tor

Edit Package tor

The onion router. Anonymizing network.

Refresh
Refresh
Source Files
Filename Size Changed
defaults-torrc 0000000335 335 Bytes
fix-test.patch 0000000627 627 Bytes
tor-0.2.5.x-logrotate.patch 0000001058 1.03 KB
tor-0.4.7.10.tar.gz 0007933376 7.57 MB
tor-0.4.7.10.tar.gz.sha256sum 0000000086 86 Bytes
tor-0.4.7.10.tar.gz.sha256sum.asc 0000001321 1.29 KB
tor-master.service 0000000395 395 Bytes
tor.changes 0000153951 150 KB
tor.keyring 0000043895 42.9 KB
tor.service 0000001471 1.44 KB
tor.spec 0000005800 5.66 KB
tor.tmpfiles 0000000026 26 Bytes
Revision 1 (latest revision is 18)
Nikolov's avatar Nikolov (microchip) committed (revision 1)
- tor 0.4.7.10
  * IPFire location database did not have proper ARIN network
    allocations - affected circuit path selection and relay metrics
 

- tor 0.4.7.9 (boo#1202336)
  * major fixes aimed at reducing memory pressure on relays
  * prevent a possible side-channel
  * major bugfix related to congestion control
  * major bugfix related to Vanguard L2 layer node selection

- tor 0.4.7.8
  * Fix a scenario where RTT estimation can become wedged, seriously
    degrading congestion control performance on all circuits. This
    impacts clients, onion services, and relays, and can be triggered
    remotely by a malicious endpoint.
    (TROVE-2022-001, CVE-2022-33903, boo#1200672)
  * Regenerate fallback directories generated on June 17, 2022.
  * Update the geoip files to match the IPFire Location Database, as
    retrieved on 2022/06/17.
  * Allow the rseq system call in the sandbox
  * logging bug fixes

- tor 0.4.7.7
  * New feature: Congestion control to improve traffic speed and
    stability on the network once a majority of Exit nodes upgrade
    boo#1198949
  * Directory authorities: improved handling of "MiddleOnly" relays
  * Improved mitigation against guard discovery attacks on clients
    and short-lived services
Comments 0
openSUSE Build Service is sponsored by