Revisions of tor
Dominique Leuenberger (dimstar_suse)
accepted
request 818991
from
Bernhard Wiedemann (bmwiedemann)
(revision 82)
Fix logrotate to not fail when tor is stopped (boo#1164275) nicer version with try-reload-or-restart
Dominique Leuenberger (dimstar_suse)
accepted
request 808310
from
Factory Maintainer (factory-maintainer)
(revision 81)
Automatic submission by obs-autosubmit
Dominique Leuenberger (dimstar_suse)
accepted
request 786716
from
Tomáš Chvátal (scarabeus_iv)
(revision 80)
Dominique Leuenberger (dimstar_suse)
accepted
request 769011
from
Bernhard Wiedemann (bmwiedemann)
(revision 79)
tor 0.4.2.6 * Correct how we use libseccomp * Fix crash when reloading logging configuration while the experimental sandbox is enabled * Avoid a possible crash when logging an assertion about mismatched magic numbers
Dominique Leuenberger (dimstar_suse)
accepted
request 761967
from
Bernhard Wiedemann (bmwiedemann)
(revision 78)
- Update tor.service and add defaults-torrc to work without dropped torctl (boo#1072274) - Add tor-master.service to allow handling multiple tor daemons - tor 0.4.2.5: * first stable release in the 0.4.2.x series * improves reliability and stability * several stability and correctness improvements for onion services * fixes many smaller bugs present in previous series
Dominique Leuenberger (dimstar_suse)
accepted
request 755515
from
Tomáš Chvátal (scarabeus_iv)
(revision 77)
Dominique Leuenberger (dimstar_suse)
accepted
request 736066
from
Bernhard Wiedemann (bmwiedemann)
(revision 76)
- Update dependnecnies: * python3 instead of python * add libpcap and seccomp - Use more suitable macros for building and systemd dependencies
Dominique Leuenberger (dimstar_suse)
accepted
request 733468
from
Factory Maintainer (factory-maintainer)
(revision 75)
Automatic submission by obs-autosubmit
Dominique Leuenberger (dimstar_suse)
accepted
request 725000
from
Bernhard Wiedemann (bmwiedemann)
(revision 74)
- update to 0.4.1.5 * Onion service clients now add padding cells at the start of their INTRODUCE and RENDEZVOUS circuits to make it look like Exit traffic * Add a generic publish-subscribe message-passing subsystem * Controller commands are now parsed using a generalized parsing subsystem * Implement authenticated SENDMEs as detailed in proposal 289 * Our node selection algorithm now excludes nodes in linear time * Construct a fast secure pseudorandom number generator for each thread, to use when performance is critical * Consider our directory information to have changed when our list of bridges changes * Do not count previously configured working bridges towards our total of working bridges * When considering upgrading circuits from "waiting for guard" to "open", always ignore circuits that are marked for close * Properly clean up the introduction point map when circuits change purpose * Fix an unreachable bug in which an introduction point could try to send an INTRODUCE_ACK * Clients can now handle unknown status codes from INTRODUCE_ACK cells - Remove upstreamed tor-0.3.5.8-no-ssl-version-warning.patch - Compile without -Werror to build with LTO (boo#1146548) - Add fix-test.patch to workaround a LTO-induced test-failure - removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by firewalld, see [1]. [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html
Dominique Leuenberger (dimstar_suse)
accepted
request 704260
from
Tomáš Chvátal (scarabeus_iv)
(revision 73)
Dominique Leuenberger (dimstar_suse)
accepted
request 678960
from
Bernhard Wiedemann (bmwiedemann)
(revision 71)
- tor 0.3.5.8: * CVE-2019-8955 prevent attackers from making tor run out of memory and crash * Allow SOCKS5 with empty username+password * Update geoip and geoip6 to the February 5 2019 Maxmind GeoLite2 Country database * Select guards even if the consensus has expired, as long as the consensus is still reasonably live
Dominique Leuenberger (dimstar_suse)
accepted
request 663471
from
Andreas Stieger (AndreasStieger)
(revision 70)
tor 0.3.5.7
Dominique Leuenberger (dimstar_suse)
accepted
request 646176
from
Andreas Stieger (AndreasStieger)
(revision 69)
tor 0.3.4.9 (forwarded request 646175 from AndreasStieger)
Yuchen Lin (maxlin_factory)
accepted
request 634782
from
Andreas Stieger (AndreasStieger)
(revision 68)
tor 0.3.4.8
Dominique Leuenberger (dimstar_suse)
accepted
request 622849
from
Andreas Stieger (AndreasStieger)
(revision 67)
Dominique Leuenberger (dimstar_suse)
accepted
request 621774
from
Andreas Stieger (AndreasStieger)
(revision 66)
tor 0.3.3.8
Yuchen Lin (maxlin_factory)
accepted
request 616357
from
Andreas Stieger (AndreasStieger)
(revision 65)
Dominique Leuenberger (dimstar_suse)
accepted
request 612507
from
Andreas Stieger (AndreasStieger)
(revision 64)
- tor 0.3.3.6: * new stable release series * controller support and other improvements for v3 onion services * official support for embedding Tor within other application * Improvements to IPv6 support * Relay option ReducedExitPolicy to configure a reasonable default * Revent DoS via malicious protocol version string (boo#1094283) * Many other other bug fixes and improvements
Dominique Leuenberger (dimstar_suse)
accepted
request 582239
from
Andreas Stieger (AndreasStieger)
(revision 63)
- tor 0.3.2.10: * CVE-2018-0490: remote crash vulnerability against directory authorities (boo#1083845, TROVE-2018-001) * CVE-2018-0491: remote relay crash (boo#1083846, TROVE-2018-002) * New system for improved resistance to DoS attacks against relays * Various other bug fixes
Displaying revisions 41 - 60 of 122