Andrew Lewman commited on 2010-10-08 16:54:16
Zeige 10 geänderte Dateien mit 55 Einfügungen und 57 Löschungen.
... | ... |
@@ -114,7 +114,7 @@ |
114 | 114 |
<h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3> |
115 | 115 |
|
116 | 116 |
<p> |
117 |
- <a href="<page docs/faq>#ExitPolicies">Moved to the new FAQ page</a> |
|
117 |
+ <a href="<wiki>TorFAQ#ExitPolicies">See the FAQ</a> |
|
118 | 118 |
</p> |
119 | 119 |
|
120 | 120 |
<a id="HowMuchAbuse"></a> |
... | ... |
@@ -295,7 +295,7 @@ |
295 | 295 |
not so different from AOL in this respect.</p> |
296 | 296 |
|
297 | 297 |
<p>Lastly, please remember that Tor relays have <a |
298 |
- href="<page docs/faq>#ExitPolicies">individual exit policies</a>. Many Tor relays do |
|
298 |
+ href="<wiki>#ExitPolicies">individual exit policies</a>. Many Tor relays do |
|
299 | 299 |
not allow exiting connections at all. Many of those that do allow some |
300 | 300 |
exit connections might already disallow connections to |
301 | 301 |
your service. When you go about banning nodes, you should parse the |
... | ... |
@@ -327,7 +327,7 @@ |
327 | 327 |
|
328 | 328 |
<p> |
329 | 329 |
Some fans have suggested that we redesign Tor to include a <a |
330 |
- href="<page docs/faq>#Backdoor">backdoor</a>. |
|
330 |
+ href="<wikifaq>#Backdoor">backdoor</a>. |
|
331 | 331 |
There are two problems with this idea. First, it technically weakens the |
332 | 332 |
system too far. Having a central way to link users to their activities |
333 | 333 |
is a gaping hole for all sorts of attackers; and the policy mechanisms |
... | ... |
@@ -60,9 +60,9 @@ |
60 | 60 |
'url' => '<wiki>', |
61 | 61 |
'txt' => 'Tor Wiki', |
62 | 62 |
}, |
63 |
- {'url' => 'docs/faq', |
|
64 |
- 'txt' => 'FAQ', #maybe stick this in about instead... |
|
65 |
- 'subelements' => [ |
|
63 |
+ {'url' => '<wikifaq>', |
|
64 |
+ 'txt' => 'General FAQ', |
|
65 |
+ }, |
|
66 | 66 |
{'url' => 'docs/faq-abuse', |
67 | 67 |
'txt' => 'Abuse FAQ', |
68 | 68 |
}, |
... | ... |
@@ -74,7 +74,6 @@ |
74 | 74 |
}, |
75 | 75 |
{'url' => 'eff/tor-dmca-response', |
76 | 76 |
'txt' => 'Tor DMCA Response', |
77 |
- }] |
|
78 | 77 |
}, |
79 | 78 |
]; |
80 | 79 |
:> |
... | ... |
@@ -84,7 +84,7 @@ |
84 | 84 |
|
85 | 85 |
<p> |
86 | 86 |
If you plan to run Firefox on a different computer than Tor, see the <a |
87 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">FAQ |
|
87 |
+ href="<wikifaq>#SocksListenAddress">FAQ |
|
88 | 88 |
entry for running Tor on a different computer</a>. |
89 | 89 |
</p> |
90 | 90 |
|
... | ... |
@@ -92,14 +92,14 @@ |
92 | 92 |
point them at Polipo (that is, localhost port 8118). To use SOCKS |
93 | 93 |
directly (for instant messaging, Jabber, IRC, etc), you can point |
94 | 94 |
your application directly at Tor (localhost port 9050), but see <a |
95 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
95 |
+ href="<wikifaq>#SOCKSAndDNS">this |
|
96 | 96 |
FAQ entry</a> for why this may be dangerous. For applications |
97 | 97 |
that support neither SOCKS nor HTTP, take a look at <a |
98 | 98 |
href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> or |
99 | 99 |
<a href="http://www.dest-unreach.org/socat/">socat</a>.</p> |
100 | 100 |
|
101 | 101 |
<p>For information on how to Torify other applications, check out the |
102 |
- <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify |
|
102 |
+ <a href="<wiki>/TheOnionRouter/TorifyHOWTO">Torify |
|
103 | 103 |
HOWTO</a>. |
104 | 104 |
</p> |
105 | 105 |
|
... | ... |
@@ -115,7 +115,7 @@ |
115 | 115 |
Tor detector</a> |
116 | 116 |
and see whether it thinks you're using Tor or not. |
117 | 117 |
(If that site is down, see <a |
118 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
118 |
+ href="<wikifaq>#IsMyConnectionPrivate">this |
|
119 | 119 |
