pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/net/tor Update to 0.1.1.25.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/b738fba16783
branches:  trunk
changeset: 521293:b738fba16783
user:      tv <tv%pkgsrc.org@localhost>
date:      Wed Nov 08 19:41:10 2006 +0000

description:
Update to 0.1.1.25.

Changes in version 0.1.1.25 - 2006-11-04
  o Major bugfixes:
    - When a client asks us to resolve (rather than connect to)
      an address, and we have a cached answer, give them the cached
      answer. Previously, we would give them no answer at all.
    - We were building exactly the wrong circuits when we predict
      hidden service requirements, meaning Tor would have to build all
      its circuits on demand.
    - If none of our live entry guards have a high uptime, but we
      require a guard with a high uptime, try adding a new guard before
      we give up on the requirement. This patch should make long-lived
      connections more stable on average.
    - When testing reachability of our DirPort, don't launch new
      tests when there's already one in progress -- unreachable
      servers were stacking up dozens of testing streams.

  o Security bugfixes:
    - When the user sends a NEWNYM signal, clear the client-side DNS
      cache too. Otherwise we continue to act on previous information.

  o Minor bugfixes:
    - Avoid a memory corruption bug when creating a hash table for
      the first time.
    - Avoid possibility of controller-triggered crash when misusing
      certain commands from a v0 controller on platforms that do not
      handle printf("%s",NULL) gracefully.
    - Avoid infinite loop on unexpected controller input.
    - Don't log spurious warnings when we see a circuit close reason we
      don't recognize; it's probably just from a newer version of Tor.
    - Add Vidalia to the OS X uninstaller script, so when we uninstall
      Tor/Privoxy we also uninstall Vidalia.

diffstat:

 net/tor/Makefile |  4 ++--
 net/tor/distinfo |  8 ++++----
 2 files changed, 6 insertions(+), 6 deletions(-)

diffs (28 lines):

diff -r b775cac06e50 -r b738fba16783 net/tor/Makefile
--- a/net/tor/Makefile  Wed Nov 08 17:33:26 2006 +0000
+++ b/net/tor/Makefile  Wed Nov 08 19:41:10 2006 +0000
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.35 2006/10/26 14:47:37 tv Exp $
+# $NetBSD: Makefile,v 1.36 2006/11/08 19:41:10 tv Exp $
 #
 
-DISTNAME=              tor-0.1.1.24
+DISTNAME=              tor-0.1.1.25
 CATEGORIES=            net security
 MASTER_SITES=          http://tor.eff.org/dist/
 
diff -r b775cac06e50 -r b738fba16783 net/tor/distinfo
--- a/net/tor/distinfo  Wed Nov 08 17:33:26 2006 +0000
+++ b/net/tor/distinfo  Wed Nov 08 19:41:10 2006 +0000
@@ -1,7 +1,7 @@
-$NetBSD: distinfo,v 1.21 2006/10/09 00:51:26 tv Exp $
+$NetBSD: distinfo,v 1.22 2006/11/08 19:41:10 tv Exp $
 
-SHA1 (tor-0.1.1.24.tar.gz) = 627a449efc2c094eafd8389d33f29a9030feb3a3
-RMD160 (tor-0.1.1.24.tar.gz) = cf6cd6cb69fac2fc89f0e0b48c8188fae8051ab2
-Size (tor-0.1.1.24.tar.gz) = 849462 bytes
+SHA1 (tor-0.1.1.25.tar.gz) = b7a976701a163f702f91e9f65d23b57db907d502
+RMD160 (tor-0.1.1.25.tar.gz) = d67bf4e8046544d5b0b3198be8da1e9b876cf045
+Size (tor-0.1.1.25.tar.gz) = 877917 bytes
 SHA1 (patch-ac) = 3e3a6bce4da2a55b60a52fcc4a575eaceb6a2aa8
 SHA1 (patch-ad) = f0ead230249a0341b5d15c47d9361bd6e16ec23a



Home | Main Index | Thread Index | Old Index