The NetBSD Project

CVS log for pkgsrc/net/tor/PLIST

[BACK] Up to [cvs.NetBSD.org] / pkgsrc / net / tor

Request diff between arbitrary revisions


Keyword substitution: kv
Default branch: MAIN


Revision 1.16: download - view: text, markup, annotated - select for diffs
Sun Jun 27 21:18:38 2021 UTC (3 years, 10 months ago) by wiz
Branches: MAIN
CVS tags: pkgsrc-2025Q1-base, pkgsrc-2025Q1, pkgsrc-2024Q4-base, pkgsrc-2024Q4, pkgsrc-2024Q3-base, pkgsrc-2024Q3, pkgsrc-2024Q2-base, pkgsrc-2024Q2, pkgsrc-2024Q1-base, pkgsrc-2024Q1, pkgsrc-2023Q4-base, pkgsrc-2023Q4, pkgsrc-2023Q3-base, pkgsrc-2023Q3, pkgsrc-2023Q2-base, pkgsrc-2023Q2, pkgsrc-2023Q1-base, pkgsrc-2023Q1, pkgsrc-2022Q4-base, pkgsrc-2022Q4, pkgsrc-2022Q3-base, pkgsrc-2022Q3, pkgsrc-2022Q2-base, pkgsrc-2022Q2, pkgsrc-2022Q1-base, pkgsrc-2022Q1, pkgsrc-2021Q4-base, pkgsrc-2021Q4, pkgsrc-2021Q3-base, pkgsrc-2021Q3, HEAD
Diff to: previous 1.15: preferred, colored
Changes since revision 1.15: +2 -3 lines
tor: update to 0.4.6.5.

Changes in version 0.4.6.5 - 2021-06-14
  Tor 0.4.6.5 is the first stable release in its series. The 0.4.6.x
  series includes numerous features and bugfixes, including a significant
  improvement to our circuit timeout algorithm that should improve
  observed client performance, and a way for relays to report when they are
  overloaded.

  This release also includes security fixes for several security issues,
  including a denial-of-service attack against onion service clients,
  and another denial-of-service attack against relays. Everybody should
  upgrade to one of 0.3.5.15, 0.4.4.9, 0.4.5.9, or 0.4.6.5.

  o Major bugfixes (security):
    - Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell on
      half-closed streams. Previously, clients failed to validate which
      hop sent these cells: this would allow a relay on a circuit to end
      a stream that wasn't actually built with it. Fixes bug 40389;
      bugfix on 0.3.5.1-alpha. This issue is also tracked as TROVE-2021-
      003 and CVE-2021-34548.

  o Major bugfixes (security, defense-in-depth):
    - Detect more failure conditions from the OpenSSL RNG code.
      Previously, we would detect errors from a missing RNG
      implementation, but not failures from the RNG code itself.
      Fortunately, it appears those failures do not happen in practice
      when Tor is using OpenSSL's default RNG implementation. Fixes bug
      40390; bugfix on 0.2.8.1-alpha. This issue is also tracked as
      TROVE-2021-004. Reported by Jann Horn at Google's Project Zero.

  o Major bugfixes (security, denial of service):
    - Resist a hashtable-based CPU denial-of-service attack against
      relays. Previously we used a naive unkeyed hash function to look
      up circuits in a circuitmux object. An attacker could exploit this
      to construct circuits with chosen circuit IDs, to create
      collisions and make the hash table inefficient. Now we use a
      SipHash construction here instead. Fixes bug 40391; bugfix on
      0.2.4.4-alpha. This issue is also tracked as TROVE-2021-005 and
      CVE-2021-34549. Reported by Jann Horn from Google's Project Zero.
    - Fix an out-of-bounds memory access in v3 onion service descriptor
      parsing. An attacker could exploit this bug by crafting an onion
      service descriptor that would crash any client that tried to visit
      it. Fixes bug 40392; bugfix on 0.3.0.1-alpha. This issue is also
      tracked as TROVE-2021-006 and CVE-2021-34550. Reported by Sergei
      Glazunov from Google's Project Zero.

  o Major features (control port, onion services):
    - Add controller support for creating version 3 onion services with
      client authorization. Previously, only v2 onion services could be
      created with client authorization. Closes ticket 40084. Patch by
      Neel Chauhan.

  o Major features (directory authority):
    - When voting on a relay with a Sybil-like appearance, add the Sybil
      flag when clearing out the other flags. This lets a relay operator
      know why their relay hasn't been included in the consensus. Closes
      ticket 40255. Patch by Neel Chauhan.

  o Major features (metrics):
    - Relays now report how overloaded they are in their extrainfo
      documents. This information is controlled with the
      OverloadStatistics torrc option, and it will be used to improve
      decisions about the network's load balancing. Implements proposal
      328; closes ticket 40222.

  o Major features (relay, denial of service):
    - Add a new DoS subsystem feature to control the rate of client
      connections for relays. Closes ticket 40253.

  o Major features (statistics):
    - Relays now publish statistics about the number of v3 onion
      services and volume of v3 onion service traffic, in the same
      manner they already do for v2 onions. Closes ticket 23126.

