Message ID | 95480272-9077-4259-a302-d8b4c55c2449@ipfire.org |
---|---|
State | Staged |
Commit | 41ac2cd531d7d022b9ad3da625799dc573d5258b |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4S3SGc0GQKz3wmX for <patchwork@web04.haj.ipfire.org>; Sun, 8 Oct 2023 16:26:32 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4S3SGZ1mflzg7; Sun, 8 Oct 2023 16:26:30 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4S3SGZ0TCQz2xKs; Sun, 8 Oct 2023 16:26:30 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4S3SGX352mz2xKs for <development@lists.ipfire.org>; Sun, 8 Oct 2023 16:26:28 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4S3SGT6FHLzg7 for <development@lists.ipfire.org>; Sun, 8 Oct 2023 16:26:25 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1696782387; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=fZBsrWNi82F810+djwYAV6EqBqEABnthg37LWgHRLLQ=; b=obo3mdjRIw/4fl6RU9Ls1IKpuTsMLa7G0u708Z7DeIAWmCsc9Jwi8Nmkmupg+aooiwxRyE 63KUocA7pQ0+IkAA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1696782387; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=fZBsrWNi82F810+djwYAV6EqBqEABnthg37LWgHRLLQ=; b=MB5YUFvPEjkuTBs5eDZ7FB3WhdQAAaCdXD7D7leY8bn/MfO4HG0O1FPumwQUDS0jarZyjO 1gcciMkCSje5QAT2uDsseYftTP/02csBRh5Ov7OrGirzVWdbwTf6Kc6z/HMB2bNQBd2sGy V21GevYVphSMO1BLVWa97zgE8uZj/OfpY/98Im101aaQDATBeUO6Asc4/w8aP037LqhbpR WQYEu6RGzf/E2ycdTMsy5WBXVyAhgJk2L7IvdjooGsE8QPUiTIIw02FDpYSCtY+LorU50D AuXRCcNZDVmnan14NHWIjatdu7zd4xpopFfHbb0dPDWsIHcDKvwKFx/fkP5HPw== Message-ID: <95480272-9077-4259-a302-d8b4c55c2449@ipfire.org> Date: Sun, 8 Oct 2023 16:26:00 +0000 MIME-Version: 1.0 To: "IPFire: Development" <development@lists.ipfire.org> From: =?utf-8?q?Peter_M=C3=BCller?= <peter.mueller@ipfire.org> Subject: [PATCH] Tor: Update to 0.4.8.7 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Message-ID-Hash: WFNZ3H2GG7KWWP3DR26ZLJ7YCQLLD7EA X-Message-ID-Hash: WFNZ3H2GG7KWWP3DR26ZLJ7YCQLLD7EA X-MailFrom: peter.mueller@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> Archived-At: <https://lists.ipfire.org/mailman3/hyperkitty/list/development@lists.ipfire.org/message/WFNZ3H2GG7KWWP3DR26ZLJ7YCQLLD7EA/> List-Archive: <https://lists.ipfire.org/mailman3/hyperkitty/list/development@lists.ipfire.org/> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Owner: <mailto:development-owner@lists.ipfire.org> List-Post: <mailto:development@lists.ipfire.org> List-Subscribe: <mailto:development-join@lists.ipfire.org> List-Unsubscribe: <mailto:development-leave@lists.ipfire.org> |
Series |
Tor: Update to 0.4.8.7
|
|
Commit Message
Peter Müller
Oct. 8, 2023, 4:26 p.m. UTC
Changes in version 0.4.8.7 - 2023-09-25
This version fixes a single major bug in the Conflux subsystem on the client
side. See below for more information. The upcoming Tor Browser 13 stable will
pick this up.
o Major bugfixes (conflux):
- Fix an issue that prevented us from pre-building more conflux sets
after existing sets had been used. Fixes bug 40862; bugfix
on 0.4.8.1-alpha.
o Minor features (fallbackdir):
- Regenerate fallback directories generated on September 25, 2023.
o Minor features (geoip data):
- Update the geoip files to match the IPFire Location Database, as
retrieved on 2023/09/25.
Changes in version 0.4.8.6 - 2023-09-18
This version contains an important fix for onion service regarding congestion
control and its reliability. Apart from that, uneeded BUG warnings have been
suppressed especially about a compression bomb seen on relays. We strongly
recommend, in particular onion service operators, to upgrade as soon as
possible to this latest stable.
o Major bugfixes (onion service):
- Fix a reliability issue where services were expiring their
introduction points every consensus update. This caused
connectivity issues for clients caching the old descriptor and
intro points. Bug reported and fixed by gitlab user
@hyunsoo.kim676. Fixes bug 40858; bugfix on 0.4.7.5-alpha.
o Minor features (debugging, compression):
- Log the input and output buffer sizes when we detect a potential
compression bomb. Diagnostic for ticket 40739.
o Minor features (fallbackdir):
- Regenerate fallback directories generated on September 18, 2023.
o Minor features (geoip data):
- Update the geoip files to match the IPFire Location Database, as
retrieved on 2023/09/18.
o Minor bugfix (defensive programming):
- Disable multiple BUG warnings of a missing relay identity key when
starting an instance of Tor compiled without relay support. Fixes
bug 40848; bugfix on 0.4.3.1-alpha.
o Minor bugfixes (bridge authority):
- When reporting a pseudo-networkstatus as a bridge authority, or
answering "ns/purpose/*" controller requests, include accurate
published-on dates from our list of router descriptors. Fixes bug
40855; bugfix on 0.4.8.1-alpha.
