diff options
author | obache <obache@pkgsrc.org> | 2010-03-02 11:25:59 +0000 |
---|---|---|
committer | obache <obache@pkgsrc.org> | 2010-03-02 11:25:59 +0000 |
commit | cb03aadfe364853a34e8a89d3cff3615af541a50 (patch) | |
tree | d41e8c8517113873031653fb0ba489a73e6b080a /net/tor | |
parent | 6712400ed46675ac0fa4694355c49ecc66ae2bad (diff) | |
download | pkgsrc-cb03aadfe364853a34e8a89d3cff3615af541a50.tar.gz |
Update tor to 0.2.1.24 per maintainer update request by PR#42911.
Changes in version 0.2.1.24 - 2010-02-21
Tor 0.2.1.24 makes Tor work again on the latest OS X -- this time
for sure!
o Minor bugfixes:
- Work correctly out-of-the-box with even more vendor-patched versions
of OpenSSL. In particular, make it so Debian and OS X don't need
customized patches to run/build.
Changes in version 0.2.1.23 - 2010-02-13
Tor 0.2.1.23 fixes a huge client-side performance bug, makes Tor work
again on the latest OS X, and updates the location of a directory
authority.
o Major bugfixes (performance):
- We were selecting our guards uniformly at random, and then weighting
which of our guards we'd use uniformly at random. This imbalance
meant that Tor clients were severely limited on throughput (and
probably latency too) by the first hop in their circuit. Now we
select guards weighted by currently advertised bandwidth. We also
automatically discard guards picked using the old algorithm. Fixes
bug 1217; bugfix on 0.2.1.3-alpha. Found by Mike Perry.
o Major bugfixes:
- Make Tor work again on the latest OS X: when deciding whether to
use strange flags to turn TLS renegotiation on, detect the OpenSSL
version at run-time, not compile time. We need to do this because
Apple doesn't update its dev-tools headers when it updates its
libraries in a security patch.
- Fix a potential buffer overflow in lookup_last_hid_serv_request()
that could happen on 32-bit platforms with 64-bit time_t. Also fix
a memory leak when requesting a hidden service descriptor we've
requested before. Fixes bug 1242, bugfix on 0.2.0.18-alpha. Found
by aakova.
o Minor bugfixes:
- Refactor resolve_my_address() to not use gethostbyname() anymore.
Fixes bug 1244; bugfix on 0.0.2pre25. Reported by Mike Mestnik.
o Minor features:
- Avoid a mad rush at the beginning of each month when each client
rotates half of its guards. Instead we spread the rotation out
throughout the month, but we still avoid leaving a precise timestamp
in the state file about when we first picked the guard. Improves
over the behavior introduced in 0.1.2.17.
Diffstat (limited to 'net/tor')
-rw-r--r-- | net/tor/Makefile | 4 | ||||
-rw-r--r-- | net/tor/distinfo | 8 |
2 files changed, 6 insertions, 6 deletions
diff --git a/net/tor/Makefile b/net/tor/Makefile index d0eb01ab42f..9812f6eb9a6 100644 --- a/net/tor/Makefile +++ b/net/tor/Makefile @@ -1,7 +1,7 @@ -# $NetBSD: Makefile,v 1.70 2010/01/21 11:47:23 wiz Exp $ +# $NetBSD: Makefile,v 1.71 2010/03/02 11:25:59 obache Exp $ # -DISTNAME= tor-0.2.1.22 +DISTNAME= tor-0.2.1.24 CATEGORIES= net security MASTER_SITES= http://www.torproject.org/dist/ diff --git a/net/tor/distinfo b/net/tor/distinfo index fea236ede09..8e68a4bf55f 100644 --- a/net/tor/distinfo +++ b/net/tor/distinfo @@ -1,5 +1,5 @@ -$NetBSD: distinfo,v 1.39 2010/01/21 11:47:23 wiz Exp $ +$NetBSD: distinfo,v 1.40 2010/03/02 11:25:59 obache Exp $ -SHA1 (tor-0.2.1.22.tar.gz) = bf6114592570e0a0d0d8b23de991ecc03bfc6633 -RMD160 (tor-0.2.1.22.tar.gz) = 382829f8772a16fb94883b9a88e1f3e3ff0f16a6 -Size (tor-0.2.1.22.tar.gz) = 2408280 bytes +SHA1 (tor-0.2.1.24.tar.gz) = 7b51c9e2f9ad5b70dea2fbe73728cd64213fc505 +RMD160 (tor-0.2.1.24.tar.gz) = d6c65499fbc942afc94e508a8e553091aeadb159 +Size (tor-0.2.1.24.tar.gz) = 2396864 bytes |