  o Major bugfixes (circuit build timeout):
    - Improve the accuracy of our circuit build timeout calculation for
      60%, 70%, and 80% build rates for various guard choices. We now
      use a maximum likelihood estimator for Pareto parameters of the
      circuit build time distribution, instead of a "right-censored
      estimator". This causes clients to ignore circuits that never
      finish building in their timeout calculations. Previously, clients
      were counting such unfinished circuits as having the highest
      possible build time value, when in reality these circuits most
      likely just contain relays that are offline. We also now wait a
      bit longer to let circuits complete for measurement purposes,
      lower the minimum possible effective timeout from 1.5 seconds to
      10ms, and increase the resolution of the circuit build time
      histogram from 50ms bin widths to 10ms bin widths. Additionally,
      we alter our estimate Xm by taking the maximum of the top 10 most
      common build time values of the 10ms histogram, and compute Xm as
      the average of these. Fixes bug 40168; bugfix on 0.2.2.14-alpha.
    - Remove max_time calculation and associated warning from circuit
      build timeout 'alpha' parameter estimation, as this is no longer
      needed by our new estimator from 40168. Fixes bug 34088; bugfix
      on 0.2.2.9-alpha.

  o Major bugfixes (signing key):
    - In the tor-gencert utility, give an informative error message if
      the passphrase given in `--create-identity-key` is too short.
      Fixes bug 40189; bugfix on 0.2.0.1-alpha. Patch by Neel Chauhan.

  o Minor features (bridge):
    - We now announce the URL to Tor's new bridge status at
      https://bridges.torproject.org/ when Tor is configured to run as a
      bridge relay. Closes ticket 30477.

  o Minor features (build system):
    - New "make lsp" command to auto generate the compile_commands.json
      file used by the ccls server. The "bear" program is needed for
      this. Closes ticket 40227.

  o Minor features (client):
    - Clients now check whether their streams are attempting to re-enter
      the Tor network (i.e. to send Tor traffic over Tor), and close
      them preemptively if they think exit relays will refuse them for
      this reason. See ticket 2667 for details. Closes ticket 40271.

  o Minor features (command line):
    - Add long format name "--torrc-file" equivalent to the existing
      command-line option "-f". Closes ticket 40324. Patch by
      Daniel Pinto.

  o Minor features (command-line interface):
    - Add build informations to `tor --version` in order to ease
      reproducible builds. Closes ticket 32102.
    - When parsing command-line flags that take an optional argument,
      treat the argument as absent if it would start with a '-'
      character. Arguments in that form are not intelligible for any of
      our optional-argument flags. Closes ticket 40223.
    - Allow a relay operator to list the ed25519 keys on the command
      line by adding the `rsa` and `ed25519` arguments to the
      --list-fingerprint flag to show the respective RSA and ed25519
      relay fingerprint. Closes ticket 33632. Patch by Neel Chauhan.

  o Minor features (compatibility):
    - Remove an assertion function related to TLS renegotiation. It was
      used nowhere outside the unit tests, and it was breaking
      compilation with recent alpha releases of OpenSSL 3.0.0. Closes
      ticket 40399.

  o Minor features (control port, stream handling):
    - Add the stream ID to the event line in the ADDRMAP control event.
      Closes ticket 40249. Patch by Neel Chauhan.

  o Minor features (dormant mode):
    - Add a new 'DormantTimeoutEnabled' option to allow coarse-grained
      control over whether the client ever becomes dormant from
      inactivity. Most people won't need this. Closes ticket 40228.
    - Add a new 'DormantTimeoutEnabled' option for coarse-grained
      control over whether the client can become dormant from
      inactivity. Most people won't need this. Closes ticket 40228.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2021/06/10.

  o Minor features (logging):
    - Edit heartbeat log messages so that more of them begin with the
      string "Heartbeat: ". Closes ticket 40322; patch
      from 'cypherpunks'.
    - Change the DoS subsystem heartbeat line format to be more clear on
      what has been detected/rejected, and which option is disabled (if
      any). Closes ticket 40308.
    - In src/core/mainloop/mainloop.c and src/core/mainloop/connection.c,
      put brackets around IPv6 addresses in log messages. Closes ticket
      40232. Patch by Neel Chauhan.

  o Minor features (logging, diagnostic):
    - Log decompression failures at a higher severity level, since they
      can help provide missing context for other warning messages. We
      rate-limit these messages, to avoid flooding the logs if they
      begin to occur frequently. Closes ticket 40175.

  o Minor features (onion services):
    - Add a warning message when trying to connect to (no longer
      supported) v2 onion services. Closes ticket 40373.

  o Minor features (performance, windows):
    - Use SRWLocks to implement locking on Windows. Replaces the
      "critical section" locking implementation with the faster
      SRWLocks, available since Windows Vista. Closes ticket 17927.
      Patch by Daniel Pinto.

  o Minor features (protocol, proxy support, defense in depth):
    - Close HAProxy connections if they somehow manage to send us data
      before we start reading. Closes another case of ticket 40017.

  o Minor features (tests, portability):
    - Port the hs_build_address.py test script to work with recent
      versions of python. Closes ticket 40213. Patch from
      Samanta Navarro.

