?????? Why are we doing this? ?????? </p>

Because anonymity is important for many people. See who uses Tor.

?????? Tor Project Inc. develops Tor. Why another organization? ??????

Tor Project Inc. develops Tor, but it doesn't provide Tor nodes. All nodes are contributed by volunteers, and while entry and middle nodes operate with little risk, exits provide publicly facing IP addresses, which can be connected to abuses of the network. Therefore, not many people provide exits, and that limits the available bandwidth of the network. Torservers.net aims to expand the pool of exit nodes by helping people set up their own exits and by taking care of abuse complaints and legal issues. So, to the contrary, we need even more organizations! We're happy to help you set one up in your country.

We also provide and distribute private bridge IPs to Tor users where regular Tor access is blocked.



Hidden Services

?????? What happens if I use the same key on two or more servers? ??????

You get a simple form of failover. See https://lists.torproject.org/pipermail/tor-relays/2011-April/000736.html


?????? Which Ports Should I Use? ??????

Tor will work with any ORPort and DirPort.

Tor ORPort traffic is SSL, so the rationale is that your node will be “most reachable” if you use 443 (commonly used for HTTPS). Nobody knows for sure, but what IS known is that there is also a fair amount of users where 443 is definitely blocked, so you should take a look at other node configurations at Torstatus and decide what port could be useful. 22 is probably good too. Same goes for DirPort: The stuff is HTTP, so port 80 makes much sense. Most relays however use port 80 already, so it also makes perfect sense for you NOT to use port 80, because it might be blocked for some Tor users. We use 443/80 for most of our relays.

If you have limited bandwidth resources, it is wise to disable directory mirroring and donate your traffic for relaying only.

?????? What are the minimal requirements for a 10mbps relay? ??????

A virtual machine with 256MB RAM might be enough, but we experienced some out of memory errors with long running nodes. If you can, upgrade to 512MB. You can also experiment with OpenSSL 1.0 and OpenBSD-Malloc. CPU requirements: Hard to say. If you have some idea, edit this.

?????? What are the minimal requirements for a high bandwidth relay? ??????

Tor currently does not scale on multi-cores. You can however run multiple Tor processes. We have good experience with running one process per CPU core. One core should be good enough for 100 Mbps, likely more. Also check if your CPU supports AES-NI crypto acceleration. See our setup guide for details.

?????? [warn] Your computer is too slow to handle this many circuit creation requests! ??????

Try setting NumCPU to the actual number of CPUs you have. Scott suggests setting MaxOnionsPending 250 ( https://lists.torproject.org/pipermail/tor-relays/2012-May/001352.html ).

?????? [warn] Failing because we have 15967 connections already. Please raise your ulimit -n. ??????

Edit /etc/init.d/tor and raise ulimit. Run ulimit -n 65535.

?????? kernel: [93953.089233] TCP: Peer xx.xx.xx.xx:27419/34681 unexpectedly shrunk window 2848685075:2848689620 (repaired) ??????

You can safely ignore these messages.