Roger Dingledine commited on 2007-10-21 12:04:33
Zeige 14 geänderte Dateien mit 106 Einfügungen und 103 Löschungen.
... | ... |
@@ -14,7 +14,7 @@ |
14 | 14 |
<b>Note that these are the installation instructions for running a Tor client on |
15 | 15 |
Mac OS X. If you want to relay traffic for others to help the network |
16 | 16 |
grow (please do), read the <a |
17 |
- href="<page docs/tor-doc-server>">Configuring a server</a> guide.</b> |
|
17 |
+ href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b> |
|
18 | 18 |
</p> |
19 | 19 |
|
20 | 20 |
<hr /> |
... | ... |
@@ -174,25 +174,26 @@ FAQ entry</a> for hints.</p> |
174 | 174 |
|
175 | 175 |
<hr /> |
176 | 176 |
<a id="server"></a> |
177 |
-<h2><a class="anchor" href="#server">Step Four: Configure it as a server</a></h2> |
|
177 |
+<a id="relay"></a> |
|
178 |
+<h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2> |
|
178 | 179 |
<br /> |
179 | 180 |
|
180 | 181 |
<p>The Tor network relies on volunteers to donate bandwidth. The more |
181 |
-people who run servers, the faster the Tor network will be. If you have |
|
182 |
+people who run relays, the faster the Tor network will be. If you have |
|
182 | 183 |
at least 20 kilobytes/s each way, please help out Tor by configuring your |
183 |
-Tor to be a server too. We have many features that make Tor servers easy |
|
184 |
+Tor to be a relay too. We have many features that make Tor relays easy |
|
184 | 185 |
and convenient, including rate limiting for bandwidth, exit policies so |
185 | 186 |
you can limit your exposure to abuse complaints, and support for dynamic |
186 | 187 |
IP addresses.</p> |
187 | 188 |
|
188 |
-<p>Having servers in many different places on the Internet is what |
|
189 |
+<p>Having relays in many different places on the Internet is what |
|
189 | 190 |
makes Tor users secure. <a |
190 | 191 |
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
191 | 192 |
may also get stronger anonymity yourself</a>, |
192 | 193 |
since remote sites can't know whether connections originated at your |
193 | 194 |
computer or were relayed from others.</p> |
194 | 195 |
|
195 |
-<p>Read more at our <a href="<page docs/tor-doc-server>">Configuring a server</a> |
|
196 |
+<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a> |
|
196 | 197 |
guide.</p> |
197 | 198 |
|
198 | 199 |
<hr /> |
... | ... |
@@ -14,7 +14,7 @@ |
14 | 14 |
<b>Note that these are the installation instructions for running a Tor |
15 | 15 |
client. If you want to relay traffic for others to help the network grow |
16 | 16 |
(please do), read the <a |
17 |
-href="<page docs/tor-doc-server>">Configuring a server</a> guide.</b> |
|
17 |
+href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b> |
|
18 | 18 |
</p> |
19 | 19 |
|
20 | 20 |
<hr /> |
... | ... |
@@ -171,25 +171,26 @@ FAQ entry</a> for hints.</p> |
171 | 171 |
|
172 | 172 |
<hr /> |
173 | 173 |
<a id="server"></a> |
174 |
-<h2><a class="anchor" href="#server">Step Five: Configure it as a server</a></h2> |
|
174 |
+<a id="relay"></a> |
|
175 |
+<h2><a class="anchor" href="#relay">Step Five: Configure it as a relay</a></h2> |
|
175 | 176 |
<br /> |
176 | 177 |
|
177 | 178 |
<p>The Tor network relies on volunteers to donate bandwidth. The more |
178 |
-people who run servers, the faster the Tor network will be. If you have |
|
179 |
+people who run relays, the faster the Tor network will be. If you have |
|
179 | 180 |
at least 20 kilobytes/s each way, please help out Tor by configuring your |
180 |
-Tor to be a server too. We have many features that make Tor servers easy |
|
181 |
+Tor to be a relay too. We have many features that make Tor relays easy |
|
181 | 182 |
and convenient, including rate limiting for bandwidth, exit policies so |
182 | 183 |
you can limit your exposure to abuse complaints, and support for dynamic |
183 | 184 |
IP addresses.</p> |
184 | 185 |
|
185 |
-<p>Having servers in many different places on the Internet is what |
|
186 |
+<p>Having relays in many different places on the Internet is what |
|
186 | 187 |
makes Tor users secure. <a |
187 | 188 |
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
188 | 189 |
may also get stronger anonymity yourself</a>, |
189 | 190 |
since remote sites can't know whether connections originated at your |
190 | 191 |
computer or were relayed from others.</p> |
191 | 192 |
|
192 |
-<p>Read more at our <a href="<page docs/tor-doc-server>">Configuring a server</a> |
|
193 |
+<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a> |
|
193 | 194 |
guide.</p> |
194 | 195 |
|
195 | 196 |
<hr /> |
... | ... |
@@ -14,7 +14,7 @@ |
14 | 14 |
<b>Note that these are the installation instructions for running a Tor |
15 | 15 |
client on MS Windows (98, 98SE, NT4, 2000, XP, Server). |
16 | 16 |
If you want to relay traffic for others to help the network grow (please |
17 |
-do), read the <a href="<page docs/tor-doc-server>">Configuring a server</a> |
|
17 |
+do), read the <a href="<page docs/tor-doc-relay>">Configuring a relay</a> |
|
18 | 18 |
guide.</b> |
19 | 19 |
</p> |
20 | 20 |
|
... | ... |
@@ -157,25 +157,26 @@ FAQ entry</a> for hints.</p> |
157 | 157 |
|
158 | 158 |
<hr /> |
159 | 159 |
<a id="server"></a> |
160 |
-<h2><a class="anchor" href="#server">Step Four: Configure it as a server</a></h2> |
|
160 |
+<a id="relay"></a> |
|
161 |
+<h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2> |
