Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: tor | Distribution: openSUSE Tumbleweed |
Version: 0.4.8.12 | Vendor: openSUSE |
Release: 1.1 | Build date: Tue Jun 11 12:05:46 2024 |
Group: Unspecified | Build host: reproducible |
Size: 24904535 | Source RPM: tor-0.4.8.12-1.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.torproject.org/ | |
Summary: Anonymizing overlay network for TCP (The onion router) |
Tor is a connection-based low-latency anonymous communication system. This package provides the "tor" program, which serves as both a client and a relay node. Scripts will automatically create a "tor" user and a "tor" group, and set tor up to run as a daemon when the system is rebooted. Applications connect to the local Tor proxy using the SOCKS protocol. The tor client chooses a path through a set of relays, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each relay, which reveals the downstream relay. Warnings: Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy or similar protocol cleaners to solve this problem. This is alpha code, and is even more likely than released code to have anonymity-spoiling bugs. The present network is small -- this further reduces the strength of the anonymity provided. Tor is not presently suitable for high-stakes anonymity.
BSD-3-Clause
* Tue Jun 11 2024 Bernhard Wiedemann <[email protected]> - tor 0.4.8.12 * Minor features and bugfixes * See https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes * Thu Apr 11 2024 Bernhard Wiedemann <[email protected]> - tor 0.4.8.11 * Minor features and bugfixes * See https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes * Wed Feb 14 2024 Martin Pluskal <[email protected]> - Enables scrypt support unconditionally * Mon Feb 05 2024 Andreas Stieger <[email protected]> - fix users/groups with rpm 4.19 * Fri Dec 08 2023 Bernhard Wiedemann <[email protected]> - tor 0.4.8.10: * (TROVE-2023-007, exit) (boo#1217918) - fix a a UAF and NULL pointer dereference crash on Exit relays * Thu Nov 09 2023 Bernhard Wiedemann <[email protected]> - tor 0.4.8.9: * (onion service, TROVE-2023-006): - Fix a possible hard assert on a NULL pointer * (guard usage): - When Tor excluded a guard due to temporary circuit restrictions, it considered *additional* primary guards for potential usage by that circuit. * Fri Nov 03 2023 Andreas Stieger <[email protected]> - tor 0.4.8.8: * Mitigate an issue when Tor compiled with OpenSSL can crash during handshake with a remote relay. (TROVE-2023-004, boo#1216873) * Regenerate fallback directories generated on November 03, 2023. * Update the geoip files to match the IPFire Location Database, as retrieved on 2023/11/03 * directory authority: Look at the network parameter "maxunmeasuredbw" with the correct spelling * vanguards addon support: Count the conflux linked cell as valid when it is successfully processed. This will quiet a spurious warn in the vanguards addon * Mon Sep 25 2023 Andreas Stieger <[email protected]> - tor 0.4.8.7: * Fix an issue that prevented us from pre-building more conflux sets after existing sets had been used * Tue Sep 19 2023 Andreas Stieger <[email protected]> - tor 0.4.8.6: * onion service: Fix a reliability issue where services were expiring their introduction points every consensus update. This caused connectivity issues for clients caching the old descriptor and intro points * Log the input and output buffer sizes when we detect a potential compression bomb * Disable multiple BUG warnings of a missing relay identity key when starting an instance of Tor compiled without relay support * When reporting a pseudo-networkstatus as a bridge authority, or answering "ns/purpose/*" controller requests, include accurate published-on dates from our list of router descriptors * Use less frightening language and lower the log-level of our run-time ABI compatibility check message in our Zstd compression subsystem * Wed Aug 30 2023 Andreas Stieger <[email protected]> - tor 0.4.8.5: * bugfixes creating log BUG stacktrace * Sun Aug 27 2023 Andreas Stieger <[email protected]> - tor 0.4.8.4: * Extend DoS protection to partially opened channels and known relays * Dynamic Proof-Of-Work protocol to thwart flooding DoS attacks against hidden services. Disabled by default, enable via "HiddenServicePoW" in torrc * Implement conflux traffic splitting * Directory authorities and relays now interact properly with directory authorities if they change addresses * Sun Jul 30 2023 Andreas Stieger <[email protected]> - tor 0.4.7.14: * bugfix affecting vanguards (onion service), and minor fixes * Fri Mar 