Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

tor-0.4.8.14-1.1 RPM for x86_64

From OpenSuSE Tumbleweed for x86_64

Name: tor Distribution: openSUSE Tumbleweed
Version: 0.4.8.14 Vendor: openSUSE
Release: 1.1 Build date: Wed Feb 5 19:26:41 2025
Group: Unspecified Build host: reproducible
Size: 27387010 Source RPM: tor-0.4.8.14-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://www.torproject.org/
Summary: Anonymizing overlay network for TCP (The onion router)
Tor is a connection-based low-latency anonymous communication system.

This package provides the "tor" program, which serves as both a client and
a relay node. Scripts will automatically create a "tor" user and
a "tor" group, and set tor up to run as a daemon when the system
is rebooted.

Applications connect to the local Tor proxy using the SOCKS
protocol. The tor client chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.

Warnings: Tor does no protocol cleaning.  That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy or
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.

Provides

Requires

License

BSD-3-Clause

Changelog

* Wed Feb 05 2025 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.8.14
    * bugfix for onion service directory cache
    * test-network now unconditionally includes IPv6
    * Regenerate fallback directories 2025-02-05
    * Update the geoip files to 2025-02-05
    * Fix a pointer free
* Fri Dec 27 2024 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.13
    * Conflux related client circuit building performance bugfix
    * Fix minor memory leaks
    * Add STATUS TYPE=version handler for Pluggable Transport
* Tue Jun 11 2024 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.8.12
    * Minor features and bugfixes
    * See https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes
* Thu Apr 11 2024 Bernhard Wiedemann <bwiedemann@suse.de>
  - tor 0.4.8.11
    * Minor features and bugfixes
    * See https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes
* Wed Feb 14 2024 Martin Pluskal <mpluskal@suse.com>
  - Enables scrypt support unconditionally
* Mon Feb 05 2024 Andreas Stieger <andreas.stieger@gmx.de>
  - fix users/groups with rpm 4.19
* Fri Dec 08 2023 Bernhard Wiedemann <bwiedemann@suse.de>
  - tor 0.4.8.10:
    * (TROVE-2023-007, exit) (boo#1217918)
    - fix a a UAF and NULL pointer dereference crash on Exit relays
* Thu Nov 09 2023 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.8.9:
    * (onion service, TROVE-2023-006):
    - Fix a possible hard assert on a NULL pointer
    * (guard usage):
    - When Tor excluded a guard due to temporary circuit restrictions,
      it considered *additional* primary guards for potential usage by
      that circuit.
* Fri Nov 03 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.8:
    * Mitigate an issue when Tor compiled with OpenSSL can crash during
      handshake with a remote relay. (TROVE-2023-004, boo#1216873)
    * Regenerate fallback directories generated on November 03, 2023.
    * Update the geoip files to match the IPFire Location Database, as
      retrieved on 2023/11/03
    * directory authority: Look at the network parameter
      "maxunmeasuredbw" with the correct spelling
    * vanguards addon support: Count the conflux linked cell as
      valid when it is successfully processed. This will quiet a
      spurious warn in the vanguards addon
* Mon Sep 25 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.7:
    * Fix an issue that prevented us from pre-building more conflux
      sets after existing sets had been used
* Tue Sep 19 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.6:
    * onion service: Fix a reliability issue where services were
      expiring their introduction points every consensus update.
      This caused connectivity issues for clients caching the old
      descriptor and intro points
    * Log the input and output buffer sizes when we detect a potential
      compression bomb
    * Disable multiple BUG warnings of a missing relay identity key when
      starting an instance of Tor compiled without relay support
    * When reporting a pseudo-networkstatus as a bridge authority, or
      answering "ns/purpose/*" controller requests, include accurate
      published-on dates from our list of router descriptors
    * Use less frightening language and lower the log-level of our
      run-time ABI compatibility check message in our Zstd
      compression subsystem
* Wed Aug 30 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.5:
    * bugfixes creating log BUG stacktrace
* Sun Aug 27 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.4:
    * Extend DoS protection to partially opened channels and known
      relays
    * Dynamic Proof-Of-Work protocol to thwart flooding DoS attacks
      against hidden services. Disabled by default, enable via
      "HiddenServicePoW" in torrc
    * Implement conflux traffic splitting
    * Directory authorities and relays now interact properly with
      directory authorities if they change addresses
* Sun Jul 30 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.14:
    * bugfix affecting vanguards (onion service), and minor fixes
* Fri Mar 10 2023 Martin Pluskal <mpluskal@suse.com>
  - Enable support for scrypt()
* Fri Jan 13 2023 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.7.13:
    * fix SafeSocks option to avoid DNS leaks (boo#1207110, TROVE-2022-002)
    * improve congestion control
    * fix relay channel handling
* Tue Dec 06 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.12:
    * new key for moria1
    * new metrics are exported on the MetricsPort for the congestion
      control subsystem
* Thu Nov 10 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.11:
    * Improve security of DNS cache by randomly clipping the TTL
      value (boo#1205307, TROVE-2021-009)
    * Improved defenses against network-wide DoS, multiple counters
      and metrics added to MetricsPorts
    * Apply circuit creation anti-DoS defenses if the outbound
      circuit max cell queue size is reached too many times. This
      introduces two new consensus parameters to control the queue
      size limit and number of times allowed to go over that limit.
    * Directory authority updates
    * IPFire database and geoip updates
    * Bump the maximum amount of CPU that can be used from 16 to 128.
      The NumCPUs torrc option overrides this hardcoded maximum.
    * onion service: set a higher circuit build timeout for opened
      client rendezvous circuit to avoid timeouts and retry load
    * Make the service retry a rendezvous if the circuit is being
      repurposed for measurements
* Fri Aug 12 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.10
    * IPFire location database did not have proper ARIN network
      allocations - affected circuit path selection and relay metrics
* Thu Aug 11 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.9 (boo#1202336)
    * major fixes aimed at reducing memory pressure on relays
    * prevent a possible side-channel
    * major bugfix related to congestion control
    * major bugfix related to Vanguard L2 layer node selection
* Thu Jun 16 2022 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.7.8
    * Fix a scenario where RTT estimation can become wedged, seriously
      degrading congestion control performance on all circuits. This
      impacts clients, onion services, and relays, and can be triggered
      remotely by a malicious endpoint.
      (TROVE-2022-001, CVE-2022-33903, boo#1200672)
    * Regenerate fallback directories generated on June 17, 2022.
    * Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/06/17.
    * Allow the rseq system call in the sandbox
    * logging bug fixes
* Wed Apr 27 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.7
    * New feature: Congestion control to improve traffic speed and
      stability on the network once a majority of Exit nodes upgrade
      boo#1198949
    * Directory authorities: improved handling of "MiddleOnly" relays
    * Improved mitigation against guard discovery attacks on clients
      and short-lived services
    * Improve observed performance under DNS load
    * Improve handling of overload state
    * end-of-life relays running version 0.4.2.x, 0.4.3.x,
      0.4.4.x and 0.4.5 alphas/rc, 0.3.5.x are now rejected
    * Onion service v2 addresses are no longer recognized
* Sun Feb 06 2022 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.6.10
    * minor bugfixes and features
    * https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.6/ReleaseNotes

