control 2.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. Source: tor
  2. Section: comm
  3. Priority: optional
  4. Maintainer: Peter Palfrader <weasel@debian.org>
  5. Build-Depends: debhelper (>= 4.1.65), libssl-dev, dpatch, zlib1g-dev, libevent-dev (>= 1.1), texlive-base-bin, texlive-latex-base, texlive-fonts-recommended, transfig, gs, binutils (>= 2.14.90.0.7)
  6. Standards-Version: 3.7.2
  7. Package: tor
  8. Architecture: any
  9. Depends: ${shlibs:Depends}, adduser, tsocks
  10. Conflicts: libssl0.9.8 (<< 0.9.8g-9)
  11. Recommends: privoxy | polipo (>= 1), socat, logrotate
  12. Suggests: mixmaster, mixminion, anon-proxy
  13. Description: anonymizing overlay network for TCP
  14. Tor is a connection-based low-latency anonymous communication system which
  15. addresses many flaws in the original onion routing design.
  16. .
  17. In brief, Onion Routing is a connection-oriented anonymizing communication
  18. service. Users choose a source-routed path through a set of nodes, and
  19. negotiate a "virtual circuit" through the network, in which each node
  20. knows its predecessor and successor, but no others. Traffic flowing down
  21. the circuit is unwrapped by a symmetric key at each node, which reveals
  22. the downstream node.
  23. .
  24. Basically Tor provides a distributed network of servers ("onion
  25. routers"). Users bounce their tcp streams (web traffic, ftp, ssh, etc)
  26. around the routers, and recipients, observers, and even the routers
  27. themselves have difficulty tracking the source of the stream.
  28. .
  29. Note that Tor does no protocol cleaning. That means there is a danger that
  30. application protocols and associated programs can be induced to reveal
  31. information about the initiator. Tor depends on Privoxy and similar protocol
  32. cleaners to solve this problem.
  33. .
  34. Client applications can use the Tor network by connecting to the local
  35. onion proxy. If the application itself does not come with socks support
  36. you can use a socks client such as tsocks. Some web browsers like mozilla
  37. and web proxies like privoxy come with socks support, so you don't need an
  38. extra socks client if you want to use Tor with them.
  39. .
  40. This package enables only the onion proxy by default, but it can be configured
  41. as a relay (server) node.
  42. .
  43. Remember that this is development code -- don't rely on the current Tor
  44. network if you really need strong anonymity.
  45. .
  46. The latest information can be found at http://tor.eff.org/, or on the
  47. mailing lists, archived at http://archives.seul.org/or/talk/ or
  48. http://archives.seul.org/or/announce/.
  49. Package: tor-dbg
  50. Architecture: any
  51. Depends: tor (= ${Source-Version})
  52. Suggests: gdb
  53. Priority: extra
  54. Description: debugging symbols for Tor
  55. This package provides the debugging symbols for Tor, The Onion Router.
  56. Those symbols allow your debugger to assign names to your backtraces, which
  57. makes it somewhat easier to interpret core dumps.