git.schokokeks.org
Repositories
Help
Report an Issue
tor-webwml.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
57239b0dd
Branches
Tags
bridges
docs-debian
jobs
master
press-clips
tor-webwml.git
en
download.wml
mention quicktime explicitly, and mention the exit node issue explicitly too.
Roger Dingledine
commited
57239b0dd
at 2007-03-08 13:01:21
download.wml
Blame
History
Raw
## translation metadata # Revision: $Revision$ #include "head.wmi" TITLE="Download" <div class="main-column"> <h2>Tor: Packages and source</h2> <hr /> <p>Tor is distributed as <a href="http://www.fsf.org/">Free Software</a> under the <a href="<svnsandbox>LICENSE">3-clause BSD license</a>. </p> <p>If you want Tor to become faster and more usable, please consider <a href="<page donate>">making a donation to the Tor project</a>. </p> <p>The latest stable release is <b><version-stable></b>, and the latest development release is <b><version-alpha></b>.</p> <p><b>Subscribe</b> to the <a href="http://archives.seul.org/or/announce/">or-announce mailing list</a> to keep informed of security advisories and new stable releases (you will need to confirm via email):</p> <form action="http://freehaven.net/cgi-bin/majordomo.cgi"> <input type="hidden" name="mlist" value="or-announce"> <input type="hidden" name="subscribe" value="1"> <input type="hidden" name="host" value="freehaven.net"> <input name="email" size="15"> <input type="submit" value="subscribe"> </form> <p>There is also an <a href="http://rss.gmane.org/gmane.network.onion-routing.announce">RSS feed</a> of the or-announce list at <a href="http://gmane.org">gmane.org</a>.</p> <table border="1" cellspacing="0" cellpadding="2"> <thead> <tr> <th>Platform</th> <th>Package</th> <th>Setup info</th> </tr> </thead> <tr> <td>Windows</td> <td>Tor & Privoxy & Vidalia bundle: <a href="<package-win32-bundle-stable>"><version-win32-bundle-stable></a> (<a href="<package-win32-bundle-stable-sig>">sig</a>), <a href="<package-win32-bundle-alpha>"><version-win32-bundle-alpha></a> (<a href="<package-win32-bundle-alpha-sig>">sig</a>). </td> <td><a href="<page docs/tor-doc-win32>">Windows instructions</a></td> </tr> <tr> <td>Windows packages for experts</td> <td><a href="<page download-windows>">Windows download page</a></td> <td><a href="<page docs/tor-doc-win32>">Windows instructions</a></td> </tr> <tr> <td>Mac OS X 10.4 (Tiger) Universal Binary</td> <td>Tor & Privoxy & Vidalia bundle: <a href="<package-osx-bundle-stable>"><version-osx-bundle-stable></a> (<a href="<package-osx-bundle-stable-sig>">sig</a>), <a href="<package-osx-bundle-alpha>"><version-osx-bundle-alpha></a> (<a href="<package-osx-bundle-alpha-sig>">sig</a>). </td> <td><a href="<page docs/tor-doc-osx>">OS X instructions</a></td> </tr> <tr> <td>Mac OS X 10.3 (Panther)</td> <td>Tor & Privoxy & Vidalia bundle: <a href="<package-oldosx-bundle-stable>"><version-oldosx-bundle-stable></a> (<a href="<package-oldosx-bundle-stable-sig>">sig</a>), <a href="<package-oldosx-bundle-alpha>"><version-oldosx-bundle-alpha></a> (<a href="<package-oldosx-bundle-alpha-sig>">sig</a>). </td> <td><a href="<page docs/tor-doc-osx>">OS X instructions</a></td> </tr> <tr> <td>Mac OS X packages for experts</td> <td><a href="<page download-osx>">OS X download page</a></td> <td><a href="<page docs/tor-doc-osx>">OS X instructions</a></td> </tr> <tr> <td>Linux/Unix packages</td> <td><a href="<page download-unix>">Linux/Unix download page</a></td> <td> <a href="<page docs/tor-doc-unix>">Linux/Unix instructions</a> </td> </tr> <tr> <td>Source tarballs</td> <td> <a href="<package-source-stable>"><version-stable></a> (<a href="<package-source-stable-sig>">sig</a>), <a href="<package-source-alpha>"><version-alpha></a> (<a href="<package-source-alpha-sig>">sig</a>). </td> <td><kbd>./configure && make && src/or/tor</kbd></td> </tr> </table> <br /> <a id="Warning"></a> <h2><a class="anchor" href="#Warning">Warning</a></h2> # Translators: you might not want to translate this section quite # yet, since it's likely to change a lot before we like it. -RD <p>Tor by itself is <b>NOT</b> all you need to maintain your anonymity. There are several major pitfalls to watch out for. </p> <p>First, Tor only protects applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. We recommend you use <a href="http://www.mozilla.org/firefox">Firefox</a> with the <a href="https://addons.mozilla.org/firefox/2275/">Torbutton</a> extension. <!-- , and follow <a href="comingsoon">other recommendations for other supported applications</a>. --> </p> <p>Second, browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others can be manipulated into revealing your IP address. We recommend the <a href="https://addons.mozilla.org/firefox/1237/">QuickJava</a> and <a href="https://addons.mozilla.org/firefox/433/">FlashBlock</a> extensions, and you should probably uninstall other <a href="about:plugins">plugins</a> in general. <!-- You may also find <a href="https://addons.mozilla.org/firefox/722/">NoScript</a> and <a href="https://addons.mozilla.org/firefox/1865/">AdBlock</a> helpful. --> </p> <p>Third, beware of cookies: if you ever browse without Tor and Privoxy and a site gives you a cookie, that cookie could identify you even when you start using Tor again. You should clear your cookies frequently. <a href="https://addons.mozilla.org/firefox/82/">CookieCuller</a> can help protect any cookies you do not want to lose. </p> <p>Fourth, Tor anonymizes the origin of your traffic, and it encrypts everything inside the Tor network, but <a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">it can't encrypt your traffic between the Tor network and its final destination.</a> If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use SSL or other end-to-end encryption and authentication. Also, while Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. </p> <p>Last, be smart and learn more. Understand what Tor offers and what it doesn't offer. This list of pitfalls isn't complete, and we need your help <a href="<page volunteer>#Documentation">identifying and documenting all the issues</a>. </p> <h2>More Information</h2> <ul> <li>Here is a <a href="<page mirrors>">list of sites mirroring the Tor site</a>. Here is a <a href="http://opensource.depthstrike.com/?category=tor">page with torrents for each download above</a>. You can also download the <a href="dist/">Privoxy source</a> or <a href="dist/vidalia-bundles/">Vidalia source</a>.</li> <li>See our <a href="http://wiki.noreply.org/noreply/TheOnionRouter/VerifyingSignatures">FAQ entry on verifying package signatures</a>, which allows you to make sure you've downloaded the file we intended you to get.</li> <li>See the <a href="<page documentation>#Developers">developer documentation</a> for instructions on fetching Tor from SVN to get the latest development version. Note that this version may not work or even compile!</li> </ul> <hr /> <a id="ChangeLog"></a> <h2>Testing releases</h2> <p>2007-03-02: Tor 0.1.2.9-rc <a href="http://archives.seul.org/or/talk/Mar-2007/msg00004.html"> makes it work better on Windows again, and fixes a few other bugs</a>. Please test it! </p> <p>2007-02-26: Tor 0.1.2.8-beta <a href="http://archives.seul.org/or/talk/Feb-2007/msg00224.html">fixes a few crash bugs, and generally continues to clean things up. We're getting close!