  o Minor features (vote document):
    - Add a "stats" line to directory authority votes, to report various
      statistics that authorities compute about the relays. This will
      help us diagnose the network better. Closes ticket 40314.

  o Minor bugfixes (build):
    - The configure script now shows whether or not lzma and zstd have
      been used, not just if the enable flag was passed in. Fixes bug
      40236; bugfix on 0.4.3.1-alpha.

  o Minor bugfixes (compatibility):
    - Fix a failure in the test cases when running on the "hppa"
      architecture, along with a related test that might fail on other
      architectures in the future. Fixes bug 40274; bugfix
      on 0.2.5.1-alpha.

  o Minor bugfixes (compilation):
    - Fix a compilation warning about unused functions when building
      with a libc that lacks the GLOB_ALTDIRFUNC constant. Fixes bug
      40354; bugfix on 0.4.5.1-alpha. Patch by Daniel Pinto.

  o Minor bugfixes (consensus handling):
    - Avoid a set of bugs that could be caused by inconsistently
      preferring an out-of-date consensus stored in a stale directory
      cache over a more recent one stored on disk as the latest
      consensus. Fixes bug 40375; bugfix on 0.3.1.1-alpha.

  o Minor bugfixes (control, sandbox):
    - Allow the control command SAVECONF to succeed when the seccomp
      sandbox is enabled, and make SAVECONF keep only one backup file to
      simplify implementation. Previously SAVECONF allowed a large
      number of backup files, which made it incompatible with the
      sandbox. Fixes bug 40317; bugfix on 0.2.5.4-alpha. Patch by
      Daniel Pinto.

  o Minor bugfixes (directory authorities, voting):
    - Add a new consensus method (31) to support any future changes that
      authorities decide to make to the value of bwweightscale or
      maxunmeasuredbw. Previously, there was a bug that prevented the
      authorities from parsing these consensus parameters correctly under
      most circumstances. Fixes bug 19011; bugfix on 0.2.2.10-alpha.

  o Minor bugfixes (ipv6):
    - Allow non-SOCKSPorts to disable IPv4, IPv6, and PreferIPv4. Some
      rare configurations might break, but in this case you can disable
      NoIPv4Traffic and NoIPv6Traffic as needed. Fixes bug 33607; bugfix
      on 0.4.1.1-alpha. Patch by Neel Chauhan.

  o Minor bugfixes (key generation):
    - Do not require a valid torrc when using the `--keygen` argument to
      generate a signing key. This allows us to generate keys on systems
      or users which may not run Tor. Fixes bug 40235; bugfix on
      0.2.7.2-alpha. Patch by Neel Chauhan.

  o Minor bugfixes (logging, relay):
    - Emit a warning if an Address is found to be internal and tor can't
      use it. Fixes bug 40290; bugfix on 0.4.5.1-alpha.

  o Minor bugfixes (metrics port):
    - Fix a bug that made tor try to re-bind() on an already open
      MetricsPort every 60 seconds. Fixes bug 40370; bugfix
      on 0.4.5.1-alpha.

  o Minor bugfixes (onion services, logging):
    - Downgrade the severity of a few rendezvous circuit-related
      warnings from warning to info. Fixes bug 40207; bugfix on
      0.3.2.1-alpha. Patch by Neel Chauhan.

  o Minor bugfixes (relay):
    - Reduce the compression level for data streaming from HIGH to LOW.
      This should reduce the CPU and memory burden for directory caches.
      Fixes bug 40301; bugfix on 0.3.5.1-alpha.

  o Minor bugfixes (testing, BSD):
    - Fix pattern-matching errors when patterns expand to invalid paths
      on BSD systems. Fixes bug 40318; bugfix on 0.4.5.1-alpha. Patch by
      Daniel Pinto.

  o Code simplification and refactoring:
    - Remove the orconn_ext_or_id_map structure and related functions.
      (Nothing outside of unit tests used them.) Closes ticket 33383.
      Patch by Neel Chauhan.

  o Removed features:
    - Remove unneeded code for parsing private keys in directory
      documents. This code was only used for client authentication in v2
      onion services, which are now unsupported. Closes ticket 40374.
    - As of this release, Tor no longer supports the old v2 onion
      services. They were deprecated last July for security, and support
      will be removed entirely later this year. We strongly encourage
      everybody to migrate to v3 onion services. For more information,
      see https://blog.torproject.org/v2-deprecation-timeline . Closes
      ticket 40266. (NOTE: We accidentally released an earlier version
      of the 0.4.6.1-alpha changelog without this entry. Sorry for
      the confusion!)

  o Code simplification and refactoring (metrics, DoS):
    - Move the DoS subsystem into the subsys manager, including its
      configuration options. Closes ticket 40261.

  o Documentation (manual):
    - Move the ServerTransport* options to the "SERVER OPTIONS" section.
      Closes issue 40331.
    - Indicate that the HiddenServiceStatistics option also applies to
      bridges. Closes ticket 40346.
    - Move the description of BridgeRecordUsageByCountry to the section
      "STATISTICS OPTIONS". Closes ticket 40323.

  o Removed features (relay):
    - Because DirPorts are only used on authorities, relays no longer
      advertise them. Similarly, self-testing for DirPorts has been
      disabled, since an unreachable DirPort is no reason for a relay
      not to advertise itself. (Configuring a DirPort will still work,
      for now.) Closes ticket 40282.