FAQ entry</a> for more suggestions on how to test your Tor.) |
120 | 120 |
</p> |
121 | 121 |
|
... | ... |
@@ -124,12 +124,12 @@ |
124 | 124 |
your local applications to local port 8118 and port 9050. If |
125 | 125 |
your firewall blocks outgoing connections, punch a hole so |
126 | 126 |
it can connect to at least TCP ports 80 and 443, and then see <a |
127 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
127 |
+ href="<wikifaq>#FirewalledClient">this |
|
128 | 128 |
FAQ entry</a>. |
129 | 129 |
</p> |
130 | 130 |
|
131 | 131 |
<p>If it's still not working, look at <a |
132 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
132 |
+ href="<wikifaq>#ItDoesntWork">this |
|
133 | 133 |
FAQ entry</a> for hints.</p> |
134 | 134 |
|
135 | 135 |
<p> |
... | ... |
@@ -153,7 +153,7 @@ |
153 | 153 |
|
154 | 154 |
<p>Having relays in many different places on the Internet is what |
155 | 155 |
makes Tor users secure. <a |
156 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">You |
|
156 |
+ href="<wikifaq>#RelayAnonymity">You |
|
157 | 157 |
may also get stronger anonymity yourself</a>, |
158 | 158 |
since remote sites can't know whether connections originated at your |
159 | 159 |
computer or were relayed from others.</p> |
... | ... |
@@ -32,13 +32,12 @@ |
32 | 32 |
people who run relays, the faster the Tor network will be. If you have |
33 | 33 |
at least 20 kilobytes/s each way, please help out Tor by configuring your |
34 | 34 |
Tor to be a relay too. We have many features that make Tor relays easy |
35 |
- and convenient, including <a href="<page docs/faq>#RelayFlexible">rate limiting |
|
35 |
+ and convenient, including <a href="<wiki>TorFAQ#RelayFlexible">rate limiting |
|
36 | 36 |
for bandwidth, exit policies so you can limit your exposure to abuse |
37 | 37 |
complaints, and support for dynamic IP addresses</a>. |
38 | 38 |
</p> |
39 | 39 |
|
40 |
- <p>You can run a Tor relay on <a |
|
41 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayOS">pretty |
|
40 |
+ <p>You can run a Tor relay on <a href="<wiki>/TorFAQ#RelayOS">pretty |
|
42 | 41 |
much any</a> operating system. Tor relays work best on Linux, OS X Tiger |
43 | 42 |
or later, FreeBSD 5.x+, NetBSD 5.x+, and Windows Server 2003 or later. |
44 | 43 |
</p> |
... | ... |
@@ -81,7 +80,10 @@ |
81 | 80 |
<li>Click <tt>Setup Relaying</tt>.</li> |
82 | 81 |
|
83 | 82 |
<li> |
84 |
- <dt>Choose <tt>Relay Traffic for the Tor network</tt> if you want to be a public relay (recommended), or choose <tt>Help censored users reach the Tor network</tt> if you want to be a <a href="<page docs/faq>#RelayOrBridge">bridge</a> for users in countries that censor their Internet.</dt> |
|
83 |
+ <dt>Choose <tt>Relay Traffic for the Tor network</tt> if you |
|
84 |
+want to be a public relay (recommended), or choose <tt>Help |
|
85 |
+censored users reach the Tor network</tt> if you want to be a <a |
|
86 |
+href="<wiki>TorFAQ#RelayOrBridge">bridge</a> for users in countries that censor their Internet.</dt> |
|
85 | 87 |
<dd><img alt="vidalia basic settings" src="../img/screenshot-win32-configure-relay-1.png"></dd> |
86 | 88 |
</li> |
87 | 89 |
|
... | ... |
@@ -98,8 +100,7 @@ |
98 | 100 |
|
99 | 101 |
<li><dt>Choose the <tt>Exit Policies</tt> tab. If you want to allow others |
100 | 102 |
to use your relay for these services, don't change anything. Un-check |
101 |
- the services you don't want to allow people to <a href="<page |
|
102 |
- docs/faq>#ExitPolicies">reach from your relay</a>. If you want to be a non-exit relay, un-check all services.</dt> |
|
103 |
+ the services you don't want to allow people to <a href="<wiki>TorFAQ#ExitPolicies">reach from your relay</a>. If you want to be a non-exit relay, un-check all services.</dt> |
|
103 | 104 |
<dd><img alt="vidalia exit policies" src="../img/screenshot-win32-configure-relay-3.png"></dd> |
