Anonymizing overlay network for TCP (The Onion Router)
Tor is a connection-based low-latency anonymous communication system.
This package provides the "tor" program, which serves as both a client and
a relay node. Scripts will automatically create a "%{toruser}" user and
a "%{torgroup}" group, and set tor up to run as a daemon when the system
is rebooted.
Applications connect to the local Tor proxy using the SOCKS
protocol. The local proxy chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.
Warnings: Tor does no protocol cleaning. That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy and
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is very small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.
Authors:
--------
- R. Dingledine
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP6/tor && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
defaults-torrc | 0000000335 335 Bytes | |
fix-test.patch | 0000000627 627 Bytes | |
tor-0.2.5.x-logrotate.patch | 0000001058 1.03 KB | |
tor-0.4.8.9.tar.gz | 0008266806 7.88 MB | |
tor-0.4.8.9.tar.gz.sha256sum | 0000000085 85 Bytes | |
tor-0.4.8.9.tar.gz.sha256sum.asc | 0000000716 716 Bytes | |
tor-master.service | 0000000395 395 Bytes | |
tor.changes | 0000159063 155 KB | |
tor.keyring | 0000043895 42.9 KB | |
tor.service | 0000001471 1.44 KB | |
tor.spec | 0000006152 6.01 KB | |
tor.tmpfiles | 0000000026 26 Bytes |
Latest Revision
tor 0.4.8.9: * (onion service, TROVE-2023-006): - Fix a possible hard assert on a NULL pointer * (guard usage): - When Tor excluded a guard due to temporary circuit restrictions, it considered *additional* primary guards for potential usage by that circuit. - tor 0.4.8.8: * Mitigate an issue when Tor compiled with OpenSSL can crash during handshake with a remote relay. (TROVE-2023-004, boo#1216873) * Regenerate fallback directories generated on November 03, 2023. * Update the geoip files to match the IPFire Location Database, as retrieved on 2023/11/03 * directory authority: Look at the network parameter "maxunmeasuredbw" with the correct spelling * vanguards addon support: Count the conflux linked cell as valid when it is successfully processed. This will quiet a spurious warn in the vanguards addon
Comments 0