pkgsrc-WIP-changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Update tor-dev to version 0.3.4.1-alpha.
Module Name: pkgsrc-wip
Committed By: Alexander Nasonov <alnsn%yandex.ru@localhost>
Pushed By: alnsn
Date: Fri May 18 20:33:51 2018 +0100
Changeset: e4c930b4d84a0abd913a2aa7395e084b7a316c4e
Modified Files:
tor-dev/Makefile
tor-dev/distinfo
Log Message:
Update tor-dev to version 0.3.4.1-alpha.
Changes in version 0.3.4.1-alpha - 2018-05-17
Tor 0.3.4.1-alpha is the first release in the 0.3.4.x series. It
includes refactoring to begin reducing Tor's binary size and idle CPU
usage on mobile, along with prep work for new bandwidth scanners,
improvements to the experimental "vanguards" feature, and numerous
other small features and bugfixes.
o New system requirements:
- Tor no longer tries to support old operating systems without
mmap() or some local equivalent. Apparently, compilation on such
systems has been broken for some time, without anybody noticing or
complaining. Closes ticket 25398.
o Major feature (directory authority, modularization):
- The directory authority subsystem has been modularized. The code
is now located in src/or/dirauth/, and is compiled in by default.
To disable the module, the configure option
--disable-module-dirauth has been added. This module may be
disabled by default in some future release. Closes ticket 25610.
o Major features (main loop, CPU usage):
- When Tor is disabled (via DisableNetwork or via hibernation), it
no longer needs to run any per-second events. This change should
make it easier for mobile applications to disable Tor while the
device is sleeping, or Tor is not running. Closes ticket 26063.
- Tor no longer enables all of its periodic events by default.
Previously, Tor would enable all possible main loop events,
regardless of whether it needed them. Furthermore, many of these
events are now disabled with Tor is hibernating or DisableNetwork
is set. This is a big step towards reducing client CPU usage by
reducing the amount of wake-ups the daemon does. Closes ticket
25376 and 25762.
- The bandwidth-limitation logic has been refactored so that
bandwidth calculations are performed on-demand, rather than every
TokenBucketRefillInterval milliseconds. This change should improve
the granularity of our bandwidth calculations, and limit the
number of times that the Tor process needs to wake up when it is
idle. Closes ticket 25373.
- Move responsibility for many operations from a once-per-second
callback to a callback that is only scheduled as needed. Moving
this functionality has allowed us to disable the callback when
Tor's network is disabled. Once enough items are removed from our
once-per-second callback, we can eliminate it entirely to conserve
CPU when idle. The functionality removed includes: closing
connections, circuits, and channels (ticket 25932); consensus
voting (25937); flushing log callbacks (25951); honoring delayed
SIGNEWNYM requests (25949); rescanning the consensus cache
(25931); saving the state file to disk (25948); warning relay
operators about unreachable ports (25952); and keeping track of
Tor's uptime (26009).
o Major bugfixes (directory authorities, security):
- When directory authorities read a zero-byte bandwidth file, they
would previously log a warning with the contents of an
uninitialised buffer. They now log a warning about the empty file
instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha.
o Major bugfixes (crash):
- Avoid a rare assertion failure in the circuit build timeout code
if we fail to allow any circuits to actually complete. Fixes bug
25733; bugfix on 0.2.2.2-alpha.
o Major bugfixes (directory authority):
- Avoid a crash when testing router reachability on a router that
could have an ed25519 ID, but which does not. Fixes bug 25415;
bugfix on 0.3.3.2-alpha.
o Major bugfixes (onion service):
- Correctly detect when onion services get disabled after HUP. Fixes
bug 25761; bugfix on 0.3.2.1.
o Major bugfixes (protover, voting):
- Revise Rust implementation of protover to use a more memory-
efficient voting algorithm and corresponding data structures, thus
avoiding a potential (but small impact) DoS attack where specially
crafted protocol strings would expand to several potential
megabytes in memory. In the process, several portions of code were
revised to be methods on new, custom types, rather than functions
taking interchangeable types, thus increasing type safety of the
module. Custom error types and handling were added as well, in
order to facilitate better error dismissal/handling in outside
crates and avoid mistakenly passing an internal error string to C
over the FFI boundary. Many tests were added, and some previous
differences between the C and Rust implementations have been
remedied. Fixes bug 24031; bugfix on 0.3.3.1-alpha.
o Major bugfixes (relay, denial of service):
- Impose a limit on circuit cell queue size. The limit can be
controlled by a consensus parameter. Fixes bug 25226; bugfix
on 0.2.4.14-alpha.
o ... All minor features and bugfixes are skipped ...
To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=e4c930b4d84a0abd913a2aa7395e084b7a316c4e
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
diffstat:
tor-dev/Makefile | 2 +-
tor-dev/distinfo | 8 ++++----
2 files changed, 5 insertions(+), 5 deletions(-)
diffs:
diff --git a/tor-dev/Makefile b/tor-dev/Makefile
index 8c0c3c5e40..02ccaf3427 100644
--- a/tor-dev/Makefile
+++ b/tor-dev/Makefile
@@ -1,6 +1,6 @@
# $NetBSD$
-DISTNAME= tor-0.3.3.4-alpha
+DISTNAME= tor-0.3.4.1-alpha
PKGNAME= ${DISTNAME:S/tor/tordev/:S/-alpha//}
CATEGORIES= net security
MASTER_SITES= http://www.torproject.org/dist/
diff --git a/tor-dev/distinfo b/tor-dev/distinfo
index 1a77a13e26..438f369864 100644
--- a/tor-dev/distinfo
+++ b/tor-dev/distinfo
@@ -1,8 +1,8 @@
$NetBSD$
-SHA1 (tor-0.3.3.4-alpha.tar.gz) = ce98ac4eb1c55352890321066f69719daf5ea711
-RMD160 (tor-0.3.3.4-alpha.tar.gz) = e2afe5a7cde0a952a0446e4198178407776203fd
-SHA512 (tor-0.3.3.4-alpha.tar.gz) = e9053de4adac117b938b24eeb82183ffe61638e64f2209dfed1b8333b0acc478c212df150720eda59b6d31505d6e0b301cc1f4edc38564d6f0593a82f326b015
-Size (tor-0.3.3.4-alpha.tar.gz) = 6379590 bytes
+SHA1 (tor-0.3.4.1-alpha.tar.gz) = e305ffd032f6e998f5f1452d6fce32b502707a32
+RMD160 (tor-0.3.4.1-alpha.tar.gz) = a7fc820002772666663260c49bc1e20f402d0237
+SHA512 (tor-0.3.4.1-alpha.tar.gz) = d27e65a2b9d2505051a3d5b95955010eae8cca0d220cb9de75f5d59eeeebf2484b11fd1d27f5fffa80917e1f3ff255ed674ab821af1403b6d6795617b1a9557f
+Size (tor-0.3.4.1-alpha.tar.gz) = 6603160 bytes
SHA1 (patch-Makefile.in) = cc7a58817fcc0294dc6a301e01a4e5076ce531b2
SHA1 (patch-src_or_config.c) = 8e4905833ca6722651b52b83c910b1e96d1ca756
Home |
Main Index |
Thread Index |
Old Index