|
161 | 162 |
<br /> |
162 | 163 |
|
163 | 164 |
<p>The Tor network relies on volunteers to donate bandwidth. The more |
164 |
-people who run servers, the faster the Tor network will be. If you have |
|
165 |
+people who run relays, the faster the Tor network will be. If you have |
|
165 | 166 |
at least 20 kilobytes/s each way, please help out Tor by configuring your |
166 |
-Tor to be a server too. We have many features that make Tor servers easy |
|
167 |
+Tor to be a relay too. We have many features that make Tor relays easy |
|
167 | 168 |
and convenient, including rate limiting for bandwidth, exit policies so |
168 | 169 |
you can limit your exposure to abuse complaints, and support for dynamic |
169 | 170 |
IP addresses.</p> |
170 | 171 |
|
171 |
-<p>Having servers in many different places on the Internet is what |
|
172 |
+<p>Having relays in many different places on the Internet is what |
|
172 | 173 |
makes Tor users secure. <a |
173 | 174 |
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
174 | 175 |
may also get stronger anonymity yourself</a>, |
175 | 176 |
since remote sites can't know whether connections originated at your |
176 | 177 |
computer or were relayed from others.</p> |
177 | 178 |
|
178 |
-<p>Read more at our <a href="<page docs/tor-doc-server>">Configuring a server</a> |
|
179 |
+<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a> |
|
179 | 180 |
guide.</p> |
180 | 181 |
|
181 | 182 |
<hr /> |
... | ... |
@@ -10,7 +10,7 @@ |
10 | 10 |
<h1>Configuring Hidden Services for <a href="<page index>">Tor</a></h1> |
11 | 11 |
<hr /> |
12 | 12 |
|
13 |
-<p>Tor allows clients and servers to offer hidden services. That is, |
|
13 |
+<p>Tor allows clients and relays to offer hidden services. That is, |
|
14 | 14 |
you can offer a web server, SSH server, etc., without revealing your |
15 | 15 |
IP address to its users. In fact, because you don't use any public address, |
16 | 16 |
you can run a hidden service from behind your firewall. |
... | ... |
@@ -1,25 +1,25 @@ |
1 | 1 |
## translation metadata |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
|
4 |
-#include "head.wmi" TITLE="Response template for Tor server operator to ISP" |
|
4 |
+#include "head.wmi" TITLE="Response template for Tor relay operator to ISP" |
|
5 | 5 |
|
6 | 6 |
<div class="main-column"> |
7 | 7 |
|
8 | 8 |
<!-- PUT CONTENT AFTER THIS TAG --> |
9 | 9 |
|
10 |
-<h2>Response template for Tor node maintainer to ISP</h2> |
|
10 |
+<h2>Response template for Tor relay maintainer to ISP</h2> |
|
11 | 11 |
<hr /> |
12 | 12 |
<p>Written by the Electronic Frontier |
13 | 13 |
Foundation (<a href="http://www.eff.org/">EFF</a>). Last updated 19 Feb 2005.</p> |
14 | 14 |
|
15 |
-<p>Note to Tor server operators: In this litigous era, anyone |
|
15 |
+<p>Note to Tor relay operators: In this litigous era, anyone |
|
16 | 16 |
providing routing services may face copyright complaints under the |
17 | 17 |
Digital Millennium Copyright Act. Thankfully, the DMCA safe harbors |
18 | 18 |
provide immunity from many of them -- both to you and to your |
19 | 19 |
upstream provider. If your Internet host forwards a DMCA complaint |
20 | 20 |
to you, here's a template you can use to write a response. You can |
21 | 21 |
tailor this to your own circumstances: if you think your host would |
22 |
-be disturbed to hear you're running a server on the network, you may |
|
22 |
+be disturbed to hear you're running a relay on the network, you may |
|
23 | 23 |
want to take that part out. Of course it's up to you to comply with |
24 | 24 |
your ISP's terms of service. If you're not comfortable including so |
25 | 25 |
much legal explanation, feel free to invite the ISP to contact EFF |
... | ... |
@@ -1,13 +1,13 @@ |
1 | 1 |
## translation metadata |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
|
4 |
-#include "head.wmi" TITLE="Legal FAQ for Tor Server Operators" |
|
4 |
+#include "head.wmi" TITLE="Legal FAQ for Tor Relay Operators" |
|
5 | 5 |
|
6 | 6 |
<div class="main-column"> |
7 | 7 |
|
8 | 8 |
<!-- PUT CONTENT AFTER THIS TAG --> |
9 | 9 |
|
10 |
-<h2>Legal FAQ for Tor Server Operators</h2> |
|
10 |
+<h2>Legal FAQ for Tor Relay Operators</h2> |
|
11 | 11 |
<hr /> |
12 | 12 |
<p>FAQ written by the Electronic Frontier |
13 | 13 |
Foundation (<a href="http://www.eff.org/">EFF</a>). Last updated 25 Apr 2005.</p> |
... | ... |
@@ -46,34 +46,34 @@ infringement?</a></h3> |
46 | 46 |
|
47 | 47 |
<p><strong>No.</strong> Tor has been developed to be a tool for free |
48 | 48 |
speech, privacy, and human rights. It is not a tool designed or intended |
49 |
-to be used to break the law, either by Tor users or Tor server |
|
49 |
+to be used to break the law, either by Tor users or Tor relay |
|
50 | 50 |
operators.</p> |
51 | 51 |
|
52 | 52 |
<p>We further recommend that you not keep any potentially illegal files |
53 | 53 |
on the same machine you use for Tor, nor use that machine for any illegal |
54 |
-purpose. Although no Tor server in the US has ever been seized, nor any server |
|
54 |
+purpose. Although no Tor relay in the US has ever been seized, nor any relay |
|
55 | 55 |
operator sued, the future possibility cannot be ruled out. If that |
56 | 56 |
happens, you will want your machine to be clean.</p> |
57 | 57 |
|
58 | 58 |
<a id="Promise"></a> |
59 | 59 |
