Port details on branch 2023Q4 |
- tor Anonymizing overlay network for TCP
- 0.4.8.10 security
=0 0.4.8.10Version of this port present on the latest quarterly branch. - Maintainer: yuri@FreeBSD.org
 - Port Added: 2023-11-03 15:57:52
- Last Update: 2023-12-08 22:24:37
- Commit Hash: 9490056
- Also Listed In: net
- License: BSD3CLAUSE
- WWW:
- https://www.torproject.org/
- Description:
- Tor: an anonymizing overlay network for TCP
Tor is a connection-based low-latency anonymous communication system which
addresses many flaws in the original onion routing design.
Tor is a toolset for a wide range of organizations and people that
want to improve their safety and security on the Internet. Using
Tor can help you anonymize web browsing and publishing, instant
messaging, IRC, SSH, and more. Tor also provides a platform on which
software developers can build new applications with built-in
anonymity, safety, and privacy features.
¦ ¦ ¦ ¦ 
- Manual pages:
-
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- Conflicts:
- CONFLICTS_INSTALL:
- To install the port:
- cd /usr/ports/security/tor/ && make install clean
- To add the package, run one of these commands:
- pkg install security/tor
- pkg install tor
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: tor
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1702072755
SHA256 (tor-0.4.8.10.tar.gz) = e628b4fab70edb4727715b23cf2931375a9f7685ac08f2c59ea498a178463a86
SIZE (tor-0.4.8.10.tar.gz) = 8272740
No package information for this port in our database- Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link:

- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- asciidoc : textproc/asciidoc
- gmake>=4.3 : devel/gmake
- pkgconf>=1.3.0_1 : devel/pkgconf
- Library dependencies:
-
- libevent.so : devel/libevent
- libzstd.so : archivers/zstd
- This port is required by:
- for Run
-
- security/snowflake-tor
- security/webtunnel-tor
Configuration Options:
- ===> The following configuration options are available for tor-0.4.8.10:
DOCS=on: Build and/or install documentation
MANPAGES=on: Build and/or install manual pages
STATIC_TOR=off: Build a static tor
TCMALLOC=off: Use the tcmalloc memory allocation library
====> Supported compression libraries
ZSTD=on: Zstandard compression support
LZMA=on: LZMA compression support
====> Tracing
LTTNG=off: Build with LTTng-UST instrumentation
USDT=off: Build with tracing USDT instrumentation
LOG_DEBUG=off: Build with tracing event to debug log
===> Use 'make config' to modify these settings
- Options name:
- security_tor
- USES:
- compiler:c11 cpe gmake pkgconfig ssl
- pkg-message:
- For install:
- To enable the tor server, set tor_enable="YES" in your /etc/rc.conf
and edit /usr/local/etc/tor/torrc as desired. (However, note that the
/usr/local/etc/rc.d/tor rc.subr script can override some torrc
options: see that script for details.) To use the torify script, install
the net/torsocks port.
Tor users are strongly advised to prevent traffic analysis that
exploits sequential IP IDs by setting:
sysctl net.inet.ip.random_id=1
(see sysctl.conf(5)).
In order to run additional, independent instances of tor on the same machine
set tor_instances="inst1 inst2 ..." in your /etc/rc.conf, and create the
corresponding additional configuration files /usr/local/etc/tor/torrc@inst1, ...
Alternatively, you can use the extended instance definition to specify all
instance parameteres explicitly:
inst_name{:inst_conf:inst_user:inst_group:inst_pidfile:inst_data_dir}
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
0.4.8.10 08 Dec 2023 22:24:37
    |
Yuri Victorovich (yuri)  |
security/tor: update 0.4.8.9 → 0.4.8.10
Log: https://forum.torproject.org/t/security-release-0-4-8-10/10536
This is a security release fixing a high severity bug (TROVE-2023-007)
affecting Exit relays supporting Conflux. We strongly recommend to update as
soon as possible.
o Major bugfixes (TROVE-2023-007, exit):
- Improper error propagation from a safety check in conflux leg
linking lead to a desynchronization of which legs were part of a
conflux set, ultimately causing a UAF and NULL pointer dereference
crash on Exit relays. Fixes bug 40897; bugfix on 0.4.8.1-alpha.
o Minor features (fallbackdir): (Only the first 15 lines of the commit message are shown above ) |
0.4.8.9 13 Nov 2023 08:18:06
    |
Yuri Victorovich (yuri)  |
security/tor: update 0.4.8.8 → 0.4.8.9
(cherry picked from commit 0ff308880e4bf2218b899c58b83b604c7445246e) |
0.4.8.8 03 Nov 2023 15:55:03
    |
Yuri Victorovich (yuri)  |
security/tor: update 0.4.8.7 → 0.4.8.8
This update contains a fix to a remote crash bug (TROVE 2023 004).
It is highly recommended that all relay operators
upgrade to the new versions as soon as possible to maintain the
network stability and security.
(cherry picked from commit 155a3b26cdc5526873e4f98500cb50840a5e019d) |