tor_0.2.7.6-1ubuntu1_i386.deb


Advertisement

Description

tor - anonymizing overlay network for TCP

Distribution: Ubuntu 16.04 LTS (Xenial Xerus)
Repository: Ubuntu Universe i386
Package name: tor
Package version: 0.2.7.6
Package release: 1ubuntu1
Package architecture: i386
Package type: deb
Installed size: 3.50 KB
Download size: 1.02 MB
Official Mirror: archive.ubuntu.com
Tor is a connection-based low-latency anonymous communication system. Clients choose a source-routed path through a set of relays, and negotiate a "virtual circuit" through the network, in which each relay knows its predecessor and successor, but no others. Traffic flowing down the circuit is decrypted at each relay, which reveals the downstream relay. Basically, Tor provides a distributed network of relays. Users bounce their TCP streams (web traffic, ftp, ssh, etc) around the relays, and recipients, observers, and even the relays themselves have difficulty learning which users connected to which destinations. This package enables only a Tor client by default, but it can also be configured as a relay and/or a hidden service easily. Client applications can use the Tor network by connecting to the local socks proxy interface provided by your Tor instance. If the application itself does not come with socks support, you can use a socks client such as torsocks. Note that Tor does no protocol cleaning on application traffic. There is a danger that application protocols and associated programs can be induced to reveal information about the user. Tor depends on Torbutton and similar protocol cleaners to solve this problem. For best protection when web surfing, the Tor Project recommends that you use the Tor Browser Bundle, a standalone tarball that includes static builds of Tor, Torbutton, and a modified Firefox that is patched to fix a variety of privacy bugs.

Alternatives

Conflicts

  • libssl0.9.8 << 0.9.8g-9

    Download

    Source package: tor

    Install Howto

    1. Update the package index:
      # sudo apt-get update
    2. Install tor deb package:
      # sudo apt-get install tor

    Files

    • /etc/apparmor.d/system_tor
    • /etc/apparmor.d/abstractions/tor
    • /etc/cron.weekly/tor
    • /etc/default/tor
    • /etc/init.d/tor
    • /etc/logrotate.d/tor
    • /etc/tor/torrc
    • /lib/systemd/system/tor.service
    • /lib/systemd/system/tor@.service
    • /lib/systemd/system/tor@default.service
    • /lib/systemd/system-generators/tor-generator
    • /usr/bin/tor
    • /usr/bin/tor-gencert
    • /usr/bin/tor-resolve
    • /usr/bin/torify
    • /usr/sbin/tor
    • /usr/sbin/tor-instance-create
    • /usr/share/doc/tor/NEWS.Debian.gz
    • /usr/share/doc/tor/README.Debian
    • /usr/share/doc/tor/README.polipo
    • /usr/share/doc/tor/README.privoxy
    • /usr/share/doc/tor/changelog.Debian.gz
    • /usr/share/doc/tor/copyright
    • /usr/share/doc/tor/tor-exit-notice.html
    • /usr/share/doc/tor/tor-gencert.html
    • /usr/share/doc/tor/tor-resolve.html
    • /usr/share/doc/tor/tor.html
    • /usr/share/doc/tor/torify.html
    • /usr/share/lintian/overrides/tor
    • /usr/share/man/man1/tor-gencert.1.gz
    • /usr/share/man/man1/tor-resolve.1.gz
    • /usr/share/man/man1/tor.1.gz
    • /usr/share/man/man1/torify.1.gz
    • /usr/share/man/man5/torrc.5.gz
    • /usr/share/man/man8/tor-instance-create.8.gz
    • /usr/share/tor/tor-service-defaults-torrc
    • /usr/share/tor/tor-service-defaults-torrc-instances

    Changelog

    2016-03-22 - Gianfranco Costamagna <locutusofborg@debian.org> tor (0.2.7.6-1ubuntu1) xenial; urgency=low * Merge from Debian unstable. Remaining changes: - Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf].

    2015-12-10 - Peter Palfrader <weasel@debian.org> tor (0.2.7.6-1) unstable; urgency=high * New upstream version. - Actually look at the Guard flag when selecting a new directory guard. * Actually install tor-instance-create.8 manpage. * Change the apparmor profile tor allow Tor to access the systemd notification socket. Thanks for regar42. Closes Tor#17693. * tor-instance-create: Do systemctl daemon-reload *after* writing the new torrc.

    2015-11-20 - Peter Palfrader <weasel@debian.org> tor (0.2.7.5-1) unstable; urgency=medium * New upstream version, upload 0.2.7.x tree to unstable.

    2015-10-22 - Peter Palfrader <weasel@debian.org> tor (0.2.7.4-rc-1) experimental; urgency=medium * New upstream version. * Include identity tag for syslog logging feature from master. This is bug#17194 upstream. * Support multiple instances (closes: #791393). * Split systemd service timeout into start and stop timeout, and raise them to 120 and 60 seconds from 45 (closes: tor#16398). * Enable apparmor support for the default tor service (re: #761404). Apparmor is not yet being enabled for any other tor instance.

    2015-09-25 - Peter Palfrader <weasel@debian.org> tor (0.2.7.3-rc-1) experimental; urgency=medium * New upstream version.

    2015-07-27 - Peter Palfrader <weasel@debian.org> tor (0.2.7.2-alpha-1) experimental; urgency=medium * New upstream tree.

    2015-10-05 - Matthias Klose <doko@ubuntu.com> tor (0.2.6.10-1ubuntu2) wily; urgency=medium * Limit the seccomp build-dependency to [amd64 i386 x32 armel armhf]. Fails on other archs with error: 'mcontext_t {aka struct sigcontext}' has no member named 'M_SYSCALL'.

    2015-10-03 - Matthias Klose <doko@ubuntu.com> tor (0.2.6.10-1ubuntu1) wily; urgency=medium * Build using libseccomp on all architectures.

    2015-07-13 - Peter Palfrader <weasel@debian.org> tor (0.2.6.10-1) unstable; urgency=medium * New upstream version.

    2015-06-12 - Peter Palfrader <weasel@debian.org> tor (0.2.6.9-1) unstable; urgency=medium * New upstream version. * Drop do-not-require-systemd and fix-sandbox-use-with-systemd.-bug-16212 patches as they are included upstream now.

    Advertisement
    Advertisement