104 | 105 |
</li> |
105 | 106 |
|
... | ... |
@@ -110,12 +111,9 @@ |
110 | 111 |
<br /> |
111 | 112 |
<strong>Manual Configuration</strong>: |
112 | 113 |
<ul> |
113 |
- <li>Edit the bottom part of <a |
|
114 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">your |
|
115 |
- torrc file</a>. If you want to be a public relay (recommended), |
|
116 |
- make sure to define ORPort and <a href="<page |
|
117 |
- docs/faq>#ExitPolicies">look at ExitPolicy</a>; otherwise |
|
118 |
- if you want to be a <a href="<page docs/faq>#RelayOrBridge">bridge</a> |
|
114 |
+ <li>Edit the bottom part of <a href="<wiki>/TorFAQ#torrc">your torrc file</a>. If you want to be a public relay (recommended), |
|
115 |
+ make sure to define ORPort and <a href="<wiki>TorFAQ#ExitPolicies">look at ExitPolicy</a>; otherwise |
|
116 |
+ if you want to be a <a href="<wiki>TorFAQ#RelayOrBridge">bridge</a> |
|
119 | 117 |
for users in countries that censor their Internet, |
120 | 118 |
just use <a href="<page docs/bridges>#RunningABridge">these lines</a>. |
121 | 119 |
</li> |
... | ... |
@@ -132,7 +130,7 @@ |
132 | 130 |
</li> |
133 | 131 |
|
134 | 132 |
<li>Restart your relay. If it <a |
135 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">logs |
|
133 |
+ href="<wikifaq>#Logs">logs |
|
136 | 134 |
any warnings</a>, address them. |
137 | 135 |
</li> |
138 | 136 |
|
... | ... |
@@ -155,7 +153,7 @@ |
155 | 153 |
try to determine whether the ports you configured are reachable from |
156 | 154 |
the outside. This step is usually fast, but may take up to 20 |
157 | 155 |
minutes. Look for a |
158 |
- <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">log |
|
156 |
+ <a href="<wikifaq>#Logs">log |
|
159 | 157 |
entry</a> like |
160 | 158 |
<tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt> |
161 | 159 |
If you don't see this message, it means that your relay is not reachable |
... | ... |
@@ -183,13 +181,13 @@ |
183 | 181 |
|
184 | 182 |
<p> |
185 | 183 |
6. Read |
186 |
- <a href="https://wiki.torproject.org/noreply/TheOnionRouter/OperationalSecurity">about operational security</a> |
|
184 |
+ <a href="<wiki>TheOnionRouter/OperationalSecurity">about operational security</a> |
|
187 | 185 |
to get ideas how you can increase the security of your relay. |
188 | 186 |
</p> |
189 | 187 |
|
190 | 188 |
<p> |
191 | 189 |
7. If you want to run more than one relay that's great, but please set <a |
192 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#MultipleRelays">the |
|
190 |
+ href="<wikifaq>#MultipleRelays">the |
|
193 | 191 |
MyFamily option</a> in all your relays' configuration files. |
194 | 192 |
</p> |
195 | 193 |
|
... | ... |
@@ -197,7 +195,7 @@ |
197 | 195 |
8. Decide about rate limiting. Cable modem, DSL, and other users |
198 | 196 |
who have asymmetric bandwidth (e.g. more down than up) should |
199 | 197 |
rate limit to their slower bandwidth, to avoid congestion. See the <a |
200 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate |
|
198 |
+ href="<wikifaq>#LimitBandwidth">rate |
|
201 | 199 |
limiting FAQ entry</a> for details. |
202 | 200 |
</p> |
203 | 201 |
|
... | ... |
@@ -206,7 +204,7 @@ |
206 | 204 |
in your DataDirectory). This is your relay's "identity," and |
207 | 205 |
you need to keep it safe so nobody can read the traffic that goes |
208 | 206 |
through your relay. This is the critical file to keep if you need to <a |
209 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#UpgradeRelay">move |
|
207 |
+ href="<wikifaq>#UpgradeRelay">move |
|
210 | 208 |
or restore your Tor relay</a> if something goes wrong. |
211 | 209 |
</p> |
212 | 210 |
|
... | ... |
@@ -231,7 +229,7 @@ |
231 | 229 |
in their torrc and restart Tor. OS X or Unix relays can't bind |
232 | 230 |
