Commit Graph

90 Commits

Author SHA1 Message Date
pascal
80d55d87e8 Update to tor 0.2.7.5. Switch to libevent2 by default, as recommended by
upstream.

Based on diffs from Daniel Jakots.
2015-11-25 21:04:07 +00:00
ajacoutot
8cc209a614 Tweak pkill invocation. 2015-07-20 19:55:58 +00:00
ajacoutot
ac25bf1241 No need to override the default pexp after recent rc.subr(8) change. 2015-07-15 13:54:55 +00:00
pascal
fde16b57bb Bugfix update to tor 0.2.6.10. 2015-07-14 12:05:44 +00:00
pascal
59fb9acca2 In some situations, it is desirable to start multiple tor instances on the
same machine.  While this is of course done outside the rc.subr(8) framework,
the package's rc.d(8) script should not interfere with these instances.

Require exact pexp matches in order to achieve this.  Patch by "nusenu",
developer of ansible-relayor, tested by me in various situations.
2015-06-25 10:27:05 +00:00
pascal
2f11187e11 update to tor 0.2.6.9. 2015-06-11 20:23:16 +00:00
pascal
82e6b0c733 Update to tor 0.2.6.8, reminded by David Hill. 2015-06-09 14:46:39 +00:00
pascal
5d44d29fcf SECURITY update to tor 0.2.6.7, fixes CVE-2015-2928 and CVE-2015-2929. 2015-04-07 09:33:05 +00:00
pascal
bf31a8dd89 Use SIGINT instead of SIGTERM to terminate the tor process in rc_stop().
For clients, this means no change.

For relays, this instructs tor to do a clean shutdown, leaving 30s for other
peers to find another route.  Increase daemon_timeout to one minute to give
tor a bit more time on slow machines (like my BBB).

Hint from Michael McConvill, "go ahead" ajacoutot@
2015-04-03 15:26:10 +00:00
pascal
46628e5b83 Update to next major release 0.2.6.6.
Changes in version 0.2.6.6 - 2015-03-24
  Tor 0.2.6.6 is the first stable release in the 0.2.6 series.

  It adds numerous safety, security, correctness, and performance
  improvements. Client programs can be configured to use more kinds of
  sockets, AutomapHosts works better, the multithreading backend is
  improved, cell transmission is refactored, test coverage is much
  higher, more denial-of-service attacks are handled, guard selection is
  improved to handle long-term guards better, pluggable transports
  should work a bit better, and some annoying hidden service performance
  bugs should be addressed.
2015-03-26 21:32:30 +00:00
pascal
3b596aa208 Fix crash on startup on sparc64, patch from upstream. 2015-03-23 16:21:10 +00:00
pascal
1f48c262ec update to tor 0.2.5.11 2015-03-19 23:05:34 +00:00
pascal
352231fc60 Update to tor 0.2.5.10. 2014-10-24 20:14:48 +00:00
pascal
f43c377bd5 Fix relay functionality after get_cipher_by_char removal. Patch by jsing@,
tested by myself and "babut".

ok dcoppa@
2014-10-05 19:29:20 +00:00
pascal
162edfb3b8 Bugfix update to 0.2.4.24. 2014-09-27 17:16:00 +00:00
pascal
ab2d4a35a0 Update to tor 0.2.4.23; mitigates the attack described at
https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-august-6th-2014
2014-08-10 16:51:53 +00:00
pascal
2f68fa30e2 Check for OPENSSL_NO_COMP before turning off compression. 2014-07-12 13:57:23 +00:00
pascal
97aa0e043d Update to tor 0.2.4.22. 2014-05-18 15:33:16 +00:00
pascal
2904801c40 Update to 0.2.4.21. 2014-03-09 19:46:32 +00:00
pascal
7e6dac48c3 SECURITY update to 0.2.4.20. From the ChangeLog:
Tor 0.2.4.20 fixes potentially poor random number generation for users
  who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their
  torrc file, 3) have "Sandy Bridge" or "Ivy Bridge" Intel processors,
  and 4) have no state file in their DataDirectory (as would happen on
  first start). Users who generated relay or hidden service identity
  keys in such a situation should discard them and generate new ones.

