Updated the description text, changed packager email

svn:r18675
This commit is contained in:
Andrew Lewman 2009-02-23 00:02:48 +00:00
parent 261670b57e
commit a7ea85e12e

View File

@ -109,9 +109,9 @@ Summary: Anonymizing overlay network for TCP (The onion router)
URL: https://www.torproject.org/
Group: System Environment/Daemons
License: BSD-like
Vendor: R. Dingledine <arma@seul.org>
Packager: Andrew Lewman <phobos@rootme.org>
License: 3-clause BSD
Vendor: The Tor Project (https://torproject.org)
Packager: Andrew Lewman <andrew@torproject.org>
%if %{is_suse}
Requires: openssl >= 0.9.6
@ -139,17 +139,17 @@ a "%{torgroup}" group, and set tor up to run as a daemon when the system
is rebooted.
Applications connect to the local Tor proxy using the SOCKS
protocol. The local proxy chooses a path through a set of relays, in
protocol. The tor client chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.
Warnings: Tor does no protocol cleaning. That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy and
reveal information about the initiator. Tor depends on Privoxy or
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is very small -- this further reduces the
bugs. The present network is small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.
@ -285,6 +285,9 @@ exit 0
%changelog
* Sun Feb 22 2009 Andrew Lewman <andrew@torproject.org>
- update the description, vendor, and packager
* Thu Sep 11 2008 Andrew Lewman <phobos@rootme.org>
- See r16867
- http://archives.seul.org/or/cvs/Sep-2008/msg00156.html