</a> </p> <p>2007-02-06: Tor 0.1.2.7-alpha <a href="http://archives.seul.org/or/talk/Feb-2007/msg00060.html">makes rate limiting much more comfortable for servers, along with a huge pile of other bugfixes</a>. </p> <p>2007-01-09: Tor 0.1.2.6-alpha <a href="http://archives.seul.org/or/talk/Jan-2007/msg00095.html">fixes two server crash bugs in 0.1.2.5-alpha</a>. </p> <p>2007-01-06: Tor 0.1.2.5-alpha <a href="http://archives.seul.org/or/talk/Jan-2007/msg00087.html">enables write limiting by default, makes NT services more convenient and more correct, includes better detection for misbehaving DNS on servers, and a bunch of other features and bugfixes. The bundles also ship with the new Vidalia 0.0.10 release</a>. </p> <p>2006-12-03: Tor 0.1.2.4-alpha <a href="http://archives.seul.org/or/talk/Dec-2006/msg00057.html">fixes some bugs. The Windows and OS X bundles include the new Privoxy 3.0.6</a>. </p> <p>2006-10-29: Tor 0.1.2.3-alpha <a href="http://archives.seul.org/or/talk/Nov-2006/msg00030.html">starts preparing the Tor directory authorities to integrate with Mike Perry's new Tor controller, so we can autodetect broken exit relays. The bundles include the new Vidalia 0.0.9 release, which features an improved interface for setting up and configuring a Tor server. The Windows bundle also includes Torbutton for simpler installs</a>. </p> <p>2006-10-09: Tor 0.1.2.2-alpha features <a href="http://archives.seul.org/or/talk/Oct-2006/msg00147.html">better load balancing when picking paths, an automated workaround on the server-side for ISPs that "hijack" your DNS answers, and a whole lot of bugfixes</a>. </p> <p>2006-08-27: Tor 0.1.2.1-alpha features <a href="http://archives.seul.org/or/talk/Aug-2006/msg00300.html">an asynchronous DNS library from Adam Langley, better performance and memory overhead for clients and servers, and more</a>. </p> <hr /> <h2>Stable releases</h2> <p>2006-12-14: Tor 0.1.1.26 fixes <a href="http://archives.seul.org/or/announce/Dec-2006/msg00000.html"> a serious privacy bug for people who have set the HttpProxyAuthenticator config option</a>. </p> <p>2006-11-04: Tor 0.1.1.25 fixes <a href="http://archives.seul.org/or/announce/Nov-2006/msg00000.html">yet more crashes and performance bugs, as well as quieting some loud but harmless log warnings</a>. </p> <p>2006-09-29: Tor 0.1.1.24 fixes <a href="http://archives.seul.org/or/announce/Oct-2006/msg00000.html">some more crashes and performance bugs</a>. </p> <p>2006-07-30: Tor 0.1.1.23 fixes <a href="http://archives.seul.org/or/announce/Aug-2006/msg00000.html">more bugs in server reachability testing, a few more crash bugs, and an important client-side bug</a>. Clients and servers should both upgrade. </p> <p>2006-07-05: Tor 0.1.1.22 fixes <a href="http://archives.seul.org/or/announce/Jul-2006/msg00000.html">reachability testing for servers and partial directory downloads</a>. Servers should upgrade; clients who have flaky or slow net connections will also benefit. We also bundle with the new Vidalia version: 0.0.7. </p> <p>2006-06-10: Tor 0.1.1.21 fixes <a href="http://archives.seul.org/or/announce/Jun-2006/msg00000.html">minor stability and protocol correctness problems, mainly for Tor servers. We've also upgraded the Windows bundle with Vidalia 0.0.5, and we're linking to a new OS X bundle with Vidalia 0.0.5 (finally a better interface for Mac users!). Lastly, we've added support for SUSE-style RPM packages</a>. We're still tracking down some reported bugs in Tor server reachability testing. </p> <p>2006-05-23: Tor 0.1.1.20 features <a href="http://archives.seul.org/or/announce/May-2006/msg00000.html">some major security fixes, including entry guards to protect the beginning of the circuit, exit enclaves to protect the end, and better firewall support; a new directory protocol that improves bandwidth use and keeps clients more up to date; two new directory authorities; a new ascii-based controller protocol that lets people easily write applications to interact with Tor; and many scalability and performance improvements</a>. </p> <hr /> <p>You can read the <a href="<svnsandbox>ChangeLog">ChangeLog</a> for more details.</p> </div><!-- #main --> #include <foot.wmi>