<h3><a class="anchor" href="#Promise">Can EFF promise that I won't get |
60 |
-in trouble for running a Tor server?</a></h3> |
|
60 |
+in trouble for running a Tor relay?</a></h3> |
|
61 | 61 |
|
62 | 62 |
<p><strong>No.</strong> All new technologies create legal uncertainties, |
63 | 63 |
and Tor is no exception to the rule. Presently, no court has ever considered any |
64 | 64 |
case involving the Tor technology, and we therefore cannot guarantee |
65 | 65 |
that you will never face any legal liability as a result of running a |
66 |
-Tor server. However, EFF believes so strongly that those running Tor |
|
67 |
-servers shouldn't be liable for traffic that passes through the server |
|
68 |
-that we're running our own Tor server. |
|
66 |
+Tor relay. However, EFF believes so strongly that those running Tor |
|
67 |
+relays shouldn't be liable for traffic that passes through the relay |
|
68 |
+that we're running our own Tor relay. |
|
69 | 69 |
</p> |
70 | 70 |
|
71 | 71 |
<a id="Represent"></a> |
72 | 72 |
<h3><a class="anchor" href="#Represent">Will EFF represent me if I get |
73 |
-in trouble for running a Tor server?</a></h3> |
|
73 |
+in trouble for running a Tor relay?</a></h3> |
|
74 | 74 |
|
75 | 75 |
<p><strong>Maybe.</strong> While EFF cannot promise legal representation |
76 |
-of all Tor server operators, it will assist server operators in |
|
76 |
+of all Tor relay operators, it will assist relay operators in |
|
77 | 77 |
assessing the situation and will try to locate qualified legal counsel |
78 | 78 |
when necessary. Inquiries to EFF for the purpose of securing legal |
79 | 79 |
representation or referrals should be directed to staff attorney Kevin |
... | ... |
@@ -81,7 +81,7 @@ Bankston (bankston at eff.org or US +1 (415) 436-9333 x 126). Such |
81 | 81 |
inquiries will be kept |
82 | 82 |
confidential subject to the limits of the attorney/client privilege. |
83 | 83 |
Note that although EFF cannot practice law outside of the U.S., it will |
84 |
-still try to assist non-U.S. server operators in finding local |
|
84 |
+still try to assist non-U.S. relay operators in finding local |
|
85 | 85 |
representation.</p> |
86 | 86 |
|
87 | 87 |
<a id="DevelopersAreNotLawyers"></a> |
... | ... |
@@ -92,7 +92,7 @@ them if I suspect Tor is being used for illegal purposes?</a></h3> |
92 | 92 |
<p><strong>No.</strong> Tor's core developers, Roger Dingledine |
93 | 93 |
and Nick Mathewson, are available to answer technical questions, but |
94 | 94 |
they are not lawyers and cannot give legal advice. Nor do they have any |
95 |
-ability to prevent illegal activity that may occur through Tor servers. |
|
95 |
+ability to prevent illegal activity that may occur through Tor relays. |
|
96 | 96 |
Furthermore, your communications with Tor's core developers are |
97 | 97 |
not protected by any legal privilege, so law enforcement or civil |
98 | 98 |
litigants could subpoena and obtain any information you give to |
... | ... |
@@ -100,15 +100,15 @@ them.</p> |
100 | 100 |
|
101 | 101 |
<a id="RequestForLogs"></a> |
102 | 102 |
<h3><a class="anchor" href="#RequestForLogs">If I receive a request from |
103 |
-law enforcement or anyone else for my Tor server's logs, what should |
|
103 |
+law enforcement or anyone else for my Tor relay's logs, what should |
|
104 | 104 |
I do?</a></h3> |
105 | 105 |
|
106 | 106 |
<p><strong>Educate them about Tor.</strong> In most instances, properly |
107 |
-configured Tor servers will have no useful data for inquiring parties, |
|
107 |
+configured Tor relays will have no useful data for inquiring parties, |
|
108 | 108 |
and you should feel free to educate them on this point. To the extent |
109 | 109 |
you do maintain logs, however, you should not disclose them to any third |
110 | 110 |
party without first consulting a lawyer. In the U.S., such a disclosure |
111 |
-may violate the Electronic Communications Privacy Act, and server |
|
111 |
+may violate the Electronic Communications Privacy Act, and relay |
|
112 | 112 |
operators outside of the U.S. may be subject to similar data protection |
113 | 113 |
laws.</p> |
114 | 114 |
|
... | ... |
@@ -142,7 +142,7 @@ will help us recognize trends and issues that the lawyers might want to |
142 | 142 |
focus on. Chilling Effects encourages submissions from people outside |
143 | 143 |
the United States too.</p> |
144 | 144 |
|
145 |
-<p>EFF is actively seeking Tor server operators willing to stand up |
|
145 |
+<p>EFF is actively seeking Tor relay operators willing to stand up |
|
146 | 146 |
and help set a clear legal precedent establishing that merely running |
147 | 147 |
a node does not create copyright liability for either node operators |
148 | 148 |
or their bandwidth providers. If you want to be the EFF's test case, |
... | ... |
@@ -151,12 +151,12 @@ more here</a>.</p> |
151 | 151 |
|
152 | 152 |
<a id="ExitSnooping"></a> |
153 | 153 |
<h3><a class="anchor" href="#ExitSnooping">Should I snoop on the plaintext |
154 |
-that exits through my Tor server?</a></h3> |
|
154 |
+that exits through my Tor relay?</a></h3> |
|
155 | 155 |
|
156 | 156 |
<p><strong>No.</strong> You may be technically capable of modifying |
157 | 157 |
the Tor source code or installing additional software to monitor |
158 | 158 |
or log plaintext that exits your node. However, |
159 |
-Tor server operators in the U.S. can create legal and possibly even |
