Package tor: Information

  • Default inline alert: Version in the repository: 0.4.8.6-alt1

Source package: tor
Version: 0.4.3.6-alt1
Latest version according to Repology
Build time:  Jul 9, 2020, 09:38 PM in the task #254726
Category: System/Servers
Report package bug
License: BSD-3-Clause
Summary: Anonymizing overlay network for TCP (The onion router)
Description: 
Tor is a connection-based low-latency anonymous communication system.
This package provides the "tor" program, which serves as both a client
and a relay node.

Applications connect to the local Tor proxy using the SOCKS
protocol. The local proxy chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.

Warnings: Tor does no protocol cleaning.  That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy and
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is very small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.

List of rpms provided by this srpm:
tor (x86_64, ppc64le, i586, armh, aarch64)
tor-debuginfo (x86_64, ppc64le, i586, armh, aarch64)

Maintainer: Vladimir Didenko


ACL:
Anton Farygin
@qa
@everybody

    1. ghostscript-common
    2. libssl-devel
    3. libzstd-devel
    4. libsystemd-devel
    5. libcap-devel
    6. texlive-fonts-recommended
    7. texlive-generic-recommended
    8. transfig
    9. libseccomp-devel
    10. zlib-devel
    11. liblzma-devel
    12. libevent-devel

Last changed


July 9, 2020 Vladimir Didenko 0.4.3.6-alt1
- new version (fixes CVE-2020-15572)
May 15, 2020 Vladimir Didenko 0.4.3.5-alt1
- new version
March 18, 2020 Vladimir Didenko 0.4.2.7-alt1
- new version (fixes CVE-2020-10592)