2004-01-13 14:40:00 +01:00
|
|
|
Source: tor
|
|
|
|
Section: comm
|
|
|
|
Priority: optional
|
|
|
|
Maintainer: Peter Palfrader <weasel@debian.org>
|
2007-06-01 03:10:02 +02:00
|
|
|
Build-Depends: debhelper (>= 4.1.65), libssl-dev, dpatch, zlib1g-dev, libevent-dev (>= 1.1), texlive-base-bin, texlive-latex-base, texlive-fonts-recommended, transfig, gs, binutils (>= 2.14.90.0.7)
|
2008-06-09 18:56:26 +02:00
|
|
|
Standards-Version: 3.8.0
|
|
|
|
Homepage: https://www.torproject.org/
|
2004-01-13 14:40:00 +01:00
|
|
|
|
|
|
|
Package: tor
|
|
|
|
Architecture: any
|
2005-03-15 23:34:33 +01:00
|
|
|
Depends: ${shlibs:Depends}, adduser, tsocks
|
2008-06-04 10:39:02 +02:00
|
|
|
Conflicts: libssl0.9.8 (<< 0.9.8g-9)
|
2008-06-09 18:56:26 +02:00
|
|
|
Recommends: privoxy | polipo (>= 1), socat, logrotate, tor-geoipdb
|
2004-01-13 14:40:00 +01:00
|
|
|
Suggests: mixmaster, mixminion, anon-proxy
|
2004-01-31 10:11:46 +01:00
|
|
|
Description: anonymizing overlay network for TCP
|
2004-01-13 14:40:00 +01:00
|
|
|
Tor is a connection-based low-latency anonymous communication system which
|
|
|
|
addresses many flaws in the original onion routing design.
|
|
|
|
.
|
|
|
|
In brief, Onion Routing is a connection-oriented anonymizing communication
|
|
|
|
service. Users choose a source-routed path through a set of nodes, and
|
|
|
|
negotiate a "virtual circuit" through the network, in which each node
|
|
|
|
knows its predecessor and successor, but no others. Traffic flowing down
|
|
|
|
the circuit is unwrapped by a symmetric key at each node, which reveals
|
|
|
|
the downstream node.
|
|
|
|
.
|
|
|
|
Basically Tor provides a distributed network of servers ("onion
|
|
|
|
routers"). Users bounce their tcp streams (web traffic, ftp, ssh, etc)
|
|
|
|
around the routers, and recipients, observers, and even the routers
|
|
|
|
themselves have difficulty tracking the source of the stream.
|
|
|
|
.
|
2004-01-13 15:20:31 +01:00
|
|
|
Note that Tor does no protocol cleaning. That means there is a danger that
|
2004-01-13 14:40:00 +01:00
|
|
|
application protocols and associated programs can be induced to reveal
|
|
|
|
information about the initiator. Tor depends on Privoxy and similar protocol
|
|
|
|
cleaners to solve this problem.
|
|
|
|
.
|
|
|
|
Client applications can use the Tor network by connecting to the local
|
|
|
|
onion proxy. If the application itself does not come with socks support
|
|
|
|
you can use a socks client such as tsocks. Some web browsers like mozilla
|
2004-01-13 15:20:31 +01:00
|
|
|
and web proxies like privoxy come with socks support, so you don't need an
|
2004-01-13 14:40:00 +01:00
|
|
|
extra socks client if you want to use Tor with them.
|
|
|
|
.
|
2004-02-17 05:57:37 +01:00
|
|
|
This package enables only the onion proxy by default, but it can be configured
|
|
|
|
as a relay (server) node.
|
|
|
|
.
|
2004-11-10 04:45:34 +01:00
|
|
|
Remember that this is development code -- don't rely on the current Tor
|
|
|
|
network if you really need strong anonymity.
|
2004-04-24 19:42:30 +02:00
|
|
|
.
|
2008-06-09 18:56:26 +02:00
|
|
|
The latest information can be found at https://www.torproject.org/, or on the
|
2005-03-29 02:38:03 +02:00
|
|
|
mailing lists, archived at http://archives.seul.org/or/talk/ or
|
2004-04-24 19:42:30 +02:00
|
|
|
http://archives.seul.org/or/announce/.
|
2005-09-14 15:05:58 +02:00
|
|
|
|
|
|
|
Package: tor-dbg
|
|
|
|
Architecture: any
|
2008-06-09 18:56:26 +02:00
|
|
|
Depends: tor (= ${binary:Version})
|
2005-09-14 15:05:58 +02:00
|
|
|
Suggests: gdb
|
|
|
|
Priority: extra
|
2009-03-16 18:08:45 +01:00
|
|
|
Section: debug
|
2005-09-14 15:05:58 +02:00
|
|
|
Description: debugging symbols for Tor
|
|
|
|
This package provides the debugging symbols for Tor, The Onion Router.
|
|
|
|
Those symbols allow your debugger to assign names to your backtraces, which
|
|
|
|
makes it somewhat easier to interpret core dumps.
|
2008-06-09 18:56:26 +02:00
|
|
|
|
|
|
|
Package: tor-geoipdb
|
|
|
|
Architecture: all
|
|
|
|
Priority: extra
|
|
|
|
Depends: tor (>= ${source:Version})
|
|
|
|
Description: geoIP database for Tor
|
|
|
|
This package provides a geoIP database for Tor, i.e. it maps IPv4 addresses
|
|
|
|
to countries.
|
|
|
|
.
|
|
|
|
Bridges (special Tor relays that aren't listed in the main Tor directory) use
|
|
|
|
this information to report which countries they get access from. This allows
|
|
|
|
the Tor network operators to learn if certain countries started blocking
|
|
|
|
access to bridges.
|