10 2023 Martin Pluskal <[email protected]> - Enable support for scrypt() * Fri Jan 13 2023 Bernhard Wiedemann <[email protected]> - tor 0.4.7.13: * fix SafeSocks option to avoid DNS leaks (boo#1207110, TROVE-2022-002) * improve congestion control * fix relay channel handling * Tue Dec 06 2022 Andreas Stieger <[email protected]> - tor 0.4.7.12: * new key for moria1 * new metrics are exported on the MetricsPort for the congestion control subsystem * Thu Nov 10 2022 Andreas Stieger <[email protected]> - tor 0.4.7.11: * Improve security of DNS cache by randomly clipping the TTL value (boo#1205307, TROVE-2021-009) * Improved defenses against network-wide DoS, multiple counters and metrics added to MetricsPorts * Apply circuit creation anti-DoS defenses if the outbound circuit max cell queue size is reached too many times. This introduces two new consensus parameters to control the queue size limit and number of times allowed to go over that limit. * Directory authority updates * IPFire database and geoip updates * Bump the maximum amount of CPU that can be used from 16 to 128. The NumCPUs torrc option overrides this hardcoded maximum. * onion service: set a higher circuit build timeout for opened client rendezvous circuit to avoid timeouts and retry load * Make the service retry a rendezvous if the circuit is being repurposed for measurements * Fri Aug 12 2022 Andreas Stieger <[email protected]> - tor 0.4.7.10 * IPFire location database did not have proper ARIN network allocations - affected circuit path selection and relay metrics * Thu Aug 11 2022 Andreas Stieger <[email protected]> - tor 0.4.7.9 (boo#1202336) * major fixes aimed at reducing memory pressure on relays * prevent a possible side-channel * major bugfix related to congestion control * major bugfix related to Vanguard L2 layer node selection * Thu Jun 16 2022 Bernhard Wiedemann <[email protected]> - tor 0.4.7.8 * Fix a scenario where RTT estimation can become wedged, seriously degrading congestion control performance on all circuits. This impacts clients, onion services, and relays, and can be triggered remotely by a malicious endpoint. (TROVE-2022-001, CVE-2022-33903, boo#1200672) * Regenerate fallback directories generated on June 17, 2022. * Update the geoip files to match the IPFire Location Database, as retrieved on 2022/06/17. * Allow the rseq system call in the sandbox * logging bug fixes * Wed Apr 27 2022 Andreas Stieger <[email protected]> - tor 0.4.7.7 * New feature: Congestion control to improve traffic speed and stability on the network once a majority of Exit nodes upgrade boo#1198949 * Directory authorities: improved handling of "MiddleOnly" relays * Improved mitigation against guard discovery attacks on clients and short-lived services * Improve observed performance under DNS load * Improve handling of overload state * end-of-life relays running version 0.4.2.x, 0.4.3.x, 0.4.4.x and 0.4.5 alphas/rc, 0.3.5.x are now rejected * Onion service v2 addresses are no longer recognized * Sun Feb 06 2022 Bernhard Wiedemann <[email protected]> - tor 0.4.6.10 * minor bugfixes and features * https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.6/ReleaseNotes * Fri Dec 17 2021 Andreas Stieger <[email protected]> - tor 0.4.6.9: * remove the DNS timeout metric from the overload general signal * regenerate fallback directories generated on December 15, 2021 * Update the geoip files to match the IPFire Location Database, as retrieved on 2021/12/15 * Reject IPv6-only DirPort * Sat Nov 13 2021 Andreas Stieger <[email protected]> - tor 0.4.6.8: * Improving reporting of general overload state for DNS timeout errors by relays * Regenerate fallback directories for October 2021 * Bug fixes for onion services * CVE-2021-22929: do not log v2 onion services access attempt warnings on disk excessively (TROVE-2021-008, boo#1192658) * Tue Aug 24 2021 Jan Engelhardt <[email protected]> - Reduce boilerplate generated by %service_*. * Tue Aug 17 2021 Bernhard Wiedemann <[email protected]> - tor 0.4.6.7: * Fix a DoS via a remotely triggerable assertion failure (boo#1189489, TROVE-2021-007, CVE-2021-38385) * Tue Jul 06 2021 Bernhard Wiedemann <[email protected]> - Add missing service_add_pre tor-master.service * Thu Jul 01 2021 Andreas Stieger <[email protected]> - tor 0.4.6.6: * Fix a compilation error with gcc 7, drop tor-0.4.6.5-gcc7.patch * Enable the deterministic RNG for unit tests that covers the address set bloomfilter-based API's * Wed Jun 16 2021 Andreas Stieger <[email protected]> - tor 0.4.6.5 * Add controller support for creating v3 onion services with client