tor 0.2.2.34-1 source package in Ubuntu

Changelog

tor (0.2.2.34-1) unstable; urgency=high

  * New upstream version, fixing a couple of security relevant bugs
    such as guard enumeration (CVE-2011-2768) and bridge enumeration
    (CVE-2011-2769) issues.  For details consult the upstream changelog.
 -- Ubuntu Archive Auto-Sync <email address hidden>   Sun,  30 Oct 2011 10:30:20 +0000

Upload details

Uploaded by:
Ubuntu Archive Auto-Sync on 2011-10-30
Uploaded to:
Precise
Original maintainer:
Peter Palfrader
Architectures:
any all
Section:
net
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
tor_0.2.2.34.orig.tar.gz 2.6 MiB a027a535b35e5f9ca7091e4c83a06b4be48f0f95d6906bdd467ccc0659e7e798
tor_0.2.2.34-1.diff.gz 30.7 KiB b431317a9ce6d9195805539d1f06552f62e014b074c1cb612dec186c57158d4f
tor_0.2.2.34-1.dsc 1.6 KiB 634f3683620639e723381a90d9dfbff047af7b4056f1328bb3334065c24a5e1d

Available diffs

View changes file

Binary packages built by this source

tor: anonymizing overlay network for TCP

 Tor is a connection-based low-latency anonymous communication system which
 addresses many flaws in the original onion routing design.
 .
 In brief, Onion Routing is a connection-oriented anonymizing communication
 service. Users choose a source-routed path through a set of nodes, and
 negotiate a "virtual circuit" through the network, in which each node
 knows its predecessor and successor, but no others. Traffic flowing down
 the circuit is unwrapped by a symmetric key at each node, which reveals
 the downstream node.
 .
 Basically Tor provides a distributed network of servers ("onion
 routers"). Users bounce their tcp streams (web traffic, ftp, ssh, etc)
 around the routers, and recipients, observers, and even the routers
 themselves have difficulty tracking the source of the stream.
 .
 Note that Tor does no protocol cleaning. That means there is a danger that
 application protocols and associated programs can be induced to reveal
 information about the initiator. Tor depends on Privoxy and similar protocol
 cleaners to solve this problem.
 .
 Client applications can use the Tor network by connecting to the local
 onion proxy. If the application itself does not come with socks support
 you can use a socks client such as tsocks. Some web browsers like mozilla
 and web proxies like privoxy come with socks support, so you don't need an
 extra socks client if you want to use Tor with them.
 .
 This package enables only the onion proxy by default, but it can be configured
 as a relay (server) node.
 .
 Remember that this is development code -- don't rely on the current Tor
 network if you really need strong anonymity.
 .
 The latest information can be found at https://www.torproject.org/, or on the
 mailing lists, archived at https://lists.torproject.org/pipermail/tor-talk/ or
 https://lists.torproject.org/pipermail/tor-announce/.

tor-dbg: debugging symbols for Tor

 This package provides the debugging symbols for Tor, The Onion Router.
 Those symbols allow your debugger to assign names to your backtraces, which
 makes it somewhat easier to interpret core dumps.

tor-geoipdb: geoIP database for Tor

 This package provides a geoIP database for Tor, i.e. it maps IPv4 addresses
 to countries.
 .
 Bridges (special Tor relays that aren't listed in the main Tor directory) use
 this information to report which countries they get access from. This allows
 the Tor network operators to learn if certain countries started blocking
 access to bridges.