diff options
author | Mike Tigas | 2019-08-28 13:05:59 -0400 |
---|---|---|
committer | Mike Tigas | 2019-08-28 13:05:59 -0400 |
commit | 314b137de40a88c746885126e708242b75ba7ec3 (patch) | |
tree | 641cf4ff8363ab42b7a067ce7bf03c7a18300581 | |
parent | 320647a993b4e53c38cff0ba834bc29607389d5e (diff) | |
download | aur-314b137de40a88c746885126e708242b75ba7ec3.tar.gz |
tor 0.4.1.5 released on 2019-08-20 (until next unstable release comes out)
upstream tag: https://gitweb.torproject.org/tor.git/tag/?h=tor-0.4.1.5
changelog: https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.4.1.5
---
Changes in version 0.4.1.5 - 2019-08-20
This is the first stable release in the 0.4.1.x series. This series
adds experimental circuit-level padding, authenticated SENDME cells to
defend against certain attacks, and several performance improvements
to save on CPU consumption. It fixes bugs in bootstrapping and v3
onion services. It also includes numerous smaller features and
bugfixes on earlier versions.
Per our support policy, we will support the 0.4.1.x series for nine
months, or until three months after the release of a stable 0.4.2.x:
whichever is longer. If you need longer-term support, please stick
with 0.3.5.x, which will we plan to support until Feb 2022.
Below are the changes since 0.4.1.4-rc. For a complete list of changes
since 0.4.0.5, see the ReleaseNotes file.
o Directory authority changes:
- The directory authority "dizum" has a new IP address. Closes
ticket 31406.
o Minor features (circuit padding logging):
- Demote noisy client-side warn logs about circuit padding to
protocol warnings. Add additional log messages and circuit ID
fields to help with bug 30992 and any other future issues.
o Minor bugfixes (circuit padding negotiation):
- Bump the circuit padding protocol version to explicitly signify
that the HS setup machine support is finalized in 0.4.1.x-stable.
This also means that 0.4.1.x-alpha clients will not negotiate
padding with 0.4.1.x-stable relays, and 0.4.1.x-stable clients
will not negotiate padding with 0.4.1.x-alpha relays (or 0.4.0.x
relays). Fixes bug 31356; bugfix on 0.4.1.1-alpha.
o Minor bugfixes (circuit padding):
- Ignore non-padding cells on padding circuits. This addresses
various warning messages from subsystems that were not expecting
padding circuits. Fixes bug 30942; bugfix on 0.4.1.1-alpha.
o Minor bugfixes (clock skew detection):
- Don't believe clock skew results from NETINFO cells that appear to
arrive before we sent the VERSIONS cells they are responding to.
Previously, we would accept them up to 3 minutes "in the past".
Fixes bug 31343; bugfix on 0.2.4.4-alpha.
o Minor bugfixes (compatibility, standards compliance):
- Fix a bug that would invoke undefined behavior on certain
operating systems when trying to asprintf() a string exactly
INT_MAX bytes long. We don't believe this is exploitable, but it's
better to fix it anyway. Fixes bug 31001; bugfix on 0.2.2.11-alpha.
Found and fixed by Tobias Stoeckmann.
o Minor bugfixes (compilation warning):
- Fix a compilation warning on Windows about casting a function
pointer for GetTickCount64(). Fixes bug 31374; bugfix
on 0.2.9.1-alpha.
o Minor bugfixes (compilation):
- Avoid using labs() on time_t, which can cause compilation warnings
on 64-bit Windows builds. Fixes bug 31343; bugfix on 0.2.4.4-alpha.
o Minor bugfixes (distribution):
- Do not ship any temporary files found in the
scripts/maint/practracker directory. Fixes bug 31311; bugfix
on 0.4.1.1-alpha.
o Testing (continuous integration):
- In Travis, make stem log a controller trace to the console, and
tail stem's tor log after failure. Closes ticket 30591.
- In Travis, only run the stem tests that use a tor binary. Closes
ticket 30694.
-rw-r--r-- | .SRCINFO | 8 | ||||
-rw-r--r-- | PKGBUILD | 4 |
2 files changed, 6 insertions, 6 deletions
@@ -1,6 +1,6 @@ pkgbase = tor-unstable pkgdesc = Anonymizing overlay network. - pkgver = 0.4.1.4_rc + pkgver = 0.4.1.5 pkgrel = 1 url = http://www.torproject.org/ install = tor.install @@ -17,12 +17,12 @@ pkgbase = tor-unstable conflicts = tor backup = etc/tor/torrc backup = etc/tor/torrc-dist - source = https://www.torproject.org/dist/tor-0.4.1.4-rc.tar.gz - source = https://www.torproject.org/dist/tor-0.4.1.4-rc.tar.gz.asc + source = https://www.torproject.org/dist/tor-0.4.1.5.tar.gz + source = https://www.torproject.org/dist/tor-0.4.1.5.tar.gz.asc source = torrc source = tor.service validpgpkeys = 2133BC600AB133E1D826D173FE43009C4607B1FB - sha256sums = 1e92b655a19062209c747c2f328f2b52009d8256a9514705bb8a6cfebb21b3ae + sha256sums = a864e0b605fb933fcc167bf242eed4233949e8a1bf23ac8e0381b106cd920425 sha256sums = SKIP sha256sums = 44093eaf790c6c1cad8690ee002829481fb9b22ca58663f524f5792521222406 sha256sums = 05383ab3c9879b7d77eadeeb8e9824c471ff7a5a7501996efaa573a7547fa4da @@ -5,7 +5,7 @@ # Contributor: simo <simo@archlinux.org> pkgname=tor-unstable -pkgver=0.4.1.4_rc +pkgver=0.4.1.5 pkgrel=1 pkgdesc='Anonymizing overlay network.' arch=('i686' 'x86_64' 'armv7h') @@ -22,7 +22,7 @@ install='tor.install' source=("https://www.torproject.org/dist/${pkgname/-unstable/}-${pkgver/_/-}.tar.gz"{,.asc} 'torrc' 'tor.service') -sha256sums=('1e92b655a19062209c747c2f328f2b52009d8256a9514705bb8a6cfebb21b3ae' +sha256sums=('a864e0b605fb933fcc167bf242eed4233949e8a1bf23ac8e0381b106cd920425' 'SKIP' '44093eaf790c6c1cad8690ee002829481fb9b22ca58663f524f5792521222406' '05383ab3c9879b7d77eadeeb8e9824c471ff7a5a7501996efaa573a7547fa4da') |