From patchwork Sun Oct 8 16:26:00 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Peter_M=C3=BCller?= X-Patchwork-Id: 7271 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4S3SGc0GQKz3wmX for ; Sun, 8 Oct 2023 16:26:32 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4S3SGZ1mflzg7; Sun, 8 Oct 2023 16:26:30 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4S3SGZ0TCQz2xKs; Sun, 8 Oct 2023 16:26:30 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4S3SGX352mz2xKs for ; Sun, 8 Oct 2023 16:26:28 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4S3SGT6FHLzg7 for ; Sun, 8 Oct 2023 16:26:25 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1696782387; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=fZBsrWNi82F810+djwYAV6EqBqEABnthg37LWgHRLLQ=; b=obo3mdjRIw/4fl6RU9Ls1IKpuTsMLa7G0u708Z7DeIAWmCsc9Jwi8Nmkmupg+aooiwxRyE 63KUocA7pQ0+IkAA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1696782387; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=fZBsrWNi82F810+djwYAV6EqBqEABnthg37LWgHRLLQ=; b=MB5YUFvPEjkuTBs5eDZ7FB3WhdQAAaCdXD7D7leY8bn/MfO4HG0O1FPumwQUDS0jarZyjO 1gcciMkCSje5QAT2uDsseYftTP/02csBRh5Ov7OrGirzVWdbwTf6Kc6z/HMB2bNQBd2sGy V21GevYVphSMO1BLVWa97zgE8uZj/OfpY/98Im101aaQDATBeUO6Asc4/w8aP037LqhbpR WQYEu6RGzf/E2ycdTMsy5WBXVyAhgJk2L7IvdjooGsE8QPUiTIIw02FDpYSCtY+LorU50D AuXRCcNZDVmnan14NHWIjatdu7zd4xpopFfHbb0dPDWsIHcDKvwKFx/fkP5HPw== Message-ID: <95480272-9077-4259-a302-d8b4c55c2449@ipfire.org> Date: Sun, 8 Oct 2023 16:26:00 +0000 MIME-Version: 1.0 To: "IPFire: Development" From: =?utf-8?q?Peter_M=C3=BCller?= Subject: [PATCH] Tor: Update to 0.4.8.7 Message-ID-Hash: WFNZ3H2GG7KWWP3DR26ZLJ7YCQLLD7EA X-Message-ID-Hash: WFNZ3H2GG7KWWP3DR26ZLJ7YCQLLD7EA X-MailFrom: peter.mueller@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Changes in version 0.4.8.7 - 2023-09-25 This version fixes a single major bug in the Conflux subsystem on the client side. See below for more information. The upcoming Tor Browser 13 stable will pick this up. o Major bugfixes (conflux): - Fix an issue that prevented us from pre-building more conflux sets after existing sets had been used. Fixes bug 40862; bugfix on 0.4.8.1-alpha. o Minor features (fallbackdir): - Regenerate fallback directories generated on September 25, 2023. o Minor features (geoip data): - Update the geoip files to match the IPFire Location Database, as retrieved on 2023/09/25. Changes in version 0.4.8.6 - 2023-09-18 This version contains an important fix for onion service regarding congestion control and its reliability. Apart from that, uneeded BUG warnings have been suppressed especially about a compression bomb seen on relays. We strongly recommend, in particular onion service operators, to upgrade as soon as possible to this latest stable. o Major bugfixes (onion service): - Fix a reliability issue where services were expiring their introduction points every consensus update. This caused connectivity issues for clients caching the old descriptor and intro points. Bug reported and fixed by gitlab user @hyunsoo.kim676. Fixes bug 40858; bugfix on 0.4.7.5-alpha. o Minor features (debugging, compression): - Log the input and output buffer sizes when we detect a potential compression bomb. Diagnostic for ticket 40739. o Minor features (fallbackdir): - Regenerate fallback directories generated on September 18, 2023. o Minor features (geoip data): - Update the geoip files to match the IPFire Location Database, as retrieved on 2023/09/18. o Minor bugfix (defensive programming): - Disable multiple BUG warnings of a missing relay identity key when starting an instance of Tor compiled without relay support. Fixes bug 40848; bugfix on 0.4.3.1-alpha. o Minor bugfixes (bridge authority): - When reporting a pseudo-networkstatus as a bridge authority, or answering "ns/purpose/*" controller requests, include accurate published-on dates from our list of router descriptors. Fixes bug 40855; bugfix on 0.4.8.1-alpha. o Minor bugfixes (compression, zstd): - Use less frightening language and lower the log-level of our run- time ABI compatibility check message in our Zstd compression subsystem. Fixes bug 40815; bugfix on 0.4.3.1-alpha. Signed-off-by: Peter Müller Reviewed-by: Adolf Belka --- lfs/tor | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lfs/tor b/lfs/tor index d7be53a1c..7a9ca4128 100644 --- a/lfs/tor +++ b/lfs/tor @@ -26,7 +26,7 @@ include Config SUMMARY = Anonymizing overlay network for TCP (The onion router) -VER = 0.4.8.5 +VER = 0.4.8.7 THISAPP = tor-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -34,7 +34,7 @@ DL_FROM = $(URL_IPFIRE) DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = tor -PAK_VER = 80 +PAK_VER = 81 DEPS = libseccomp @@ -48,7 +48,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 71a4807284ecefc4a18d6bc15ce798844304f860338b786590779fb171f851d630e8af3114dbc84fe854561e0085dcb147b4dd87787988a8fb6c3628bfcc8175 +$(DL_FILE)_BLAKE2 = 4d0cde752a729c64e380663e4438398fe768a8657e9aa3246bdf0ec9a4b4e01e277cb594ae0cb44cc66ea8c6080f2e58c6daf1bf01dc51b678d228e8e38fc971 install : $(TARGET)