Roger Dingledine commited on 2009-06-24 06:42:20
Zeige 1 geänderte Dateien mit 43 Einfügungen und 0 Löschungen.
... | ... |
@@ -49,6 +49,8 @@ have a virus or spyware?</a></li> |
49 | 49 |
<p>Running a Tor relay:</p> |
50 | 50 |
<ul> |
51 | 51 |
<li><a href="#RelayFlexible">How stable does my relay need to be?</a></li> |
52 |
+<li><a href="#RunARelayBut">I'd run a relay, but I don't want to deal |
|
53 |
+with abuse issues.</a></li> |
|
52 | 54 |
<li><a href="#WhyNotNamed">Why is my Tor relay not named?</a></li> |
53 | 55 |
</ul> |
54 | 56 |
|
... | ... |
@@ -731,6 +733,47 @@ low-bandwidth ones. Therefore having low-bandwidth relays is useful too. |
731 | 733 |
|
732 | 734 |
<hr /> |
733 | 735 |
|
736 |
+<a id="RunARelayBut"></a> |
|
737 |
+<h3><a class="anchor" href="#RunARelayBut">I'd run a relay, but I don't |
|
738 |
+want to deal with abuse issues.</a></h3> |
|
739 |
+ |
|
740 |
+<p> |
|
741 |
+Great. That's exactly why we implemented exit policies. |
|
742 |
+</p> |
|
743 |
+ |
|
744 |
+<p> |
|
745 |
+Each Tor relay has an exit policy that specifies what sort of outbound |
|
746 |
+connections he will allow from his relay, and what sort he will |
|
747 |
+refuse. The exit policies are propagated to the client in the directory, |
|
748 |
+so clients will avoid picking exit nodes that would refuse to exit to |
|
749 |
+their intended destination. |
|
750 |
+</p> |
|
751 |
+ |
|
752 |
+<p> |
|
753 |
+By default, your relay allows access to many popular |
|
754 |
+services, but restricts some (such as port 25, see all <a |
|
755 |
+href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#DefaultPorts">default |
|
756 |
+restricted ports</a>) due to abuse potential. You can edit your torrc |
|
757 |
+to make your exit policy more or less restrictive. If you want to avoid |
|
758 |
+most if not all abuse potential, set it to "reject *:*". This setting |
|
759 |
+forces a "non-exit" operation. Nobody exits through your node, only |
|
760 |
+direct connections to other nodes will be established. |
|
761 |
+</p> |
|
762 |
+ |
|
763 |
+<p> |
|
764 |
+One good way to minimize abuse complaints in general |
|
765 |
+for exit nodes is to set the reverse DNS of your Tor |
|
766 |
+exit IP to be something like 'tor-exit.yourhost.org' |
|
767 |
+or 'tor-readme.yourhost.org'. You can then place <a |
|
768 |
+href="https://tor-svn.freehaven.net/svn/tor/trunk/contrib/tor-exit-notice.html">this |
|
769 |
+exit notice</a> html page (<a href="http://tor-exit.fscked.org">live |
|
770 |
+version</a>) on a vhost for that hostname to try to educate people |
|
771 |
+before they run off and harass you or your ISP. This actually does cut |
|
772 |
+down on abuse complaints quite a bit, believe it or not. |
|
773 |
+</p> |
|
774 |
+ |
|
775 |
+<hr /> |
|
776 |
+ |
|
734 | 777 |
<a id="WhyNotNamed"></a> |
735 | 778 |
<h3><a class="anchor" href="#WhyNotNamed">Why is my Tor relay not named?</a></h3> |
736 | 779 |
|
737 | 780 |