summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortron <tron@pkgsrc.org>2010-03-02 12:31:44 +0000
committertron <tron@pkgsrc.org>2010-03-02 12:31:44 +0000
commit3c3c6d6726f3cf88844e96be7d3ec47ab4f4b634 (patch)
treef5081178a43ad9fb7fa99c2c7f80216b87678fbe
parentb8e127e3efc49485b70eb6adec7937d0e2868645 (diff)
downloadpkgsrc-3c3c6d6726f3cf88844e96be7d3ec47ab4f4b634.tar.gz
Pullup ticket #3034 - requested by obache
tor: security and compatibility update Revisions pulled up: - net/tor/Makefile 1.71 - net/tor/distinfo 1.40 --- Module Name: pkgsrc Committed By: obache Date: Tue Mar 2 11:25:59 UTC 2010 Modified Files: pkgsrc/net/tor: Makefile distinfo Log Message: Update tor to 0.2.1.24 per maintainer update request by PR#42911. Changes in version 0.2.1.24 - 2010-02-21 Tor 0.2.1.24 makes Tor work again on the latest OS X -- this time for sure! o Minor bugfixes: - Work correctly out-of-the-box with even more vendor-patched versions of OpenSSL. In particular, make it so Debian and OS X don't need customized patches to run/build. Changes in version 0.2.1.23 - 2010-02-13 Tor 0.2.1.23 fixes a huge client-side performance bug, makes Tor work again on the latest OS X, and updates the location of a directory authority. o Major bugfixes (performance): - We were selecting our guards uniformly at random, and then weighting which of our guards we'd use uniformly at random. This imbalance meant that Tor clients were severely limited on throughput (and probably latency too) by the first hop in their circuit. Now we select guards weighted by currently advertised bandwidth. We also automatically discard guards picked using the old algorithm. Fixes bug 1217; bugfix on 0.2.1.3-alpha. Found by Mike Perry. o Major bugfixes: - Make Tor work again on the latest OS X: when deciding whether to use strange flags to turn TLS renegotiation on, detect the OpenSSL version at run-time, not compile time. We need to do this because Apple doesn't update its dev-tools headers when it updates its libraries in a security patch. - Fix a potential buffer overflow in lookup_last_hid_serv_request() that could happen on 32-bit platforms with 64-bit time_t. Also fix a memory leak when requesting a hidden service descriptor we've requested before. Fixes bug 1242, bugfix on 0.2.0.18-alpha. Found by aakova. o Minor bugfixes: - Refactor resolve_my_address() to not use gethostbyname() anymore. Fixes bug 1244; bugfix on 0.0.2pre25. Reported by Mike Mestnik. o Minor features: - Avoid a mad rush at the beginning of each month when each client rotates half of its guards. Instead we spread the rotation out throughout the month, but we still avoid leaving a precise timestamp in the state file about when we first picked the guard. Improves over the behavior introduced in 0.1.2.17.
-rw-r--r--net/tor/Makefile4
-rw-r--r--net/tor/distinfo8
2 files changed, 6 insertions, 6 deletions
diff --git a/net/tor/Makefile b/net/tor/Makefile
index 89648b89143..eda8c82b78f 100644
--- a/net/tor/Makefile
+++ b/net/tor/Makefile
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.68.2.1 2010/01/24 11:28:08 tron Exp $
+# $NetBSD: Makefile,v 1.68.2.2 2010/03/02 12:31:44 tron Exp $
#
-DISTNAME= tor-0.2.1.22
+DISTNAME= tor-0.2.1.24
CATEGORIES= net security
MASTER_SITES= http://www.torproject.org/dist/
diff --git a/net/tor/distinfo b/net/tor/distinfo
index e68c96675a1..17747766215 100644
--- a/net/tor/distinfo
+++ b/net/tor/distinfo
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.38.2.1 2010/01/24 11:28:08 tron Exp $
+$NetBSD: distinfo,v 1.38.2.2 2010/03/02 12:31:44 tron Exp $
-SHA1 (tor-0.2.1.22.tar.gz) = bf6114592570e0a0d0d8b23de991ecc03bfc6633
-RMD160 (tor-0.2.1.22.tar.gz) = 382829f8772a16fb94883b9a88e1f3e3ff0f16a6
-Size (tor-0.2.1.22.tar.gz) = 2408280 bytes
+SHA1 (tor-0.2.1.24.tar.gz) = 7b51c9e2f9ad5b70dea2fbe73728cd64213fc505
+RMD160 (tor-0.2.1.24.tar.gz) = d6c65499fbc942afc94e508a8e553091aeadb159
+Size (tor-0.2.1.24.tar.gz) = 2396864 bytes