have <a
282
+href="#ExitPolicies">individual exit policies</a>. Many Tor relays do
283 283
 not allow exiting connections at all. Many of those that do allow some
284 284
 exit connections might already disallow connections to
285 285
 your service. When you go about banning nodes, you should parse the
... ...
@@ -291,7 +291,7 @@ the overall list of nodes in the network). </p>
291 291
 <a href="<svnsandbox>contrib/exitlist">Python script to parse the Tor
292 292
 directory</a>. (Note that this script won't give you a perfect list
293 293
 of IP addresses that might connect to you using Tor, since some Tor
294
-servers might exit from other addresses than the one they publish.)
294
+relays might exit from other addresses than the one they publish.)
295 295
 </p>
296 296
 
297 297
 <a id="TracingUsers"></a>
... ...
@@ -121,7 +121,7 @@ is similar to using a twisty, hard-to-follow route in order to throw off
121 121
 somebody who is tailing you&mdash;and then periodically erasing your
122 122
 footprints.  Instead of taking a direct route from source to
123 123
 destination, data packets on the Tor network take a random pathway
124
-through several servers that cover your tracks so no observer at any
124
+through several relays that cover your tracks so no observer at any
125 125
 single point can tell where the data came from or where it's going.
126 126
 </p>
127 127
 
... ...
@@ -130,9 +130,9 @@ single point can tell where the data came from or where it's going.
130 130
 <p>
131 131
 To create a private network pathway with Tor, the user's software or
132 132
 client incrementally builds a circuit of encrypted connections through
133
-servers on the network.  The circuit is extended one hop at a time, and
134
-each server along the way knows only which server gave it data and which
135
-server it is giving data to.  No individual server ever knows the
133
+relays on the network.  The circuit is extended one hop at a time, and
134
+each relay along the way knows only which relay gave it data and which
135
+relay it is giving data to.  No individual relay ever knows the
136 136
 complete path that a data packet has taken.  The client negotiates a
137 137
 separate set of encryption keys for each hop along the circuit to ensure
138 138
 that each hop can't trace these connections as they pass through.
... ...
@@ -143,8 +143,8 @@ that each hop can't trace these connections as they pass through.
143 143
 <p>
144 144
 Once a circuit has been established, many kinds of data can be exchanged
145 145
 and several different sorts of software applications can be deployed
146
-over the Tor network.  Because each server sees no more than one hop in
147
-the circuit, neither an eavesdropper nor a compromised server can use
146
+over the Tor network.  Because each relay sees no more than one hop in
147
+the circuit, neither an eavesdropper nor a compromised relay can use
148 148
 traffic analysis to link the connection's source and destination.  Tor
149 149
 only works for TCP streams and can be used by any application with SOCKS
150 150
 support.
... ...
@@ -206,9 +206,9 @@ As Tor's usability increases, it will attract more users, which will
206 206
 increase the possible sources and destinations of each communication,
207 207
 thus increasing security for everyone.
208 208
 We're making progress, but we need your help.  Please consider
209
-<a href="<page docs/tor-doc-server>">running a server</a>
209
+<a href="<page docs/tor-doc-relay>">running a relay</a>
210 210
 or <a href="<page volunteer>">volunteering</a> as a
211
-<a href="<page developers>">developer</a>.
211
+<a href="<page documentation>#Developers">developer</a>.
212 212
 </p>
213 213
 
214 214
 <p>
... ...
@@ -216,7 +216,7 @@ Ongoing trends in law, policy, and technology threaten anonymity as never
216 216
 before, undermining our ability to speak and read freely online. These
217 217
 trends also undermine national security and critical infrastructure by
218 218
 making communication among individuals, organizations, corporations,
219
-and governments more vulnerable to analysis. Each new user and server
219
+and governments more vulnerable to analysis. Each new user and relay
220 220
 provides additional diversity, enhancing Tor's ability to put control
221 221
 over your security and privacy back into your hands.
222 222
 </p>
... ...
@@ -85,7 +85,7 @@ Coders:</a></h3>
85 85
 <dt>Benedikt Boss</dt><dd>Worked on <a
86 86
 href="https://www.torproject.org/svn/topf/README">TOPF</a>, a fuzzer for Tor;
87 87
 mentored by Roger.</dd>
88
-<dt>Christian King</dt><dd> Worked on making Tor servers stable on
88
+<dt>Christian King</dt><dd> Worked on making Tor relays stable on
89 89
 Windows; mentored by Nick.</dd>
90 90
 <dt>Karsten Loesing</dt><dd> Worked on distributing and securing
91 91
 the publishing and fetching of hidden service descriptors; mentored
... ...
