I just didn’t know what to do with my 8Mbit/s symetric fibre flat internet connection
I decided to run a tor middleman node.
So I tried to set it up with best conscience, using a webserver to serve the tor-exit-notice.html , using a reverse dns entry which is forward resolveable and using the offical tor debian repositorys for the tor binary.
I installed debian squeeze on a alix2c1 using debootstrap:
Here my tor config
# # this should force tor to avoid disk writes because of the cf flash card AvoidDiskWrites 1 #because (i love centralized syslogging) Log notice syslog #start tor as daemon RunAsDaemon 1 # data dir DataDirectory /var/lib/tor # i like to graph some tor statistik for debugging with munin (nice to have it) ControlPort 9051 ControlListenAddress 192.168.1.8:9051 # needed for authentification for the munin plugins HashedControlPassword 16:blablablabla # Required: what port to advertise for incoming Tor connections. ORPort 9001 # A handle for your relay, so people don't have to refer to it by key. Nickname TorTorToriweanarisch # Define these to limit how much relayed traffic you will allow. RelayBandwidthRate 600 KB RelayBandwidthBurst 650 KB # the next two options say that tor is allowed to use only 10GB per day starting from 00:00 localtime AccountingMax 5 GB AccountingStart day 21:00 # this info is very useful, tor will contact you if something is misconfigured or that youre generating ther errors on the network ContactInfo Tor Ture <paranoid dot brume AT gmail dot com> #This setting means that your relay will be used for relaying traffic inside the Tor network, but not for connections to external websites or other services ExitPolicy reject *:*
Here some references (please read):
https://blog.torproj … rg/running-exit-node
https://trac.torproj … oc/ReducedExitPolicy
https://www.torproje … html.en#ExitPolicies
Generate your password hash for control connection:
tor --hash-password password