directly to these ports (since they don't run as root), so they will |
233 | 231 |
need to set up some sort of <a |
234 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients"> |
|
232 |
+ href="<wikifaq>#ServerForFirewalledClients"> |
|
235 | 233 |
port forwarding</a> so connections can reach their Tor relay. If you are |
236 | 234 |
using ports 80 and 443 already but still want to help out, other useful |
237 | 235 |
ports are 22, 110, and 143. |
... | ... |
@@ -242,7 +240,7 @@ |
242 | 240 |
— such as a public webserver — make sure that connections to the |
243 | 241 |
webserver are allowed from the local host too. You need to allow these |
244 | 242 |
connections because Tor clients will detect that your Tor relay is the <a |
245 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">safest |
|
243 |
+ href="<wikifaq>#ExitEavesdroppers">safest |
|
246 | 244 |
way to reach that webserver</a>, and always build a circuit that ends |
247 | 245 |
at your relay. If you don't want to allow the connections, you must |
248 | 246 |
explicitly reject them in your exit policy. |
... | ... |
@@ -255,7 +253,7 @@ |
255 | 253 |
be run as root, so it's good practice to not run it as root. Running |
256 | 254 |
as a 'tor' user avoids issues with identd and other services that |
257 | 255 |
detect user name. If you're the paranoid sort, feel free to <a |
258 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorInChroot">put Tor |
|
256 |
+ href="<wiki>TheOnionRouter/TorInChroot">put Tor |
|
259 | 257 |
into a chroot jail</a>.) |
260 | 258 |
</p> |
261 | 259 |
|
... | ... |
@@ -80,7 +80,7 @@ |
80 | 80 |
</p> |
81 | 81 |
|
82 | 82 |
<p>If you prefer, you can instead use Privoxy with <a |
83 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">this |
|
83 |
+ href="<wiki>TheOnionRouter/PrivoxyConfig">this |
|
84 | 84 |
sample Privoxy configuration</a>. But since the config files both use |
85 | 85 |
port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p> |
86 | 86 |
|
... | ... |
@@ -106,7 +106,7 @@ |
106 | 106 |
|
107 | 107 |
<p> |
108 | 108 |
If you plan to run Firefox on a different computer than Tor, see the <a |
109 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress"> |
|
109 |
+ href="<wikifaq>#SocksListenAddress"> |
|
110 | 110 |
FAQ |
111 | 111 |
entry for running Tor on a different computer</a>. |
112 | 112 |
</p> |
... | ... |
@@ -115,15 +115,15 @@ |
115 | 115 |
point them at Polipo (that is, localhost port 8118). To use SOCKS |
116 | 116 |
directly (for instant messaging, Jabber, IRC, etc), you can point |
117 | 117 |
your application directly at Tor (localhost port 9050), but see <a |
118 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
118 |
+ href="<wikifaq>#SOCKSAndDNS">this |
|
119 | 119 |
FAQ entry</a> for why this may be dangerous. For applications |
120 | 120 |
that support neither SOCKS nor HTTP, take a look at <a |
121 | 121 |
href="http://tsocks.sourceforge.net/">tsocks</a> or <a |
122 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>. |
|
122 |
+ href="<wiki>TheOnionRouter/TorifyHOWTO#socat">socat</a>. |
|
123 | 123 |
</p> |
124 | 124 |
|
125 | 125 |
<p>For information on how to Torify other applications, check out the |
126 |
- <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify |
|
126 |
+ <a href="<wiki>TheOnionRouter/TorifyHOWTO">Torify |
|
127 | 127 |
HOWTO</a>. |
128 | 128 |
</p> |
129 | 129 |
|
... | ... |
@@ -141,7 +141,7 @@ |
141 | 141 |
#<a href="http://ipchicken.com/">this site</a> |
142 | 142 |
#to see what IP address it thinks you're using. |
143 | 143 |
(If that site is down, see <a |
144 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
144 |
+ href="<wikifaq>#IsMyConnectionPrivate">this |
|
145 | 145 |
FAQ entry</a> for more suggestions on how to test your Tor.) |
146 | 146 |