Revision 1.15: download - view: text, markup, annotated - select for diffs
Mon Feb 15 19:01:31 2021 UTC (4 years, 2 months ago) by wiz
Branches: MAIN
CVS tags: pkgsrc-2021Q2-base, pkgsrc-2021Q2, pkgsrc-2021Q1-base, pkgsrc-2021Q1
Diff to: previous 1.14: preferred, colored
Changes since revision 1.14: +2 -2 lines
tor: update to 0.4.5.6.

Changes in version 0.4.5.6 - 2021-02-15
  The Tor 0.4.5.x release series is dedicated to the memory of Karsten
  Loesing (1979-2020), Tor developer, cypherpunk, husband, and father.
  Karsten is best known for creating the Tor metrics portal and leading
  the metrics team, but he was involved in Tor from the early days. For
  example, while he was still a student he invented and implemented the
  v2 onion service directory design, and he also served as an ambassador
  to the many German researchers working in the anonymity field. We
  loved him and respected him for his patience, his consistency, and his
  welcoming approach to growing our community.

  This release series introduces significant improvements in relay IPv6
  address discovery, a new "MetricsPort" mechanism for relay operators
  to measure performance, LTTng support, build system improvements to
  help when using Tor as a static library, and significant bugfixes
  related to Windows relay performance. It also includes numerous
  smaller features and bugfixes.

Revision 1.13.16.1: download - view: text, markup, annotated - select for diffs
Mon Mar 4 17:11:05 2019 UTC (6 years, 2 months ago) by bsiegert
Branches: pkgsrc-2018Q4
Diff to: previous 1.13: preferred, colored; next MAIN 1.14: preferred, colored
Changes since revision 1.13: +4 -1 lines
Pullup ticket #5919 - requested by leot
net/tor: security fix

Revisions pulled up:
- net/tor/Makefile                                              1.136-1.137
- net/tor/PLIST                                                 1.14
- net/tor/distinfo                                              1.96-1.97

---
   Module Name:    pkgsrc
   Committed By:   adam
   Date:           Tue Jan  8 08:39:55 UTC 2019

   Modified Files:
           pkgsrc/net/tor: Makefile PLIST distinfo

   Log Message:
   tor: updated to 0.3.5.7

   Changes in version 0.3.5.7:

   Tor 0.3.5.7 is the first stable release in its series; it includes
   compilation and portability fixes, and a fix for a severe problem
   affecting directory caches.

   The Tor 0.3.5 series includes several new features and performance
   improvements, including client authorization for v3 onion services,
   cleanups to bootstrap reporting, support for improved bandwidth-
   measurement tools, experimental support for NSS in place of OpenSSL,
   and much more. It also begins a full reorganization of Tor's code
   layout, for improved modularity and maintainability in the future.
   Finally, there is the usual set of performance improvements and
   bugfixes that we try to do in every release series.

   There are a couple of changes in the 0.3.5 that may affect
   compatibility. First, the default version for newly created onion
   services is now v3. Use the HiddenServiceVersion option if you want to
   override this. Second, some log messages related to bootstrapping have
   changed; if you use stem, you may need to update to the latest version
   so it will recognize them.

   We have designated 0.3.5 as a "long-term support" (LTS) series: we
   will continue to patch major bugs in typical configurations of 0.3.5
   until at least 1 Feb 2022. (We do not plan to provide long-term
   support for embedding, Rust support, NSS support, running a directory
   authority, or unsupported platforms. For these, you will need to stick
   with the latest stable release.)

---
   Module Name:    pkgsrc
   Committed By:   adam
   Date:           Fri Feb 22 08:47:51 UTC 2019

   Modified Files:
           pkgsrc/net/tor: Makefile distinfo

   Log Message:
   tor: updated to 0.3.5.8

   Changes in version 0.3.5.8:

   Tor 0.3.5.8 backports serveral fixes from later releases, including fixes
   for an annoying SOCKS-parsing bug that affected users in earlier 0.3.5.x
   releases.

   It also includes a fix for a medium-severity security bug affecting Tor
   0.3.2.1-alpha and later. All Tor instances running an affected release
   should upgrade to 0.3.3.12, 0.3.4.11, 0.3.5.8, or 0.4.0.2-alpha.

   o Major bugfixes (cell scheduler, KIST, security):
     - Make KIST consider the outbuf length when computing what it can
       put in the outbuf. Previously, KIST acted as though the outbuf
       were empty, which could lead to the outbuf becoming too full. It
       is possible that an attacker could exploit this bug to cause a Tor
       client or relay to run out of memory and crash. Fixes bug 29168;
       bugfix on 0.3.2.1-alpha. This issue is also being tracked as
       TROVE-2019-001 and CVE-2019-8955.