(no CVE assigned yet)
2013-12-24 09:51:15 +00:00
juanfra
1f36b82899 Update to tor 0.2.4.19. OK pascal@ sthen@. 2013-12-19 17:43:33 +00:00
pascal
cb2c4d2735 Update to 0.2.4.18rc, ok dcoppa@ benoit@ jca@ 2013-11-19 20:36:27 +00:00
pascal
4c18615302 Fix PKGNAME; -rc was interpreted as FLAVOR extension.
noticed by naddy@ and nigel@, ok sthen@
2013-09-12 21:17:59 +00:00
pascal
fa5f3fc305 Update to tor-0.2.4.17-rc. Adds support for crypto stronger than 1024RSA/DH
as well as mitigation against the recent "botnet" problems.  If you are
running a relay, you should most definitely upgrade.

Full Changelog:

https://gitweb.torproject.org/tor.git/blob/tor-0.2.4.17-rc:/ChangeLog

tested by gonzalo@ bcallah@, ok bcallah@
2013-09-11 15:57:36 +00:00
pascal
ae093edee2 Fix a crash encountered by jcs@; patch from upstream.
See https://gitweb.torproject.org/tor.git/commit/77a193533966c5c2f81e6a85b3c2a7446076508f

ok jcs@
2013-06-15 15:43:22 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
pascal
12a2d09d56 Update to new major release, Tor 0.2.3.25.
Tor 0.2.3.25, the first stable release in the 0.2.3 branch, features
significantly reduced directory overhead (via microdescriptors),
enormous crypto performance improvements for fast relays on new
enough hardware, a new v3 TLS handshake protocol that can better
resist fingerprinting, support for protocol obfuscation plugins (aka
pluggable transports), better scalability for hidden services, IPv6
support for bridges, performance improvements like allowing clients
to skip the first round-trip on the circuit ("optimistic data") and
refilling token buckets more often, a new "stream isolation" design
to isolate different applications on different circuits, and many
stability, security, and privacy fixes.

Also kill unneeded pthread patch.

Tested by dhill & dcoppa@.

ok dcoppa@
2012-11-22 18:37:32 +00:00
pascal
e0085ac361 Update to tor 0.2.2.39, reminded by sthen@
Changes in version 0.2.2.39 - 2012-09-11
  Tor 0.2.2.39 fixes two more opportunities for remotely triggerable
  assertions.

  o Security fixes:
    - Fix an assertion failure in tor_timegm() that could be triggered
      by a badly formatted directory object. Bug found by fuzzing with
      Radamsa. Fixes bug 6811; bugfix on 0.2.0.20-rc.
    - Do not crash when comparing an address with port value 0 to an
      address policy. This bug could have been used to cause a remote
      assertion failure by or against directory authorities, or to
      allow some applications to crash clients. Fixes bug 6690; bugfix
      on 0.2.1.10-alpha.

No CVEs for these vulnerabilities yet.
2012-09-12 21:09:28 +00:00
pascal
b6ee0c371b SECURITY update to tor 0.2.2.38. From the ChangeLog:
Changes in version 0.2.2.38 - 2012-08-12
  Tor 0.2.2.38 fixes a rare race condition that can crash exit relays;
  fixes a remotely triggerable crash bug; and fixes a timing attack that
  could in theory leak path information.
2012-08-13 16:39:35 +00:00
pascal
45ac429aa4 Security update tor tor 0.2.2.37, fixing a potential DoS.
Full release notes:
https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes

ok sthen@ jasper@
2012-06-13 11:27:16 +00:00
pascal
6c1c40420b Update to tor 0.2.2.36, including SECURITY fixes and various other bugfixes.
- Never use a bridge or a controller-supplied node as an exit, even
  if its exit policy allows it.
- Only build circuits if we have a sufficient threshold of the total
  descriptors that are marked in the consensus with the "Exit"
  flag.
- Provide controllers with a safer way to implement the cookie
  authentication mechanism. With the old method, if another locally
  running program could convince a controller that it was the Tor
  process, then that program could trick the contoller into telling
  it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE"
  authentication method uses a challenge-response approach to prevent
  this attack.

