120 Commits

Author SHA1 Message Date
stsp
56992d4aad Remove use of the -fasynchronous-unwind-tables compiler option from net/tor.
Upstream added it for backtrace support but this does not (yet?) work here.
Fixes the build on armv7. Package bump for good measure.
ok sthen@ jca@ phessler@
2018-04-25 12:54:15 +00:00
stsp
d1505f7ca7 sync hunk offsets in patch with tor release tarball 2018-04-25 12:41:28 +00:00
kn
e3d1906ace Unbreak tor after my clumsy retroshare removal commit. 2018-04-18 09:39:46 +00:00
kn
fa3affdb7a Remove net/retroshare
Heavily outdated, broken with new clang (again) and noone seems to care.

OK stsp, landry
2018-04-18 09:19:23 +00:00
pascal
1a7d10770a Update to tor 0.3.2.10; fixes TROVE-2018-001 through 004. 2018-03-04 14:05:06 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
pascal
98cd7c2913 Update to new Tor release 0.3.2.9. Complete list of changes can be found
here: https://gitweb.torproject.org/tor.git/tree/ReleaseNotes?h=tor-0.3.2.9&id=9e8b762fcecfece64aae70ae640aaa59fd227ca5
2018-01-10 14:35:49 +00:00
pascal
c24fa7e9a3 Update to tor 0.3.1.9; same diff from Klemens Nanni. This release fixes
security issues TROVE-2017-09 through -13.
2017-12-02 12:20:30 +00:00
pascal
e240c7253f Update to tor 0.3.1.8. 2017-10-25 18:17:27 +00:00
pascal
2e83fe2e6d Update to tor 0.3.1.7; disable LZMA support. Earlier diff by Klemens Nanni. 2017-10-05 12:59:07 +00:00
pascal
d1bf677e74 Update to tor 0.3.0.10, fixes TROVE-2017-007.
same diff from pirofti@
2017-08-03 12:21:26 +00:00
pascal
b5d0483656 SECURITY update to 0.3.0.9. Fixes CVE-2017-0377. 2017-07-01 19:11:57 +00:00
pascal
58eb38cce0 SECURITY update to tor 0.3.0.8. Fixes CVE-2017-0375 and CVE-2017-0376. 2017-06-10 18:02:23 +00:00
pascal
b7b0c645e7 Update to tor 0.3.0.7. SECURITY fix for TROVE-2017-002 (relays only). 2017-05-17 11:20:33 +00:00
pascal
4026771db4 Update to 0.3.0.6. For a detailed list of changes, see:
https://blog.torproject.org/blog/tor-0306-released-new-series-stable
2017-04-27 19:55:56 +00:00
pascal
96c3dcf531 forgot to remove this patch 2017-03-03 10:02:13 +00:00
pascal
ee71496f57 Update to tor 0.2.9.10. 2017-03-02 21:50:43 +00:00
jsing
000898cd9e Disable tests that attempt to construct their own SSL data structures. This
requires all structs to be fully visible and completely understood by the
application, which is no longer the case with LibreSSL.

ok naddy@ pascal@
2017-01-29 16:07:52 +00:00
pascal
eaef457ef8 Update to tor 0.2.9.9. Fixes a denial of service (TROVE-2017-001). 2017-01-25 12:16:44 +00:00
pascal
f92dea9841 Update to tor 0.2.9.8. Also fixes CVE-2016-1254. 2016-12-20 22:06:05 +00:00
pascal
53888c4bd4 Update to tor 0.2.8.11; just compilation fixes that do not concern us. 2016-12-09 12:59:38 +00:00
pascal
1b87f82f1e Update to tor 0.2.8.10. 2016-12-02 21:58:24 +00:00
pascal
e9b7a59efd SECURITY update to 0.2.8.9. 2016-10-18 16:59:02 +00:00
pascal
097a559794 Update to tor 0.2.8.8. 2016-09-24 21:23:21 +00:00
pascal
0f3fd93c1d Update to tor 0.2.8.7. 2016-08-24 21:35:03 +00:00
pascal
c5fd522410 Update to 0.2.8.6. 2016-08-03 15:40:31 +00:00
pascal
a46823c434 Adjust commented-out HiddenServiceDir directives in sample torrc.
from Michael McConville
2016-05-18 10:14:07 +00:00
pascal
b01174ae9b Update my mail address. 2016-05-07 12:40:56 +00:00
pascal
2afb7f1e13 Fix build on sparc64 (and probably other !amd64 64bit platforms too). 2015-12-11 14:11:47 +00:00
pascal
ceb2e1757b Bugfix update to 0.2.7.6, from Vigdis. 2015-12-10 23:35:11 +00:00
pascal
80d55d87e8 Update to tor 0.2.7.5. Switch to libevent2 by default, as recommended by
upstream.