   o Major bugfixes (networking, backport from 0.4.0.2-alpha):
     - Gracefully handle empty username/password fields in SOCKS5
       username/password auth messsage and allow SOCKS5 handshake to
       continue. Previously, we had rejected these handshakes, breaking
       certain applications. Fixes bug 29175; bugfix on 0.3.5.1-alpha.

   o Minor features (compilation, backport from 0.4.0.2-alpha):
     - Compile correctly when OpenSSL is built with engine support
       disabled, or with deprecated APIs disabled. Closes ticket 29026.
       Patches from "Mangix".

   o Minor features (geoip):
     - Update geoip and geoip6 to the February 5 2019 Maxmind GeoLite2
       Country database. Closes ticket 29478.

   o Minor features (testing, backport from 0.4.0.2-alpha):
     - Treat all unexpected ERR and BUG messages as test failures. Closes
       ticket 28668.

   o Minor bugfixes (onion service v3, client, backport from 0.4.0.1-alpha):
     - Stop logging a "BUG()" warning and stacktrace when we find a SOCKS
       connection waiting for a descriptor that we actually have in the
       cache. It turns out that this can actually happen, though it is
       rare. Now, tor will recover and retry the descriptor. Fixes bug
       28669; bugfix on 0.3.2.4-alpha.

   o Minor bugfixes (IPv6, backport from 0.4.0.1-alpha):
     - Fix tor_ersatz_socketpair on IPv6-only systems. Previously, the
       IPv6 socket was bound using an address family of AF_INET instead
       of AF_INET6. Fixes bug 28995; bugfix on 0.3.5.1-alpha. Patch from
       Kris Katterjohn.

   o Minor bugfixes (build, compatibility, rust, backport from 0.4.0.2-alpha):
     - Update Cargo.lock file to match the version made by the latest
       version of Rust, so that "make distcheck" will pass again. Fixes
       bug 29244; bugfix on 0.3.3.4-alpha.

   o Minor bugfixes (client, clock skew, backport from 0.4.0.1-alpha):
     - Select guards even if the consensus has expired, as long as the
       consensus is still reasonably live. Fixes bug 24661; bugfix
       on 0.3.0.1-alpha.

   o Minor bugfixes (compilation, backport from 0.4.0.1-alpha):
     - Compile correctly on OpenBSD; previously, we were missing some
       headers required in order to detect it properly. Fixes bug 28938;
       bugfix on 0.3.5.1-alpha. Patch from Kris Katterjohn.terjohn.

   o Minor bugfixes (documentation, backport from 0.4.0.2-alpha):
     - Describe the contents of the v3 onion service client authorization
       files correctly: They hold public keys, not private keys. Fixes
       bug 28979; bugfix on 0.3.5.1-alpha. Spotted by "Felixix".

   o Minor bugfixes (logging, backport from 0.4.0.1-alpha):
     - Rework rep_hist_log_link_protocol_counts() to iterate through all
       link protocol versions when logging incoming/outgoing connection
       counts. Tor no longer skips version 5, and we won't have to
       remember to update this function when new link protocol version is
       developed. Fixes bug 28920; bugfix on 0.2.6.10.

   o Minor bugfixes (logging, backport from 0.4.0.2-alpha):
     - Log more information at "warning" level when unable to read a
       private key; log more information at "info" level when unable to
       read a public key. We had warnings here before, but they were lost
       during our NSS work. Fixes bug 29042; bugfix on 0.3.5.1-alpha.

   o Minor bugfixes (misc, backport from 0.4.0.2-alpha):
     - The amount of total available physical memory is now determined
       using the sysctl identifier HW_PHYSMEM (rather than HW_USERMEM)
       when it is defined and a 64-bit variant is not available. Fixes
       bug 28981; bugfix on 0.2.5.4-alpha. Patch from Kris Katterjohn.

   o Minor bugfixes (onion services, backport from 0.4.0.2-alpha):
     - Avoid crashing if ClientOnionAuthDir (incorrectly) contains more
       than one private key for a hidden service. Fixes bug 29040; bugfix
       on 0.3.5.1-alpha.
     - In hs_cache_store_as_client() log an HSDesc we failed to parse at
       "debug" level. Tor used to log it as a warning, which caused very
       long log lines to appear for some users. Fixes bug 29135; bugfix
       on 0.3.2.1-alpha.
     - Stop logging "Tried to establish rendezvous on non-OR circuit..."
       as a warning. Instead, log it as a protocol warning, because there
       is nothing that relay operators can do to fix it. Fixes bug 29029;
       bugfix on 0.2.5.7-rc.on 0.2.5.7-rc.

   o Minor bugfixes (tests, directory clients, backport from 0.4.0.1-alpha):
     - Mark outdated dirservers when Tor only has a reasonably live
       consensus. Fixes bug 28569; bugfix on 0.3.2.5-alpha.

   o Minor bugfixes (tests, backport from 0.4.0.2-alpha):
     - Detect and suppress "bug" warnings from the util/time test on
       Windows. Fixes bug 29161; bugfix on 0.2.9.3-alpha.
     - Do not log an error-level message if we fail to find an IPv6
       network interface from the unit tests. Fixes bug 29160; bugfix
       on 0.2.7.3-rc.

   o Minor bugfixes (usability, backport from 0.4.0.1-alpha):
     - Stop saying "Your Guard ..." in pathbias_measure_{use,close}_rate().
       Some users took this phrasing to mean that the mentioned guard was
       under their control or responsibility, which it is not. Fixes bug
       28895; bugfix on Tor 0.3.0.1-alpha.

