aboutsummaryrefslogtreecommitdiff
path: root/debian/control
diff options
context:
space:
mode:
authorPeter Palfrader <peter@palfrader.org>2004-01-13 13:40:00 +0000
committerPeter Palfrader <peter@palfrader.org>2004-01-13 13:40:00 +0000
commit9d3cf1b4d1884d7f7e0ea39bc9fe8eae481647a2 (patch)
treef8abee2a51977b150260bfb7699a4c94b6bc6bb7 /debian/control
parent793c65e60fa0cf4be6cde6b6011d12291e92a969 (diff)
downloadtor-9d3cf1b4d1884d7f7e0ea39bc9fe8eae481647a2.tar
tor-9d3cf1b4d1884d7f7e0ea39bc9fe8eae481647a2.tar.gz
First go at a debian package
svn:r987
Diffstat (limited to 'debian/control')
-rw-r--r--debian/control41
1 files changed, 41 insertions, 0 deletions
diff --git a/debian/control b/debian/control
new file mode 100644
index 000000000..a6b0ee5a7
--- /dev/null
+++ b/debian/control
@@ -0,0 +1,41 @@
+Source: tor
+Section: comm
+Priority: optional
+Maintainer: Peter Palfrader <weasel@debian.org>
+Build-Depends: debhelper (>= 4.1.65), libssl-dev, dpatch
+Standards-Version: 3.6.1
+
+Package: tor
+Architecture: any
+Depends: ${shlibs:Depends}
+Recommends: privoxy, tsocks
+Suggests: mixmaster, mixminion, anon-proxy
+Description: anonymous communication system
+ Tor is a connection-based low-latency anonymous communication system which
+ addresses many flaws in the original onion routing design.
+ .
+ In brief, Onion Routing is a connection-oriented anonymizing communication
+ service. Users choose a source-routed path through a set of nodes, and
+ negotiate a "virtual circuit" through the network, in which each node
+ knows its predecessor and successor, but no others. Traffic flowing down
+ the circuit is unwrapped by a symmetric key at each node, which reveals
+ the downstream node.
+ .
+ Basically Tor provides a distributed network of servers ("onion
+ routers"). Users bounce their tcp streams (web traffic, ftp, ssh, etc)
+ around the routers, and recipients, observers, and even the routers
+ themselves have difficulty tracking the source of the stream.
+ .
+ Note that Tor does not protocol cleaning. That means there is a danger that
+ application protocols and associated programs can be induced to reveal
+ information about the initiator. Tor depends on Privoxy and similar protocol
+ cleaners to solve this problem.
+ .
+ Client applications can use the Tor network by connecting to the local
+ onion proxy. If the application itself does not come with socks support
+ you can use a socks client such as tsocks. Some web browsers like mozilla
+ and web proxies like privoxy come with socks support, you don't need an
+ extra socks client if you want to use Tor with them.
+ .
+ Remember that this is alpha code, and the network is very small -- Tor will
+ not provide anonymity currently.