Based on diffs from Daniel Jakots.
2015-11-25 21:04:07 +00:00
ajacoutot
8cc209a614 Tweak pkill invocation. 2015-07-20 19:55:58 +00:00
ajacoutot
ac25bf1241 No need to override the default pexp after recent rc.subr(8) change. 2015-07-15 13:54:55 +00:00
pascal
fde16b57bb Bugfix update to tor 0.2.6.10. 2015-07-14 12:05:44 +00:00
pascal
59fb9acca2 In some situations, it is desirable to start multiple tor instances on the
same machine.  While this is of course done outside the rc.subr(8) framework,
the package's rc.d(8) script should not interfere with these instances.

Require exact pexp matches in order to achieve this.  Patch by "nusenu",
developer of ansible-relayor, tested by me in various situations.
2015-06-25 10:27:05 +00:00
pascal
2f11187e11 update to tor 0.2.6.9. 2015-06-11 20:23:16 +00:00
pascal
82e6b0c733 Update to tor 0.2.6.8, reminded by David Hill. 2015-06-09 14:46:39 +00:00
pascal
5d44d29fcf SECURITY update to tor 0.2.6.7, fixes CVE-2015-2928 and CVE-2015-2929. 2015-04-07 09:33:05 +00:00
pascal
bf31a8dd89 Use SIGINT instead of SIGTERM to terminate the tor process in rc_stop().
For clients, this means no change.

For relays, this instructs tor to do a clean shutdown, leaving 30s for other
peers to find another route.  Increase daemon_timeout to one minute to give
tor a bit more time on slow machines (like my BBB).

Hint from Michael McConvill, "go ahead" ajacoutot@
2015-04-03 15:26:10 +00:00
pascal
46628e5b83 Update to next major release 0.2.6.6.
Changes in version 0.2.6.6 - 2015-03-24
  Tor 0.2.6.6 is the first stable release in the 0.2.6 series.

  It adds numerous safety, security, correctness, and performance
  improvements. Client programs can be configured to use more kinds of
  sockets, AutomapHosts works better, the multithreading backend is
  improved, cell transmission is refactored, test coverage is much
  higher, more denial-of-service attacks are handled, guard selection is
  improved to handle long-term guards better, pluggable transports
  should work a bit better, and some annoying hidden service performance
  bugs should be addressed.
2015-03-26 21:32:30 +00:00
pascal
3b596aa208 Fix crash on startup on sparc64, patch from upstream. 2015-03-23 16:21:10 +00:00
pascal
1f48c262ec update to tor 0.2.5.11 2015-03-19 23:05:34 +00:00
pascal
352231fc60 Update to tor 0.2.5.10. 2014-10-24 20:14:48 +00:00
pascal
f43c377bd5 Fix relay functionality after get_cipher_by_char removal. Patch by jsing@,
tested by myself and "babut".

ok dcoppa@
2014-10-05 19:29:20 +00:00
pascal
162edfb3b8 Bugfix update to 0.2.4.24. 2014-09-27 17:16:00 +00:00
pascal
ab2d4a35a0 Update to tor 0.2.4.23; mitigates the attack described at
https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-august-6th-2014
2014-08-10 16:51:53 +00:00
pascal
2f68fa30e2 Check for OPENSSL_NO_COMP before turning off compression. 2014-07-12 13:57:23 +00:00
pascal
97aa0e043d Update to tor 0.2.4.22. 2014-05-18 15:33:16 +00:00
pascal
2904801c40 Update to 0.2.4.21. 2014-03-09 19:46:32 +00:00
pascal
7e6dac48c3 SECURITY update to 0.2.4.20. From the ChangeLog:
Tor 0.2.4.20 fixes potentially poor random number generation for users
  who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their
  torrc file, 3) have "Sandy Bridge" or "Ivy Bridge" Intel processors,
  and 4) have no state file in their DataDirectory (as would happen on
  first start). Users who generated relay or hidden service identity
  keys in such a situation should discard them and generate new ones.

(no CVE assigned yet)
2013-12-24 09:51:15 +00:00