Revision 1.14: download - view: text, markup, annotated - select for diffs
Tue Jan 8 08:39:55 2019 UTC (6 years, 4 months ago) by adam
Branches: MAIN
CVS tags: pkgsrc-2020Q4-base, pkgsrc-2020Q4, pkgsrc-2020Q3-base, pkgsrc-2020Q3, pkgsrc-2020Q2-base, pkgsrc-2020Q2, pkgsrc-2020Q1-base, pkgsrc-2020Q1, pkgsrc-2019Q4-base, pkgsrc-2019Q4, pkgsrc-2019Q3-base, pkgsrc-2019Q3, pkgsrc-2019Q2-base, pkgsrc-2019Q2, pkgsrc-2019Q1-base, pkgsrc-2019Q1
Diff to: previous 1.13: preferred, colored
Changes since revision 1.13: +4 -1 lines
tor: updated to 0.3.5.7

Changes in version 0.3.5.7:

Tor 0.3.5.7 is the first stable release in its series; it includes
compilation and portability fixes, and a fix for a severe problem
affecting directory caches.

The Tor 0.3.5 series includes several new features and performance
improvements, including client authorization for v3 onion services,
cleanups to bootstrap reporting, support for improved bandwidth-
measurement tools, experimental support for NSS in place of OpenSSL,
and much more. It also begins a full reorganization of Tor's code
layout, for improved modularity and maintainability in the future.
Finally, there is the usual set of performance improvements and
bugfixes that we try to do in every release series.

There are a couple of changes in the 0.3.5 that may affect
compatibility. First, the default version for newly created onion
services is now v3. Use the HiddenServiceVersion option if you want to
override this. Second, some log messages related to bootstrapping have
changed; if you use stem, you may need to update to the latest version
so it will recognize them.

We have designated 0.3.5 as a "long-term support" (LTS) series: we
will continue to patch major bugs in typical configurations of 0.3.5
until at least 1 Feb 2022. (We do not plan to provide long-term
support for embedding, Rust support, NSS support, running a directory
authority, or unsupported platforms. For these, you will need to stick
with the latest stable release.)

Revision 1.13: download - view: text, markup, annotated - select for diffs
Sat May 13 20:25:44 2017 UTC (8 years ago) by alnsn
Branches: MAIN
CVS tags: pkgsrc-2018Q4-base, pkgsrc-2018Q3-base, pkgsrc-2018Q3, pkgsrc-2018Q2-base, pkgsrc-2018Q2, pkgsrc-2018Q1-base, pkgsrc-2018Q1, pkgsrc-2017Q4-base, pkgsrc-2017Q4, pkgsrc-2017Q3-base, pkgsrc-2017Q3, pkgsrc-2017Q2-base, pkgsrc-2017Q2
Branch point for: pkgsrc-2018Q4
Diff to: previous 1.12: preferred, colored
Changes since revision 1.12: +9 -9 lines
Introduce ${PLIST.doc}.

It should fix a build with PKG_OPTIONS.tor=-doc.

Revision 1.12: download - view: text, markup, annotated - select for diffs
Sat Jun 7 09:11:36 2014 UTC (10 years, 11 months ago) by wiz
Branches: MAIN
CVS tags: pkgsrc-2017Q1-base, pkgsrc-2017Q1, pkgsrc-2016Q4-base, pkgsrc-2016Q4, pkgsrc-2016Q3-base, pkgsrc-2016Q3, pkgsrc-2016Q2-base, pkgsrc-2016Q2, pkgsrc-2016Q1-base, pkgsrc-2016Q1, pkgsrc-2015Q4-base, pkgsrc-2015Q4, pkgsrc-2015Q3-base, pkgsrc-2015Q3, pkgsrc-2015Q2-base, pkgsrc-2015Q2, pkgsrc-2015Q1-base, pkgsrc-2015Q1, pkgsrc-2014Q4-base, pkgsrc-2014Q4, pkgsrc-2014Q3-base, pkgsrc-2014Q3, pkgsrc-2014Q2-base, pkgsrc-2014Q2
Diff to: previous 1.11: preferred, colored
Changes since revision 1.11: +3 -2 lines
Update to 0.2.4.22, based on the wip version by athaba and myself.
Very many changes since the last stable version in pkgsrc, upgrade!

Revision 1.11: download - view: text, markup, annotated - select for diffs
Tue Mar 11 14:05:11 2014 UTC (11 years, 2 months ago) by jperkin
Branches: MAIN
CVS tags: pkgsrc-2014Q1-base, pkgsrc-2014Q1
Diff to: previous 1.10: preferred, colored
Changes since revision 1.10: +1 -2 lines
Remove example rc.d scripts from PLISTs.

These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.

