From cd6d6d76d7e3e993875b1916cfdae1d702ae42eb Mon Sep 17 00:00:00 2001
From: Roger Dingledine
(The Tor server doesn't need to be run as root, and doesn't -need any special system permissions or kernel mods. If you're -the paranoid sort, feel free to put it into a chroot jail.)
First, copy torrc.sample to torrc (by default it's in /usr/local/etc/tor/), and edit the middle part. Create the DataDirectory, -and make sure it's owned by whoever will be running tor. Fix your system +and make sure it's owned by the uid/gid that will be running tor. Fix your system clock so it's not too far off. Make sure name resolution works. Open a hole in your firewall so outsiders can connect to your ORPort.
@@ -242,11 +243,6 @@ tor-ops@freehaven.net. if there's any problem. Also describe what kind of connectivity the new server will have. If possible, PGP sign your mail. -NOTE: You won't be able to use tor as a client or server -in this configuration until you've been added to the directory -and can authenticate to the other nodes. (This is no longer the case -for 0.0.8 and after.)
-Once your fingerprint has been approved, you can click here or here and look at the @@ -319,7 +315,7 @@ the latest cvs version may not compile or work right). Then: