Sat Dec 2 12:22:14 2017 UTC ()
tor: update to 0.3.1.9.

Changes in version 0.3.1.9 - 2017-12-01:
  Tor 0.3.1.9 backports important security and stability fixes from the
  0.3.2 development series. All Tor users should upgrade to this
  release, or to another of the releases coming out today.

  o Major bugfixes (security, backport from 0.3.2.6-alpha):
    - Fix a denial of service bug where an attacker could use a
      malformed directory object to cause a Tor instance to pause while
      OpenSSL would try to read a passphrase from the terminal. (Tor
      instances run without a terminal, which is the case for most Tor
      packages, are not impacted.) Fixes bug 24246; bugfix on every
      version of Tor. Also tracked as TROVE-2017-011 and CVE-2017-8821.
      Found by OSS-Fuzz as testcase 6360145429790720.
    - Fix a denial of service issue where an attacker could crash a
      directory authority using a malformed router descriptor. Fixes bug
      24245; bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2017-010
      and CVE-2017-8820.
    - When checking for replays in the INTRODUCE1 cell data for a
      (legacy) onion service, correctly detect replays in the RSA-
      encrypted part of the cell. We were previously checking for
      replays on the entire cell, but those can be circumvented due to
      the malleability of Tor's legacy hybrid encryption. This fix helps
      prevent a traffic confirmation attack. Fixes bug 24244; bugfix on
      0.2.4.1-alpha. This issue is also tracked as TROVE-2017-009
      and CVE-2017-8819.

  o Major bugfixes (security, onion service v2, backport from 0.3.2.6-alpha):
    - Fix a use-after-free error that could crash v2 Tor onion services
      when they failed to open circuits while expiring introduction
      points. Fixes bug 24313; bugfix on 0.2.7.2-alpha. This issue is
      also tracked as TROVE-2017-013 and CVE-2017-8823.

  o Major bugfixes (security, relay, backport from 0.3.2.6-alpha):
    - When running as a relay, make sure that we never build a path
      through ourselves, even in the case where we have somehow lost the
      version of our descriptor appearing in the consensus. Fixes part
      of bug 21534; bugfix on 0.2.0.1-alpha. This issue is also tracked
      as TROVE-2017-012 and CVE-2017-8822.
    - When running as a relay, make sure that we never choose ourselves
      as a guard. Fixes part of bug 21534; bugfix on 0.3.0.1-alpha. This
      issue is also tracked as TROVE-2017-012 and CVE-2017-8822.

  o Major bugfixes (exit relays, DNS, backport from 0.3.2.4-alpha):
    - Fix an issue causing DNS to fail on high-bandwidth exit nodes,
      making them nearly unusable. Fixes bugs 21394 and 18580; bugfix on
      0.1.2.2-alpha, which introduced eventdns. Thanks to Dhalgren for
      identifying and finding a workaround to this bug and to Moritz,
      Arthur Edelstein, and Roger for helping to track it down and
      analyze it.

  o Minor features (bridge):
    - Bridges now include notice in their descriptors that they are
      bridges, and notice of their distribution status, based on their
      publication settings. Implements ticket 18329. For more fine-
      grained control of how a bridge is distributed, upgrade to 0.3.2.x
      or later.

  o Minor features (directory authority, backport from 0.3.2.6-alpha):
    - Add an IPv6 address for the "bastet" directory authority. Closes
      ticket 24394.

  o Minor features (geoip):
    - Update geoip and geoip6 to the November 6 2017 Maxmind GeoLite2
      Country database.

  o Minor bugfix (relay address resolution, backport from 0.3.2.1-alpha):
    - Avoid unnecessary calls to directory_fetches_from_authorities() on
      relays, to prevent spurious address resolutions and descriptor
      rebuilds. This is a mitigation for bug 21789. Fixes bug 23470;
      bugfix on in 0.2.8.1-alpha.

  o Minor bugfixes (compilation, backport from 0.3.2.1-alpha):
    - Fix unused variable warnings in donna's Curve25519 SSE2 code.
      Fixes bug 22895; bugfix on 0.2.7.2-alpha.

  o Minor bugfixes (logging, relay shutdown, annoyance, backport from 0.3.2.2-alpha):
    - When a circuit is marked for close, do not attempt to package any
      cells for channels on that circuit. Previously, we would detect
      this condition lower in the call stack, when we noticed that the
      circuit had no attached channel, and log an annoying message.
      Fixes bug 8185; bugfix on 0.2.5.4-alpha.

