Update wip/tor-dev to version 0.4.2.1-alpha.

Changes in version 0.4.2.1-alpha - 2019-09-17
  This is the first alpha release in the 0.4.2.x series. It adds new
  defenses for denial-of-service attacks against onion services. It also
  includes numerous kinds of bugfixes and refactoring to help improve
  Tor's stability and ease of development.

  o Major features (onion service v3, denial of service):
    - Add onion service introduction denial of service defenses. Intro
      points can now rate-limit client introduction requests, using
      parameters that can be sent by the service within the
      ESTABLISH_INTRO cell. If the cell extension for this is not used,
      the intro point will honor the consensus parameters. Closes
      ticket 30924.

  o Major bugfixes (circuit build, guard):
    - When considering upgrading circuits from "waiting for guard" to
      "open", always ignore circuits that are marked for close.
      Previously we could end up in the situation where a subsystem is
      notified of a circuit opening, but the circuit is still marked for
      close, leading to undesirable behavior. Fixes bug 30871; bugfix
      on 0.3.0.1-alpha.

  o Major bugfixes (crash, Linux, Android):
    - Tolerate systems (including some Android installations) where
      madvise and MADV_DONTDUMP are available at build-time, but not at
      run time. Previously, these systems would notice a failed syscall
      and abort. Fixes bug 31570; bugfix on 0.4.1.1-alpha.
    - Tolerate systems (including some Linux installations) where
      madvise and/or MADV_DONTFORK are available at build-time, but not
      at run time. Previously, these systems would notice a failed
      syscall and abort. Fixes bug 31696; bugfix on 0.4.1.1-alpha.

  o Many minor features and bugfixes

  o Removed features:
    - No longer include recommended package digests in votes as detailed
      in proposal 301. The RecommendedPackages torrc option is
      deprecated and will no longer have any effect. "package" lines
      will still be considered when computing consensuses for consensus
      methods that include them. (This change has no effect on the list
      of recommended Tor versions, which is still in use.) Closes
      ticket 29738.
    - Remove torctl.in from contrib/dist directory. Resolves
      ticket 30550.
This commit is contained in:
Alexander Nasonov 2019-09-21 15:19:46 +01:00
parent 54d6831035
commit d51ae96061
No known key found for this signature in database
GPG Key ID: 66070EA58C2922DF
2 changed files with 5 additions and 6 deletions

View File

@ -1,8 +1,7 @@
# $NetBSD$
DISTNAME= tor-0.4.1.4-rc
DISTNAME= tor-0.4.2.1-alpha
PKGNAME= ${DISTNAME:S/tor/tordev/:S/-alpha//:S/-rc/rc0/}
PKGREVISION= 1
CATEGORIES= net security
MASTER_SITES= https://dist.torproject.org/

View File

@ -1,8 +1,8 @@
$NetBSD$
SHA1 (tor-0.4.1.4-rc.tar.gz) = 8d8c92a3ae4d5d29c86353f917f2e471cd4aba3e
RMD160 (tor-0.4.1.4-rc.tar.gz) = 5a75e8bee985aa637d76de7cf6db838358346f6f
SHA512 (tor-0.4.1.4-rc.tar.gz) = 851809c5ff80beea8bf4432d702bcb6ce9ffe0b3d137c3c11386f1e4c771140d218d4ed2dc5c3c4994091c13a2e28f85ce125c1b68fe606d16e4e1f5a259937b
Size (tor-0.4.1.4-rc.tar.gz) = 7369948 bytes
SHA1 (tor-0.4.2.1-alpha.tar.gz) = 98d565971a161d693bbe3fe9c35c22beb169825d
RMD160 (tor-0.4.2.1-alpha.tar.gz) = 8b8cd7244d3b5696fda3bd746353024ed8d3ccbc
SHA512 (tor-0.4.2.1-alpha.tar.gz) = 5d3642c4298a7c49647c4958456a97de0970c0242238437c1c79c82073e8b77213472569ffce663b949c5c8e3dce0fa544d6f2b4e299a80758a42fce67ffc6ee
Size (tor-0.4.2.1-alpha.tar.gz) = 7457483 bytes
SHA1 (patch-Makefile.in) = c190295f4702bd1e69531cab1ac61dbab451e48b
SHA1 (patch-src_app_config_config.c) = bac106e382207cdf22c84a52b45c791de2bdf0f8