Revision 1.10: download - view: text, markup, annotated - select for diffs
Tue Sep 6 19:34:01 2011 UTC (13 years, 8 months ago) by drochner
Branches: MAIN
CVS tags: pkgsrc-2013Q4-base, pkgsrc-2013Q4, pkgsrc-2013Q3-base, pkgsrc-2013Q3, pkgsrc-2013Q2-base, pkgsrc-2013Q2, pkgsrc-2013Q1-base, pkgsrc-2013Q1, pkgsrc-2012Q4-base, pkgsrc-2012Q4, pkgsrc-2012Q3-base, pkgsrc-2012Q3, pkgsrc-2012Q2-base, pkgsrc-2012Q2, pkgsrc-2012Q1-base, pkgsrc-2012Q1, pkgsrc-2011Q4-base, pkgsrc-2011Q4, pkgsrc-2011Q3-base, pkgsrc-2011Q3
Diff to: previous 1.9: preferred, colored
Changes since revision 1.9: +4 -0 lines
update to 0.2.2.32

Tor 0.2.2.32, the first stable release in the 0.2.2 branch, is finally
ready. More than two years in the making, this release features improved
client performance and hidden service reliability, better compatibility
for Android, correct behavior for bridges that listen on more than
one address, more extensible and flexible directory object handling,
better reporting of network statistics, improved code security, and
many many other features and bugfixes.

Revision 1.9: download - view: text, markup, annotated - select for diffs
Tue Aug 18 05:48:08 2009 UTC (15 years, 9 months ago) by obache
Branches: MAIN
CVS tags: pkgsrc-2011Q2-base, pkgsrc-2011Q2, pkgsrc-2011Q1-base, pkgsrc-2011Q1, pkgsrc-2010Q4-base, pkgsrc-2010Q4, pkgsrc-2010Q3-base, pkgsrc-2010Q3, pkgsrc-2010Q2-base, pkgsrc-2010Q2, pkgsrc-2010Q1-base, pkgsrc-2010Q1, pkgsrc-2009Q4-base, pkgsrc-2009Q4, pkgsrc-2009Q3-base, pkgsrc-2009Q3
Diff to: previous 1.8: preferred, colored
Changes since revision 1.8: +1 -1 lines
Update tor to 0.2.1.19.
Based on maintainer update request via PR 41828.
(remove patch-a{a,b} and make to simplify by me).

Tor 0.2.1.18 lays the foundations for performance improvements, adds
status events to help users diagnose bootstrap problems, adds optional
authentication/authorization for hidden services, fixes a variety of
potential anonymity problems, and includes a huge pile of other features
and bug fixes.

Tor 0.2.1.19 fixes a major bug with accessing and providing hidden
services.

Revision 1.8: download - view: text, markup, annotated - select for diffs
Sun Jun 14 18:09:45 2009 UTC (15 years, 11 months ago) by joerg
Branches: MAIN
CVS tags: pkgsrc-2009Q2-base, pkgsrc-2009Q2
Diff to: previous 1.7: preferred, colored
Changes since revision 1.7: +1 -3 lines
Remove @dirrm entries from PLISTs

Revision 1.7: download - view: text, markup, annotated - select for diffs
Fri Aug 1 17:23:21 2008 UTC (16 years, 9 months ago) by wiz
Branches: MAIN
CVS tags: pkgsrc-2009Q1-base, pkgsrc-2009Q1, pkgsrc-2008Q4-base, pkgsrc-2008Q4, pkgsrc-2008Q3-base, pkgsrc-2008Q3, cube-native-xorg-base, cube-native-xorg
Diff to: previous 1.6: preferred, colored
Changes since revision 1.6: +4 -0 lines
Update to current stable version, tor-0.2.0.30, based on wip/tor.
Thanks to athaba, netcap, and tvierling.

Changes in version 0.2.0.30 - 2008-07-15
  This new stable release switches to a more efficient directory
  distribution design, adds features to make connections to the Tor
  network harder to block, allows Tor to act as a DNS proxy, adds separate
  rate limiting for relayed traffic to make it easier for clients to
  become relays, fix a variety of potential anonymity problems, and
  includes the usual huge pile of other features and bug fixes.

Revision 1.6: download - view: text, markup, annotated - select for diffs
Fri May 26 02:21:41 2006 UTC (18 years, 11 months ago) by jschauma
Branches: MAIN
CVS tags: pkgsrc-2008Q2-base, pkgsrc-2008Q2, pkgsrc-2008Q1-base, pkgsrc-2008Q1, pkgsrc-2007Q4-base, pkgsrc-2007Q4, pkgsrc-2007Q3-base, pkgsrc-2007Q3, pkgsrc-2007Q2-base, pkgsrc-2007Q2, pkgsrc-2007Q1-base, pkgsrc-2007Q1, pkgsrc-2006Q4-base, pkgsrc-2006Q4, pkgsrc-2006Q3-base, pkgsrc-2006Q3, pkgsrc-2006Q2-base, pkgsrc-2006Q2, cwrapper
Diff to: previous 1.5: preferred, colored
Changes since revision 1.5: +1 -1 lines
- Update tor to latest stable version 0.1.1.20 via files from pkgsrc-wip
- maintainer -> tv

