summaryrefslogtreecommitdiff
path: root/net/tor
diff options
context:
space:
mode:
authorsnj <snj>2009-11-15 04:24:51 +0000
committersnj <snj>2009-11-15 04:24:51 +0000
commit3a2061d0141d9868f8f2d8b4b7822be4d2d1b2a5 (patch)
treef88fd85ebe0431528b9e2d87851df1034e069404 /net/tor
parentda62596e69a72b61106b1f3fd71c7a7dc2f980ea (diff)
downloadpkgsrc-3a2061d0141d9868f8f2d8b4b7822be4d2d1b2a5.tar.gz
Update to 0.2.1.20. From Christian Sturm in PR pkg/42311.
Changes in version 0.2.1.20 - 2009-10-15 o Major bugfixes: - Send circuit or stream sendme cells when our window has decreased by 100 cells, not when it has decreased by 101 cells. Bug uncovered by Karsten when testing the "reduce circuit window" performance patch. Bugfix on the 54th commit on Tor -- from July 2002, before the release of Tor 0.0.0. This is the new winner of the oldest-bug prize. - Fix a remotely triggerable memory leak when a consensus document contains more than one signature from the same voter. Bugfix on 0.2.0.3-alpha. - Avoid segfault in rare cases when finishing an introduction circuit as a client and finding out that we don't have an introduction key for it. Fixes bug 1073. o Major features: - Tor now reads the "circwindow" parameter out of the consensus, and uses that value for its circuit package window rather than the default of 1000 cells. Begins the implementation of proposal 168. o New directory authorities: - Set up urras (run by Jacob Appelbaum) as the seventh v3 directory authority. - Move moria1 and tonga to alternate IP addresses. o Minor bugfixes: - Fix a signed/unsigned compile warning in 0.2.1.19. - Fix possible segmentation fault on directory authorities. Bugfix on 0.2.1.14-rc. - Fix an extremely rare infinite recursion bug that could occur if we tried to log a message after shutting down the log subsystem. Found by Matt Edman. Bugfix on 0.2.0.16-alpha. - Fix an obscure bug where hidden services on 64-bit big-endian systems might mis-read the timestamp in v3 introduce cells, and refuse to connect back to the client. Bugfix on 0.2.1.6-alpha. - We were triggering a CLOCK_SKEW controller status event whenever we connect via the v2 connection protocol to any relay that has a wrong clock. Instead, we should only inform the controller when it's a trusted authority that claims our clock is wrong. Bugfix on 0.2.0.20-rc; starts to fix bug 1074. - We were telling the controller about CHECKING_REACHABILITY and REACHABILITY_FAILED status events whenever we launch a testing circuit or notice that one has failed. Instead, only tell the controller when we want to inform the user of overall success or overall failure. Bugfix on 0.1.2.6-alpha. Fixes bug 1075. - Don't warn when we're using a circuit that ends with a node excluded in ExcludeExitNodes, but the circuit is not used to access the outside world. This should help fix bug 1090. Bugfix on 0.2.1.6-alpha. - Work around a small memory leak in some versions of OpenSSL that stopped the memory used by the hostname TLS extension from being freed. o Minor features: - Add a "getinfo status/accepted-server-descriptor" controller command, which is the recommended way for controllers to learn whether our server descriptor has been successfully received by at least on directory authority. Un-recommend good-server-descriptor getinfo and status events until we have a better design for them.
Diffstat (limited to 'net/tor')
-rw-r--r--net/tor/Makefile4
-rw-r--r--net/tor/distinfo8
2 files changed, 6 insertions, 6 deletions
diff --git a/net/tor/Makefile b/net/tor/Makefile
index 0c7705e6ec8..f73e13dc5ec 100644
--- a/net/tor/Makefile
+++ b/net/tor/Makefile
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.66 2009/08/18 05:48:08 obache Exp $
+# $NetBSD: Makefile,v 1.67 2009/11/15 04:24:51 snj Exp $
#
-DISTNAME= tor-0.2.1.19
+DISTNAME= tor-0.2.1.20
CATEGORIES= net security
MASTER_SITES= http://www.torproject.org/dist/
diff --git a/net/tor/distinfo b/net/tor/distinfo
index 50f27dbb5da..96e40014fc7 100644
--- a/net/tor/distinfo
+++ b/net/tor/distinfo
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.36 2009/08/18 05:48:08 obache Exp $
+$NetBSD: distinfo,v 1.37 2009/11/15 04:24:51 snj Exp $
-SHA1 (tor-0.2.1.19.tar.gz) = 8a8af1354ab5b3fea58e2bbffeddc05e3dfedb17
-RMD160 (tor-0.2.1.19.tar.gz) = 3606cc574ade12adfa8f3c7a180958865be077e8
-Size (tor-0.2.1.19.tar.gz) = 2409484 bytes
+SHA1 (tor-0.2.1.20.tar.gz) = bfc6c7e9ccee23abc4e97ca4ba98aa3ad7784262
+RMD160 (tor-0.2.1.20.tar.gz) = ae4a4ab22fa9eb5c011c652ddd13033407f48e5a
+Size (tor-0.2.1.20.tar.gz) = 2412059 bytes