2008-08-01 19:25:13 by Thomas Klausner | Files touched by this commit (10) | |
Log message:
Remove tor -- updated pkgsrc/net/tor based on this.
|
2008-07-20 19:48:40 by Christian St. | Files touched by this commit (2) |
Log message:
Updated to 0.2.0.30 (stable release!) It works again on new installs
|
2008-07-11 00:48:20 by Christian St. | Files touched by this commit (2) |
Log message:
Updated to version 0.2.0.29-rc
Changelog:
o Major bugfixes:
- If you have more than one bridge but don't know their keys,
you would only launch a request for the descriptor of the first one
on your list. (Tor considered launching requests for the others, but
found that it already had a connection on the way for $0000...0000
so it didn't open another.) Bugfix on 0.2.0.x.
- If you have more than one bridge but don't know their keys, and the
connection to one of the bridges failed, you would cancel all
pending bridge connections. (After all, they all have the same
digest.) Bugfix on 0.2.0.x.
- When a hidden service was trying to establish an introduction point,
and Tor had built circuits preemptively for such purposes, we
were ignoring all the preemptive circuits and launching a new one
instead. Bugfix on 0.2.0.14-alpha.
- When a hidden service was trying to establish an introduction point,
and Tor *did* manage to reuse one of the preemptively built
circuits, it didn't correctly remember which one it used,
so it asked for another one soon after, until there were no
more preemptive circuits, at which point it launched one from
scratch. Bugfix on 0.0.9.x.
- Make directory servers include the X-Your-Address-Is: http header in
their responses even for begin_dir conns. Now clients who only
ever use begin_dir connections still have a way to learn their IP
address. Fixes bug 737; bugfix on 0.2.0.22-rc. Reported by goldy.
o Minor bugfixes:
- Fix a macro/CPP interactions that was confusing some compilers:
some GCCs don't like #if/#endif pairs inside macro arguments.
Fix for bug 707.
- Fix macro collision between OpenSSL 0.9.8h and Windows headers.
Fixes bug 704; fix from Steven Murdoch.
- When opening /dev/null in finish_daemonize(), do not pass the
O_CREAT flag. Fortify was complaining, and correctly so. Fixes
bug 742; fix from Michael Scherer. Bugfix on 0.0.2pre19.
- Correctly detect transparent proxy support on Linux hosts that
require in.h to be included before netfilter_ipv4.h. Patch
from coderman.
- Disallow session resumption attempts during the renegotiation
stage of the v2 handshake protocol. Clients should never be
trying session resumption at this point, but apparently some
did, in ways that caused the handshake to fail. Bugfix on
0.2.0.20-rc. Bug found by Geoff Goodell.
|
2008-06-13 20:52:38 by Christian St. | Files touched by this commit (2) |
Log message:
Update to 0.2.0.28-rc
Changes in version 0.2.0.28-rc - 2008-06-13
o Anonymity fixes:
- Fix a bug where, when we were choosing the 'end stream reason' to
put in our relay end cell that we send to the exit relay, Tor
clients on Windows were sometimes sending the wrong 'reason'. The
anonymity problem is that exit relays may be able to guess whether
the client is running Windows, thus helping partition the anonymity
set. Down the road we should stop sending reasons to exit relays,
or otherwise prevent future versions of this bug.
o Major bugfixes:
- While setting up a hidden service, some valid introduction circuits
were overlooked and abandoned. This might be the reason for
the long delay in making a hidden service available. Bugfix on
0.2.0.13-alpha.
o Minor features:
- Update to the "June 9 2008" ip-to-country file.
- Run 'make test' as part of 'make dist', so we stop releasing so
many development snapshots that fail their unit tests.
o Minor bugfixes:
- When we're checking if we have enough dir info for each relay
to begin establishing circuits, make sure that we actually have
the descriptor listed in the consensus, not just any descriptor.
- Bridge relays no longer print "xx=0" in their extrainfo document
for every single country code in the geoip db.
- Only warn when we fail to load the geoip file if we were planning to
include geoip stats in our extrainfo document.
- If we change our MaxAdvertisedBandwidth and then reload torrc,
Tor won't realize it should publish a new relay descriptor. Fixes
bug 688, reported by mfr.
- When we haven't had any application requests lately, don't bother
logging that we have expired a bunch of descriptors.
- Make relay cells written on a connection count as non-padding when
tracking how long a connection has been in use. Bugfix on
0.2.0.1-alpha. Spotted by lodger.
- Fix unit tests in 0.2.0.27-rc.
- Fix compile on Windows.
|
2008-06-04 20:53:23 by Christian St. | Files touched by this commit (2) |
Log message:
oops, forgot adding patch-ab and removing patch-ac
|
2008-06-04 20:49:38 by Christian St. | Files touched by this commit (6) |
Log message:
- Updated to 0.2.0.27-rc
- changed maintainer Todd Vierling to me (Christian Sturm)
|
2008-05-24 17:34:08 by Tobias Nygren | Files touched by this commit (146) |
Log message:
This commit brought to you by the automated whitespace police (pkglint)
|
2008-04-18 10:13:34 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Remove superfluous directory created during installation.
Add missing man page to PLIST.
|
2008-03-14 21:49:08 by Johann Franz | Files touched by this commit (2) |
Log message:
Updated tor 0.2.0.19-alpha to 0.2.0.21-rc.
Changes in version 0.2.0.21-rc - 2008-03-02
Bugfixes only.
Changes in version 0.2.0.20-rc - 2008-02-24
Tor 0.2.0.20-rc is the first release candidate for the 0.2.0 series. It
makes more progress towards normalizing Tor's TLS handshake, makes
hidden services work better again, helps relays bootstrap if they don't
know their IP address, adds optional support for linking in openbsd's
allocator or tcmalloc, allows really fast relays to scale past 15000
sockets, and fixes a bunch of minor bugs reported by Veracode.
|
2008-02-13 18:41:45 by Johann Franz | Files touched by this commit (2) |
Log message:
Update tor to 0.2.0.19-alpha.
Changes in version 0.2.0.19-alpha - 2008-02-09
Tor 0.2.0.19-alpha makes more progress towards normalizing Tor's TLS
handshake, makes path selection for relays more secure and IP address
guessing more robust, and generally fixes a lot of bugs in preparation
for calling the 0.2.0 branch stable.
Changes in version 0.2.0.18-alpha - 2008-01-25
Tor 0.2.0.18-alpha adds a sixth v3 directory authority run by CCC,
fixes a big memory leak in 0.2.0.17-alpha, and adds new config options
that can warn or reject connections to ports generally associated with
vulnerable-plaintext protocols.
Changes in version 0.2.0.17-alpha - 2008-01-17
Tor 0.2.0.17-alpha makes the tarball build cleanly again (whoops).
Changes in version 0.2.0.16-alpha - 2008-01-17
Tor 0.2.0.16-alpha adds a fifth v3 directory authority run by Karsten
Loesing, and generally cleans up a lot of features and minor bugs.
|