tor - anonymizing overlay network for TCP
|Distribution||Debian 7 (Wheezy)|
|Repository||Debian Main i386|
|Installed size||2.74 KB|
|Download size||1.25 MB|
Tor is a connection-based low-latency anonymous communication system. Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.
|tor_0.2.4.29-1_i386.deb||0.2.4.29||i386||Debian Security Updates Main|
|tor_0.2.4.29-1_amd64.deb||0.2.4.29||amd64||Debian Security Updates Main|
- Update the package index:
# sudo apt-get update
- Install tor deb package:
# sudo apt-get install tor
2015-04-06 - Peter Palfrader <firstname.lastname@example.org> tor (0.2.4.27-1) wheezy-security; urgency=medium * New upstream version, fixing hidden service related Denial of Service bugs: - Fix two remotely triggerable assertion failures (upstream bugs #15600 and #15601). - Disallow multiple INTRODUCE1 cells on the same circuit at introduction points, making overwhelming hidden services with introductions more expensive (upstream bug #15515).
2015-03-22 - Peter Palfrader <email@example.com> tor (0.2.4.26-1) wheezy-security; urgency=medium * New upstream version. + Fixes the following security relevant issues (copied from upstream changelog): - Fix an assertion failure that could occur under high DNS load. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr"; diagnosed and fixed by "cypherpunks". - Fix a bug that could lead to a relay crashing with an assertion failure if a buffer of exactly the wrong layout was passed to buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on 0.2.0.10-alpha. Patch from 'cypherpunks'. - Do not assert if the 'data' pointer on a buffer is advanced to the very end of the buffer; log a BUG message instead. Only assert if it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha. - Disable support for SSLv3. All versions of OpenSSL in use with Tor today support TLS 1.0 or later, so we can safely turn off support for this old (and insecure) protocol. Fixes bug 13426. + Updates the list of directory authorities and the geoIP database.
2014-09-26 - Peter Palfrader <firstname.lastname@example.org> tor (0.2.4.24-1) wheezy; urgency=low * New upstream version, built for stable (re: #762587): - Use correct byte order when sending the address of the chosen rendezvous point to a hidden service. This bug meant that clients were leaking to the hidden service whether they were on a little-endian (common) or big-endian (rare) system. - Change IP address for the gabelmoo v3 directory authority. - Update geoip and geoip6 to the August 7 2014 Maxmind GeoLite2 Country database.
2014-07-30 - Peter Palfrader <email@example.com> tor (0.2.4.23-1~deb7u1) wheezy-security; urgency=high * New upstream version, built for wheezy: - Clients will no longer use CREATE_FAST cells for the first hop of their circuit. This approach can improve security on connections where Tor's circuit handshake is stronger than the available TLS connection security levels. - Prepare for lowering the number of used entry guards by honoring the NumDirectoryGuards consensus parameter. - Fix a bug in the bounds-checking in the 32-bit curve25519-donna implementation. - Warn and drop the circuit if we receive an inbound 'relay early' cell.
2014-06-23 - Peter Palfrader <firstname.lastname@example.org> tor (0.2.4.22-1~deb7u1) wheezy; urgency=medium * Build for stable (re: #751977). * Revert upstream changes to the default torrc to match what 0.2.3.25-1 from stable has (two minor changes in comments).
2014-05-17 - Peter Palfrader <email@example.com> tor (0.2.4.22-1) unstable; urgency=medium * New upstream version.
2014-03-01 - Peter Palfrader <firstname.lastname@example.org> tor (0.2.4.21-1) unstable; urgency=low * New upstream version.
2013-12-25 - Peter Palfrader <email@example.com> tor (0.2.4.20-1) unstable; urgency=low * New upstream version. - Avoid a crash bug when starting with a corrupted microdescriptor cache file. Fixes bug 10406; bugfix on 0.2.2.6-alpha (closes: #732105). * init script: make /var/log/tor if it does not exist anymore (closes: #732572).
2013-12-12 - Peter Palfrader <firstname.lastname@example.org> tor (0.2.4.19-1) unstable; urgency=low * New upstream version.
|tora_2.1.3-2_i386.deb||graphical toolkit for database developers and administrators|
|torchat_0.9.9.550-2_all.deb||decentralized instant messenger built on top of the Tor Network|
|torcs-data-cars_1.3.3+dfsg-0.1_all.deb||data files for TORCS game - Cars set|
|torcs-data-tracks_1.3.3+dfsg-0.1_all.deb||data files for TORCS game - Tracks set|
|torcs-data_1.3.3+dfsg-0.1_all.deb||base data files for TORCS game|
|torcs_1.3.3+dfsg-0.1_i386.deb||3D racing cars simulator game using OpenGL|
|torque-client-x11_2.4.16+dfsg-1+deb7u4_i386.deb||GUI for torque clients|
|torque-client_2.4.16+dfsg-1+deb7u4_i386.deb||command line interface to Torque server|
|torque-common_2.4.16+dfsg-1+deb7u4_i386.deb||Torque Queueing System shared files|
|torque-mom_2.4.16+dfsg-1+deb7u4_i386.deb||job execution engine for Torque batch system|
|torque-pam_2.4.16+dfsg-1+deb7u4_i386.deb||PAM module for PBS MOM nodes|
|torque-scheduler_2.4.16+dfsg-1+deb7u4_i386.deb||scheduler part of Torque|
|torque-server_2.4.16+dfsg-1+deb7u4_i386.deb||PBS-derived batch processing server|
|torrentflux_2.4-5.1_all.deb||web based, feature-rich BitTorrent download manager|
|torrus-apache2_2.03-2+deb7u1_all.deb||Universal front-end for Round-Robin Databases (for apache 2.x) (deprecated)|