Anonymizing overlay network for TCP (The Onion Router)

Edit Package tor

Tor is a connection-based low-latency anonymous communication system.

This package provides the "tor" program, which serves as both a client and
a relay node. Scripts will automatically create a "%{toruser}" user and
a "%{torgroup}" group, and set tor up to run as a daemon when the system
is rebooted.

Applications connect to the local Tor proxy using the SOCKS
protocol. The local proxy chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.

Warnings: Tor does no protocol cleaning. That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy and
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is very small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.

Authors:
--------
- R. Dingledine

Refresh
Refresh
Source Files
Filename Size Changed
defaults-torrc 0000000335 335 Bytes
fix-test.patch 0000000627 627 Bytes
tor-0.2.5.x-logrotate.patch 0000001058 1.03 KB
tor-0.4.8.12.tar.gz 0009687430 9.24 MB
tor-0.4.8.12.tar.gz.sha256sum 0000000086 86 Bytes
tor-0.4.8.12.tar.gz.sha256sum.asc 0000000716 716 Bytes
tor-master.service 0000000395 395 Bytes
tor.changes 0000160226 156 KB
tor.keyring 0000043895 42.9 KB
tor.service 0000001471 1.44 KB
tor.spec 0000006185 6.04 KB
tor.tmpfiles 0000000026 26 Bytes
Revision 3 (latest revision is 16)
Sergey Kondakov's avatar Sergey Kondakov (X0F) committed (revision 3)
- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

- Add the missing zlib requirement.

- tor 0.4.0.5:
  * new stable branch, but not a long-term support branch
  * improvements for power management and bootstrap reporting
  * preliminary backend support for circuit padding to prevent some
    kinds of traffic analysis
  * refactoring for long-term maintainability
- drop upstreamed tor-0.3.5.8-nonetwork.patch

- Add tor-0.3.5.8-no-ssl-version-warning.patch (boo#1129411)
- Update tor.tmpfiles to use /run instead of /var/run

- Add tor-0.3.5.8-nonetwork.patch to fix test failures
  without network

- tor 0.3.5.8:
  * CVE-2019-8955 prevent attackers from making tor run
    out of memory and crash
  * Allow SOCKS5 with empty username+password
  * Update geoip and geoip6 to the February 5 2019 Maxmind
    GeoLite2 Country database
  * Select guards even if the consensus has expired, as long
    as the consensus is still reasonably live

- tor 0.3.5.7:
Comments 0
openSUSE Build Service is sponsored by