|
159 |
+Tor relay operators in the U.S. can create legal and possibly even |
|
160 | 160 |
criminal liability for themselves under state or federal wiretap laws if |
161 | 161 |
they affirmatively monitor, log, or disclose Tor users' |
162 | 162 |
communications, while non-U.S. operators may be subject to similar laws. |
... | ... |
@@ -165,16 +165,16 @@ first talking to a lawyer.</p> |
165 | 165 |
|
166 | 166 |
<a id="DirectoryWarranty"></a> |
167 | 167 |
<h3><a class="anchor" href="#DirectoryWarranty">Do Tor's core developers |
168 |
-make any promises about the trustworthiness or reliability of Tor servers |
|
168 |
+make any promises about the trustworthiness or reliability of Tor relays |
|
169 | 169 |
that are listed in their directory?</a></h3> |
170 | 170 |
|
171 | 171 |
<p><strong>No.</strong> Although the developers attempt to verify that |
172 |
-Tor servers listed in the directory the core developers maintain are |
|
172 |
+Tor relays listed in the directory the core developers maintain are |
|
173 | 173 |
stable and have adequate bandwidth, neither they nor EFF can guarantee |
174 | 174 |
the personal trustworthiness or reliability of the individuals who run |
175 |
-those servers. Tor's core developers further reserve the right to |
|
176 |
-refuse a Tor server operator's request to be listed in their |
|
177 |
-directory or to remove any server from their directory for any |
|
175 |
+those relays. Tor's core developers further reserve the right to |
|
176 |
+refuse a Tor relay operator's request to be listed in their |
|
177 |
+directory or to remove any relay from their directory for any |
|
178 | 178 |
reason.</p> |
179 | 179 |
|
180 | 180 |
<a id="License"></a> |
... | ... |
@@ -26,8 +26,8 @@ href="http://www.catb.org/~esr/faqs/smart-questions.html">helpful</a>.</p> |
26 | 26 |
# |
27 | 27 |
<ul> |
28 | 28 |
<li><tt>tor-ops</tt> gets to the people who manage the directory |
29 |
-authorities. Use this if you run a Tor server and have a question or |
|
30 |
-problem with your server.</li> |
|
29 |
+authorities. Use this if you run a Tor relay and have a question or |
|
30 |
+problem with your relay.</li> |
|
31 | 31 |
<li><tt>tor-webmaster</tt> can fix typos on the website, change wrong |
32 | 32 |
statements or directions on the website, and add new sections and |
33 | 33 |
paragraphs that you send us. You might want to make a draft of your new |
... | ... |
@@ -16,8 +16,8 @@ Mac OS X</a></li> |
16 | 16 |
Linux/BSD/Unix</a></li> |
17 | 17 |
<li><a href="<page docs/tor-switchproxy>">Installing |
18 | 18 |
SwitchProxy for Tor</a></li> |
19 |
-<li><a href="<page docs/tor-doc-server>">Configuring a |
|
20 |
-Tor server</a></li> |
|
19 |
+<li><a href="<page docs/tor-doc-relay>">Configuring a |
|
20 |
+Tor relay</a></li> |
|
21 | 21 |
<li><a href="<page docs/tor-hidden-service>">Configuring |
22 | 22 |
a Tor hidden service</a></li> |
23 | 23 |
</ul> |
... | ... |
@@ -32,7 +32,7 @@ to Torifying various applications</a> is also popular. (While we |
32 | 32 |
monitor the Wiki page to help ensure accuracy, the Tor developers are |
33 | 33 |
not responsible for the content.)</li> |
34 | 34 |
<li>The <a href="<page faq-abuse>">Abuse FAQ</a> is a collection of |
35 |
-common questions and issues discussed when running a Tor server.</li> |
|
35 |
+common questions and issues discussed when running a Tor relay.</li> |
|
36 | 36 |
<li>The <a href="<page eff/tor-legal-faq>">Tor Legal FAQ</a> is written by |
37 | 37 |
EFF lawyers. It aims to give you an overview of some of the legal issues |
38 | 38 |
that arise from the Tor project in the US.</li> |
... | ... |
@@ -44,7 +44,7 @@ the development version of Tor</a>.</li> |
44 | 44 |
<li>The <a href="http://wiki.noreply.org/noreply/TheOnionRouter">Tor |
45 | 45 |
wiki</a> provides a plethora of helpful contributions from Tor |
46 | 46 |
users. Check it out!</li> |
47 |
-<li>The Tor IRC channel (for users, server operators, and developers) |
|
47 |
+<li>The Tor IRC channel (for users, relay operators, and developers) |
|
48 | 48 |
is <a href="irc://irc.oftc.net/tor">#tor on irc.oftc.net</a>.</li> |
49 | 49 |
<li>We have a <a |
50 | 50 |
href="http://bugs.torproject.org/tor">bugtracker</a>. |
... | ... |
@@ -151,7 +151,7 @@ href="http://wiki.noreply.org/noreply/TheOnionRouter/SupportPrograms">A |
151 | 151 |
list of supporting programs you might want to use in association with |
152 | 152 |
Tor</a>.</li> |
153 | 153 |
<li><a href="http://www.noreply.org/tor-running-routers/">Weasel's graph |
154 |
-of the number of Tor servers over time</a>.</li> |
|
154 |
+of the number of Tor relays over time</a>.</li> |
|
155 | 155 |
<li><a href="http://check.torproject.org/">The |
156 | 156 |
Tor detector</a> or <a href="http://torcheck.xenobite.eu/">the other |
157 | 157 |
Tor detector</a> try to guess if you're using Tor or not.</li> |
... | ... |
@@ -1,13 +1,13 @@ |
1 | 1 |
## translation metadata |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
|
4 |
-#include "head.wmi" TITLE="Abuse FAQ for Server Operators" |
|
4 |
+#include "head.wmi" TITLE="Abuse FAQ for Relay Operators" |
|
5 | 5 |
|
6 | 6 |
<div class="main-column"> |
7 | 7 |
|
8 | 8 |
<!-- PUT CONTENT AFTER THIS TAG --> |
9 | 9 |
|
10 |
-<h2>Abuse FAQ for Tor Server Operators</h2> |
|
10 |
+<h2>Abuse FAQ for Tor Relay Operators</h2> |
|
11 | 11 |
<hr /> |