We are not affected by the openssl vulnerability.

Full release notes:
https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes

ok sthen@ jasper@
2012-05-26 11:08:44 +00:00
ajacoutot
689f54b24a --localstatedir=/var is the default now. 2012-04-28 10:52:08 +00:00
sthen
7e0537c75c SECURITY update to tor 0.2.2.35
"Tor 0.2.2.35 fixes a critical heap-overflow security issue in Tor's
  buffers code. Absolutely everybody should upgrade."

More info https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes
OK pascal@ (maintainer)
2011-12-16 20:08:50 +00:00
jcs
1642d2f395 security update to 0.2.2.34; from maintainer 2011-10-28 18:13:22 +00:00
sthen
a9040fb667 update to tor 0.2.2.33 from maintainer Pascal Stumpf
- fixes several bugs, and includes a slight tweak to Tor's TLS handshake that
  makes relays and bridges that run this new version reachable from Iran again.
2011-09-17 10:39:26 +00:00
jasper
0e707bc90f zap zap zap
spotted by nigel@
2011-09-08 06:59:15 +00:00
jasper
4ee0250bed - update to 0.2.2.32
from new maintainer pascal stumpf (rui@ timed-out too many times)
additional testing from roberth

ok sthen@
2011-09-07 07:55:41 +00:00
sthen
491c689745 bump for pfioc_natlook changes 2011-03-26 10:01:08 +00:00
ajacoutot
76dd1acdea Bugfix update to tor-0.2.1.30.
* amongst other things, add a tweak to Tor's TLS handshake that makes
relays and bridges that run this new version reachable from Iran.

Add an rc script.

from Pascal Stumpf.
MAINTAINER timeout.
2011-03-11 06:49:55 +00:00
jasper
33d32d6915 SECURITY update of tor 0.2.1.29
Fixes a heap overflow vulnerability.
More information: http://archives.seul.org/or/announce/Jan-2011/msg00000.html

from robert AT @openbsd.pap.st
2011-01-18 19:59:17 +00:00
benoit
808eba112e - update tor to 0.2.1.28
- maintainer timeout

SECURITY update of tor to 0.2.1.28 : CVE-2010-1676
2010-12-26 11:50:59 +00:00
benoit
b72319bec0 - update tor to 0.2.1.27
- maintainer timeout
2010-12-11 11:05:05 +00:00
espie
47ff75aa46 USE_GROFF=Yes 2010-10-18 18:36:45 +00:00
benoit
00b7da21b3 - update tor to 0.2.1.26
ok rui@
2010-06-20 07:57:07 +00:00
benoit
ee40a9f268 - update tor to 0.2.1.25
- update patches

ok rui@
2010-03-25 05:35:35 +00:00
sthen
d51fcc95b5 Update tor to 0.2.1.22; from robert at openbsd dot pap dot st, thanks!
"Some of their directories were compromised and they changed keys:
http://archives.seul.org/or/talk/Jan-2010/msg00161.html"

ok ajacoutot@ jasper@ espie@
2010-01-23 21:00:09 +00:00
benoit
574a30c096 - update tor to 0.2.1.21
ok rui@
2010-01-04 08:07:57 +00:00
benoit
96ac375702 - update tor to 0.2.1.20
- add patches using the new SSL/TLS renegotiation.

ok rui@, ajacoutot@
2009-11-14 10:09:05 +00:00
benoit
a0739f17c4 - update tor to 0.2.1.19
- update patch

ok rui@, ajacoutot@
2009-08-10 21:14:41 +00:00
jasper
28d25ff576 SECURITY UPDATE of tor to 0.2.0.35
for the full announcement, see: http://archives.seul.org/or/announce/Jun-2009/msg00000.html

ok rui@ (MAINTAINER), naddy@
2009-06-30 12:36:44 +00:00