pkgsrc-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
pkg/44702: [net/tor] Maintainer update to 0.2.1.30
>Number: 44702
>Category: pkg
>Synopsis: [net/tor] Maintainer update to 0.2.1.30
>Confidential: no
>Severity: non-critical
>Priority: medium
>Responsible: pkg-manager
>State: open
>Class: change-request
>Submitter-Id: net
>Arrival-Date: Wed Mar 09 00:15:01 +0000 2011
>Originator: Christian Sturm
>Release:
>Organization:
>Environment:
>Description:
The supplied patch updates net/tor to 0.2.1.30. I also updated my
e-mail address in the MAINTAINER line and fixed some warnings found
with pkglint -Wall.
Changes in version 0.2.1.30 - 2011-02-23
Tor 0.2.1.30 fixes a variety of less critical bugs. The main other
change is a slight tweak to Tor's TLS handshake that makes relays
and bridges that run this new version reachable from Iran again.
We don't expect this tweak will win the arms race long-term, but it
buys us time until we roll out a better solution.
o Major bugfixes:
- Stop sending a CLOCK_SKEW controller status event whenever
we fetch directory information from a relay that has a wrong clock.
Instead, only inform the controller when it's a trusted authority
that claims our clock is wrong. Bugfix on 0.1.2.6-alpha; fixes
the rest of bug 1074.
- Fix a bounds-checking error that could allow an attacker to
remotely crash a directory authority. Bugfix on 0.2.1.5-alpha.
Found by "piebeer".
- If relays set RelayBandwidthBurst but not RelayBandwidthRate,
Tor would ignore their RelayBandwidthBurst setting,
potentially using more bandwidth than expected. Bugfix on
0.2.0.1-alpha. Reported by Paul Wouters. Fixes bug 2470.
- Ignore and warn if the user mistakenly sets "PublishServerDescriptor
hidserv" in her torrc. The 'hidserv' argument never controlled
publication of hidden service descriptors. Bugfix on 0.2.0.1-alpha.
o Minor features:
- Adjust our TLS Diffie-Hellman parameters to match those used by
Apache's mod_ssl.
- Update to the February 1 2011 Maxmind GeoLite Country database.
o Minor bugfixes:
- Check for and reject overly long directory certificates and
directory tokens before they have a chance to hit any assertions.
Bugfix on 0.2.1.28. Found by "doorss".
- Bring the logic that gathers routerinfos and assesses the
acceptability of circuits into line. This prevents a Tor OP from
getting locked in a cycle of choosing its local OR as an exit for a
path (due to a .exit request) and then rejecting the circuit because
its OR is not listed yet. It also prevents Tor clients from using an
OR running in the same instance as an exit (due to a .exit request)
if the OR does not meet the same requirements expected of an OR
running elsewhere. Fixes bug 1859; bugfix on 0.1.0.1-rc.
o Packaging changes:
- Stop shipping the Tor specs files and development proposal documents
in the tarball. They are now in a separate git repository at
git://git.torproject.org/torspec.git
- Do not include Git version tags as though they are SVN tags when
generating a tarball from inside a repository that has switched
between branches. Bugfix on 0.2.1.15-rc; fixes bug 2402.
>How-To-Repeat:
>Fix:
begin 644 tor.patch.gz
M'XL("#W!=DT``W1O<BYP871C:`"]56MOFT@4_6Q^Q:B;#UL1'L/#@"5+(39Q
MV?JU#.[N2BNA81@2U@E80)*F5?[[WL%Q;*=)JVJEM3"/>^^<<^;>F;EAF?'/
M`S2C:YX7UUP:_O>?%(T($F`#I+&[IJZJ5MNL+YN::25OM;:JM1W=Z9U4\[8N
M^%U17J(:'DU1E0BKCBME19XCY18I&Z34PK(7J2C*\T</8W3!4V3H\&+@@6$,
M=!,I.OQZ'8XLR_M@`5(_Q9H#VQ@8[C96.CM#"C[%!I+ACM'9F81^02=SWIZ3
M\3X_IW>=N`Y!TPWMD+,M2Q1\WJ`3&"DA21F'))[[LV#8Z\&<%5TU5*P:GJ0L
M/TZBX%-(PL4<?%B27XTT=0F-_#B8+*(P(.""Y*&&L]NZ:!\D-/-)'$0)">/.
M>=6VFX&FW=_?JP"QJ:M_.&O5JK[4LJ)I-:%GYH?S&/Y!!/&TO:(I/2O**N,J
M;27Y->]MP^M&;:K;FO$<L+@*&B3T83$+EOXD^"XMB%_,9L$\ABB_K,J'F^*+
M*')UQ^MK^H``Z;ZJUPAP43Q:2F@:CH(Y$:`W%=2^X)F2-MFV+O:V,)9X@`$2
MF(P#$H]#2,!JN5Q$P"+$*AEOVJRH8;I(+4IV?9MQ]$Y5-;ANUAK@J9N:YXUZ
MLWXG4K(B03+UYY,5S(;(0,T\3Y*/K$]&)(S`.UV,_&D`Q,/>`V\D-)FODM%B
M?A%.5I'0WAG%W)],23#_)(!'R^7PY"O<![\_2LK>[4<30:PHS4/#JC('\1`G
M)DC^(B+LW">"3@R3?W[8HQ`#*R1.8A@2B&*P*\[68!:)-?&I@V13ASM\GJ_"
MZ1@2>]&EXI,?"1`)':"2U7DW=:BU`!:>2;18+4D"T6)4O(BVEFZ5)Y"TZ,@G
M#))\[`*N9Q>`1J-Q0D91N(S)=C\<FA(2C<1*&_9.OEZ$TX"(.8HC!:K=S<B"
MW6LCV=+%`PP"=:L(P$Z^[H@>T?:]\W1)6OPQ3P",),L@F@FYVW2*M2Z"]SB/
M2'?@O$"O5O&Z8O2Z:6G+MQ5Y2N);U7LC_'&WA))NCG(G?1D%%^&?CUIS16NN
M\<_T9G/-F^XX%8=&VU1LW:AB,:#>WQ+J]7J]HQ6QR]1AY,^RU$QM.LOW*6HF
MTM.APOX\)['`WF5SN$]LMQ=>A.TJ--P7"\+0<[&&!X7KTOICFF^#7B%Y@Z(K
M13@GL3^=)C/_8Y!<3/VN>L<[[]6TP=APVU_%(5R4>?4_]=<=W9O]U7)>]E?+
MV8L4_77WT<,.^HV6VYZ)K8'>']C[_@HXHK\^!_^HO_9%>^UWW?6YM^[%=L*>
M>BO6@/B9+ZLK=E7R>M=@)85\\#'Z];"QJBVMU<LO[]$0L<PVK=3SF(=AL]JZ
ME5L<-JWNTM3U+)VZN)_:*>M+2C0;X[[^)I!ANTX.*'W#M0W+M*CIV9PY7I^G
M&>,<>XZ1>91"4R?%%_X=&`.;GH?2AQ96A?Q2NZD?Q.:(SE_4=A[DFY[IM
M>[K9S^P4FYGEI89CI&:J2_*WVH^`=)M;%%N626W+LSS7X+GC9JR/J>ZZ&37Z
M5/>XQW+0\T+[$8QA60Y<3]K15ON&MNQ*H50$V)R;W&*&F<*%4YP;NIERCV=V
4GF4FUBW.&'9U2_H7C/\EW6P*````
`
end
Home |
Main Index |
Thread Index |
Old Index