Roger Dingledine commited on 2012-12-25 20:21:39
Zeige 1 geänderte Dateien mit 15 Einfügungen und 85 Löschungen.
| ... | ... |
@@ -59,18 +60,6 @@ |
| 59 | 60 |
servers</a>. |
| 60 | 61 |
</li> |
| 61 | 62 |
|
| 62 |
- <li><strong>Manual Configuration</strong>: |
|
| 63 |
- <ul> |
|
| 64 |
- <li>Edit the bottom part of <a href="<page docs/faq>#torrc">your |
|
| 65 |
- torrc file</a>. If you want to be a public relay (recommended), |
|
| 66 |
- make sure to define ORPort and <a href="<page |
|
| 67 |
- docs/faq>#ExitPolicies">look at ExitPolicy</a>; otherwise |
|
| 68 |
- if you want to be a <a href="<page docs/faq>#RelayOrBridge">bridge</a> |
|
| 69 |
- for users in countries that censor their Internet, |
|
| 70 |
- just use <a href="<page docs/bridges>#RunningABridge">these lines</a>. |
|
| 71 |
- </li> |
|
| 72 |
- </ul></li> |
|
| 73 |
- |
|
| 74 | 63 |
<li><strong>Configuring Tor with the Vidalia Graphical Interface</strong>: |
| 75 | 64 |
<ol> |
| 76 | 65 |
|
| ... | ... |
@@ -176,49 +165,30 @@ that censor their Internet.</dt> |
| 176 | 165 |
We recommend the following steps as well: |
| 177 | 166 |
</p> |
| 178 | 167 |
|
| 179 |
- <p> |
|
| 180 |
- 6. Read |
|
| 168 |
+ <ol> |
|
| 169 |
+ <li>Read |
|
| 181 | 170 |
<a href="<wiki>doc/OperationalSecurity">about operational security</a> |
| 182 | 171 |
to get ideas how you can increase the security of your relay. |
| 183 |
- </p> |
|
| 172 |
+ </li> |
|
| 184 | 173 |
|
| 185 |
- <p> |
|
| 186 |
- 7. If you want to run more than one relay that's great, but please set <a |
|
| 174 |
+ <li> |
|
| 175 |
+ If you want to run more than one relay that's great, but please set <a |
|
| 187 | 176 |
href="<page docs/faq>#MultipleRelays">the |
| 188 | 177 |
MyFamily option</a> in all your relays' configuration files. |
| 189 |
- </p> |
|
| 190 |
- |
|
| 191 |
- <p> |
|
| 192 |
- 8. Decide about rate limiting. Cable modem, DSL, and other users |
|
| 193 |
- who have asymmetric bandwidth (e.g. more down than up) should |
|
| 194 |
- rate limit to their slower bandwidth, to avoid congestion. See the <a |
|
| 195 |
- href="<wikifaq>#LimitBandwidth">rate |
|
| 196 |
- limiting FAQ entry</a> for details. |
|
| 197 |
- </p> |
|
| 198 |
- |
|
| 199 |
- <p> |
|
| 200 |
- 9. Back up your Tor relay's private key (stored in "keys/secret_id_key" |
|
| 201 |
- in your DataDirectory). This is your relay's "identity," and |
|
| 202 |
- you need to keep it safe so nobody can read the traffic that goes |
|
| 203 |
- through your relay. This is the critical file to keep if you need to <a |
|
| 204 |
- href="<wikifaq>#UpgradeRelay">move |
|
| 205 |
- or restore your Tor relay</a> if something goes wrong. |
|
| 206 |
- </p> |
|
| 207 |
- |
|
| 208 |
- <p> |
|
| 178 |
+ </li> |
|
| 209 | 179 |
|
| 210 |
- 10. If you control the name servers for your domain, consider setting your |
|
| 180 |
+ <li> |
|
| 181 |
+ If you control the name servers for your domain, consider setting your |
|
| 211 | 182 |
reverse DNS hostname to 'anonymous-relay', 'proxy' or 'tor-proxy', so when |
| 212 | 183 |
other people see the address in their web logs, they will more quickly |
| 213 | 184 |
understand what's going on. Adding the <a |
| 214 | 185 |
href="<gitblob>contrib/tor-exit-notice.html">Tor |
| 215 | 186 |
exit notice</a> on a vhost for this name can go a long way to deterring abuse |
| 216 | 187 |
complaints to you and your ISP if you are running an exit node. |
| 188 |
+ </li> |
|
| 217 | 189 |
|
| 218 |
- </p> |
|
| 219 |
- |
|
| 220 |
- <p> |
|
| 221 |
- 11. If your computer isn't running a webserver, please consider |
|
| 190 |
+ <li> |
|
| 191 |