Files

/etc/logrotate.d/tor
/etc/tor
/etc/tor/torrc
/etc/tor/torrc.minimal
/etc/tor/torrc.sample
/usr/bin/tor
/usr/bin/tor-gencert
/usr/bin/tor-print-ed-signing-cert
/usr/bin/tor-resolve
/usr/bin/torify
/usr/lib/systemd/system/tor-master.service
/usr/lib/systemd/system/tor.service
/usr/lib/tmpfiles.d/tor.conf
/usr/sbin/rctor
/usr/sbin/rctor-master
/usr/share/doc/packages/tor
/usr/share/doc/packages/tor/ChangeLog
/usr/share/doc/packages/tor/HACKING
/usr/share/doc/packages/tor/HACKING/CodingStandards.md
/usr/share/doc/packages/tor/HACKING/Fuzzing.md
/usr/share/doc/packages/tor/HACKING/GettingStarted.md
/usr/share/doc/packages/tor/HACKING/HelpfulTools.md
/usr/share/doc/packages/tor/HACKING/HowToReview.md
/usr/share/doc/packages/tor/HACKING/Module.md
/usr/share/doc/packages/tor/HACKING/README.1st.md
/usr/share/doc/packages/tor/HACKING/ReleasingTor.md
/usr/share/doc/packages/tor/HACKING/WritingTests.md
/usr/share/doc/packages/tor/HACKING/tracing
/usr/share/doc/packages/tor/HACKING/tracing/EventsCircuit.md
/usr/share/doc/packages/tor/HACKING/tracing/README.md
/usr/share/doc/packages/tor/README.md
/usr/share/doc/packages/tor/tor-gencert.html
/usr/share/doc/packages/tor/tor-print-ed-signing-cert.html
/usr/share/doc/packages/tor/tor-resolve.html
/usr/share/doc/packages/tor/tor.html
/usr/share/doc/packages/tor/torify.html
/usr/share/licenses/tor
/usr/share/licenses/tor/LICENSE
/usr/share/man/man1/tor-gencert.1.gz
/usr/share/man/man1/tor-print-ed-signing-cert.1.gz
/usr/share/man/man1/tor-resolve.1.gz
/usr/share/man/man1/tor.1.gz
/usr/share/man/man1/torify.1.gz
/usr/share/tor
/usr/share/tor/defaults-torrc
/usr/share/tor/geoip
/usr/share/tor/geoip6
/var/lib/tor
/var/log/tor


Generated by rpm2html 1.8.1

Fabrice Bellet, Thu Feb 13 00:04:48 2025