camo 2.3.0+dfsg-1 source package in Ubuntu

Changelog

camo (2.3.0+dfsg-1) unstable; urgency=medium

  [ Luke Faraone ]
  * Imported Upstream version 2.3.0+dfsg
  * Document DFSG removal in debian/copyright
  * Bump standards version, no changes needed.
  * Update copyright format to 1.0
  * Fix test invocation in debian/rules
  * Include {package,mime-types}.json in the built package
  * Refresh patches

  [ Tim Abbott ]
  * Fix incorrect test in start-stop-daemon command.

 -- Luke Faraone <email address hidden>  Sun, 15 May 2016 18:05:03 +0000

Upload details

Uploaded by:
Zulip Debian Packaging Team
Uploaded to:
Sid
Original maintainer:
Zulip Debian Packaging Team
Architectures:
all
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Yakkety: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
camo_2.3.0+dfsg-1.dsc 1.9 KiB 52db622379fb4063132076e20d53727dad64fe0e71c245088a20da60fd8a1dfa
camo_2.3.0+dfsg.orig.tar.gz 12.5 KiB 556a3486f36c2b9045ef265f6d0941fb93c895714c45eb81bb2b95c75ca141f3
camo_2.3.0+dfsg-1.debian.tar.xz 4.9 KiB 3cc7c03648c6579a1ca9a7f8ae0ed30acbbeb84d2660ffeb07f54cde59f1084d

Available diffs

No changes file available.

Binary packages built by this source

camo: SSL/TLS image proxy to prevent mixed-content warnings

 Camo is an image proxy to prevent mixed content warnings on secure
 pages.
 .
 It should not be installed by an end-user; instead people who operate
 websites that allow user-specified image embeds by URL can run this as
 a daemon to proxy such images through their own servers and serve the
 resulting content over SSL/TLS.
 .
 This provides integrity protection and last-mile confidentiality to
 images, thus preventing a local network attacker from seeing the images
 you request (allowing for possible disclosure of the content you're
 viewing) or changing their content (to misinform, confuse, or shock).
 .
 It of course does not prevent an attacker from modifying the content or
 noticing its access if the attacker is in the path between your
 datacentre and the image source.
 .
 However, even in this case, it provides some security insofar as it
 may prevent the attacker from knowing who is accessing the image.
 .
 Using a shared key, proxy URLs are encrypted with hmac so we can bust
 caches/ban/rate limit if needed.
 .
 Features include:
  * Proxy Google charts
  * Proxy images under 5 MB
  * Follow redirects to a configurable depth
  * Proxy remote images with a content-type of image/*
  * Disallows proxying to private IP ranges