Changes (summary):

some major security fixes, including entry guards to protect the
beginning of the circuit, exit enclaves to protect the end, and better
firewall support; a new directory protocol that improves bandwidth use
and keeps clients more up to date; two new directory authorities;
a new ascii-based controller protocol that lets people easily write
applications to interact with Tor; and
many scalability and performance improvements

Full changes available at
http://archives.seul.org/or/announce/May-2006/msg00000.html:

Revision 1.5: download - view: text, markup, annotated - select for diffs
Tue Aug 9 15:16:39 2005 UTC (19 years, 9 months ago) by salo
Branches: MAIN
CVS tags: pkgsrc-2006Q1-base, pkgsrc-2006Q1, pkgsrc-2005Q4-base, pkgsrc-2005Q4, pkgsrc-2005Q3-base, pkgsrc-2005Q3
Diff to: previous 1.4: preferred, colored
Changes since revision 1.4: +2 -2 lines
sort.

Revision 1.4: download - view: text, markup, annotated - select for diffs
Mon May 2 20:34:04 2005 UTC (20 years ago) by reed
Branches: MAIN
CVS tags: pkgsrc-2005Q2-base, pkgsrc-2005Q2
Diff to: previous 1.3: preferred, colored
Changes since revision 1.3: +2 -1 lines
RCD_SCRIPTS_EXAMPLEDIR is no longer customizable.
And always is defined as share/examples/rc.d
which was the default before.

This rc.d scripts are not automatically added to PLISTs now also.
So add to each corresponding PLIST as required.

This was discussed on tech-pkg in late January and late April.

Todo: remove the RCD_SCRIPTS_EXAMPLEDIR uses in MESSAGES and elsewhere
and remove the RCD_SCRIPTS_EXAMPLEDIR itself.

Revision 1.3: download - view: text, markup, annotated - select for diffs
Sun Feb 13 20:27:53 2005 UTC (20 years, 3 months ago) by jschauma
Branches: MAIN
CVS tags: pkgsrc-2005Q1-base, pkgsrc-2005Q1
Diff to: previous 1.2: preferred, colored
Changes since revision 1.2: +3 -1 lines
Update tor to 0.0.9.4.

pkgsrc changes:
 - depend on tsocks to allow torification of other applications
 - create a user for this application to run as
 - install a suitable rc script

ChangeLog says:
  o Bugfixes on 0.0.9:
    - Fix an assert bug that took down most of our servers: when
      a server claims to have 500 GB of bandwidthburst, don't
      freak out.
    - Don't crash as badly if we have spawned the max allowed number
      of dnsworkers, or we're out of file descriptors.
    - Block more file-sharing ports in the default exit policy.
    - MaxConn is now automatically set to the hard limit of max
      file descriptors we're allowed (ulimit -n), minus a few for
      logs, etc.
    - Give a clearer message when servers need to raise their
      ulimit -n when they start running out of file descriptors.
    - SGI Compatibility patches from Jan Schaumann.
    - Tolerate a corrupt cached directory better.
    - When a dirserver hasn't approved your server, list which one.
    - Go into soft hibernation after 95% of the bandwidth is used,
      not 99%. This is especially important for daily hibernators who
      have a small accounting max. Hopefully it will result in fewer
      cut connections when the hard hibernation starts.
    - Load-balance better when using servers that claim more than
      800kB/s of capacity.
    - Make NT services work (experimental, only used if compiled in).

Revision 1.2: download - view: text, markup, annotated - select for diffs
Tue Jan 11 21:02:20 2005 UTC (20 years, 4 months ago) by tv
Branches: MAIN
Diff to: previous 1.1: preferred, colored
Changes since revision 1.1: +1 -2 lines
Update to 0.0.9.2 (OK'd by jschauma@netbsd.org).

The ChangeLog is huge -- see it for changes.  This is still a pre-alpha
piece of software, so rapid development and change is currently expected.

Revision 1.1.1.1 (vendor branch): download - view: text, markup, annotated - select for diffs
Fri Aug 13 19:33:41 2004 UTC (20 years, 9 months ago) by jschauma
Branches: TNF
CVS tags: pkgsrc-base, pkgsrc-2004Q4-base, pkgsrc-2004Q4, pkgsrc-2004Q3-base, pkgsrc-2004Q3
Diff to: previous 1.1: preferred, colored
Changes since revision 1.1: +0 -0 lines
Import tor into pkgsrc:

The simple version: Tor provides a distributed network of servers ("onion
routers"). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around
the routers. This makes it hard for recipients, observers, and even the onion
routers themselves to track the source of the stream.

The complex version:  Onion Routing is a connection-oriented anonymizing
communication service. Users choose a source-routed path through a set of
nodes, and negotiate a "virtual circuit" through the network, in which each
node knows its predecessor and successor, but no others. Traffic flowing down
the circuit is unwrapped by a symmetric key at each node, which reveals the
downstream node.

Revision 1.1: download - view: text, markup, annotated - select for diffs
Fri Aug 13 19:33:41 2004 UTC (20 years, 9 months ago) by jschauma
Branches: MAIN
Initial revision

Diff request

This form allows you to request diffs between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.

Log view options

CVSweb <webmaster@jp.NetBSD.org>