  o Minor bugfixes (onion service, backport from 0.3.2.5-alpha):
    - Rename the consensus parameter "hsdir-interval" to "hsdir_interval"
      so it matches dir-spec.txt. Fixes bug 24262; bugfix
      on 0.3.1.1-alpha.

  o Minor bugfixes (relay, crash, backport from 0.3.2.4-alpha):
    - Avoid a crash when transitioning from client mode to bridge mode.
      Previously, we would launch the worker threads whenever our
      "public server" mode changed, but not when our "server" mode
      changed. Fixes bug 23693; bugfix on 0.2.6.3-alpha.


(wiz)
diff -r1.126 -r1.127 pkgsrc/net/tor/Makefile
diff -r1.86 -r1.87 pkgsrc/net/tor/distinfo

cvs diff -r1.126 -r1.127 pkgsrc/net/tor/Makefile (expand / switch to unified diff)

--- pkgsrc/net/tor/Makefile 2017/10/27 12:56:59 1.126
+++ pkgsrc/net/tor/Makefile 2017/12/02 12:22:14 1.127
@@ -1,16 +1,16 @@ @@ -1,16 +1,16 @@
1# $NetBSD: Makefile,v 1.126 2017/10/27 12:56:59 adam Exp $ 1# $NetBSD: Makefile,v 1.127 2017/12/02 12:22:14 wiz Exp $
2 2
3DISTNAME= tor-0.3.1.8 3DISTNAME= tor-0.3.1.9
4CATEGORIES= net security 4CATEGORIES= net security
5MASTER_SITES= http://www.torproject.org/dist/ 5MASTER_SITES= http://www.torproject.org/dist/
6 6
7MAINTAINER= reezer@reezer.org 7MAINTAINER= reezer@reezer.org
8HOMEPAGE= http://www.torproject.org/ 8HOMEPAGE= http://www.torproject.org/
9COMMENT= Anonymizing overlay network for TCP 9COMMENT= Anonymizing overlay network for TCP
10LICENSE= modified-bsd 10LICENSE= modified-bsd
11 11
12USE_LANGUAGES= c99 12USE_LANGUAGES= c99
13USE_PKGLOCALEDIR= yes 13USE_PKGLOCALEDIR= yes
14GNU_CONFIGURE= yes 14GNU_CONFIGURE= yes
15 15
16CONFIGURE_ENV+= CPP=${CPP:Q} 16CONFIGURE_ENV+= CPP=${CPP:Q}

cvs diff -r1.86 -r1.87 pkgsrc/net/tor/distinfo (expand / switch to unified diff)

--- pkgsrc/net/tor/distinfo 2017/10/27 12:56:59 1.86
+++ pkgsrc/net/tor/distinfo 2017/12/02 12:22:14 1.87
@@ -1,6 +1,6 @@ @@ -1,6 +1,6 @@
1$NetBSD: distinfo,v 1.86 2017/10/27 12:56:59 adam Exp $ 1$NetBSD: distinfo,v 1.87 2017/12/02 12:22:14 wiz Exp $
2 2
3SHA1 (tor-0.3.1.8.tar.gz) = 100cdcc9318ef77bdfc73131f45843d3a8b6fcb7 3SHA1 (tor-0.3.1.9.tar.gz) = 5d6d5f00691d35c782f9126b7ad70a678343a832
4RMD160 (tor-0.3.1.8.tar.gz) = 488a04b546aeea18cfe383a870d5f725c027c34e 4RMD160 (tor-0.3.1.9.tar.gz) = 5ce9be8ac2d7ece520598853c80cc06a1b7999ac
5SHA512 (tor-0.3.1.8.tar.gz) = 0c2d5f6e444815f0812b0f8bb2102f2013c890375cf20b62025d0704e8ee7742bbf7173764795e3e63606a47d0695a5a982c318c55a30ca50600eb6de5b94b16 5SHA512 (tor-0.3.1.9.tar.gz) = c22557251272595c65b2fade485020d76de16f5bb826d4a47d7bd093b7336dad42e8e2b8a3e0c56d9a10e62f0a5b1596c4b10cd578bf6da17f058f3d4e356f66
6Size (tor-0.3.1.8.tar.gz) = 6073611 bytes 6Size (tor-0.3.1.9.tar.gz) = 6092702 bytes