mirror of
https://github.com/torproject/support.git
synced 2025-03-06 16:27:01 +00:00
clean html tags from mdwn
This commit is contained in:
parent
a4fd5966e4
commit
ec08881f5c
content/operators
@ -5,24 +5,42 @@ title: How do I run a middle or guard relay on Debian?
|
||||
seo_slug: how-do-i-run-a-middle-or-guard-relay
|
||||
---
|
||||
description:
|
||||
<p class="mb-3">For the most in-depth resource on running a relay, see the <mark><a href="https://trac.torproject.org/projects/tor/wiki/TorRelayGuide">Tor Relay Guide</a></mark>.</p><p class="mb-3"><ol><li>Run "apt-get install tor" (as root).</li><li>Make sure your clock, date, and timezone are set correctly. Install the ntp or openntpd (or similar) package to keep it that way.</li><li>Edit /etc/tor/torrc to look like the following:
|
||||
<pre><code>## The IP address or hostname for incoming connections (leave commented and Tor will guess)
|
||||
#Address noname.example.com
|
||||
For the most in-depth resource on running a relay, see the <mark><a href="https://trac.torproject.org/projects/tor/wiki/TorRelayGuide">Tor Relay Guide</a></mark>.
|
||||
|
||||
## Set the nickname of this relay
|
||||
Nickname ididnteditheconfig
|
||||
|
||||
## Set your own contact info
|
||||
ContactInfo 0xFFFFFFFF Random Person <nobody AT example dot com>
|
||||
* Run "apt-get install tor" (as root).
|
||||
* Make sure your clock, date, and timezone are set correctly. Install the ntp or openntpd (or similar) package to keep it that way.
|
||||
* Edit /etc/tor/torrc to look like the following:
|
||||
|
||||
## If you control multiple relays, include then in the family
|
||||
#MyFamily $keyid,$keyid,...
|
||||
|
||||
ORPort 9001
|
||||
DirPort 9030
|
||||
## The IP address or hostname for incoming connections (leave commented and Tor will guess)
|
||||
#Address noname.example.com
|
||||
|
||||
## Set your bandwidth rate (leave commented and Tor will run without bandwidth caps)
|
||||
#RelayBandwidthRate 30 MBytes
|
||||
#RelayBandwidthBurst 100 MBytes
|
||||
## Set the nickname of this relay
|
||||
Nickname ididnteditheconfig
|
||||
|
||||
ExitPolicy reject *:*</code></pre></li><li>Run "service tor reload" (as root)</li><li>After your relay connects to the network, it will try to determine whether the ports you configured are reachable from the outside. This step is usually fast, but it may take a few minutes. Look for a log entry in /var/log/syslog such as "Self-testing indicates your ORPort is reachable from the outside. Excellent." If you don't see this message, it means that your relay is not reachable from the outside. You should re-check your firewalls, check that the IP and ports you specified in your torrc are correct, etc.</li></ol></p><p class="mb-3">When it confirms that it's reachable, it will upload a "server descriptor" to the directory authorities to let clients know what address, ports, keys, etc your relay is using. After a few hours (to give it enough time to propagate), you can query Atlas to see whether your relay has successfully registered in the network. If it hasn't, re-check firewalls, IP and ports again.</p>
|
||||
## Set your own contact info
|
||||
ContactInfo 0xFFFFFFFF Random Person <nobody AT example dot com>
|
||||
|
||||
## If you control multiple relays, include then in the family
|
||||
#MyFamily $keyid,$keyid,...
|
||||
|
||||
ORPort 9001
|
||||
DirPort 9030
|
||||
|
||||
## Set your bandwidth rate (leave commented and Tor will run without bandwidth caps)
|
||||
#RelayBandwidthRate 30 MBytes
|
||||
#RelayBandwidthBurst 100 MBytes
|
||||
|
||||
ExitPolicy reject *:*
|
||||
* Run "service tor reload" (as root)
|
||||
* After your relay connects to the network, it will try to determine whether the ports you configured are reachable from the outside.
|
||||
This step is usually fast, but it may take a few minutes.
|
||||
|
||||
Look for a log entry in /var/log/syslog such as "Self-testing indicates your ORPort is reachable from the outside. Excellent."
|
||||
If you don't see this message, it means that your relay is not reachable from the outside.
|
||||
You should re-check your firewalls, check that the IP and ports you specified in your torrc are correct, etc.
|
||||
|
||||
When it confirms that it's reachable, it will upload a "server descriptor" to the directory authorities to let clients know what address, ports, keys, etc your relay is using.
|
||||
After a few hours (to give it enough time to propagate), you can query Atlas to see whether your relay has successfully registered in the network.
|
||||
If it hasn't, re-check firewalls, IP and ports again.
|
||||
|
@ -8,6 +8,7 @@ description:
|
||||
No.
|
||||
If law enforcement becomes interested in traffic from your exit relay, it's possible that officers will seize your computer.
|
||||
For that reason, it's best not to run your exit relay in your home or using your home internet connection.
|
||||
|
||||
Instead, consider running your exit relay in a commercial facility that is supportive of Tor.
|
||||
Have a separate IP address for your exit relay, and don't route your own traffic through it.
|
||||
Of course, you should avoid keeping any sensitive or personal information on the computer hosting your exit relay.
|
||||
|
Loading…
x
Reference in New Issue
Block a user