34 Commits

Author SHA1 Message Date
pascal
c5fd522410 Update to 0.2.8.6. 2016-08-03 15:40:31 +00:00
pascal
a46823c434 Adjust commented-out HiddenServiceDir directives in sample torrc.
from Michael McConville
2016-05-18 10:14:07 +00:00
pascal
2afb7f1e13 Fix build on sparc64 (and probably other !amd64 64bit platforms too). 2015-12-11 14:11:47 +00:00
pascal
80d55d87e8 Update to tor 0.2.7.5. Switch to libevent2 by default, as recommended by
upstream.

Based on diffs from Daniel Jakots.
2015-11-25 21:04:07 +00:00
pascal
46628e5b83 Update to next major release 0.2.6.6.
Changes in version 0.2.6.6 - 2015-03-24
  Tor 0.2.6.6 is the first stable release in the 0.2.6 series.

  It adds numerous safety, security, correctness, and performance
  improvements. Client programs can be configured to use more kinds of
  sockets, AutomapHosts works better, the multithreading backend is
  improved, cell transmission is refactored, test coverage is much
  higher, more denial-of-service attacks are handled, guard selection is
  improved to handle long-term guards better, pluggable transports
  should work a bit better, and some annoying hidden service performance
  bugs should be addressed.
2015-03-26 21:32:30 +00:00
pascal
3b596aa208 Fix crash on startup on sparc64, patch from upstream. 2015-03-23 16:21:10 +00:00
pascal
352231fc60 Update to tor 0.2.5.10. 2014-10-24 20:14:48 +00:00
pascal
f43c377bd5 Fix relay functionality after get_cipher_by_char removal. Patch by jsing@,
tested by myself and "babut".

ok dcoppa@
2014-10-05 19:29:20 +00:00
pascal
2f68fa30e2 Check for OPENSSL_NO_COMP before turning off compression. 2014-07-12 13:57:23 +00:00
pascal
fa5f3fc305 Update to tor-0.2.4.17-rc. Adds support for crypto stronger than 1024RSA/DH
as well as mitigation against the recent "botnet" problems.  If you are
running a relay, you should most definitely upgrade.

Full Changelog:

https://gitweb.torproject.org/tor.git/blob/tor-0.2.4.17-rc:/ChangeLog

tested by gonzalo@ bcallah@, ok bcallah@
2013-09-11 15:57:36 +00:00
pascal
ae093edee2 Fix a crash encountered by jcs@; patch from upstream.
See https://gitweb.torproject.org/tor.git/commit/77a193533966c5c2f81e6a85b3c2a7446076508f

ok jcs@
2013-06-15 15:43:22 +00:00
pascal
12a2d09d56 Update to new major release, Tor 0.2.3.25.
Tor 0.2.3.25, the first stable release in the 0.2.3 branch, features
significantly reduced directory overhead (via microdescriptors),
enormous crypto performance improvements for fast relays on new
enough hardware, a new v3 TLS handshake protocol that can better
resist fingerprinting, support for protocol obfuscation plugins (aka
pluggable transports), better scalability for hidden services, IPv6
support for bridges, performance improvements like allowing clients
to skip the first round-trip on the circuit ("optimistic data") and
refilling token buckets more often, a new "stream isolation" design
to isolate different applications on different circuits, and many
stability, security, and privacy fixes.

Also kill unneeded pthread patch.

Tested by dhill & dcoppa@.

ok dcoppa@
2012-11-22 18:37:32 +00:00
pascal
6c1c40420b Update to tor 0.2.2.36, including SECURITY fixes and various other bugfixes.
- Never use a bridge or a controller-supplied node as an exit, even
  if its exit policy allows it.
- Only build circuits if we have a sufficient threshold of the total
  descriptors that are marked in the consensus with the "Exit"
  flag.
- Provide controllers with a safer way to implement the cookie
  authentication mechanism. With the old method, if another locally
  running program could convince a controller that it was the Tor
  process, then that program could trick the contoller into telling
  it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE"
  authentication method uses a challenge-response approach to prevent
  this attack.

We are not affected by the openssl vulnerability.