</p> |
147 | 147 |
|
... | ... |
@@ -152,7 +152,7 @@ |
152 | 152 |
9050). If |
153 | 153 |
your firewall blocks outgoing connections, punch a hole so |
154 | 154 |
it can connect to at least TCP ports 80 and 443, and then see <a |
155 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
155 |
+ href="<wikifaq>#FirewalledClient">this |
|
156 | 156 |
FAQ entry</a>. If your SELinux config is not allowing tor or privoxy to |
157 | 157 |
run correctly, create a file named booleans.local in the directory |
158 | 158 |
/etc/selinux/targeted. Edit this file in your favorite text editor and |
... | ... |
@@ -161,7 +161,7 @@ |
161 | 161 |
</p> |
162 | 162 |
|
163 | 163 |
<p>If it's still not working, look at <a |
164 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
164 |
+ href="<wikifaq>#ItDoesntWork">this |
|
165 | 165 |
FAQ entry</a> for hints.</p> |
166 | 166 |
|
167 | 167 |
<hr /> |
... | ... |
@@ -180,7 +180,7 @@ |
180 | 180 |
|
181 | 181 |
<p>Having relays in many different places on the Internet is what |
182 | 182 |
makes Tor users secure. <a |
183 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">You |
|
183 |
+ href="<wikifaq>#RelayAnonymity">You |
|
184 | 184 |
may also get stronger anonymity yourself</a>, |
185 | 185 |
since remote sites can't know whether connections originated at your |
186 | 186 |
computer or were relayed from others.</p> |
... | ... |
@@ -44,7 +44,7 @@ |
44 | 44 |
You should fill in "localhost" |
45 | 45 |
and "8118" to point the top four protocols to Polipo, as shown here. (Even |
46 | 46 |
though Polipo doesn't support FTP and Gopher, <a |
47 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">you |
|
47 |
+ href="wikifaq#FtpProxy">you |
|
48 | 48 |
should set them up anyway</a>.) You should also fill out the socks proxy entry to point directly to Tor ("localhost", "9050", and socks5) |
49 | 49 |
to cover protocols besides the first four. Then click "OK".</p> |
50 | 50 |
|
... | ... |
@@ -86,7 +86,7 @@ |
86 | 86 |
|
87 | 87 |
<p> |
88 | 88 |
If you plan to run Firefox on a different computer than Tor, see the <a |
89 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress">FAQ |
|
89 |
+ href="<wikifaq>#SocksListenAddress">FAQ |
|
90 | 90 |
entry for running Tor on a different computer</a>. |
91 | 91 |
</p> |
92 | 92 |
|
... | ... |
@@ -94,14 +94,14 @@ |
94 | 94 |
point them at Polipo (that is, localhost port 8118). To use SOCKS |
95 | 95 |
directly (for instant messaging, Jabber, IRC, etc), you can point |
96 | 96 |
your application directly at Tor (localhost port 9050), but see <a |
97 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
97 |
+ href="<wikifaq>#SOCKSAndDNS">this |
|
98 | 98 |
FAQ entry</a> for why this may be dangerous. For applications |
99 | 99 |
that support neither SOCKS nor HTTP, take a look at SocksCap or |
100 | 100 |
<a href="http://www.freecap.ru/eng/">FreeCap</a>. |
101 | 101 |
(FreeCap is free software; SocksCap is proprietary.)</p> |
102 | 102 |
|
103 | 103 |
<p>For information on how to Torify other applications, check out the |
104 |
- <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify |
|
104 |
+ <a href="<wiki>/TheOnionRouter/TorifyHOWTO">Torify |
|
105 | 105 |
HOWTO</a>. |
106 | 106 |
</p> |
107 | 107 |
|
... | ... |
@@ -125,7 +125,7 @@ |
125 | 125 |
sure that your IP address is being anonymized. Click on <a |
126 | 126 |
href="https://check.torproject.org/">the Tor detector</a> and see |
127 | 127 |
whether it thinks you're using Tor or not. (If that site is down, see <a |
128 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
128 |
+ href="<wikifaq>#IsMyConnectionPrivate">this |
|
129 | 129 |
FAQ entry</a> for more suggestions on how to test your Tor.) |
130 | 130 |
</p> |
131 | 131 |
|
... | ... |
@@ -134,12 +134,12 @@ |
134 | 134 |
