Package: tor
Version: 0.1.0.16-1
Severity: grave
Tags: security
Justification: user security hole

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Source: http://archives.seul.org/or/announce/Jan-2006/msg00001.html

Basically an attacker who can run a fast Tor server can find the location of a
hidden service in a matter of hours, possibly even minutes.  This is fixed in
0.1.1.12-alpha, but as this is an alpha release it may contain other bugs.

- -- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFD0s8gqlk5sZw9W7kRArprAKCk6rq93AwexRo3Mnp3ovaPztZTugCfRdZM
noaYhcZw50wxwg4MiKZn5H4=
=RRVR
-----END PGP SIGNATURE-----



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to