Revisions of tor

Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 818991 from Bernhard Wiedemann's avatar Bernhard Wiedemann (bmwiedemann) (revision 82)
Fix logrotate to not fail when tor is stopped (boo#1164275)

nicer version with try-reload-or-restart
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 808310 from Factory Maintainer's avatar Factory Maintainer (factory-maintainer) (revision 81)
Automatic submission by obs-autosubmit
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 769011 from Bernhard Wiedemann's avatar Bernhard Wiedemann (bmwiedemann) (revision 79)
tor 0.4.2.6
  * Correct how we use libseccomp
  * Fix crash when reloading logging configuration while the
    experimental sandbox is enabled
  * Avoid a possible crash when logging an assertion
    about mismatched magic numbers
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 761967 from Bernhard Wiedemann's avatar Bernhard Wiedemann (bmwiedemann) (revision 78)
- Update tor.service and add defaults-torrc
  to work without dropped torctl (boo#1072274)
- Add tor-master.service to allow handling multiple tor daemons

- tor 0.4.2.5:
  * first stable release in the 0.4.2.x series
  * improves reliability and stability
  * several stability and correctness improvements for onion services
  *  fixes many smaller bugs present in previous series
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 736066 from Bernhard Wiedemann's avatar Bernhard Wiedemann (bmwiedemann) (revision 76)
- Update dependnecnies:
  * python3 instead of python
  * add libpcap and seccomp
- Use more suitable macros for building and systemd dependencies
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 733468 from Factory Maintainer's avatar Factory Maintainer (factory-maintainer) (revision 75)
Automatic submission by obs-autosubmit
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 725000 from Bernhard Wiedemann's avatar Bernhard Wiedemann (bmwiedemann) (revision 74)
- update to 0.4.1.5
  * Onion service clients now add padding cells at the start of their
    INTRODUCE and RENDEZVOUS circuits to make it look like
    Exit traffic
  * Add a generic publish-subscribe message-passing subsystem
  * Controller commands are now parsed using a generalized parsing
    subsystem
  * Implement authenticated SENDMEs as detailed in proposal 289
  * Our node selection algorithm now excludes nodes in linear time
  * Construct a fast secure pseudorandom number generator for
    each thread, to use when performance is critical
  * Consider our directory information to have changed when our list
    of bridges changes
  * Do not count previously configured working bridges towards our
    total of working bridges
  * When considering upgrading circuits from "waiting for guard" to
    "open", always ignore circuits that are marked for close
  * Properly clean up the introduction point map when circuits change
    purpose
  * Fix an unreachable bug in which an introduction point could try to
    send an INTRODUCE_ACK
  * Clients can now handle unknown status codes from INTRODUCE_ACK
    cells
- Remove upstreamed tor-0.3.5.8-no-ssl-version-warning.patch
- Compile without -Werror to build with LTO (boo#1146548)
- Add fix-test.patch to workaround a LTO-induced test-failure

- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 678960 from Bernhard Wiedemann's avatar Bernhard Wiedemann (bmwiedemann) (revision 71)
- tor 0.3.5.8:
  * CVE-2019-8955 prevent attackers from making tor run
    out of memory and crash
  * Allow SOCKS5 with empty username+password
  * Update geoip and geoip6 to the February 5 2019 Maxmind
    GeoLite2 Country database
  * Select guards even if the consensus has expired, as long
    as the consensus is still reasonably live
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 646176 from Andreas Stieger's avatar Andreas Stieger (AndreasStieger) (revision 69)
tor 0.3.4.9 (forwarded request 646175 from AndreasStieger)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 612507 from Andreas Stieger's avatar Andreas Stieger (AndreasStieger) (revision 64)
- tor 0.3.3.6:
  * new stable release series
  * controller support and other improvements for v3 onion services
  * official support for embedding Tor within other application
  * Improvements to IPv6 support
  * Relay option ReducedExitPolicy to configure a reasonable default
  * Revent DoS via malicious protocol version string (boo#1094283)
  * Many other other bug fixes and improvements
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 582239 from Andreas Stieger's avatar Andreas Stieger (AndreasStieger) (revision 63)
- tor 0.3.2.10:
  * CVE-2018-0490: remote crash vulnerability against directory
    authorities (boo#1083845, TROVE-2018-001)
  * CVE-2018-0491: remote relay crash (boo#1083846, TROVE-2018-002)
  * New system for improved resistance to DoS attacks against relays
  * Various other bug fixes
Displaying revisions 41 - 60 of 122
openSUSE Build Service is sponsored by