12 | 12 |
|
13 | 13 |
<a id="WhatAboutCriminals"></a> |
... | ... |
@@ -68,11 +68,11 @@ DDoS attack can do it just fine without Tor. </p> |
68 | 68 |
|
69 | 69 |
<p>First of all, the default Tor exit policy rejects all outgoing |
70 | 70 |
port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to |
71 |
-work by default. It's possible that some server operators will enable |
|
71 |
+work by default. It's possible that some relay operators will enable |
|
72 | 72 |
port 25 on their particular exit node, in which case that computer will |
73 | 73 |
allow outgoing mails; but that individual could just set up an open mail |
74 | 74 |
relay too, independent of Tor. In short, Tor isn't useful for spamming, |
75 |
-because nearly all Tor servers refuse to deliver the mail. </p> |
|
75 |
+because nearly all Tor relays refuse to deliver the mail. </p> |
|
76 | 76 |
|
77 | 77 |
<p>Of course, it's not all about delivering the mail. Spammers can use |
78 | 78 |
Tor to connect to open HTTP proxies (and from there to SMTP servers); to |
... | ... |
@@ -91,13 +91,13 @@ it only transports correctly-formed TCP connections. |
91 | 91 |
<a id="ExitPolicies"></a> |
92 | 92 |
<h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3> |
93 | 93 |
|
94 |
-<p>Each Tor server has an exit policy that specifies what sort of |
|
95 |
-outbound connections are allowed or refused from that server. The exit |
|
94 |
+<p>Each Tor relay has an exit policy that specifies what sort of |
|
95 |
+outbound connections are allowed or refused from that relay. The exit |
|
96 | 96 |
policies are propagated to the client via the directory, so clients |
97 | 97 |
will automatically avoid picking exit nodes that would refuse to exit |
98 | 98 |
to their intended destination. </p> |
99 | 99 |
|
100 |
-<p>This way each server can decide the services, hosts, and networks |
|
100 |
+<p>This way each relay can decide the services, hosts, and networks |
|
101 | 101 |
he wants to allow connections to, based on abuse potential and his own |
102 | 102 |
situation. </p> |
103 | 103 |
|
... | ... |
@@ -118,16 +118,16 @@ well</a>, we feel that we're doing pretty well at striking a balance |
118 | 118 |
currently. </p> |
119 | 119 |
|
120 | 120 |
<a id="TypicalAbuses"></a> |
121 |
-<h3><a class="anchor" href="#TypicalAbuses">So what should I expect if I run a server?</a></h3> |
|
121 |
+<h3><a class="anchor" href="#TypicalAbuses">So what should I expect if I run a relay?</a></h3> |
|
122 | 122 |
|
123 |
-<p>If you run a Tor server that allows exit connections (such as the |
|
123 |
+<p>If you run a Tor relay that allows exit connections (such as the |
|
124 | 124 |
default exit policy), it's probably safe to say that you will eventually |
125 | 125 |
hear from somebody. Abuse |
126 | 126 |
complaints may come in a variety of forms. For example: </p> |
127 | 127 |
<ul> |
128 | 128 |
<li>Somebody connects to Hotmail, and sends a ransom note to a |
129 | 129 |
company. The |
130 |
-FBI sends you a polite email, you explain that you run a Tor server, |
|
130 |
+FBI sends you a polite email, you explain that you run a Tor relay, |
|
131 | 131 |
and they say "oh well" and leave you alone. [Port 80]</li> |
132 | 132 |
<li>Somebody tries to get you shut down by using Tor to connect to Google |
133 | 133 |
groups and post spam to Usenet, and then sends an angry mail to |
... | ... |
@@ -142,15 +142,15 @@ Template</a>, which explains why your ISP can probably ignore |
142 | 142 |
the notice without any liability. [Arbitrary ports]</li> |
143 | 143 |
</ul> |
144 | 144 |
|
145 |
-<p>You might also find that your Tor server's IP is blocked from accessing |
|
145 |
+<p>You might also find that your Tor relay's IP is blocked from accessing |
|
146 | 146 |
some Internet sites/services. This might happen regardless of your exit |
147 | 147 |
policy, because some groups don't seem to know or care that Tor has |
148 | 148 |
exit policies. (If you have a spare IP not used for other activities, |
149 |
-you might consider running your Tor server on it.) For example, </p> |
|
149 |
+you might consider running your Tor relay on it.) For example, </p> |
|
150 | 150 |
|
151 | 151 |
<ul> |
152 | 152 |
<li>Because of a few cases of anonymous jerks messing with its web |
153 |
-pages, Wikipedia is currently blocking many Tor server IPs from writing |
|
153 |
+pages, Wikipedia is currently blocking many Tor relay IPs from writing |
|
154 | 154 |
(reading still works). We're talking to Wikipedia about how they might |
155 | 155 |
control abuse while still providing access to anonymous contributors, |
156 | 156 |
who often have hot news or inside info on a topic but don't want to risk |
... | ... |
@@ -158,10 +158,10 @@ revealing their identities when publishing it (or don't want to reveal |
158 | 158 |
to local observers that they're accessing Wikipedia). Slashdot is also |
159 | 159 |
in the same boat.</li> |
160 | 160 |
|
161 |
-<li>SORBS is putting some Tor server IPs on their email |
|
161 |
+<li>SORBS is putting some Tor relay IPs on their email |
|
162 | 162 |
blacklist as well. They do this because they passively detect whether your |
163 |
-server connects to certain IRC networks, and they conclude from this that |
|
164 |
-your server is capable of spamming. We tried to work with |
|
163 |
+relay connects to certain IRC networks, and they conclude from this that |