Full release notes:
https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes

ok sthen@ jasper@
2012-05-26 11:08:44 +00:00
sthen
7e0537c75c SECURITY update to tor 0.2.2.35
"Tor 0.2.2.35 fixes a critical heap-overflow security issue in Tor's
  buffers code. Absolutely everybody should upgrade."

More info https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes
OK pascal@ (maintainer)
2011-12-16 20:08:50 +00:00
sthen
a9040fb667 update to tor 0.2.2.33 from maintainer Pascal Stumpf
- fixes several bugs, and includes a slight tweak to Tor's TLS handshake that
  makes relays and bridges that run this new version reachable from Iran again.
2011-09-17 10:39:26 +00:00
jasper
0e707bc90f zap zap zap
spotted by nigel@
2011-09-08 06:59:15 +00:00
jasper
4ee0250bed - update to 0.2.2.32
from new maintainer pascal stumpf (rui@ timed-out too many times)
additional testing from roberth

ok sthen@
2011-09-07 07:55:41 +00:00
ajacoutot
76dd1acdea Bugfix update to tor-0.2.1.30.
* amongst other things, add a tweak to Tor's TLS handshake that makes
relays and bridges that run this new version reachable from Iran.

Add an rc script.

from Pascal Stumpf.
MAINTAINER timeout.
2011-03-11 06:49:55 +00:00
benoit
ee40a9f268 - update tor to 0.2.1.25
- update patches

ok rui@
2010-03-25 05:35:35 +00:00
benoit
574a30c096 - update tor to 0.2.1.21
ok rui@
2010-01-04 08:07:57 +00:00
benoit
96ac375702 - update tor to 0.2.1.20
- add patches using the new SSL/TLS renegotiation.

ok rui@, ajacoutot@
2009-11-14 10:09:05 +00:00
benoit
a0739f17c4 - update tor to 0.2.1.19
- update patch

ok rui@, ajacoutot@
2009-08-10 21:14:41 +00:00
rui
d513b3cb62 Security: update tor to 0.2.0.33 which fixes an important security-related bug.
Reference: http://secunia.com/Advisories/33635

I got almost the same diff from merdely@ and robert at openbsd dot pap dot st

ok merdely@
2009-01-24 14:53:57 +00:00
rui
58cc46f7be SECURITY: update tor to 0.2.0.32 which fixes a major security problem
Reference: http://secunia.com/advisories/33025/

ok jasper@
2008-12-16 21:04:06 +00:00
rui
e2aedfbdc7 - update tor to 0.2.0.31.
- addresses two potential anonymity issues.
- starts to fix a bug where in rare cases traffic from one Tor stream gets mixed into another stream.
- fixes a variety of smaller issues.

ok fgsch@
2008-09-19 21:50:59 +00:00
rui
60e0a7460d update tor to 0.1.2.18. Changelog:
http://archives.seul.org/or/announce/Oct-2007/msg00000.html

ok merdely@
2007-11-04 08:39:20 +00:00
rui
754e73c63e update tor to 0.1.2.15
- fixes several crash bugs
- fixes some anonymity-related problems
- fixes compilation on BSD
- fixes a variety of other bugs

ok jcs@
2007-07-23 16:34:22 +00:00
rui
f923d4dc18 update tor to 0.1.2.14
ok jcs@
2007-05-26 17:09:05 +00:00
rui
bc0c899ed5 update to tor 0.1.2.13, regen patches while here
ok robert@
2007-05-02 18:20:44 +00:00
ray
e7225ebe13 Create data directory for tor. Also daemonize and log to syslog by
default.

OK maintainer Rui Reis <rui at rui dot cx>
2006-09-20 22:06:36 +00:00
jcs
66ccabd505 update to tor-0.1.1.22, from maintainer
make default config drop privs to _tor user and group
2006-07-17 19:23:03 +00:00
steven
ed345404f7 SECURITY update to tor 0.1.1.20
fixes CVE-2006-0414

for details, see http://secunia.com/advisories/18576/
2006-06-10 08:33:36 +00:00
naddy
0fbef49daa update to 0.0.9.3; based on submission from Jon Trembley <jon@brain-box.net> 2005-01-30 20:20:18 +00:00
sturm
84428a27af update to tor 0.0.9.1
mostly from Jon Trembley <jon at brain-box.net>
2005-01-03 22:03:00 +00:00