Filewatcher File Search File Search
Content Search
» » » » »


anonymizing overlay network for TCP

Tor is a connection-based low-latency anonymous communication system which addresses many flaws in the original onion routing design.

In brief, Onion Routing is a connection-oriented anonymizing communication service. Users choose a source-routed path through a set of nodes, and negotiate a "virtual circuit" through the network, in which each node knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each node, which reveals the downstream node.

Basically Tor provides a distributed network of servers ("onion routers"). Users bounce their tcp streams (web traffic, ftp, ssh, etc) around the routers, and recipients, observers, and even the routers themselves have difficulty tracking the source of the stream.

Note that Tor does no protocol cleaning. That means there is a danger that application protocols and associated programs can be induced to reveal information about the initiator. Tor depends on Privoxy and similar protocol cleaners to solve this problem.

Client applications can use the Tor network by connecting to the local onion proxy. If the application itself does not come with socks support you can use a socks client such as tsocks. Some web browsers like mozilla and web proxies like privoxy come with socks support, so you don't need an extra socks client if you want to use Tor with them.

This package enables only the onion proxy by default, but it can be configured as a relay (server) node.

Remember that this is development code -- don't rely on the current Tor network if you really need strong anonymity.

The latest information can be found at, or on the mailing lists, archived at or

Package version:


This is the Debian package for Tor, The Onion Router.

Some changes have been made to the Tor source to integrate it better into
Debian.  If Tor is started as root or the 'debian-tor' user, then:

- RunAsDaemon is enabled,
- PidFile is set to /var/run/tor/ (No default upstream),
- default logging goes to /var/log/tor/log (instead of stdout),
- DataDirectory is set to /var/lib/tor (uses $HOM


Tor only provides TCP layer anonymity.  It does not do any protocol
cleaning, so if you are going to browse the web you still give away a
lot of information to servers.

The privoxy package provides a privacy enhancing HTTP proxy, which
is good at filtering headers, cookies, and much more.  To view the
description of the Debian privoxy package just run "apt-cache show
privoxy".  Please refer to th


tor ( experimental; urgency=critical

  * weak cryptographic keys

    It has been discovered that the random number generator in Debian's
    openssl package is predictable.  This is caused by an incorrect
    Debian-specific change to the openssl package (CVE-2008-0166).  As a
    result, cryptographic key material may be guessable.

    See Debian Security Advisory number 1571 (DS


tor-gencert(1)                                        tor-gencert(1)

       tor-gencert  -  


tor-resolve(1)                                        tor-resolve(1)

       tor-resolve - re


torify(1)                                                  torify(1)

       torify - wrapper


TOR(8)                                                        TOR(8)

       tor - The second


tor ( etch-backports; urgency=low

  * Build for bpo40.
  * Conflict with libssl0

Browse inside tor_0.2.0.34-1~bpo40+1_i386.deb

         [DIR]DEBIAN/ (6)  65535+ mirrors
         [DIR]etc/ (4)  65535+ mirrors
         [DIR]usr/ (3)  65535+ mirrors
         [DIR]var/ (3)  41013+ mirrors

Download tor_0.2.0.34-1~bpo40+1_i386.deb

Results 1 - 1 of 1
Help - FTP Sites List - Software Dir.
Search over 15 billion files
© 1997-2017