pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/net/tor Update to 0.2.0.31:
details: https://anonhg.NetBSD.org/pkgsrc/rev/2301a1b0c035
branches: trunk
changeset: 546880:2301a1b0c035
user: wiz <wiz%pkgsrc.org@localhost>
date: Mon Sep 08 19:28:28 2008 +0000
description:
Update to 0.2.0.31:
Changes in version 0.2.0.31 - 2008-09-03
o Major bugfixes:
- Make sure that two circuits can never exist on the same connection
with the same circuit ID, even if one is marked for close. This
is conceivably a bugfix for bug 779. Bugfix on 0.1.0.4-rc.
- Relays now reject risky extend cells: if the extend cell includes
a digest of all zeroes, or asks to extend back to the relay that
sent the extend cell, tear down the circuit. Ideas suggested
by rovv.
- If not enough of our entry guards are available so we add a new
one, we might use the new one even if it overlapped with the
current circuit's exit relay (or its family). Anonymity bugfix
pointed out by rovv.
o Minor bugfixes:
- Recover 3-7 bytes that were wasted per memory chunk. Fixes bug
794; bug spotted by rovv. Bugfix on 0.2.0.1-alpha.
- Correctly detect the presence of the linux/netfilter_ipv4.h header
when building against recent kernels. Bugfix on 0.1.2.1-alpha.
- Pick size of default geoip filename string correctly on windows.
Fixes bug 806. Bugfix on 0.2.0.30.
- Make the autoconf script accept the obsolete --with-ssl-dir
option as an alias for the actually-working --with-openssl-dir
option. Fix the help documentation to recommend --with-openssl-dir.
Based on a patch by "Dave". Bugfix on 0.2.0.1-alpha.
- Disallow session resumption attempts during the renegotiation
stage of the v2 handshake protocol. Clients should never be trying
session resumption at this point, but apparently some did, in
ways that caused the handshake to fail. Bug found by Geoff Goodell.
Bugfix on 0.2.0.20-rc.
- When using the TransPort option on OpenBSD, and using the User
option to change UID and drop privileges, make sure to open
/dev/pf before dropping privileges. Fixes bug 782. Patch from
Christopher Davis. Bugfix on 0.1.2.1-alpha.
- Try to attach connections immediately upon receiving a RENDEZVOUS2
or RENDEZVOUS_ESTABLISHED cell. This can save a second or two
on the client side when connecting to a hidden service. Bugfix
on 0.0.6pre1. Found and fixed by Christian Wilms; resolves bug 743.
- When closing an application-side connection because its circuit is
getting torn down, generate the stream event correctly. Bugfix on
0.1.2.x. Anonymous patch.
diffstat:
net/tor/Makefile | 5 ++---
net/tor/distinfo | 8 ++++----
2 files changed, 6 insertions(+), 7 deletions(-)
diffs (29 lines):
diff -r 2d9fbb3f9ed4 -r 2301a1b0c035 net/tor/Makefile
--- a/net/tor/Makefile Mon Sep 08 19:25:40 2008 +0000
+++ b/net/tor/Makefile Mon Sep 08 19:28:28 2008 +0000
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.55 2008/09/06 21:39:52 wiz Exp $
+# $NetBSD: Makefile,v 1.56 2008/09/08 19:28:28 wiz Exp $
#
-DISTNAME= tor-0.2.0.30
-PKGREVISION= 1
+DISTNAME= tor-0.2.0.31
CATEGORIES= net security
MASTER_SITES= http://www.torproject.org/dist/
diff -r 2d9fbb3f9ed4 -r 2301a1b0c035 net/tor/distinfo
--- a/net/tor/distinfo Mon Sep 08 19:25:40 2008 +0000
+++ b/net/tor/distinfo Mon Sep 08 19:28:28 2008 +0000
@@ -1,7 +1,7 @@
-$NetBSD: distinfo,v 1.29 2008/08/01 17:23:21 wiz Exp $
+$NetBSD: distinfo,v 1.30 2008/09/08 19:28:28 wiz Exp $
-SHA1 (tor-0.2.0.30.tar.gz) = c6fbb3bf0141f4b34cc90845373b3dfa8b47ddc4
-RMD160 (tor-0.2.0.30.tar.gz) = e51a38aa1531076bc9722e1584403f917d207dd0
-Size (tor-0.2.0.30.tar.gz) = 2155463 bytes
+SHA1 (tor-0.2.0.31.tar.gz) = a586cc017a791ac481fde836c3cf8e3667fb5cfc
+RMD160 (tor-0.2.0.31.tar.gz) = 584cbbd9f295a8f677bc95a5f05dc78f6184b97a
+Size (tor-0.2.0.31.tar.gz) = 2156305 bytes
SHA1 (patch-aa) = 630e1e0a9591c136987b504e73c64ff9f53b54e9
SHA1 (patch-ab) = 3363efdcf8b9918c1249add1046077f2323a11ff
Home |
Main Index |
Thread Index |
Old Index