|
164 |
+your relay is capable of spamming. We tried to work with |
|
165 | 165 |
them to teach them that not all software works this way, |
166 | 166 |
but we have given up. We recommend you avoid them, and <a |
167 | 167 |
href="http://paulgraham.com/spamhausblacklist.html">teach your friends |
... | ... |
@@ -278,8 +278,8 @@ an impolite one.)</p> |
278 | 278 |
services that aggregate many users behind a few IP addresses. Tor is |
279 | 279 |
not so different from AOL in this respect.</p> |
280 | 280 |
|
281 |
-<p>Lastly, please remember that Tor servers have <a |
|
282 |
-href="#ExitPolicies">individual exit policies</a>. Many Tor servers do |
|
281 |
+<p>Lastly, please remember that Tor relays have <a |
|
282 |
+href="#ExitPolicies">individual exit policies</a>. Many Tor relays do |
|
283 | 283 |
not allow exiting connections at all. Many of those that do allow some |
284 | 284 |
exit connections might already disallow connections to |
285 | 285 |
your service. When you go about banning nodes, you should parse the |
... | ... |
@@ -291,7 +291,7 @@ the overall list of nodes in the network). </p> |
291 | 291 |
<a href="<svnsandbox>contrib/exitlist">Python script to parse the Tor |
292 | 292 |
directory</a>. (Note that this script won't give you a perfect list |
293 | 293 |
of IP addresses that might connect to you using Tor, since some Tor |
294 |
-servers might exit from other addresses than the one they publish.) |
|
294 |
+relays might exit from other addresses than the one they publish.) |
|
295 | 295 |
</p> |
296 | 296 |
|
297 | 297 |
<a id="TracingUsers"></a> |
... | ... |
@@ -121,7 +121,7 @@ is similar to using a twisty, hard-to-follow route in order to throw off |
121 | 121 |
somebody who is tailing you—and then periodically erasing your |
122 | 122 |
footprints. Instead of taking a direct route from source to |
123 | 123 |
destination, data packets on the Tor network take a random pathway |
124 |
-through several servers that cover your tracks so no observer at any |
|
124 |
+through several relays that cover your tracks so no observer at any |
|
125 | 125 |
single point can tell where the data came from or where it's going. |
126 | 126 |
</p> |
127 | 127 |
|
... | ... |
@@ -130,9 +130,9 @@ single point can tell where the data came from or where it's going. |
130 | 130 |
<p> |
131 | 131 |
To create a private network pathway with Tor, the user's software or |
132 | 132 |
client incrementally builds a circuit of encrypted connections through |
133 |
-servers on the network. The circuit is extended one hop at a time, and |
|
134 |
-each server along the way knows only which server gave it data and which |
|
135 |
-server it is giving data to. No individual server ever knows the |
|
133 |
+relays on the network. The circuit is extended one hop at a time, and |
|
134 |
+each relay along the way knows only which relay gave it data and which |
|
135 |
+relay it is giving data to. No individual relay ever knows the |
|
136 | 136 |
complete path that a data packet has taken. The client negotiates a |
137 | 137 |
separate set of encryption keys for each hop along the circuit to ensure |
138 | 138 |
that each hop can't trace these connections as they pass through. |
... | ... |
@@ -143,8 +143,8 @@ that each hop can't trace these connections as they pass through. |
143 | 143 |
<p> |
144 | 144 |
Once a circuit has been established, many kinds of data can be exchanged |
145 | 145 |
and several different sorts of software applications can be deployed |
146 |
-over the Tor network. Because each server sees no more than one hop in |
|
147 |
-the circuit, neither an eavesdropper nor a compromised server can use |
|
146 |
+over the Tor network. Because each relay sees no more than one hop in |
|
147 |
+the circuit, neither an eavesdropper nor a compromised relay can use |
|
148 | 148 |
traffic analysis to link the connection's source and destination. Tor |
149 | 149 |
only works for TCP streams and can be used by any application with SOCKS |
150 | 150 |
support. |
... | ... |
@@ -206,9 +206,9 @@ As Tor's usability increases, it will attract more users, which will |
206 | 206 |
increase the possible sources and destinations of each communication, |
207 | 207 |
thus increasing security for everyone. |
208 | 208 |
We're making progress, but we need your help. Please consider |
209 |
-<a href="<page docs/tor-doc-server>">running a server</a> |
|
209 |
+<a href="<page docs/tor-doc-relay>">running a relay</a> |
|
210 | 210 |
or <a href="<page volunteer>">volunteering</a> as a |
211 |
-<a href="<page developers>">developer</a>. |
|
211 |
+<a href="<page documentation>#Developers">developer</a>. |
|
212 | 212 |
</p> |
213 | 213 |
|
214 | 214 |
<p> |
... | ... |
@@ -216,7 +216,7 @@ Ongoing trends in law, policy, and technology threaten anonymity as never |
216 | 216 |
before, undermining our ability to speak and read freely online. These |
217 | 217 |
trends also undermine national security and critical infrastructure by |
218 | 218 |
making communication among individuals, organizations, corporations, |
219 |
-and governments more vulnerable to analysis. Each new user and server |
|
219 |
+and governments more vulnerable to analysis. Each new user and relay |
|
220 | 220 |
provides additional diversity, enhancing Tor's ability to put control |
221 | 221 |
