Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: tor | Distribution: openSUSE Tumbleweed |
Version: 0.4.8.14 | Vendor: openSUSE |
Release: 1.1 | Build date: Wed Feb 5 19:26:41 2025 |
Group: Unspecified | Build host: reproducible |
Size: 27387010 | Source RPM: tor-0.4.8.14-1.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.torproject.org/ | |
Summary: Anonymizing overlay network for TCP (The onion router) |
Tor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Scripts will automatically create a "tor" user and a "tor" group, and set tor up to run as a daemon when the system is rebooted. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
BSD-3-Clause
* Wed Feb 05 2025 Bernhard Wiedemann <bwiedemann@suse.com> - tor 0.4.8.14 * bugfix for onion service directory cache * test-network now unconditionally includes IPv6 * Regenerate fallback directories 2025-02-05 * Update the geoip files to 2025-02-05 * Fix a pointer free * Fri Dec 27 2024 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.8.13 * Conflux related client circuit building performance bugfix * Fix minor memory leaks * Add STATUS TYPE=version handler for Pluggable Transport * Tue Jun 11 2024 Bernhard Wiedemann <bwiedemann@suse.com> - tor 0.4.8.12 * Minor features and bugfixes * See https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes * Thu Apr 11 2024 Bernhard Wiedemann <bwiedemann@suse.de> - tor 0.4.8.11 * Minor features and bugfixes * See https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes * Wed Feb 14 2024 Martin Pluskal <mpluskal@suse.com> - Enables scrypt support unconditionally * Mon Feb 05 2024 Andreas Stieger <andreas.stieger@gmx.de> - fix users/groups with rpm 4.19 * Fri Dec 08 2023 Bernhard Wiedemann <bwiedemann@suse.de> - tor 0.4.8.10: * (TROVE-2023-007, exit) (boo#1217918) - fix a a UAF and NULL pointer dereference crash on Exit relays * Thu Nov 09 2023 Bernhard Wiedemann <bwiedemann@suse.com> - tor 0.4.8.9: * (onion service, TROVE-2023-006): - Fix a possible hard assert on a NULL pointer * (guard usage): - When Tor excluded a guard due to temporary circuit restrictions, it considered *additional* primary guards for potential usage by that circuit. * Fri Nov 03 2023 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.8.8: * Mitigate an issue when Tor compiled with OpenSSL can crash during handshake with a remote relay. (TROVE-2023-004, boo#1216873) * Regenerate fallback directories generated on November 03, 2023. * Update the geoip files to match the IPFire Location Database, as retrieved on 2023/11/03 * directory authority: Look at the network parameter "maxunmeasuredbw" with the correct spelling * vanguards addon support: Count the conflux linked cell as valid when it is successfully processed. This will quiet a spurious warn in the vanguards addon * Mon Sep 25 2023 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.8.7: * Fix an issue that prevented us from pre-building more conflux sets after existing sets had been used * Tue Sep 19 2023 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.8.6: * onion service: Fix a reliability issue where services were expiring their introduction points every consensus update. This caused connectivity issues for clients caching the old descriptor and intro points * Log the input and output buffer sizes when we detect a potential compression bomb * Disable multiple BUG warnings of a missing relay identity key when starting an instance of Tor compiled without relay support * When reporting a pseudo-networkstatus as a bridge authority, or answering "ns/purpose/*" controller requests, include accurate published-on dates from our list of router descriptors * Use less frightening language and lower the log-level of our run-time ABI compatibility check message in our Zstd compression subsystem * Wed Aug 30 2023 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.8.5: * bugfixes creating log BUG stacktrace * Sun Aug 27 2023 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.8.4: * Extend DoS protection to partially opened channels and known relays * Dynamic Proof-Of-Work protocol to thwart flooding DoS attacks against hidden services. Disabled by default, enable via "HiddenServicePoW" in torrc * Implement conflux traffic splitting * Directory authorities and relays now interact properly with directory authorities if they change addresses * Sun Jul 30 2023 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.7.14: * bugfix affecting vanguards (onion service), and minor fixes * Fri Mar 10 2023 Martin Pluskal <mpluskal@suse.com> - Enable support for scrypt() * Fri Jan 13 2023 Bernhard Wiedemann <bwiedemann@suse.com> - tor 0.4.7.13: * fix SafeSocks option to avoid DNS leaks (boo#1207110, TROVE-2022-002) * improve