Tor 0.2.4.20 fixes potentially poor random number generation for users who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their torrc file, 3) have "Sandy Bridge" or "Ivy Bridge" Intel processors, and 4) have no state file in their DataDirectory (as would happen on first start). Users who generated relay or hidden service identity keys in such a situation should discard them and generate new ones. (no CVE assigned yet)
31 lines
708 B
Makefile
31 lines
708 B
Makefile
# $OpenBSD: Makefile,v 1.68 2013/12/24 09:51:15 pascal Exp $
|
|
|
|
COMMENT= anonymity service using onion routing
|
|
|
|
DISTNAME= tor-0.2.4.20
|
|
PKGNAME= ${DISTNAME:S/-rc/rc/}
|
|
CATEGORIES= net
|
|
HOMEPAGE= https://www.torproject.org/
|
|
|
|
MAINTAINER= Pascal Stumpf <Pascal.Stumpf@cubes.de>
|
|
|
|
# BSD
|
|
PERMIT_PACKAGE_CDROM= Yes
|
|
|
|
WANTLIB += c crypto event m pthread ssl z
|
|
|
|
MASTER_SITES= https://www.torproject.org/dist/
|
|
|
|
CONFIGURE_STYLE=gnu
|
|
# PIE is already taken care of on a per-arch basis, and we have stack protection
|
|
# anyway on FRAME_GROWS_DOWN archs.
|
|
CONFIGURE_ARGS= --with-ssl-dir=/usr \
|
|
--disable-gcc-hardening
|
|
|
|
DB_DIR= /var/tor
|
|
SUBST_VARS+= DB_DIR
|
|
|
|
FAKE_FLAGS= sysconfdir=${PREFIX}/share/examples
|
|
|
|
.include <bsd.port.mk>
|