SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for tor-0.2.5.10-tor.1.rh5_11.i386.rpm :
Sat Oct 25 04:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.10

Thu Oct 23 04:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.9-rc

Thu Sep 25 04:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.8-rc

Wed Sep 17 04:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.7-rc

Tue Jul 29 04:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.6-alpha

Fri Jun 20 04:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.5-alpha

Thu May 8 04:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.4-alpha

Tue Mar 25 03:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.3-alpha

Sat Feb 15 03:00:00 2014 Ondrej Mikle
- Bump to upstream 0.2.5.2-alpha

Sat Oct 12 04:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.5.1-alpha

Mon Sep 9 04:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.17-rc

Mon Aug 12 04:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.16-rc

Fri Jul 5 04:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.15-alpha

Tue Jun 25 04:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.14-alpha

Tue Jun 18 04:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.13-alpha

Sat Apr 20 04:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.12-alpha

Sat Mar 16 03:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.11-alpha
- Cleanup of non-RHEL, non-Fedora related packaging code

Thu Feb 7 03:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.10-alpha

Thu Jan 17 03:00:00 2013 Ondrej Mikle
- Bump to upstream 0.2.4.9-alpha (includes 0.2.4.8-alpha merge)
- Major bugfixes in 0.2.4.9-alpha:
- Fix backward compatibility logic when receiving an embedded ntor
handshake tunneled in a CREATE cell. This clears up the \"Bug:
couldn\'t format CREATED cell\" warning. Fixes bug 7959; bugfix
on 0.2.4.8-alpha.
- Major features in 0.2.4.8-alpha:
- Preliminary support for directory guards (proposal 207)
- Tor now supports a new circuit extension handshake designed instead of
original circuit extension handshake, later called \"TAP\".
- Relays can now enable the ECDHE TLS ciphersuites when available and
appropriate.
- Major bugfixes in 0.2.4.8-alpha:
- Avoid crashing when, as a relay without IPv6-exit support, a client insists
on getting an IPv6 address or nothing. Fixes bug 7814; bugfix on
0.2.4.7-alpha.

Sat Dec 29 03:00:00 2012 Ondrej Mikle
- Bump to upstream 0.2.4.7-alpha
- Tor 0.2.4.7-alpha introduces a new approach to providing fallback
directory mirrors for more robust bootstrapping; fixes more issues where
clients with changing network conditions refuse to make any circuits;
adds initial support for exiting to IPv6 addresses; resumes being able
to update our GeoIP database, and includes the geoip6 file this time;
turns off the client-side DNS cache by default due to privacy risks;
and fixes a variety of other issues.
- major features and bugfixes (see Changelog in /usr/share for details):
- alpha exit support for IPv6 addresses
- replacing geoip countries with pseudo country code \'A1\' with real country
code
- turn off client-side DNS caching, DNS cache now configurable at
per-client-port level
- alter circuit build timeout measurement to start at the point where we
begin the CREATE/CREATE_FAST step

Fri Dec 21 03:00:00 2012 Ondrej Mikle
- Bump to upstream 0.2.4.6-alpha
- Tor 0.2.4.6-alpha fixes an assert bug that has been plaguing relays,
makes our defense-in-depth memory wiping more reliable, and begins to
count IPv6 addresses in bridge statistics,
- major bugfixes:
- Fix an assertion failure that could occur when closing a connection
with a spliced rendezvous circuit. Fix for bug 7212; bugfix on
Tor 0.2.4.4-alpha.
- Tor tries to wipe potentially sensitive data after using it, so
that if some subsequent security failure exposes Tor\'s memory,
the damage will be limited. But we had a bug where the compiler
was eliminating these wipe operations when it decided that the
memory was no longer visible to a (correctly running) program,
hence defeating our attempt at defense in depth. We fix that
by using OpenSSL\'s OPENSSL_cleanse() operation, which a compiler
is unlikely to optimize away. Future versions of Tor may use
a less ridiculously heavy approach for this. Fixes bug 7352.
Reported in an article by Andrey Karpov.

Sun Oct 28 03:00:00 2012 Ondrej Mikle
- Bump to upstream 0.2.4.5-alpha
- major bugfixes (security):
- Fix a group of remotely triggerable assertion failures related to
incorrect link protocol negotiation. Found, diagnosed, and fixed
by \"some guy from France\". Fix for CVE-2012-2250; bugfix on
0.2.3.6-alpha.
- Fix a denial of service attack by which any directory authority
could crash all the others, or by which a single v2 directory
authority could crash everybody downloading v2 directory
information. Fixes bug 7191; bugfix on 0.2.0.10-alpha.
- major bugfixes:
- When parsing exit policy summaries from microdescriptors, we had
previously been ignoring the last character in each one, so that
\"accept 80,443,8080\" would be treated by clients as indicating
a node that allows access to ports 80, 443, and 808. That would
lead to clients attempting connections that could never work,
and ignoring exit nodes that would support their connections. Now
clients parse these exit policy summaries correctly. Fixes bug 7192;
bugfix on 0.2.3.1-alpha.