congestion control * fix relay channel handling * Tue Dec 06 2022 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.7.12: * new key for moria1 * new metrics are exported on the MetricsPort for the congestion control subsystem * Thu Nov 10 2022 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.7.11: * Improve security of DNS cache by randomly clipping the TTL value (boo#1205307, TROVE-2021-009) * Improved defenses against network-wide DoS, multiple counters and metrics added to MetricsPorts * Apply circuit creation anti-DoS defenses if the outbound circuit max cell queue size is reached too many times. This introduces two new consensus parameters to control the queue size limit and number of times allowed to go over that limit. * Directory authority updates * IPFire database and geoip updates * Bump the maximum amount of CPU that can be used from 16 to 128. The NumCPUs torrc option overrides this hardcoded maximum. * onion service: set a higher circuit build timeout for opened client rendezvous circuit to avoid timeouts and retry load * Make the service retry a rendezvous if the circuit is being repurposed for measurements * Fri Aug 12 2022 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.7.10 * IPFire location database did not have proper ARIN network allocations - affected circuit path selection and relay metrics * Thu Aug 11 2022 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.7.9 (boo#1202336) * major fixes aimed at reducing memory pressure on relays * prevent a possible side-channel * major bugfix related to congestion control * major bugfix related to Vanguard L2 layer node selection * Thu Jun 16 2022 Bernhard Wiedemann <bwiedemann@suse.com> - tor 0.4.7.8 * Fix a scenario where RTT estimation can become wedged, seriously degrading congestion control performance on all circuits. This impacts clients, onion services, and relays, and can be triggered remotely by a malicious endpoint. (TROVE-2022-001, CVE-2022-33903, boo#1200672) * Regenerate fallback directories generated on June 17, 2022. * Update the geoip files to match the IPFire Location Database, as retrieved on 2022/06/17. * Allow the rseq system call in the sandbox * logging bug fixes * Wed Apr 27 2022 Andreas Stieger <andreas.stieger@gmx.de> - tor 0.4.7.7 * New feature: Congestion control to improve traffic speed and stability on the network once a majority of Exit nodes upgrade boo#1198949 * Directory authorities: improved handling of "MiddleOnly" relays * Improved mitigation against guard discovery attacks on clients and short-lived services * Improve observed performance under DNS load * Improve handling of overload state * end-of-life relays running version 0.4.2.x, 0.4.3.x, 0.4.4.x and 0.4.5 alphas/rc, 0.3.5.x are now rejected * Onion service v2 addresses are no longer recognized * Sun Feb 06 2022 Bernhard Wiedemann <bwiedemann@suse.com> - tor 0.4.6.10 * minor bugfixes and features * https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.6/ReleaseNotes
/etc/logrotate.d/tor /etc/tor /etc/tor/torrc /etc/tor/torrc.minimal /etc/tor/torrc.sample /usr/bin/tor /usr/bin/tor-gencert /usr/bin/tor-print-ed-signing-cert /usr/bin/tor-resolve /usr/bin/torify /usr/lib/systemd/system/tor-master.service /usr/lib/systemd/system/tor.service /usr/lib/tmpfiles.d/tor.conf /usr/sbin/rctor /usr/sbin/rctor-master /usr/share/doc/packages/tor /usr/share/doc/packages/tor/ChangeLog /usr/share/doc/packages/tor/HACKING /usr/share/doc/packages/tor/HACKING/CodingStandards.md /usr/share/doc/packages/tor/HACKING/Fuzzing.md /usr/share/doc/packages/tor/HACKING/GettingStarted.md /usr/share/doc/packages/tor/HACKING/HelpfulTools.md /usr/share/doc/packages/tor/HACKING/HowToReview.md /usr/share/doc/packages/tor/HACKING/Module.md /usr/share/doc/packages/tor/HACKING/README.1st.md /usr/share/doc/packages/tor/HACKING/ReleasingTor.md /usr/share/doc/packages/tor/HACKING/WritingTests.md /usr/share/doc/packages/tor/HACKING/tracing /usr/share/doc/packages/tor/HACKING/tracing/EventsCircuit.md /usr/share/doc/packages/tor/HACKING/tracing/README.md /usr/share/doc/packages/tor/README.md /usr/share/doc/packages/tor/tor-gencert.html /usr/share/doc/packages/tor/tor-print-ed-signing-cert.html /usr/share/doc/packages/tor/tor-resolve.html /usr/share/doc/packages/tor/tor.html /usr/share/doc/packages/tor/torify.html /usr/share/licenses/tor /usr/share/licenses/tor/LICENSE /usr/share/man/man1/tor-gencert.1.gz /usr/share/man/man1/tor-print-ed-signing-cert.1.gz /usr/share/man/man1/tor-resolve.1.gz /usr/share/man/man1/tor.1.gz /usr/share/man/man1/torify.1.gz /usr/share/tor /usr/share/tor/defaults-torrc /usr/share/tor/geoip /usr/share/tor/geoip6 /var/lib/tor /var/log/tor
Generated by rpm2html 1.8.1
Fabrice Bellet, Thu Feb 13 00:04:48 2025