git.schokokeks.org
Repositories
Help
Report an Issue
tor-webwml.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
1ccfb1a8c
Branches
Tags
bridges
docs-debian
jobs
master
press-clips
tor-webwml.git
pt
download.wml
Update download page to specify the version numbers of the OS alongside the common name for OSX.
Andrew Lewman
commited
1ccfb1a8c
at 2006-08-22 23:58:10
download.wml
Blame
History
Raw
## translation metadata # Based-On-Revision: 1.47 # Last-Translator: asr@mail.telepac.pt #include "head.wmi" TITLE="Download" <div class="main-column"> <h2>Tor: Pacotes e código fonte</h2> <hr /> <p>Tor é distribuído como <a href="http://www.fsf.org/"><i>Software</i> Livre</a> sob a <a href="<cvssandbox>tor/LICENSE">licença BSD de 3 cláusulas</a>. </p> <p>Se deseja que o Tor se torne mais rápido, ou mais usável, considere, por favor, <a href="<page donate>">fazer um donativo ao projecto Tor</a>. </p> <p>A última versão estável de Tor é <b><version-stable></b>, e a última versão de desenvolvimento é <b><version-alpha></b>.</p> <p><b>Subscreva</b> a <a href="http://archives.seul.org/or/announce/">lista or-announce</a> para se manter a par de avisos de segurança e do lançamento de novas versões estáveis (terá de confirmar por email):</p> <form action="http://freehaven.net/cgi-bin/majordomo.cgi"> <input type="hidden" name="mlist" value="or-announce"> <input type="hidden" name="subscribe" value="1"> <input type="hidden" name="host" value="freehaven.net"> <input name="email" size="15"> <input type="submit" value="subscribe"> </form> <table border="1" cellspacing="0" cellpadding="2"> <thead> <tr> <th>Plataforma</th> <th>Pacote</th> <th>Informação de configuração</th> </tr> </thead> <tr> <td>Windows estável: Pacote Tor & Privoxy & TorCP</td> <td> <a href="<package-win32-bundle-stable>"><version-win32-bundle-stable></a> (<a href="<package-win32-bundle-stable-sig>">sig</a>). </td> <td><a href="<page docs/tor-doc-win32>">Instruções Win32</a></td> </tr> <tr> <td>Windows desenvolvimento: Pacote Tor & Privoxy & Vidalia</td> <td> <a href="<package-win32-bundle-alpha>"><version-win32-bundle-alpha></a> (<a href="<package-win32-bundle-alpha-sig>">sig</a>). </td> <td><a href="<page docs/tor-doc-win32>">Instruções Win32</a></td> </tr> <tr> <td>Windows: apenas Tor (for peritos)</td> <td> <a href="<package-win32-stable>"><version-win32-stable></a> (<a href="<package-win32-stable-sig>">sig</a>), <a href="<package-win32-alpha>"><version-win32-alpha></a> (<a href="<package-win32-alpha-sig>">sig</a>). </td> <td>semelhantes às <a href="<page docs/tor-doc-unix>#privoxy">Instruções Unix</a></td> </tr> <tr> <td>Mac OS X Tiger (10.4)</td> <td> <a href="<package-osx-stable>"><version-osx-stable></a> (<a href="<package-osx-stable-sig>">sig</a>), <a href="<package-osx-alpha>"><version-osx-alpha></a> (<a href="<package-osx-alpha-sig>">sig</a>) </td> <td><a href="<page docs/tor-doc-osx>">Instruções OS X</a></td> </tr> <tr> <td>Mac OS X Panther (10.3)</td> <td> <a href="<package-oldosx-stable>"><version-oldosx-stable></a> (<a href="<package-oldosx-stable-sig>">sig</a>), <a href="<package-oldosx-alpha>"><version-oldosx-alpha></a> (<a href="<package-oldosx-alpha-sig>">sig</a>) </td> <td><a href="<page docs/tor-doc-osx>">Instruções OS X</a></td> </tr> <tr> <td>Debian</td> <td><kbd>apt-get install tor</kbd></td> <td> <ul> <li><a href="<page docs/tor-doc-unix>">Instruções Linux/BSD/Unix</a></li> <li><a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorOnDebian"><i>Backports</i> para Woody e Sarge, Pacotes para Ubuntu, e pacotes de versões experimentais de Tor</a></li> </ul> </td> </tr> <tr> <td>Gentoo</td> <td><kbd>emerge tor</kbd></td> <td> <ul> <li><a href="<page docs/tor-doc-unix>">Instruções Linux/BSD/Unix</a></li> <li><a href="http://gentoo-wiki.com/HOWTO_Anonymity_with_Tor_and_Privoxy">Guia Gentoo-wiki</a></li> </ul> </td> </tr> <tr> <td>Red Hat Linux</td> <td> <a href="<package-rpm-stable>"><version-rpm-stable> RPM</a> (<a href="<package-rpm-stable-sig>">sig</a>) <br> <a href="<package-srpm-stable>"><version-rpm-stable> SRPM</a> (<a href="<package-srpm-stable-sig>">sig</a>) <br> <a href="<package-rpm-alpha>"><version-rpm-alpha> RPM</a> (<a href="<package-rpm-alpha-sig>">sig</a>) <br> <a