Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified)) by mollari.NetBSD.org (Postfix) with ESMTPS id F063A1A9239 for ; Wed, 27 Oct 2021 13:16:37 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id 3214384CEF; Wed, 27 Oct 2021 13:16:37 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 6A06984CEF for ; Wed, 27 Oct 2021 13:16:36 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([IPv6:::1]) by localhost (mail.netbsd.org [IPv6:::1]) (amavisd-new, port 10025) with ESMTP id wJJKD67988x7 for ; Wed, 27 Oct 2021 13:16:35 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.netbsd.org [199.233.217.197]) by mail.netbsd.org (Postfix) with ESMTP id AE4D984CDF for ; Wed, 27 Oct 2021 13:16:35 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id A7CA1FA97; Wed, 27 Oct 2021 13:16:35 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1635340595164250" MIME-Version: 1.0 Date: Wed, 27 Oct 2021 13:16:35 +0000 From: "Thomas Klausner" Subject: CVS commit: pkgsrc/net/tor To: pkgsrc-changes@NetBSD.org Reply-To: wiz@netbsd.org X-Mailer: log_accum Message-Id: <20211027131635.A7CA1FA97@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1635340595164250 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: wiz Date: Wed Oct 27 13:16:35 UTC 2021 Modified Files: pkgsrc/net/tor: Makefile distinfo Log Message: tor: update to 0.4.6.8. Changes in version 0.4.6.8 - 2021-10-26 This version fixes several bugs from earlier versions of Tor. One highlight is a fix on how we track DNS timeouts to report general relay overload. o Major bugfixes (relay, overload state): - Relays report the general overload state for DNS timeout errors only if X% of all DNS queries over Y seconds are errors. Before that, it only took 1 timeout to report the overload state which was just too low of a threshold. The X and Y values are 1% and 10 minutes respectively but they are also controlled by consensus parameters. Fixes bug 40491; bugfix on 0.4.6.1-alpha. o Minor features (fallbackdir): - Regenerate fallback directories for October 2021. Closes ticket 40493. o Minor features (testing): - On a testing network, relays can now use the TestingMinTimeToReportBandwidth option to change the smallest amount of time over which they're willing to report their observed maximum bandwidth. Previously, this was fixed at 1 day. For safety, values under 2 hours are only supported on testing networks. Part of a fix for ticket 40337. - Relays on testing networks no longer rate-limit how frequently they are willing to report new bandwidth measurements. Part of a fix for ticket 40337. - Relays on testing networks now report their observed bandwidths immediately from startup. Previously, they waited until they had been running for a full day. Closes ticket 40337. o Minor bugfix (onion service): - Do not flag an HSDir as non-running in case the descriptor upload or fetch fails. An onion service closes pending directory connections before uploading a new descriptor which can thus lead to wrongly flagging many relays and thus affecting circuit building path selection. Fixes bug 40434; bugfix on 0.2.0.13-alpha. - Improve logging when a bad HS version is given. Fixes bug 40476; bugfix on 0.4.6.1-alpha. o Minor bugfix (CI, onion service): - Exclude onion service version 2 Stem tests in our CI. Fixes bug 40500; bugfix on 0.3.2.1-alpha. o Minor bugfixes (compatibility): - Fix compatibility with the most recent Libevent versions, which no longer have an evdns_set_random_bytes() function. Because this function has been a no-op since Libevent 2.0.4-alpha, it is safe for us to just stop calling it. Fixes bug 40371; bugfix on 0.2.1.7-alpha. o Minor bugfixes (onion service, TROVE-2021-008): - Only log v2 access attempts once total, in order to not pollute the logs with warnings and to avoid recording the times on disk when v2 access was attempted. Note that the onion address was _never_ logged. This counts as a Low-severity security issue. Fixes bug 40474; bugfix on 0.4.5.8. To generate a diff of this commit: cvs rdiff -u -r1.173 -r1.174 pkgsrc/net/tor/Makefile cvs rdiff -u -r1.120 -r1.121 pkgsrc/net/tor/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1635340595164250 Content-Disposition: inline Content-Length: 1427 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/net/tor/Makefile diff -u pkgsrc/net/tor/Makefile:1.173 pkgsrc/net/tor/Makefile:1.174 --- pkgsrc/net/tor/Makefile:1.173 Tue Sep 7 14:00:52 2021 +++ pkgsrc/net/tor/Makefile Wed Oct 27 13:16:35 2021 @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.173 2021/09/07 14:00:52 gdt Exp $ +# $NetBSD: Makefile,v 1.174 2021/10/27 13:16:35 wiz Exp $ -DISTNAME= tor-0.4.6.7 +DISTNAME= tor-0.4.6.8 CATEGORIES= net security MASTER_SITES= https://dist.torproject.org/ Index: pkgsrc/net/tor/distinfo diff -u pkgsrc/net/tor/distinfo:1.120 pkgsrc/net/tor/distinfo:1.121 --- pkgsrc/net/tor/distinfo:1.120 Tue Oct 26 11:07:03 2021 +++ pkgsrc/net/tor/distinfo Wed Oct 27 13:16:35 2021 @@ -1,5 +1,5 @@ -$NetBSD: distinfo,v 1.120 2021/10/26 11:07:03 nia Exp $ +$NetBSD: distinfo,v 1.121 2021/10/27 13:16:35 wiz Exp $ -BLAKE2s (tor-0.4.6.7.tar.gz) = 5ff08a4fc22a6072a63abe4abfddc00ee73e4fa1d2436045c011f2c7846b5405 -SHA512 (tor-0.4.6.7.tar.gz) = e5f9e235fc4b96f5e63e0bfa4ca412d0d11299a31cb77cae1c199b276d0dfbf3656657ddf910b22625dd49eb726d487666e80e8889db78c9edebbab0d80d9e03 -Size (tor-0.4.6.7.tar.gz) = 7790727 bytes +BLAKE2s (tor-0.4.6.8.tar.gz) = 42403c0613223bb1ae621a4a175596c8e42e18ef7f4b20725293bb9644e596b2 +SHA512 (tor-0.4.6.8.tar.gz) = ff008ddf10c2a4c9e0d0da28558c7a97a6d42615c8bcad25a74567e3aafaba49df1699e379fd674f93305d222748d16b2f21d0da9a8fd3444b659747e1f1d07b +Size (tor-0.4.6.8.tar.gz) = 7796485 bytes --_----------=_1635340595164250--