pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Update wip/tor-dev to version 0.3.2.7-rc.



Module Name:	pkgsrc-wip
Committed By:	Alexander Nasonov <alnsn%yandex.ru@localhost>
Pushed By:	alnsn
Date:		Fri Dec 15 09:14:59 2017 +0000
Changeset:	0347c75283e860bc563fc12397ab694aea5676da

Modified Files:
	tor-dev/Makefile
	tor-dev/distinfo

Log Message:
Update wip/tor-dev to version 0.3.2.7-rc.

Changes in version 0.3.2.7-rc - 2017-12-14
  Tor 0.3.2.7-rc fixes various bugs in earlier versions of Tor,
  including some that could affect reliability or correctness.

  This is the first release candidate in the 0.3.2 series. If we find no
  new bugs or regression here, then the first stable 0.3.2. release will
  be nearly identical to this.

  o Major bugfixes (circuit prediction):
    - Fix circuit prediction logic so that a client doesn't treat a port
      as being "handled" by a circuit if that circuit already has
      isolation settings on it. This change should make Tor clients more
      responsive by improving their chances of having a pre-created
      circuit ready for use when a request arrives. Fixes bug 18859;
      bugfix on 0.2.3.3-alpha.

  o Minor features (logging):
    - Provide better warnings when the getrandom() syscall fails. Closes
      ticket 24500.

  o Minor features (portability):
    - Tor now compiles correctly on arm64 with libseccomp-dev installed.
      (It doesn't yet work with the sandbox enabled.) Closes
      ticket 24424.

  o Minor bugfixes (bridge clients, bootstrap):
    - Retry directory downloads when we get our first bridge descriptor
      during bootstrap or while reconnecting to the network. Keep
      retrying every time we get a bridge descriptor, until we have a
      reachable bridge. Fixes part of bug 24367; bugfix on 0.2.0.3-alpha.
    - Stop delaying bridge descriptor fetches when we have cached bridge
      descriptors. Instead, only delay bridge descriptor fetches when we
      have at least one reachable bridge. Fixes part of bug 24367;
      bugfix on 0.2.0.3-alpha.
    - Stop delaying directory fetches when we have cached bridge
      descriptors. Instead, only delay bridge descriptor fetches when
      all our bridges are definitely unreachable. Fixes part of bug
      24367; bugfix on 0.2.0.3-alpha.

  o Minor bugfixes (compilation):
    - Fix a signed/unsigned comparison warning introduced by our fix to
      TROVE-2017-009. Fixes bug 24480; bugfix on 0.2.5.16.

  o Minor bugfixes (correctness):
    - Fix several places in our codebase where a C compiler would be
      likely to eliminate a check, based on assuming that undefined
      behavior had not happened elsewhere in the code. These cases are
      usually a sign of redundant checking or dubious arithmetic. Found
      by Georg Koppen using the "STACK" tool from Wang, Zeldovich,
      Kaashoek, and Solar-Lezama. Fixes bug 24423; bugfix on various
      Tor versions.

  o Minor bugfixes (onion service v3):
    - Fix a race where an onion service would launch a new intro circuit
      after closing an old one, but fail to register it before freeing
      the previously closed circuit. This bug was making the service
      unable to find the established intro circuit and thus not upload
      its descriptor, thus making a service unavailable for up to 24
      hours. Fixes bug 23603; bugfix on 0.3.2.1-alpha.

  o Minor bugfixes (scheduler, KIST):
    - Properly set the scheduler state of an unopened channel in the
      KIST scheduler main loop. This prevents a harmless but annoying
      log warning. Fixes bug 24502; bugfix on 0.3.2.4-alpha.
    - Avoid a possible integer overflow when computing the available
      space on the TCP buffer of a channel. This had no security
      implications; but could make KIST allow too many cells on a
      saturated connection. Fixes bug 24590; bugfix on 0.3.2.1-alpha.
    - Downgrade to "info" a harmless warning about the monotonic time
      moving backwards: This can happen on platform not supporting
      monotonic time. Fixes bug 23696; bugfix on 0.3.2.1-alpha.

To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=0347c75283e860bc563fc12397ab694aea5676da

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

diffstat:
 tor-dev/Makefile | 2 +-
 tor-dev/distinfo | 8 ++++----
 2 files changed, 5 insertions(+), 5 deletions(-)

diffs:
diff --git a/tor-dev/Makefile b/tor-dev/Makefile
index 358aeb83a0..28034b635b 100644
--- a/tor-dev/Makefile
+++ b/tor-dev/Makefile
@@ -1,6 +1,6 @@
 # $NetBSD$
 
-DISTNAME=	tor-0.3.2.6-alpha
+DISTNAME=	tor-0.3.2.7-rc
 PKGNAME=	${DISTNAME:S/tor/tordev/:S/-alpha//}
 CATEGORIES=	net security
 MASTER_SITES=	http://www.torproject.org/dist/
diff --git a/tor-dev/distinfo b/tor-dev/distinfo
index 859a8e2670..ecc2b332ec 100644
--- a/tor-dev/distinfo
+++ b/tor-dev/distinfo
@@ -1,8 +1,8 @@
 $NetBSD$
 
-SHA1 (tor-0.3.2.6-alpha.tar.gz) = abd4db9f33ac19adbce39f94cc6d8ac8bc9ce9f0
-RMD160 (tor-0.3.2.6-alpha.tar.gz) = 368a84fe6319c450d9a29ca05d70fbc8f1dd7513
-SHA512 (tor-0.3.2.6-alpha.tar.gz) = 24ecd93c92d73ea31967f127f9ab745bc982737da13d748afa01bf1477ed6e8191e3474d01f49efd629665807d875008558e069e02eefb15ff699dd89b877857
-Size (tor-0.3.2.6-alpha.tar.gz) = 6310498 bytes
+SHA1 (tor-0.3.2.7-rc.tar.gz) = aab7afc3cc23f143a0226f0cbf455d308c8aa2ff
+RMD160 (tor-0.3.2.7-rc.tar.gz) = 29e765b094c75ee7ebb71713c429365a44311d78
+SHA512 (tor-0.3.2.7-rc.tar.gz) = 989bdd4311521528444f4165455365d3c1f1ef5f6a8846bf08db7f84ab8e986cba47f9dfbd3a03ccb6e3f8d813d69289768170a8fd68916e9d6a21fe0484cf87
+Size (tor-0.3.2.7-rc.tar.gz) = 6313975 bytes
 SHA1 (patch-Makefile.in) = f3e51f568aa7c4338d352689d1ab2f0bb10aa016
 SHA1 (patch-src_or_config.c) = 6cc372ca1809ff8cb7f5cc181f8e7a735d1148cb


Home | Main Index | Thread Index | Old Index