clean up the RunARelayBut faq entry. immortalize mikeperry's blog post.
Roger Dingledine

Roger Dingledine commited on 2009-06-24 07:17:01
Zeige 1 geänderte Dateien mit 33 Einfügungen und 30 Löschungen.

... ...
@@ -757,36 +757,39 @@ Great. That's exactly why we implemented exit policies.
757 757
 </p>
758 758
 
759 759
 <p>
760
-Each Tor relay has an exit policy that specifies what sort of outbound
761
-connections are allowed or refused from that relay. The exit policies are
762
-propagated to the client via the directory, so clients will automatically
763
-avoid picking exit relays that would refuse to exit to their intended
764
-destination. This way each relay can decide the services, hosts, and
765
-networks he wants to allow connections to, based on abuse potential and
766
-his own situation.
767
-</p>
768
-
769
-<p>
770
-By default, your relay allows access to many popular
771
-services, but restricts some (such as port 25, see all <a
772
-href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#DefaultPorts">default
773
-restricted ports</a>)  due to abuse potential. You can edit your torrc
774
-to make your exit policy more or less restrictive. If you want to avoid
775
-most if not all abuse potential, set it to "reject *:*". This setting
776
-forces a "non-exit" operation. Nobody exits through your  node, only
777
-direct connections to other nodes will be established.
778
-</p>
779
-
780
-<p>
781
-One good way to minimize abuse complaints in general
782
-for exit nodes is to set the reverse DNS of your Tor
783
-exit IP to be something like 'tor-exit.yourhost.org'
784
-or 'tor-readme.yourhost.org'. You can then  place <a
785
-href="https://tor-svn.freehaven.net/svn/tor/trunk/contrib/tor-exit-notice.html">this
786
-exit notice</a> html page (<a href="http://tor-exit.fscked.org">live
787
-version</a>) on a  vhost for that hostname to try to educate people
788
-before they run off and  harass you or your ISP. This actually does cut
789
-down on abuse complaints quite a bit, believe it or not.
760
+Each Tor relay has an exit policy that specifies what sort of
761
+outbound connections are allowed or refused from that relay. The exit
762
+policies are propagated to the client via the directory, so clients
763
+will automatically avoid picking exit relays that would refuse to
764
+exit to their intended destination. This way each relay can decide
765
+the services, hosts, and networks he wants to allow connections to,
766
+based on abuse potential and his own situation. Read the FAQ entry on
767
+<a href="<page faq-abuse>#TypicalAbuses">issues you might encounter
768
+if you use the default exit policy</a>, and then read Mike Perry's <a
769
+href="https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment">tips
770
+for running an exit node with minimal harassment</a>.
771
+</p>
772
+
773
+<p>
774
+The default exit policy allows access to
775
+many popular services (e.g. web browsing), but <a
776
+href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#DefaultPorts">restricts</a>
777
+some due to abuse potential (e.g. mail) and some since
778
+the Tor network can't handle the load (e.g. default
779
+file-sharing ports). You can change your exit policy
780
+using Vidalia's "Sharing" tab, or by manually editing your <a
781
+href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">torrc</a>
782
+file. If you want to avoid most if not all abuse potential, set it to
783
+"reject *:*". This setting means that your relay will be used for
784
+relaying traffic inside the Tor network, but not for connections to
785
+external websites or other services.
786
+</p>
787
+
788
+<p>
789
+If there are any resources that your computer can't reach (for example,
790
+you are behind a restrictive firewall or content filter), please
791
+explicitly reject them in your exit policy &mdash; otherwise Tor users
792
+will be impacted too.
790 793
 </p>
791 794
 
792 795
 <hr />
793 796