your local applications to local port 8118 and port 9050. If |
135 | 135 |
your firewall blocks outgoing connections, punch a hole so |
136 | 136 |
it can connect to at least TCP ports 80 and 443, and then see <a |
137 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
137 |
+ href="<wikifaq>#FirewalledClient">this |
|
138 | 138 |
FAQ entry</a>. |
139 | 139 |
</p> |
140 | 140 |
|
141 | 141 |
<p>If it's still not working, look at <a |
142 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
142 |
+ href="<wikifaq>#ItDoesntWork">this |
|
143 | 143 |
FAQ entry</a> for hints.</p> |
144 | 144 |
|
145 | 145 |
<p> |
... | ... |
@@ -163,7 +163,7 @@ |
163 | 163 |
|
164 | 164 |
<p>Having relays in many different places on the Internet is what |
165 | 165 |
makes Tor users secure. <a |
166 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">You |
|
166 |
+ href="<wikifaq>#RelayAnonymity">You |
|
167 | 167 |
may also get stronger anonymity yourself</a>, |
168 | 168 |
since remote sites can't know whether connections originated at your |
169 | 169 |
computer or were relayed from others.</p> |
... | ... |
@@ -59,7 +59,7 @@ |
59 | 59 |
immediately and your browser pops up an alert saying that |
60 | 60 |
"www.duskgytldkxiuqc6.onion could not be found, please check the name and |
61 | 61 |
try again" then you haven't configured Tor correctly; see <a |
62 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">the |
|
62 |
+ href="<wikifaq>#ItDoesntWork">the |
|
63 | 63 |
it-doesn't-work FAQ entry</a> for some help. |
64 | 64 |
</p> |
65 | 65 |
|
... | ... |
@@ -118,7 +118,7 @@ |
118 | 118 |
</p> |
119 | 119 |
|
120 | 120 |
<p>First, open your torrc file in your favorite text editor. (See <a |
121 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc">the |
|
121 |
+ href="<wikifaq>#torrc">the |
|
122 | 122 |
torrc FAQ entry</a> to learn what this means.) Go to the middle section and |
123 | 123 |
look for the line</p> |
124 | 124 |
|
... | ... |
@@ -170,7 +170,7 @@ |
170 | 170 |
your logfiles for hints. It will print some warnings or error messages. That |
171 | 171 |
should give you an idea what went wrong. Typically there are typos in the torrc |
172 | 172 |
or wrong directory permissions (See <a |
173 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Logs">the |
|
173 |
+ href="<wikifaq>#Logs">the |
|
174 | 174 |
logging FAQ entry</a> if you don't know how to enable or find your |
175 | 175 |
log file.) |
176 | 176 |
</p> |
... | ... |
@@ -65,7 +65,7 @@ |
65 | 65 |
<li><a href="<page docs/tor-manual>">Manuals</a></li> |
66 | 66 |
<li><a href="<page docs/documentation>">Installation Guides</a></li> |
67 | 67 |
<li><a href="<wiki>">Tor Wiki</a></li> |
68 |
- <li><a href="<page docs/faq>">FAQ</a></li> |
|
68 |
+ <li><a href="<wikifaq>">FAQ</a></li> |
|
69 | 69 |
</ul> |
70 | 70 |
</div> |
71 | 71 |
<!-- END COL --> |
... | ... |
@@ -6,7 +6,8 @@ |
6 | 6 |
<define-tag gitrepo whitespace=delete>https://gitweb.torproject.org/tor.git?a=tree;hb=HEAD</define-tag> |
7 | 7 |
<define-tag svnwebsite whitespace=delete>https://svn.torproject.org/svn/website/trunk/</define-tag> |
8 | 8 |
<define-tag svnprojects whitespace=delete>https://svn.torproject.org/svn/projects/</define-tag> |
9 |
-<define-tag wiki whitespace=delete>https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/</define-tag> |
|
9 |
+<define-tag wiki whitespace=delete>https://trac.torproject.org/projects/tor/wiki/</define-tag> |
|
10 |
+<define-tag wikifaq whitespace=delete>https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ</define-tag> |
|
10 | 11 |
<define-tag blog whitespace=delete>https://blog.torproject.org/</define-tag> |
11 | 12 |
<define-tag tbbrepo whitespace=delete>https://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:</define-tag> |
12 | 13 |
|
13 | 14 |