+ If your computer isn't running a webserver, please consider |
|
| 222 | 192 |
changing your ORPort to 443 and your DirPort to 80. Many Tor |
| 223 | 193 |
users are stuck behind firewalls that only let them browse the |
| 224 | 194 |
web, and this change will let them reach your Tor relay. Win32 |
| ... | ... |
@@ -230,52 +200,13 @@ that censor their Internet.</dt> |
| 230 | 200 |
port forwarding</a> so connections can reach their Tor relay. If you are |
| 231 | 201 |
using ports 80 and 443 already but still want to help out, other useful |
| 232 | 202 |
ports are 22, 110, and 143. |
| 233 |
- </p> |
|
| 234 |
- |
|
| 235 |
- <p> |
|
| 236 |
- 12. If your Tor relay provides other services on the same IP address |
|
| 237 |
- — such as a public webserver — make sure that connections to the |
|
| 238 |
- webserver are allowed from the local host too. You need to allow these |
|
| 239 |
- connections because Tor clients will detect that your Tor relay is the <a |
|
| 240 |
- href="<wikifaq>#ExitEavesdroppers">safest |
|
| 241 |
- way to reach that webserver</a>, and always build a circuit that ends |
|
| 242 |
- at your relay. If you don't want to allow the connections, you must |
|
| 243 |
- explicitly reject them in your exit policy. |
|
| 244 |
- </p> |
|
| 245 |
- |
|
| 246 |
- <p> |
|
| 247 |
- 13. (Unix only). Make a separate user to run the relay. If you |
|
| 248 |
- installed the OS X package or the deb or the rpm, this is already |
|
| 249 |
- done. Otherwise, you can do it by hand. (The Tor relay doesn't need to |
|
| 250 |
- be run as root, so it's good practice to not run it as root. Running |
|
| 251 |
- as a 'tor' user avoids issues with identd and other services that |
|
| 252 |
- detect user name. If you're the paranoid sort, feel free to <a |
|
| 253 |
- href="<wiki>doc/TorInChroot">put Tor |
|
| 254 |
- into a chroot jail</a>.) |
|
| 255 |
- </p> |
|
| 256 |
- |
|
| 257 |
- <p> |
|
| 258 |
- 14. (Unix only.) Your operating system probably limits the number |
|
| 259 |
- of open file descriptors per process to 1024 (or even less). If you |
|
| 260 |
- plan to be running a fast exit node, this is probably not enough. On |
|
| 261 |
- Linux, you should add a line like "toruser hard nofile 8192" to your |
|
| 262 |
- /etc/security/limits.conf file (where toruser is the user that runs the |
|
| 263 |
- Tor process), and then restart Tor if it's installed as a package (or log |
|
| 264 |
- out and log back in if you run it yourself). The Debian/Ubuntu package |
|
| 265 |
- does this step for you. |
|
| 266 |
- </p> |
|
| 267 |
- |
|
| 268 |
- <p> |
|
| 269 |
- 15. If you installed Tor via some package or installer, it probably starts |
|
| 270 |
- Tor for you automatically on boot. But if you installed from source, |
|
| 271 |
- you may find the initscripts in contrib/tor.sh or contrib/torctl useful. |
|
| 272 |
- </p> |
|
| 203 |
+ </li> |
|
| 204 |
+ </ol> |
|
| 273 | 205 |
|
| 274 | 206 |
<p> |
| 275 | 207 |
When you change your Tor configuration, remember to verify that your |
| 276 |
- relay still works correctly after the change. Be sure to set your |
|
| 277 |
- "ContactInfo" line in the torrc so we can contact you if you need to |
|
| 278 |
- upgrade or something goes wrong. If you have problems or questions, see |
|
| 208 |
+ relay still works correctly after the change. |
|
| 209 |
+ If you have problems or questions, see |
|
| 279 | 210 |
the <a href="<page docs/documentation>#Support">Support</a> section or |
| 280 | 211 |
<a href="<page about/contact>">contact us</a> on the tor-ops list. Thanks |
| 281 | 212 |
for helping to make the Tor network grow! |
| 282 | 213 |