href="<package-srpm-alpha>"><version-rpm-alpha> SRPM</a> (<a href="<package-srpm-alpha-sig>">sig</a>) </td> <td> <ul> <li><a href="<page docs/tor-doc-unix>">Instruções Linux/BSD/Unix</a></li> <li><a href="http://mirror.noreply.org/pub/devil.homelinux.org/Tor/">RPMs contribuídos incluíndo CVS <i>snapshots</i></a></li> </ul> </td> </tr> <tr> <td>FreeBSD</td> <td><kbd>portinstall -s security/tor</kbd></td> <td><a href="<page docs/tor-doc-unix>">Instruções Linux/BSD/Unix</a></td> </tr> <tr> <td>OpenBSD</td> <td><kbd>cd /usr/ports/net/tor && make && make install</kbd></td> <td> <ul> <li><a href="<page docs/tor-doc-unix>">Instruções Linux/BSD/Unix</a></li> <li><a href="http://wiki.noreply.org/noreply/TheOnionRouter/OpenbsdChrootedTor">Guia par correr Tor em ambiente <i>chroot</i> sob openBSD</a></li> </ul> </td> </tr> <tr> <td>NetBSD</td> <td><kbd>cd /usr/pkgsrc/net/tor && make install</kbd></td> <td><a href="<page docs/tor-doc-unix>">Instruções Linux/BSD/Unix</a></td> </tr> <tr> <td>Source tarballs</td> <td> <a href="<package-source-stable>"><version-stable></a> (<a href="<package-source-stable-sig>">sig</a>), <a href="<package-source-alpha>"><version-alpha></a> (<a href="<package-source-alpha-sig>">sig</a>) </td> <td>n/a</td> </tr> </table> <hr /> <h2>Mais Informação</h2> <ul> <li>Veja esta entrada na <a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#DistSignatures">FAQ</a> sobre como verificar as assinaturas nos pacotes, que permite garantir que obteve o ficheiro correcto.</li> <li>Veja a <a href="<page documentation>#Developers">página de desenvolvimento</a> para instruções sobre como obter a última versão de desenvolvimento de Tor a partir do CVS. Atenção que esta versão poderá não funcionar nem sequer compilar.</li> </ul> <p>Veja esta <a href="<page mirrors>">página</a> que contém uma lista de <i>sites</i> que alojam cópias do Tor. </p> <hr /> <h2>Versões de teste</h2> <p>2006-05-03: Tor 0.1.1.19-rc <a href="http://archives.seul.org/or/talk/May-2006/msg00024.html">fixes the last known important bugs in the 0.1.1.x series</a>. </p> <p>2006-04-10: Tor 0.1.1.18-rc: <a href="http://archives.seul.org/or/talk/Apr-2006/msg00048.html">It adds a fifth authoritative directory server, and fixes a lot of bugs in threshold decisions around directories</a>. </p> <p>2006-03-28: Tor 0.1.1.17-rc: <a href="http://archives.seul.org/or/talk/Mar-2006/msg00184.html">fixes several major bugs for clients and servers. It also adds a fourth authoritative directory server (finally)</a>. </p> <p>2006-03-18: Tor 0.1.1.16-rc: <a href="http://archives.seul.org/or/talk/Mar-2006/msg00146.html">fixes a variety of odds and ends, including getting started on making it easier to add new authoritative dirservers</a>. </p> <p>2006-03-11: Tor 0.1.1.15-rc: <a href="http://archives.seul.org/or/talk/Mar-2006/msg00109.html">fixes a major bootstrapping bug for clients and adds some more security improvements</a>. </p> <p>2006-02-20: Tor 0.1.1.14-alpha: <a href="http://archives.seul.org/or/talk/Feb-2006/msg00190.html">fixes a few more bugs with clients and servers and ties up other loose ends</a>. </p> <p>2006-02-09: Tor 0.1.1.13-alpha: <a href="http://archives.seul.org/or/talk/Feb-2006/msg00093.html">fixes several important crash bugs for servers and clients, as well as a number of big memory bloating problems</a>. We're getting close! </p> <p>2006-01-11: Tor 0.1.1.12-alpha: <a href="http://archives.seul.org/or/talk/Jan-2006/msg00026.html">fixes a bug that prevented Tor servers from accepting connections from non-servers</a>. </p> <p>2006-01-10: Tor 0.1.1.11-alpha: <a href="http://archives.seul.org/or/talk/Jan-2006/msg00024.html">implements entry guard nodes: it automatically chooses a handful of entry nodes and sticks with them for all circuits. It also reduces directory bandwidth overhead substantially, makes Tor servers with dynamic IP addresses useful again, and makes IRC and IM connections over Tor more reliable</a>. <strong>Everybody who runs a hidden service should upgrade.