auth * When voting on a relay with a Sybil-like appearance, add the Sybil flag when clearing out the other flags. This lets a relay operator know why their relay hasn't been included in the consensus * Relays now report how overloaded they are * Add a new DoS subsystem to control the rate of client connections for relays * Relays now publish statistics about v3 onions services * Improve circuit timeout algorithm for client performance - add tor-0.4.6.5-gcc7.patch to fix build with gcc7 * Mon Jun 14 2021 Bernhard Wiedemann <[email protected]> - tor 0.4.5.9 * Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322) * Detect more failure conditions from the OpenSSL RNG code (boo#1187323) * Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324) * Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325) * Tue May 11 2021 Bernhard Wiedemann <[email protected]> - tor 0.4.5.8 * https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html * allow Linux sandbox with Glibc 2.33 * work with autoconf 2.70+ * several other minor features and bugfixes (see announcement) * Sat Apr 24 2021 Andreas Stieger <[email protected]> - fix packaging warnings related to tor-master service * Fri Apr 23 2021 Andreas Stieger <[email protected]> - Fix logging issue due to systemd picking up stdout - boo#1181244 Continue to log notices to syslog by default. - actually build with lzma/zstd - skip i586 tests (boo#1179331) * Tue Mar 16 2021 Bernhard Wiedemann <[email protected]> - tor 0.4.5.7 * https://lists.torproject.org/pipermail/tor-announce/2021-March/000216.html * Fix 2 denial of service security issues (boo#1183726) + Disable the dump_desc() function that we used to dump unparseable information to disk (CVE-2021-28089) + Fix a bug in appending detached signatures to a pending consensus document that could be used to crash a directory authority (CVE-2021-28090) * Ship geoip files based on the IPFire Location Database * Tue Feb 16 2021 Bernhard Wiedemann <[email protected]> - tor 0.4.5.6 * https://lists.torproject.org/pipermail/tor-announce/2021-February/000214.html * Introduce a new MetricsPort HTTP interface * Support IPv6 in the torrc Address option * Add event-tracing library support for USDT and LTTng-UST * Try to read N of N bytes on a TLS connection - Drop upstream tor-practracker.patch * Fri Feb 05 2021 Bernhard Wiedemann <[email protected]> - tor 0.4.4.7 * https://blog.torproject.org/node/1990 * Stop requiring a live consensus for v3 clients and services * Re-entry into the network is now denied at the Exit level * Fix undefined behavior on our Keccak library * Strip '\r' characters when reading text files on Unix platforms * Handle partial SOCKS5 messages correctly - Add tor-practracker.patch to fix tests * Wed Jan 27 2021 Bernhard Wiedemann <[email protected]> - Restrict service permissions with systemd
/etc/logrotate.d/tor /etc/tor /etc/tor/torrc /etc/tor/torrc.minimal /etc/tor/torrc.sample /usr/bin/tor /usr/bin/tor-gencert /usr/bin/tor-print-ed-signing-cert /usr/bin/tor-resolve /usr/bin/torify /usr/lib/systemd/system/tor-master.service /usr/lib/systemd/system/tor.service /usr/lib/tmpfiles.d/tor.conf /usr/sbin/rctor /usr/sbin/rctor-master /usr/share/doc/packages/tor /usr/share/doc/packages/tor/ChangeLog /usr/share/doc/packages/tor/HACKING /usr/share/doc/packages/tor/HACKING/CodingStandards.md /usr/share/doc/packages/tor/HACKING/Fuzzing.md /usr/share/doc/packages/tor/HACKING/GettingStarted.md /usr/share/doc/packages/tor/HACKING/HelpfulTools.md /usr/share/doc/packages/tor/HACKING/HowToReview.md /usr/share/doc/packages/tor/HACKING/Module.md /usr/share/doc/packages/tor/HACKING/README.1st.md /usr/share/doc/packages/tor/HACKING/ReleasingTor.md /usr/share/doc/packages/tor/HACKING/WritingTests.md /usr/share/doc/packages/tor/HACKING/tracing /usr/share/doc/packages/tor/HACKING/tracing/EventsCircuit.md /usr/share/doc/packages/tor/HACKING/tracing/README.md /usr/share/doc/packages/tor/README.md /usr/share/doc/packages/tor/tor-gencert.html /usr/share/doc/packages/tor/tor-print-ed-signing-cert.html /usr/share/doc/packages/tor/tor-resolve.html /usr/share/doc/packages/tor/tor.html /usr/share/doc/packages/tor/torify.html /usr/share/licenses/tor /usr/share/licenses/tor/LICENSE /usr/share/man/man1/tor-gencert.1.gz /usr/share/man/man1/tor-print-ed-signing-cert.1.gz /usr/share/man/man1/tor-resolve.1.gz /usr/share/man/man1/tor.1.gz /usr/share/man/man1/torify.1.gz /usr/share/tor /usr/share/tor/defaults-torrc /usr/share/tor/geoip /usr/share/tor/geoip6 /var/lib/tor /var/log/tor
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Dec 4 23:34:53 2024