Revisions of tor
- tor 0.4.3.6 * Fix a crash due to an out-of-bound memory access (CVE-2020-15572) * Some minor fixes
Fix logrotate to not fail when tor is stopped (boo#1164275) nicer version with try-reload-or-restart
Automatic submission by obs-autosubmit
tor 0.4.2.6 * Correct how we use libseccomp * Fix crash when reloading logging configuration while the experimental sandbox is enabled * Avoid a possible crash when logging an assertion about mismatched magic numbers
- Update tor.service and add defaults-torrc to work without dropped torctl (boo#1072274) - Add tor-master.service to allow handling multiple tor daemons - tor 0.4.2.5: * first stable release in the 0.4.2.x series * improves reliability and stability * several stability and correctness improvements for onion services * fixes many smaller bugs present in previous series
- Update dependnecnies: * python3 instead of python * add libpcap and seccomp - Use more suitable macros for building and systemd dependencies
Automatic submission by obs-autosubmit
- update to 0.4.1.5 * Onion service clients now add padding cells at the start of their INTRODUCE and RENDEZVOUS circuits to make it look like Exit traffic * Add a generic publish-subscribe message-passing subsystem * Controller commands are now parsed using a generalized parsing subsystem * Implement authenticated SENDMEs as detailed in proposal 289 * Our node selection algorithm now excludes nodes in linear time * Construct a fast secure pseudorandom number generator for each thread, to use when performance is critical * Consider our directory information to have changed when our list of bridges changes * Do not count previously configured working bridges towards our total of working bridges * When considering upgrading circuits from "waiting for guard" to "open", always ignore circuits that are marked for close * Properly clean up the introduction point map when circuits change purpose * Fix an unreachable bug in which an introduction point could try to send an INTRODUCE_ACK * Clients can now handle unknown status codes from INTRODUCE_ACK cells - Remove upstreamed tor-0.3.5.8-no-ssl-version-warning.patch - Compile without -Werror to build with LTO (boo#1146548) - Add fix-test.patch to workaround a LTO-induced test-failure - removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by firewalld, see [1]. [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html
- tor 0.3.5.8: * CVE-2019-8955 prevent attackers from making tor run out of memory and crash * Allow SOCKS5 with empty username+password * Update geoip and geoip6 to the February 5 2019 Maxmind GeoLite2 Country database * Select guards even if the consensus has expired, as long as the consensus is still reasonably live
tor 0.3.5.7
tor 0.3.4.9 (forwarded request 646175 from AndreasStieger)
tor 0.3.4.8
tor 0.3.3.8
- tor 0.3.3.6: * new stable release series * controller support and other improvements for v3 onion services * official support for embedding Tor within other application * Improvements to IPv6 support * Relay option ReducedExitPolicy to configure a reasonable default * Revent DoS via malicious protocol version string (boo#1094283) * Many other other bug fixes and improvements
Displaying revisions 41 - 60 of 123