over your security and privacy back into your hands. |
222 | 222 |
</p> |
... | ... |
@@ -85,7 +85,7 @@ Coders:</a></h3> |
85 | 85 |
<dt>Benedikt Boss</dt><dd>Worked on <a |
86 | 86 |
href="https://www.torproject.org/svn/topf/README">TOPF</a>, a fuzzer for Tor; |
87 | 87 |
mentored by Roger.</dd> |
88 |
-<dt>Christian King</dt><dd> Worked on making Tor servers stable on |
|
88 |
+<dt>Christian King</dt><dd> Worked on making Tor relays stable on |
|
89 | 89 |
Windows; mentored by Nick.</dd> |
90 | 90 |
<dt>Karsten Loesing</dt><dd> Worked on distributing and securing |
91 | 91 |
the publishing and fetching of hidden service descriptors; mentored |
... | ... |
@@ -133,7 +133,7 @@ question about Tor.</dd> |
133 | 133 |
<dt>Geoff Goodell</dt><dd>Runs one of the directory authorities, used to |
134 | 134 |
run the Blossom project which uses Tor as its overlay network, and runs |
135 | 135 |
the <a href="http://lefkada.eecs.harvard.edu/cgi-bin/exit.py">exit.py</a> |
136 |
-Tor server list.</dd> |
|
136 |
+Tor relay list.</dd> |
|
137 | 137 |
<dt>Fabian Keil</dt><dd>One of the core Privoxy developers, and also a |
138 | 138 |
Tor fan. He's the reason Tor and Privoxy still work well together.</dd> |
139 | 139 |
<dt>Justin Hipple</dt><dd>The other developer for Vidalia.</dd> |
... | ... |
@@ -160,7 +160,7 @@ href="http://p56soo2ibjkx23xo.onion/">TorDNSEL code</a>.</dd> |
160 | 160 |
<a href="http://advocacy.globalvoicesonline.org/tools/guide/">tutorials</a> |
161 | 161 |
for how, when, and whether to use Tor. He also teaches activists around |
162 | 162 |
the world about Tor and related tools.</dd> |
163 |
-<dt>All our server operators, people who write <a |
|
163 |
+<dt>All our relay operators, people who write <a |
|
164 | 164 |
href="http://freehaven.net/anonbib/">research papers</a> about Tor, |
165 | 165 |
people who teach others about Tor, etc.</dt> |
166 | 166 |
</dl> |
... | ... |
@@ -14,7 +14,7 @@ Tor project. There are three primary ways of contributing:</p> |
14 | 14 |
<ul> |
15 | 15 |
<li>A large enough <a href="<page donate>">donation</a> to the Tor |
16 | 16 |
Project.</li> |
17 |
-<li>Operate a fast <a href="<page docs/tor-doc-server>">Tor server</a> |
|
17 |
+<li>Operate a fast <a href="<page docs/tor-doc-relay>">Tor relay</a> |
|
18 | 18 |
that's been running for the past two months: you are eligible if you |
19 | 19 |
allow exits to port 80 and you average 100 KB/s traffic, or if you're |
20 | 20 |
not an exit but you average 500 KB/s traffic.</li> |
... | ... |
@@ -8,9 +8,9 @@ |
8 | 8 |
<!-- PUT CONTENT AFTER THIS TAG --> |
9 | 9 |
<h2>Three things everyone can do now:</h2> |
10 | 10 |
<ol> |
11 |
-<li>Please consider <a href="<page docs/tor-doc-server>">running |
|
12 |
-a server</a> to help the Tor network grow.</li> |
|
13 |
-<li>Tell your friends! Get them to run servers. Get them to run hidden |
|
11 |
+<li>Please consider <a href="<page docs/tor-doc-relay>">running |
|
12 |
+a relay</a> to help the Tor network grow.</li> |
|
13 |
+<li>Tell your friends! Get them to run relays. Get them to run hidden |
|
14 | 14 |
services. Get them to tell their friends.</li> |
15 | 15 |
<li>We are looking for funding and sponsors. If you like Tor's goals, please |
16 | 16 |
<a href="<page donate>">take a moment to donate to support further |
... | ... |
@@ -42,7 +42,7 @@ unifying their interfaces, and might involve sharing code between them |
42 | 42 |
or discarding one entirely.</li> |
43 | 43 |
</ul> |
44 | 44 |
</li> |
45 |
-<li>People running servers tell us they want to have one BandwidthRate |
|
45 |
+<li>People running relays tell us they want to have one BandwidthRate |
|
46 | 46 |
during some part of the day, and a different BandwidthRate at other |
47 | 47 |
parts of the day. Rather than coding this inside Tor, we should have a |
48 | 48 |
little script that speaks via the <a href="<page gui/index>">Tor |
... | ... |
@@ -59,7 +59,7 @@ client that fetches this directory securely (via Tor and checking its |
59 | 59 |
signature), intercepts <tt>.country.blossom</tt> hostnames, and does |
60 | 60 |
the right thing.</li> |
61 | 61 |
<li>Speaking of geolocation data, somebody should draw a map of the Earth |
62 |
-with a pin-point for each Tor server. Bonus points if it updates as the |
|
62 |
+with a pin-point for each Tor relay. Bonus points if it updates as the |
|
63 | 63 |
network grows and changes. Unfortunately, the easy ways to do this involve |
64 | 64 |
sending all the data to Google and having them draw the map for you. How |
65 | 65 |
much does this impact privacy, and do we have any other good options?</li> |
... | ... |
@@ -97,37 +97,37 @@ Farsi translations, for the many Tor users in censored areas.</li> |
97 | 97 |
<a id="Coding"></a> |
98 | 98 |
<h2><a class="anchor" href="#Coding">Coding and Design</a></h2> |
99 | 99 |
<ol> |
100 |
-<li>Tor servers don't work well on Windows XP. On |
|
100 |
+<li>Tor relays don't work well on Windows XP. On |
|
101 | 101 |
Windows, Tor uses the standard <tt>select()</tt> system |
102 | 102 |
call, which uses space in the non-page pool. This means |
103 |
-that a medium sized Tor server will empty the non-page pool, <a |
|
103 |
+that a medium sized Tor relay will empty the non-page pool, <a |
|
104 | 104 |
href="http://wiki.noreply.org/noreply/TheOnionRouter/WindowsBufferProblems">causing |
105 | 105 |
havoc and system crashes</a>. We should probably be using overlapped IO |
