pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/net/tor
Module Name: pkgsrc
Committed By: wiz
Date: Wed Oct 27 13:16:35 UTC 2021
Modified Files:
pkgsrc/net/tor: Makefile distinfo
Log Message:
tor: update to 0.4.6.8.
Changes in version 0.4.6.8 - 2021-10-26
This version fixes several bugs from earlier versions of Tor. One
highlight is a fix on how we track DNS timeouts to report general
relay overload.
o Major bugfixes (relay, overload state):
- Relays report the general overload state for DNS timeout errors
only if X% of all DNS queries over Y seconds are errors. Before
that, it only took 1 timeout to report the overload state which
was just too low of a threshold. The X and Y values are 1% and 10
minutes respectively but they are also controlled by consensus
parameters. Fixes bug 40491; bugfix on 0.4.6.1-alpha.
o Minor features (fallbackdir):
- Regenerate fallback directories for October 2021. Closes
ticket 40493.
o Minor features (testing):
- On a testing network, relays can now use the
TestingMinTimeToReportBandwidth option to change the smallest
amount of time over which they're willing to report their observed
maximum bandwidth. Previously, this was fixed at 1 day. For
safety, values under 2 hours are only supported on testing
networks. Part of a fix for ticket 40337.
- Relays on testing networks no longer rate-limit how frequently
they are willing to report new bandwidth measurements. Part of a
fix for ticket 40337.
- Relays on testing networks now report their observed bandwidths
immediately from startup. Previously, they waited until they had
been running for a full day. Closes ticket 40337.
o Minor bugfix (onion service):
- Do not flag an HSDir as non-running in case the descriptor upload
or fetch fails. An onion service closes pending directory
connections before uploading a new descriptor which can thus lead
to wrongly flagging many relays and thus affecting circuit building
path selection. Fixes bug 40434; bugfix on 0.2.0.13-alpha.
- Improve logging when a bad HS version is given. Fixes bug 40476;
bugfix on 0.4.6.1-alpha.
o Minor bugfix (CI, onion service):
- Exclude onion service version 2 Stem tests in our CI. Fixes bug 40500;
bugfix on 0.3.2.1-alpha.
o Minor bugfixes (compatibility):
- Fix compatibility with the most recent Libevent versions, which no
longer have an evdns_set_random_bytes() function. Because this
function has been a no-op since Libevent 2.0.4-alpha, it is safe
for us to just stop calling it. Fixes bug 40371; bugfix
on 0.2.1.7-alpha.
o Minor bugfixes (onion service, TROVE-2021-008):
- Only log v2 access attempts once total, in order to not pollute
the logs with warnings and to avoid recording the times on disk
when v2 access was attempted. Note that the onion address was
_never_ logged. This counts as a Low-severity security issue.
Fixes bug 40474; bugfix on 0.4.5.8.
To generate a diff of this commit:
cvs rdiff -u -r1.173 -r1.174 pkgsrc/net/tor/Makefile
cvs rdiff -u -r1.120 -r1.121 pkgsrc/net/tor/distinfo
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/net/tor/Makefile
diff -u pkgsrc/net/tor/Makefile:1.173 pkgsrc/net/tor/Makefile:1.174
--- pkgsrc/net/tor/Makefile:1.173 Tue Sep 7 14:00:52 2021
+++ pkgsrc/net/tor/Makefile Wed Oct 27 13:16:35 2021
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.173 2021/09/07 14:00:52 gdt Exp $
+# $NetBSD: Makefile,v 1.174 2021/10/27 13:16:35 wiz Exp $
-DISTNAME= tor-0.4.6.7
+DISTNAME= tor-0.4.6.8
CATEGORIES= net security
MASTER_SITES= https://dist.torproject.org/
Index: pkgsrc/net/tor/distinfo
diff -u pkgsrc/net/tor/distinfo:1.120 pkgsrc/net/tor/distinfo:1.121
--- pkgsrc/net/tor/distinfo:1.120 Tue Oct 26 11:07:03 2021
+++ pkgsrc/net/tor/distinfo Wed Oct 27 13:16:35 2021
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.120 2021/10/26 11:07:03 nia Exp $
+$NetBSD: distinfo,v 1.121 2021/10/27 13:16:35 wiz Exp $
-BLAKE2s (tor-0.4.6.7.tar.gz) = 5ff08a4fc22a6072a63abe4abfddc00ee73e4fa1d2436045c011f2c7846b5405
-SHA512 (tor-0.4.6.7.tar.gz) = e5f9e235fc4b96f5e63e0bfa4ca412d0d11299a31cb77cae1c199b276d0dfbf3656657ddf910b22625dd49eb726d487666e80e8889db78c9edebbab0d80d9e03
-Size (tor-0.4.6.7.tar.gz) = 7790727 bytes
+BLAKE2s (tor-0.4.6.8.tar.gz) = 42403c0613223bb1ae621a4a175596c8e42e18ef7f4b20725293bb9644e596b2
+SHA512 (tor-0.4.6.8.tar.gz) = ff008ddf10c2a4c9e0d0da28558c7a97a6d42615c8bcad25a74567e3aafaba49df1699e379fd674f93305d222748d16b2f21d0da9a8fd3444b659747e1f1d07b
+Size (tor-0.4.6.8.tar.gz) = 7796485 bytes
Home |
Main Index |
Thread Index |
Old Index