o Minor bugfixes (compression, zstd):
- Use less frightening language and lower the log-level of our run-
time ABI compatibility check message in our Zstd compression
subsystem. Fixes bug 40815; bugfix on 0.4.3.1-alpha.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
---
lfs/tor | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
Comments
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org> On 08/10/2023 18:26, Peter Müller wrote: > Changes in version 0.4.8.7 - 2023-09-25 > This version fixes a single major bug in the Conflux subsystem on the client > side. See below for more information. The upcoming Tor Browser 13 stable will > pick this up. > > o Major bugfixes (conflux): > - Fix an issue that prevented us from pre-building more conflux sets > after existing sets had been used. Fixes bug 40862; bugfix > on 0.4.8.1-alpha. > > o Minor features (fallbackdir): > - Regenerate fallback directories generated on September 25, 2023. > > o Minor features (geoip data): > - Update the geoip files to match the IPFire Location Database, as > retrieved on 2023/09/25. > > Changes in version 0.4.8.6 - 2023-09-18 > This version contains an important fix for onion service regarding congestion > control and its reliability. Apart from that, uneeded BUG warnings have been > suppressed especially about a compression bomb seen on relays. We strongly > recommend, in particular onion service operators, to upgrade as soon as > possible to this latest stable. > > o Major bugfixes (onion service): > - Fix a reliability issue where services were expiring their > introduction points every consensus update. This caused > connectivity issues for clients caching the old descriptor and > intro points. Bug reported and fixed by gitlab user > @hyunsoo.kim676. Fixes bug 40858; bugfix on 0.4.7.5-alpha. > > o Minor features (debugging, compression): > - Log the input and output buffer sizes when we detect a potential > compression bomb. Diagnostic for ticket 40739. > > o Minor features (fallbackdir): > - Regenerate fallback directories generated on September 18, 2023. > > o Minor features (geoip data): > - Update the geoip files to match the IPFire Location Database, as > retrieved on 2023/09/18. > > o Minor bugfix (defensive programming): > - Disable multiple BUG warnings of a missing relay identity key when > starting an instance of Tor compiled without relay support. Fixes > bug 40848; bugfix on 0.4.3.1-alpha. > > o Minor bugfixes (bridge authority): > - When reporting a pseudo-networkstatus as a bridge authority, or > answering "ns/purpose/*" controller requests, include accurate > published-on dates from our list of router descriptors. Fixes bug > 40855; bugfix on 0.4.8.1-alpha. > > o Minor bugfixes (compression, zstd): > - Use less frightening language and lower the log-level of our run- > time ABI compatibility check message in our Zstd compression > subsystem. Fixes bug 40815; bugfix on 0.4.3.1-alpha. > > Signed-off-by: Peter Müller <peter.mueller@ipfire.org> > --- > lfs/tor | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/lfs/tor b/lfs/tor > index d7be53a1c..7a9ca4128 100644 > --- a/lfs/tor > +++ b/lfs/tor > @@ -26,7 +26,7 @@ include Config > > SUMMARY = Anonymizing overlay network for TCP (The onion router) > > -VER = 0.4.8.5 > +VER = 0.4.8.7 > > THISAPP = tor-$(VER) > DL_FILE = $(THISAPP).tar.gz > @@ -34,7 +34,7 @@ DL_FROM = $(URL_IPFIRE) > DIR_APP = $(DIR_SRC)/$(THISAPP) > TARGET = $(DIR_INFO)/$(THISAPP) > PROG = tor > -PAK_VER = 80 > +PAK_VER = 81 > > DEPS = libseccomp > > @@ -48,7 +48,7 @@ objects = $(DL_FILE) > > $(DL_FILE) = $(DL_FROM)/$(DL_FILE) > > -$(DL_FILE)_BLAKE2 = 71a4807284ecefc4a18d6bc15ce798844304f860338b786590779fb171f851d630e8af3114dbc84fe854561e0085dcb147b4dd87787988a8fb6c3628bfcc8175 > +$(DL_FILE)_BLAKE2 = 4d0cde752a729c64e380663e4438398fe768a8657e9aa3246bdf0ec9a4b4e01e277cb594ae0cb44cc66ea8c6080f2e58c6daf1bf01dc51b678d228e8e38fc971 > > install : $(TARGET) >
diff --git a/lfs/tor b/lfs/tor index d7be53a1c..7a9ca4128 100644 --- a/lfs/tor +++ b/lfs/tor @@ -26,7 +26,7 @@ include Config SUMMARY = Anonymizing overlay network for TCP (The onion router) -VER = 0.4.8.5 +VER = 0.4.8.7 THISAPP = tor-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -34,7 +34,7 @@ DL_FROM = $(URL_IPFIRE) DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = tor -PAK_VER = 80 +PAK_VER = 81 DEPS = libseccomp @@ -48,7 +48,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 71a4807284ecefc4a18d6bc15ce798844304f860338b786590779fb171f851d630e8af3114dbc84fe854561e0085dcb147b4dd87787988a8fb6c3628bfcc8175 +$(DL_FILE)_BLAKE2 = 4d0cde752a729c64e380663e4438398fe768a8657e9aa3246bdf0ec9a4b4e01e277cb594ae0cb44cc66ea8c6080f2e58c6daf1bf01dc51b678d228e8e38fc971 install : $(TARGET)