Tue Oct 23 04:00:00 2012 Ondrej Mikle
- Bump to upstream 0.2.4.4-alpha
- new directory authorities (also in 0.2.3.23-rc):
- Add Faravahar (run by Sina Rabbani) as the ninth v3 directory
authority. Closes ticket 5749.
- major bugfixes (security/privacy, also in 0.2.3.23-rc):
- Disable TLS session tickets. OpenSSL\'s implementation was giving
our TLS session keys the lifetime of our TLS context objects, when
perfect forward secrecy would want us to discard anything that
could decrypt a link connection as soon as the link connection
was closed. Fixes bug 7139; bugfix on all versions of Tor linked
against OpenSSL 1.0.0 or later. Found by Florent Daignière.
- Discard extraneous renegotiation attempts once the V3 link
protocol has been initiated. Failure to do so left us open to
a remotely triggerable assertion failure. Fixes CVE-2012-2249;
bugfix on 0.2.3.6-alpha. Reported by \"some guy from France\".

Sun Sep 23 04:00:00 2012 Ondrej Mikle
- Bump to upstream 0.2.4.3-alpha
- Security fixes:
- Fix an assertion failure in tor_timegm() that could be triggered
by a badly formatted directory object. Bug found by fuzzing with
Radamsa. Fixes bug 6811; bugfix on 0.2.0.20-rc.
- Major bugfixes:
- Fix a possible crash bug when checking for deactivated circuits
in connection_or_flush_from_first_active_circuit(). Fixes bug 6341;
bugfix on 0.2.2.7-alpha. Bug report and fix received pseudonymously.
- Allow routers to detect that their own DirPorts are running. When
we removed support for versions_supports_begindir, we also
accidentally removed the mechanism we used to self-test our
DirPort. Diagnosed with help from kargig. Fixes bugs 6814 and 6815;
bugfix on 0.2.4.2-alpha.
- Security features:
- Switch to a completely time-invariant approach for picking nodes
weighted by bandwidth. Our old approach would run through the
part of the loop after it had made its choice slightly slower
than it ran through the part of the loop before it had made its
choice. Addresses ticket 6538.
- Disable the use of Guard nodes when in Tor2WebMode. Guard usage
by tor2web clients allows hidden services to identity tor2web
clients through their repeated selection of the same rendezvous
and introduction point circuit endpoints (their guards). Resolves
ticket 6888.

Fri Jun 22 04:00:00 2012 Ondrej Mikle
- fixed to work with both rpmbuild and mock on RHEL/Fedora
- removed unnecessary files from rpm such as .git repo
- fixed build dependencies and package conflicts
- fixed creating _tor user on Fedora 17 (ancient typo)
- added/updated build instructions for RPM creation
- confirmed to build and run on EL5, EL6, Fedora 16/17, OpenSuse 12.1

Sat Aug 21 04:00:00 2010 Erinn Clark
- add conflicts for Fedora packages
- add logic for SuSE since it requires special doc handling

Tue Feb 23 03:00:00 2010 Erinn Clark
- remove AUTHORS from %doc line since it no longer exists upstream
- switch maintainers

Sat May 2 04:00:00 2009 Andrew Lewman
- clean up distro detection and remove dead comment blocks

Mon Feb 23 03:00:00 2009 Andrew Lewman
- update the description, vendor, and packager

Fri Sep 12 04:00:00 2008 Andrew Lewman
- See r16867
- http://archives.seul.org/or/cvs/Sep-2008/msg00156.html

Wed Feb 28 03:00:00 2007 Andrew Lewman
- Fix a potential race condition in how we determine the running state of tor. Found by Stefan Nordhausen.
- see OR-CVS for details

Sat May 27 04:00:00 2006 Andrew Lewman
- Add in a few \"SUSEisms\" to make dist-rpm actually work on suse
- Turn Tor \"on\" via chkconfig
- Update -mcpu to -mtune to make GCC happy
- see OR-CVS for details

Wed Mar 29 04:00:00 2006 Andrew Lewman
- converted to build the specified target cpu and arch
- override related rpm macros to build correctly
- see OR-CVS for details

Tue Jan 18 03:00:00 2005 John Bashinski
- Take runtime user and group names from configure system. Default
user/group names are now \"_tor\"; blame Roger...
- Make logrotate control file a separate file in the source distribution,
rather than creating it from the spec file.
- Properly handle the order in which RPM executes scriptlets on upgrade.
The old code would kill the daemon on upgrade.
- Start the tor daemon after installation if and only if it was
running before installation. Preserve runlevel setup on upgrade.
- Package the torctl script; the init script is now a wrapper around it.

Sat Nov 6 03:00:00 2004 John Bashinski
- Add skeletal support for multiple distributions
- Even more ridiculous level of macro-ization
- Modify version numbers so RPM can determine when it has a newer version
- Return to including distribution name in package release number
- Sharply trim description
- Change user/group name from \"tor\" to \"tordmn\"; \"tor\" is a common
given name (reported by Marius Hjelle)
- Change group to \"System Environment/Daemons\" (suggested by Marius Hjelle)
- Create logrotate file (suggested by Marius Hjelle)
- Make Tor run as a user proxy by default (suggested by Marius Hjelle)
- Autogenerate spec file from GNU autotools data, substituting version
and whatnot
- Be perhaps excessively paranoid with config file and directory modes
- Remove auto-start and auto-stop at installation time; there\'s some kind
of weird race going on, and it\'s arguably a bad thing anyway.

Mon Jun 7 04:00:00 2004 Nick Mathewson 0.0.7-0.std.0.1.rc2
- Make spec file more happy with fc2 packaging

Sun Jan 18 03:00:00 2004 John Bashinski
- Basic spec file; tested with Red Hat 9.


 
ICM