@@ -133,7 +133,7 @@ question about Tor.</dd>
133 133
 <dt>Geoff Goodell</dt><dd>Runs one of the directory authorities, used to
134 134
 run the Blossom project which uses Tor as its overlay network, and runs
135 135
 the <a href="http://lefkada.eecs.harvard.edu/cgi-bin/exit.py">exit.py</a>
136
-Tor server list.</dd>
136
+Tor relay list.</dd>
137 137
 <dt>Fabian Keil</dt><dd>One of the core Privoxy developers, and also a
138 138
 Tor fan. He's the reason Tor and Privoxy still work well together.</dd>
139 139
 <dt>Justin Hipple</dt><dd>The other developer for Vidalia.</dd>
... ...
@@ -160,7 +160,7 @@ href="http://p56soo2ibjkx23xo.onion/">TorDNSEL code</a>.</dd>
160 160
 <a href="http://advocacy.globalvoicesonline.org/tools/guide/">tutorials</a>
161 161
 for how, when, and whether to use Tor. He also teaches activists around
162 162
 the world about Tor and related tools.</dd>
163
-<dt>All our server operators, people who write <a
163
+<dt>All our relay operators, people who write <a
164 164
 href="http://freehaven.net/anonbib/">research papers</a> about Tor,
165 165
 people who teach others about Tor, etc.</dt>
166 166
 </dl>
... ...
@@ -14,7 +14,7 @@ Tor project. There are three primary ways of contributing:</p>
14 14
 <ul>
15 15
 <li>A large enough <a href="<page donate>">donation</a> to the Tor
16 16
 Project.</li>
17
-<li>Operate a fast <a href="<page docs/tor-doc-server>">Tor server</a>
17
+<li>Operate a fast <a href="<page docs/tor-doc-relay>">Tor relay</a>
18 18
 that's been running for the past two months: you are eligible if you
19 19
 allow exits to port 80 and you average 100 KB/s traffic, or if you're
20 20
 not an exit but you average 500 KB/s traffic.</li>
... ...
@@ -8,9 +8,9 @@
8 8
 <!-- PUT CONTENT AFTER THIS TAG -->
9 9
 <h2>Three things everyone can do now:</h2>
10 10
 <ol>
11
-<li>Please consider <a href="<page docs/tor-doc-server>">running
12
-a server</a> to help the Tor network grow.</li>
13
-<li>Tell your friends! Get them to run servers. Get them to run hidden
11
+<li>Please consider <a href="<page docs/tor-doc-relay>">running
12
+a relay</a> to help the Tor network grow.</li>
13
+<li>Tell your friends! Get them to run relays. Get them to run hidden
14 14
 services. Get them to tell their friends.</li>
15 15
 <li>We are looking for funding and sponsors. If you like Tor's goals, please
16 16
   <a href="<page donate>">take a moment to donate to support further
... ...
@@ -42,7 +42,7 @@ unifying their interfaces, and might involve sharing code between them
42 42
 or discarding one entirely.</li>
43 43
 </ul>
44 44
 </li>
45
-<li>People running servers tell us they want to have one BandwidthRate
45
+<li>People running relays tell us they want to have one BandwidthRate
46 46
 during some part of the day, and a different BandwidthRate at other
47 47
 parts of the day. Rather than coding this inside Tor, we should have a
48 48
 little script that speaks via the <a href="<page gui/index>">Tor
... ...
@@ -59,7 +59,7 @@ client that fetches this directory securely (via Tor and checking its
59 59
 signature), intercepts <tt>.country.blossom</tt> hostnames, and does
60 60
 the right thing.</li>
61 61
 <li>Speaking of geolocation data, somebody should draw a map of the Earth
62
-with a pin-point for each Tor server. Bonus points if it updates as the
62
+with a pin-point for each Tor relay. Bonus points if it updates as the
63 63
 network grows and changes. Unfortunately, the easy ways to do this involve
64 64
 sending all the data to Google and having them draw the map for you. How
65 65
 much does this impact privacy, and do we have any other good options?</li>
... ...
