Changes between Version 2 and Version 3 of TorRelayGuide

Dec 7, 2017, 2:19:47 PM (20 months ago)

bridge and middle descriptions


  • TorRelayGuide

    v2 v3  
    55== Types of relays in the Tor network ==
     7All relays are important, but they have different technical requirements and legal implications. Understanding the different kinds of relays is the first step to learning which one is right for you.
     9=== Guard/middle relay ===
     12A guard is the first relay in a Tor circuit when the user is not using a bridge. A middle relay is neither a guard nor an exit, but acts as the middle point between the two. Non-exit relays can function as either a guard or a middle for different users.
     15A guard or middle relay will also generally receive very few (near-zero) abuse complaints. This relay will be listed in the public consensus, so may be blocked by certain services that don't understand how Tor works. If you are running a relay from home and have one static IP, you may want to consider running a bridge instead so that your non-Tor traffic doesn't get blocked as though it's coming from Tor. If you have a dynamic IP or multiple static IPs, this isn't as much of an issue.
     17It takes some time for the traffic directed to new guard/middle relay to ramp up. To understand this process, read about the [lifecycle of a new relay].
     21=== Bridge ===
     22The design of the Tor network means that the identity of most Tor relays is public. However, one of the ways Tor can be blocked by governments or ISPs is by blacklisting the IP addresses of these public Tor nodes. Bridge relays are Tor relays that are not listed in the public Tor directory, which make it harder for ISPs and governments to block them. Bridges are useful for Tor users under oppressive regimes, and for people who want an extra layer of security because they're worried somebody will recognize that they are contacting a public Tor relay IP address. Several countries, including China and Iran, have found ways to detect and block connections to Tor bridges. [ ​Pluggable Transports], a special kind of bridge, address this by adding an additional layer of obfuscation.
     25Bridges are relatively easy and low-risk relays to operate, but they have a big impact on users. A bridge isn't likely to receive any abuse complaints, and since bridges are not listed in the public consensus, they are unlikely to be blocked by popular services. Bridges are a great option if you can only run a relay from your home network, have only one static IP, and don't have a huge amount of bandwidth to donate -- we recommend giving your bridge at least 1Mbit/sec.
     29=== Exit relay ===
    731== Requirements ==