Tor: Packages and source


Tor is distributed as Free Software under the 3-clause BSD license.

You can get the latest release from the download directory. The latest stable release is 0.1.0.14, and the latest development release is 0.1.1.5-alpha. To keep informed of security advisories and new stable releases, subscribe to the or-announce mailing list: (you will need to confirm via email)

Tor should run on Linux, BSD, OS X, Windows, Solaris, and more.

Instructions for setting up Tor on Linux/BSD/Unix are here. This FAQ entry explains how to verify package signatures.

See the developers page for instructions on fetching Tor from CVS.


Mirrors

If you are running a mirror, please email tor-webmaster@freehaven.net and we'll add it to the list.

FU - Spline (http)
Ghirai.com (http)
Meulie.net (http)
Stevens Institute of Technology (ftp)
Swedish Linux Society (ftp | http)


Testing releases

2005-08-08: Tor 0.1.1.5-alpha includes the critical security fix from 0.1.0.14.

2005-08-04: Tor 0.1.1.4-alpha includes the critical security fix from 0.1.0.13.

2005-07-25: Tor 0.1.1.3-alpha fixes a crash bug with hidden services, an assert trigger in the controller, and a few other controller bugs.

2005-07-14: Tor 0.1.1.2-alpha fixes a seg fault in the controller handling, plus a few other bugs.

2005-06-28: Tor 0.1.1.1-alpha has a revised controller protocol (version 1) that uses ascii rather than binary.


Stable releases

2005-08-08: Tor 0.1.0.14 fixes the second half of a critical bug in the security of our crypto handshakes. All clients should upgrade immediately!

2005-08-04: Tor 0.1.0.13 fixes a critical bug in the security of our crypto handshakes.

2005-07-18: Tor 0.1.0.12 fixes an assert bug that was taking down some clients and servers in rare cases.

2005-06-30: Tor 0.1.0.11 fixes a security problem where servers would disregard their exit policies in some circumstances.

2005-06-12: Tor 0.1.0.10 features cleanup on Windows, including making NT services work; many performance improvements, including libevent to use poll/epoll/kqueue when available, and pthreads and better buffer management to avoid so much memory bloat; better performance and reliability for hidden services; automated self-reachability testing by servers; http and https proxy support for clients; and much more support for the Tor controller protocol.

2005-04-23: Tor 0.0.9.10 has backports for some important security bugs. It is available for people who can't upgrade to Tor 0.1.0.x yet.


You can read the ChangeLog for more details.

Webmaster - $Id$