Package: tor Version: 0.1.0.16-1 Severity: grave Tags: security Justification: user security hole
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Source: http://archives.seul.org/or/announce/Jan-2006/msg00001.html Basically an attacker who can run a fast Tor server can find the location of a hidden service in a matter of hours, possibly even minutes. This is fixed in 0.1.1.12-alpha, but as this is an alpha release it may contain other bugs. - -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15-1-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFD0s8gqlk5sZw9W7kRArprAKCk6rq93AwexRo3Mnp3ovaPztZTugCfRdZM noaYhcZw50wxwg4MiKZn5H4= =RRVR -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]