</strong> </p> <p>2005-12-11: Tor 0.1.1.10-alpha: <a href="http://archives.seul.org/or/talk/Dec-2005/msg00053.html">fixes more crash bugs, fixes some anonymity-related problems, and provides major performance speedups and uses less memory than the previous alphas</a>. </p> <p>2005-11-15: Tor 0.1.1.9-alpha: <a href="http://archives.seul.org/or/talk/Nov-2005/msg00139.html">fixes some memory leaks from the last snapshot, removes a lot of extra confusing log warnings, and fixes other bugs</a>. </p> <p>2005-10-07: Tor 0.1.1.8-alpha: <a href="http://archives.seul.org/or/talk/Oct-2005/msg00073.html">clients use the new directory protocol; servers that are tight on resources stop advertising their DirPort; and we use OpenSSL's AES if it's available</a>. </p> <p>2005-09-14: Tor 0.1.1.7-alpha <a href="http://archives.seul.org/or/talk/Sep-2005/msg00152.html">fixes some bugs in 0.1.1.6-alpha</a>. </p> <p>2005-09-09: Tor 0.1.1.6-alpha <a href="http://archives.seul.org/or/talk/Sep-2005/msg00103.html">fixes some bugs in 0.1.1.5-alpha, and adds new features including exit enclaves, improved hidden service speed, remote reachability detection by the dirservers, fixes to let the Tor network bootstrap again, and a start on the new directory design</a>. </p> <p>2005-08-08: Tor 0.1.1.5-alpha <a href="http://archives.seul.org/or/talk/Aug-2005/msg00036.html">includes the critical security fix from 0.1.0.14</a>. </p> <p>2005-08-04: Tor 0.1.1.4-alpha <a href="http://archives.seul.org/or/talk/Aug-2005/msg00010.html">includes the critical security fix from 0.1.0.13</a>. </p> <p>2005-07-25: Tor 0.1.1.3-alpha <a href="http://archives.seul.org/or/talk/Jul-2005/msg00107.html">fixes a crash bug with hidden services, an assert trigger in the controller, and a few other controller bugs</a>. </p> <p>2005-07-14: Tor 0.1.1.2-alpha <a href="http://archives.seul.org/or/talk/Jul-2005/msg00055.html">fixes a seg fault in the controller handling, plus a few other bugs</a>. </p> <p>2005-06-28: Tor 0.1.1.1-alpha has a <a href="http://archives.seul.org/or/talk/Jun-2005/msg00252.html">revised controller protocol (version 1) that uses ascii rather than binary</a>. </p> <hr /> <h2>Versões estáveis</h2> <p>2006-02-17: Tor 0.1.0.17 <a href="http://archives.seul.org/or/announce/Feb-2006/msg00000.html">fixes a crash bug for servers that enable hibernation, lets Windows servers scale better, and tries to reduce the bandwidth overhead from the old-style directory protocol</a>. Both clients and servers are encouraged to upgrade. </p> <p>2006-01-02: Tor 0.1.0.16 <a href="http://archives.seul.org/or/announce/Jan-2006/msg00000.html">fixes nine rare crash bugs, and includes backports from the 0.1.1.x tree to be more aggressive about retrying failed streams</a>. </p> <p>2005-09-23: Tor 0.1.0.15 fixes <a href="http://archives.seul.org/or/announce/Sep-2005/msg00000.html">a crash bug when exit nodes run out of file descriptors, and rejects two more ports in the default exit policy</a>. </p> <p>2005-08-08: Tor 0.1.0.14 fixes <a href="http://archives.seul.org/or/announce/Aug-2005/msg00001.html">the second half of a critical bug in the security of our crypto handshakes</a>. All clients should upgrade <b>immediately</b>! </p> <p>2005-08-04: Tor 0.1.0.13 fixes a <a href="http://archives.seul.org/or/announce/Aug-2005/msg00000.html">critical bug in the security of our crypto handshakes</a>. </p> <p>2005-07-18: Tor 0.1.0.12 fixes an <a href="http://archives.seul.org/or/announce/Jul-2005/msg00001.html">assert bug that was taking down some clients and servers in rare cases</a>. </p> <p>2005-06-30: Tor 0.1.0.11 fixes a <a href="http://archives.seul.org/or/announce/Jul-2005/msg00000.html">security problem where servers would disregard their exit policies in some circumstances</a>. </p> <p>2005-06-12: Tor 0.1.0.10 features <a href="http://archives.seul.org/or/announce/Jun-2005/msg00000.html">cleanup on Windows, including making NT services work; many performance improvements, including libevent to use poll/epoll/kqueue when available, and pthreads and better buffer management to avoid so much memory bloat; better performance and reliability for hidden services; automated self-reachability testing by servers; http and https proxy support for clients; and much more support for the Tor controller protocol</a>. </p> <hr /> <p>Pode verificar o <a href="<cvssandbox>tor/ChangeLog">ChangeLog</a> para mais detailhes.</p> </div><!-- #main --> #include <foot.wmi>