Andrew Lewman commited on 2010-10-06 21:18:13
Zeige 1 geänderte Dateien mit 15 Einfügungen und 17 Löschungen.
... | ... |
@@ -35,7 +35,7 @@ complaints, and support for dynamic IP addresses</a>. |
35 | 35 |
</p> |
36 | 36 |
|
37 | 37 |
<p>You can run a Tor relay on <a |
38 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">pretty |
|
38 |
+href="<wiki>/TorFAQ#RelayOS">pretty |
|
39 | 39 |
much any</a> operating system. Tor relays work best on Linux, OS X Tiger |
40 | 40 |
or later, FreeBSD 5.x+, NetBSD 5.x+, and Windows Server 2003 or later. |
41 | 41 |
</p> |
... | ... |
@@ -108,7 +108,7 @@ that the relay is working correctly.</li> |
108 | 108 |
<strong>Manual Configuration</strong>: |
109 | 109 |
<ul> |
110 | 110 |
<li>Edit the bottom part of <a |
111 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">your |
|
111 |
+href="<wiki>/TorFAQ#torrc">your |
|
112 | 112 |
torrc file</a>. If you want to be a public relay (recommended), |
113 | 113 |
make sure to define ORPort and <a href="<page |
114 | 114 |
faq>#ExitPolicies">look at ExitPolicy</a>; otherwise |
... | ... |
@@ -129,7 +129,7 @@ other Tor relays. |
129 | 129 |
</li> |
130 | 130 |
|
131 | 131 |
<li>Restart your relay. If it <a |
132 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">logs |
|
132 |
+href="<wiki>/TorFAQ#Logs">logs |
|
133 | 133 |
any warnings</a>, address them. |
134 | 134 |
</li> |
135 | 135 |
|
... | ... |
@@ -152,7 +152,7 @@ too. |
152 | 152 |
try to determine whether the ports you configured are reachable from |
153 | 153 |
the outside. This step is usually fast, but may take up to 20 |
154 | 154 |
minutes. Look for a |
155 |
-<a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">log |
|
155 |
+<a href="<wiki>/TorFAQ#Logs">log |
|
156 | 156 |
entry</a> like |
157 | 157 |
<tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt> |
158 | 158 |
If you don't see this message, it means that your relay is not reachable |
... | ... |
@@ -162,12 +162,10 @@ testing the IP and port you think it should be testing, etc. |
162 | 162 |
|
163 | 163 |
<p>When it decides that it's reachable, it will upload a "server |
164 | 164 |
descriptor" to the directories, to let clients know |
165 |
-what address, ports, keys, etc your relay is using. You can <a |
|
166 |
-href="http://194.109.206.212/tor/status-vote/current/consensus">load one of |
|
167 |
-the network statuses manually</a> and |
|
168 |
-look through it to find the nickname you configured, to make sure it's |
|
169 |
-there. You may need to wait up to one hour to give enough time for it to |
|
170 |
-make a fresh directory.</p> |
|
165 |
+what address, ports, keys, etc your relay is using. You can look in |
|
166 |
+your data directory for a cached-consensus file to see if your relay is |
|
167 |
+online in the Tor Network. You may need to wait up to one hour to give |
|
168 |
+enough time for it to make a fresh directory.</p> |
|
171 | 169 |
|
172 | 170 |
<hr /> |
173 | 171 |
<a id="after"></a> |
... | ... |
@@ -180,13 +178,13 @@ We recommend the following steps as well: |
180 | 178 |
|
181 | 179 |
<p> |
182 | 180 |
6. Read |
183 |
-<a href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">about operational security</a> |
|
181 |
+<a href="<wiki>/OperationalSecurity">about operational security</a> |
|
184 | 182 |
to get ideas how you can increase the security of your relay. |
185 | 183 |
</p> |
186 | 184 |
|
187 | 185 |
<p> |
188 | 186 |
7. If you want to run more than one relay that's great, but please set <a |
189 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">the |
|
187 |
+href="<wiki>/TorFAQ#MultipleRelays">the |
|
190 | 188 |
MyFamily option</a> in all your relays' configuration files. |
191 | 189 |
</p> |
192 | 190 |
|
... | ... |
@@ -194,7 +192,7 @@ MyFamily option</a> in all your relays' configuration files. |
194 | 192 |
8. Decide about rate limiting. Cable modem, DSL, and other users |
195 | 193 |
who have asymmetric bandwidth (e.g. more down than up) should |
196 | 194 |
rate limit to their slower bandwidth, to avoid congestion. See the <a |
197 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate |
|
195 |
+href="<wiki>/TorFAQ#LimitBandwidth">rate |
|
198 | 196 |
limiting FAQ entry</a> for details. |
199 | 197 |
</p> |
200 | 198 |
|
... | ... |
@@ -203,7 +201,7 @@ limiting FAQ entry</a> for details. |
203 | 201 |
in your DataDirectory). This is your relay's "identity," and |
204 | 202 |
you need to keep it safe so nobody can read the traffic that goes |
205 | 203 |
through your relay. This is the critical file to keep if you need to <a |
206 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeRelay">move |
|
204 |
+href="<wiki>/TorFAQ#UpgradeRelay">move |
|
207 | 205 |
or restore your Tor relay</a> if something goes wrong. |
208 | 206 |
</p> |
209 | 207 |
|
... | ... |
@@ -228,7 +226,7 @@ relays can simply change their ORPort and DirPort directly |
228 | 226 |
in their torrc and restart Tor. OS X or Unix relays can't bind |
229 | 227 |
directly to these ports (since they don't run as root), so they will |
230 | 228 |
need to set up some sort of <a |
231 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients"> |
|
229 |
+href="<wiki>/TorFAQ#ServerForFirewalledClients"> |
|
232 | 230 |
port forwarding</a> so connections can reach their Tor relay. If you are |
233 | 231 |
using ports 80 and 443 already but still want to help out, other useful |
234 | 232 |
ports are 22, 110, and 143. |
... | ... |
@@ -239,7 +237,7 @@ ports are 22, 110, and 143. |
239 | 237 |
— such as a public webserver — make sure that connections to the |
240 | 238 |
webserver are allowed from the local host too. You need to allow these |
241 | 239 |
connections because Tor clients will detect that your Tor relay is the <a |
242 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">safest |
|
240 |
+href="<wiki>/TorFAQ#ExitEavesdroppers">safest |
|
243 | 241 |
way to reach that webserver</a>, and always build a circuit that ends |
244 | 242 |
at your relay. If you don't want to allow the connections, you must |
245 | 243 |
explicitly reject them in your exit policy. |
... | ... |
@@ -252,7 +250,7 @@ done. Otherwise, you can do it by hand. (The Tor relay doesn't need to |
252 | 250 |
be run as root, so it's good practice to not run it as root. Running |
253 | 251 |
as a 'tor' user avoids issues with identd and other services that |
254 | 252 |
detect user name. If you're the paranoid sort, feel free to <a |
255 |
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">put Tor |
|
253 |
+href="<wiki>/TorInChroot">put Tor |
|
256 | 254 |
into a chroot jail</a>.) |
257 | 255 |
</p> |
258 | 256 |
|
259 | 257 |