106 | 106 |
instead. One solution would be to teach <a |
107 | 107 |
href="http://www.monkey.org/~provos/libevent/">libevent</a> how to use |
108 | 108 |
overlapped IO rather than select() on Windows, and then adapt Tor to |
109 | 109 |
the new libevent interface.</li> |
110 |
-<li>Because Tor servers need to store-and-forward each cell they handle, |
|
111 |
-high-bandwidth Tor servers end up using dozens of megabytes of memory |
|
110 |
+<li>Because Tor relays need to store-and-forward each cell they handle, |
|
111 |
+high-bandwidth Tor relays end up using dozens of megabytes of memory |
|
112 | 112 |
just for buffers. We need better heuristics for when to shrink/expand |
113 | 113 |
buffers. Maybe this should be modelled after the Linux kernel buffer |
114 | 114 |
design, where we have many smaller buffers that link to each other, |
115 | 115 |
rather than monolithic buffers?</li> |
116 | 116 |
<li>We need an official central site to answer "Is this IP address a Tor |
117 |
-exit server?" questions. This should provide several interfaces, including |
|
117 |
+exit relay?" questions. This should provide several interfaces, including |
|
118 | 118 |
a web interface and a DNSBL-style interface. It can provide the most |
119 | 119 |
up-to-date answers by keeping a local mirror of the Tor directory |
120 |
-information. The tricky point is that being an exit server is not a |
|
120 |
+information. The tricky point is that being an exit relay is not a |
|
121 | 121 |
boolean: so the question is actually "Is this IP address a Tor exit |
122 |
-server that can exit to my IP address:port?" The DNSBL interface |
|
122 |
+relay that can exit to my IP address:port?" The DNSBL interface |
|
123 | 123 |
will probably receive hundreds of queries a minute, so some smart |
124 | 124 |
algorithms are in order. Bonus points if it does active testing through |
125 | 125 |
each exit node to find out what IP address it's really exiting from. |
126 | 126 |
<a href="<svnsandbox>doc/contrib/torbl-design.txt">Read more here</a>.</li> |
127 |
-<li>Sometimes Tor servers crash, or the computers they're on fall off the |
|
127 |
+<li>Sometimes Tor relays crash, or the computers they're on fall off the |
|
128 | 128 |
network, or other accidents happen. Some Tor operators have expressed |
129 | 129 |
an interest in signing up to a "notifying" service that periodically |
130 |
-checks whether their Tor server is healthy and sends them a reminder mail |
|
130 |
+checks whether their Tor relay is healthy and sends them a reminder mail |
|
131 | 131 |
when it's not. Anybody want to write a few cgi scripts, a few web pages, |
132 | 132 |
and set up some sort of wget hack and/or something more complex like <a |
133 | 133 |
href="http://nagios.org/">Nagios</a> to do the monitoring? The first |
... | ... |
@@ -269,7 +269,7 @@ href="http://swiki.cc.gatech.edu:8080/ugResearch/uploads/7/ImprovingTor.pdf">pos |
269 | 269 |
paper</a> on how to discard particularly slow choices without hurting |
270 | 270 |
anonymity "too much". This line of reasoning needs more work and more |
271 | 271 |
thinking, but it looks very promising.</li> |
272 |
-<li>Tor doesn't work very well when servers have asymmetric bandwidth |
|
272 |
+<li>Tor doesn't work very well when relays have asymmetric bandwidth |
|
273 | 273 |
(e.g. cable or DSL). Because Tor has separate TCP connections between |
274 | 274 |
each hop, if the incoming bytes are arriving just fine and the outgoing |
275 | 275 |
bytes are all getting dropped on the floor, the TCP push-back mechanisms |
... | ... |
@@ -307,11 +307,11 @@ resistance section of anonbib</a>.</li> |
307 | 307 |
<li>Tor circuits are built one hop at a time, so in theory we have the |
308 | 308 |
ability to make some streams exit from the second hop, some from the |
309 | 309 |
third, and so on. This seems nice because it breaks up the set of exiting |
310 |
-streams that a given server can see. But if we want each stream to be safe, |
|
310 |
+streams that a given relay can see. But if we want each stream to be safe, |
|
311 | 311 |
the "shortest" path should be at least 3 hops long by our current logic, so |
312 | 312 |
the rest will be even longer. We need to examine this performance / security |
313 | 313 |
tradeoff.</li> |
314 |
-<li>It's not that hard to DoS Tor servers or dirservers. Are client |
|
314 |
+<li>It's not that hard to DoS Tor relays or directory authorities. Are client |
|
315 | 315 |
puzzles the right answer? What other practical approaches are there? Bonus |
316 | 316 |
if they're backward-compatible with the current Tor protocol.</li> |
317 | 317 |
</ol> |
... | ... |
@@ -47,7 +47,7 @@ security authorities are going to think you are a terrorist? </p> |
47 | 47 |
|
48 | 48 |
<p>Tor, in combination with Blossom, allows you to see the World Wide |
49 | 49 |
Web from a specific perspective. Want to see Google come up in Polish? |
50 |
-If you ask to leave the Tor cloud at a Polish Tor server, you'll see what |
|
50 |
+If you ask to leave the Tor cloud at a Polish Tor relay, you'll see what |
|
51 | 51 |
Poland sees online. Want to check the differential pricing offered by |
52 | 52 |
an online retailer or wholesaler to folks in another country, compared |
53 | 53 |
to the pricing offered to you or your company? Tor and Blossom can |
54 | 54 |