@@ -97,37 +97,37 @@ Farsi translations, for the many Tor users in censored areas.</li>
97 97
 <a id="Coding"></a>
98 98
 <h2><a class="anchor" href="#Coding">Coding and Design</a></h2>
99 99
 <ol>
100
-<li>Tor servers don't work well on Windows XP. On
100
+<li>Tor relays don't work well on Windows XP. On
101 101
 Windows, Tor uses the standard <tt>select()</tt> system
102 102
 call, which uses space in the non-page pool. This means
103
-that a medium sized Tor server will empty the non-page pool, <a
103
+that a medium sized Tor relay will empty the non-page pool, <a
104 104
 href="http://wiki.noreply.org/noreply/TheOnionRouter/WindowsBufferProblems">causing
105 105
 havoc and system crashes</a>. We should probably be using overlapped IO
106 106
 instead. One solution would be to teach <a
107 107
 href="http://www.monkey.org/~provos/libevent/">libevent</a> how to use
108 108
 overlapped IO rather than select() on Windows, and then adapt Tor to
109 109
 the new libevent interface.</li>
110
-<li>Because Tor servers need to store-and-forward each cell they handle,
111
-high-bandwidth Tor servers end up using dozens of megabytes of memory
110
+<li>Because Tor relays need to store-and-forward each cell they handle,
111
+high-bandwidth Tor relays end up using dozens of megabytes of memory
112 112
 just for buffers. We need better heuristics for when to shrink/expand
113 113
 buffers. Maybe this should be modelled after the Linux kernel buffer
114 114
 design, where we have many smaller buffers that link to each other,
115 115
 rather than monolithic buffers?</li>
116 116
 <li>We need an official central site to answer "Is this IP address a Tor
117
-exit server?" questions. This should provide several interfaces, including
117
+exit relay?" questions. This should provide several interfaces, including
118 118
 a web interface and a DNSBL-style interface. It can provide the most
119 119
 up-to-date answers by keeping a local mirror of the Tor directory
120
-information. The tricky point is that being an exit server is not a
120
+information. The tricky point is that being an exit relay is not a
121 121
 boolean: so the question is actually "Is this IP address a Tor exit
122
-server that can exit to my IP address:port?" The DNSBL interface
122
+relay that can exit to my IP address:port?" The DNSBL interface
123 123
 will probably receive hundreds of queries a minute, so some smart
124 124
 algorithms are in order. Bonus points if it does active testing through
125 125
 each exit node to find out what IP address it's really exiting from.
126 126
 <a href="<svnsandbox>doc/contrib/torbl-design.txt">Read more here</a>.</li>
127
-<li>Sometimes Tor servers crash, or the computers they're on fall off the
127
+<li>Sometimes Tor relays crash, or the computers they're on fall off the
128 128
 network, or other accidents happen. Some Tor operators have expressed
129 129
 an interest in signing up to a "notifying" service that periodically
130
-checks whether their Tor server is healthy and sends them a reminder mail
130
+checks whether their Tor relay is healthy and sends them a reminder mail
131 131
 when it's not. Anybody want to write a few cgi scripts, a few web pages,
132 132
 and set up some sort of wget hack and/or something more complex like <a
133 133
 href="http://nagios.org/">Nagios</a> to do the monitoring? The first
... ...
@@ -269,7 +269,7 @@ href="http://swiki.cc.gatech.edu:8080/ugResearch/uploads/7/ImprovingTor.pdf">pos
269 269
 paper</a> on how to discard particularly slow choices without hurting
270 270
 anonymity "too much". This line of reasoning needs more work and more
271 271
 thinking, but it looks very promising.</li>
272
-<li>Tor doesn't work very well when servers have asymmetric bandwidth
272
+<li>Tor doesn't work very well when relays have asymmetric bandwidth
273 273
 (e.g. cable or DSL). Because Tor has separate TCP connections between
274 274
 each hop, if the incoming bytes are arriving just fine and the outgoing
275 275
 bytes are all getting dropped on the floor, the TCP push-back mechanisms
... ...
@@ -307,11 +307,11 @@ resistance section of anonbib</a>.</li>
307 307
 <li>Tor circuits are built one hop at a time, so in theory we have the
308 308
 ability to make some streams exit from the second hop, some from the
309 309
 third, and so on. This seems nice because it breaks up the set of exiting
310
-streams that a given server can see. But if we want each stream to be safe,
310
+streams that a given relay can see. But if we want each stream to be safe,
311 311
 the "shortest" path should be at least 3 hops long by our current logic, so
312 312
 the rest will be even longer. We need to examine this performance / security
313 313
 tradeoff.</li>
314
-<li>It's not that hard to DoS Tor servers or dirservers. Are client
314
+<li>It's not that hard to DoS Tor relays or directory authorities. Are client
315 315
 puzzles the right answer? What other practical approaches are there? Bonus
316 316
 if they're backward-compatible with the current Tor protocol.</li>
317 317
 </ol>
... ...
@@ -47,7 +47,7 @@ security authorities are going to think you are a terrorist? </p>
47 47
 
48 48
 <p>Tor, in combination with Blossom, allows you to see the World Wide
49 49
 Web from a specific perspective.  Want to see Google come up in Polish?
50
-If you ask to leave the Tor cloud at a Polish Tor server, you'll see what
50
+If you ask to leave the Tor cloud at a Polish Tor relay, you'll see what
51 51
 Poland sees online.  Want to check the differential pricing offered by
52 52
 an online retailer or wholesaler to folks in another country, compared
53 53
 to the pricing offered to you or your company?  Tor and Blossom can
54 54