pkgsrc-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

PR/42911 CVS commit: [pkgsrc-2009Q4] pkgsrc/net/tor



The following reply was made to PR pkg/42911; it has been noted by GNATS.

From: Matthias Scheler <tron%netbsd.org@localhost>
To: gnats-bugs%gnats.NetBSD.org@localhost
Cc: 
Subject: PR/42911 CVS commit: [pkgsrc-2009Q4] pkgsrc/net/tor
Date: Tue, 2 Mar 2010 12:31:44 +0000

 Module Name:   pkgsrc
 Committed By:  tron
 Date:          Tue Mar  2 12:31:44 UTC 2010
 
 Modified Files:
        pkgsrc/net/tor [pkgsrc-2009Q4]: Makefile distinfo
 
 Log Message:
 Pullup ticket #3034 - requested by obache
 tor: security and compatibility update
 
 Revisions pulled up:
 - net/tor/Makefile                     1.71
 - net/tor/distinfo                     1.40
 ---
 Module Name:   pkgsrc
 Committed By:  obache
 Date:          Tue Mar  2 11:25:59 UTC 2010
 
 Modified Files:
        pkgsrc/net/tor: Makefile distinfo
 
 Log Message:
 Update tor to 0.2.1.24 per maintainer update request by PR#42911.
 
 Changes in version 0.2.1.24 - 2010-02-21
    Tor 0.2.1.24 makes Tor work again on the latest OS X -- this time
    for sure!
 
    o Minor bugfixes:
      - Work correctly out-of-the-box with even more vendor-patched versions
        of OpenSSL. In particular, make it so Debian and OS X don't need
        customized patches to run/build.
 
 Changes in version 0.2.1.23 - 2010-02-13
    Tor 0.2.1.23 fixes a huge client-side performance bug, makes Tor work
    again on the latest OS X, and updates the location of a directory
    authority.
 
    o Major bugfixes (performance):
      - We were selecting our guards uniformly at random, and then weighting
        which of our guards we'd use uniformly at random. This imbalance
        meant that Tor clients were severely limited on throughput (and
        probably latency too) by the first hop in their circuit. Now we
        select guards weighted by currently advertised bandwidth. We also
        automatically discard guards picked using the old algorithm. Fixes
        bug 1217; bugfix on 0.2.1.3-alpha. Found by Mike Perry.
 
    o Major bugfixes:
      - Make Tor work again on the latest OS X: when deciding whether to
        use strange flags to turn TLS renegotiation on, detect the OpenSSL
        version at run-time, not compile time. We need to do this because
        Apple doesn't update its dev-tools headers when it updates its
        libraries in a security patch.
      - Fix a potential buffer overflow in lookup_last_hid_serv_request()
        that could happen on 32-bit platforms with 64-bit time_t. Also fix
        a memory leak when requesting a hidden service descriptor we've
        requested before. Fixes bug 1242, bugfix on 0.2.0.18-alpha. Found
        by aakova.
 
    o Minor bugfixes:
      - Refactor resolve_my_address() to not use gethostbyname() anymore.
        Fixes bug 1244; bugfix on 0.0.2pre25. Reported by Mike Mestnik.
 
    o Minor features:
      - Avoid a mad rush at the beginning of each month when each client
        rotates half of its guards. Instead we spread the rotation out
        throughout the month, but we still avoid leaving a precise timestamp
        in the state file about when we first picked the guard. Improves
        over the behavior introduced in 0.1.2.17.
 
 
 To generate a diff of this commit:
 cvs rdiff -u -r1.68.2.1 -r1.68.2.2 pkgsrc/net/tor/Makefile
 cvs rdiff -u -r1.38.2.1 -r1.38.2.2 pkgsrc/net/tor/distinfo
 
 Please note that diffs are not public domain; they are subject to the
 copyright notices on the relevant files.
 


Home | Main Index | Thread Index | Old Index