- Add "AND LGPL-3.0-only" to the spec license tag, as arti links
with Rust crates crates/equix and crates/hashx which are
licensed under LGPL-3.0-only
- Update to version 1.4.5:
* Breaking: Console logging now goes to stderr instead of stdout.
* Arti 1.4.5 continues development on xon-based (proposal 324)
flow control and Conflux. In addition, we have drafted an
initial design for the directory cache storage model, which
will be needed for the core relay functionality, and
for the directory authority implementation.
* Decreased the minimum allowed duration of the hsdir_interval to
5 minutes
* New experimental arti keys list and arti keys list-keystores
subcommands for listing the existing keys and configured
keystores
* More work and bug fixes on the conflux implementation
* Experimental support for launching a SOCKS proxy from a set of
already bound listeners.
* For a full changelog see
/usr/share/doc/packages/arti/CHANGELOG.md
OBS-URL: https://build.opensuse.org/request/show/1296609
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/arti?expand=0&rev=15
- Update to version 1.4.4:
* Arti now requires Rust 1.83
* Arti now supports Circuit Handshake Extensions
* arti-ureq: We no longer enable the rustls feature by default
* Continued development towards supporting Conflux tunnels in
Arti
* Continued development towards supporting Counter Galois Onion
relay cell encryption in Arti
* Arti no longer uses MiddleOnly relays for rendezvous points or
introduction points
* Continued progress on service-side Proof-of-Work (PoW) support
* Arti no longer uses the ".z" suffix in directory URLs
* tor-rtcompat: We no longer bundle an unused copy of the Lets
Encrypt root certificate
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=37
- Update to version 1.4.3:
* Arti 1.4.3 adds adds the framework for measuring metrics
* Initial groundwork for the Counter Galois Onion proposal
* Some of the groundwork for congestion control, in the form of
handshake negotiation code
* The arti hsc flags --quiet and --force have been consolidated
into a single --batch flag
* Arti now exits by default when it does not support a
recommended or required protocol
* Cleanup, minor fixes and documentation enhancements
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=31
* Arti's RPC subsystem is now stable and ready for use!
* This release continues development on Conflux,
and also fixes a number of bugs and security issues.
* Upgraded to ring version 0.17.13: fixes RUSTSEC-2025-0009
* Upgraded to rand version 0.9.0
* Longer-lived keys are now derived using a CautiousRng,
which combines inputs from several sources,
including OsRng, to minimize the likelihood of falling
to a vulnerability in any particular one
* Arti now imposes a maximum on its fallback estimated timeout,
to prevent integer overflow
* More Conflux development
* More RPC development
* For a full changelog see
/usr/share/doc/packages/arti/CHANGELOG.md
- Update to version 1.4.1:
* Arti 1.4.1 contains
significant behind-the-scenes groundwork for Conflux,
a feature that improves performance and reliability
by allowing data streams to tunnel over multiple circuits.
* Arti now implements the client side of ID-based families
(a.k.a. "Happy Families"). When deployed everywhere on the
network, this feature will allow us to remove around 80-90%
of the data from microdescriptors, and save some administrative
complexity.
* For a full changelog see
/usr/share/doc/packages/arti/CHANGELOG.md
- Update to version 1.4.0:
* Arti 1.4.0 offers a new RPC interface, continues work on the
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=30
* Continues development on onion services, the RPC subsystem,
and relay infrastructure.
* This release fixes a major bug in Arti's channel management
code, where in some circumstances, canceled pending channel
entries were not being cleaned up properly, preventing Arti
from building new channels to their target relays.
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=28
* Achieved parity on most major client features with C Tor.
* Continued work on Arti Relay.
* The work-in-progress RPC system is significantly more clearly
defined and implementation is proceeding.
* More details can be found in the installed package changelog
(/usr/share/doc/packages/arti/CHANGELOG.md)
- Update to version 1.2.8:
* Arti 1.2.8 continues development on onion services,
the RPC subsystem, key management, and relay infrastructure.
It also includes fixes for two security issues in
handling the SOCKS protocol, the most severe of which is rated at
"medium" according to our security policy.
* Increased MSRV to 1.77
* More details can be found in the installed package changelog
(/usr/share/doc/packages/arti/CHANGELOG.md)
- Update to version 1.2.7:
* Arti 1.2.7 continues development on onion service client
authorization, the RPC subsystem, and relay infrastructure.
* More details can be found in the installed package changelog
(/usr/share/doc/packages/arti/CHANGELOG.md)
- Update to version 1.2.6:
* Arti 1.2.7 continues development on onion service client authorization,
the RPC subsystem, and relay infrastructure.
* More details can be found in the installed package changelog
(/usr/share/doc/packages/arti/CHANGELOG.md)
* Update curve25519-dalek to avoid a low-severity timing
* Add a key material export facility for some of our TLS
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=25
- Update to version 1.2.5:
* Stop publishing the obsolete arti-hyper crate
* Update curve25519-dalek to avoid a low-severity timing
vulnerability. (TROVE-2024-007)
* With full vanguards, client rendezvous circuits
do not reuse the final vanguard as the rendezvous point.
(TROVE-2024-008)
* Some RPC development
* Add skeleton, including (experimental): arti-relay crate,
relay cargo feature in arti-client,
relay command line argument to arti
* Add a key material export facility for some of our TLS
implementations.
* Tolerate removal of files from Arti's cache directory.
OBS-URL: https://build.opensuse.org/request/show/1187408
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/arti?expand=0&rev=10
* Stop publishing the obsolete arti-hyper crate
* Update curve25519-dalek to avoid a low-severity timing
vulnerability. (TROVE-2024-007)
* With full vanguards, client rendezvous circuits
do not reuse the final vanguard as the rendezvous point.
(TROVE-2024-008)
* Some RPC development
* Add skeleton, including (experimental): arti-relay crate,
relay cargo feature in arti-client,
relay command line argument to arti
* Add a key material export facility for some of our TLS
implementations.
* Tolerate removal of files from Arti's cache directory.
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=23
- Added LICENSE-APACHE and LICENSE-MIT to %files
- Added README.md and CHANGELOG.md to %files
- Update to version 1.2.1:
* Reorganize onion service code.
* Design work for out-of-memory handling, which is necessary for
onion service security.
* Initial implementation work for onion service [vanguards],
which are needed to improve onion service security.
This is not yet complete.
* Added support for unmanaged pluggable transports
* Begun work to improve Tor's relay cell protocol with support
for packed and fragmented messages
- Update to version 1.2.0
* Initial support for running onion services.
* Fixed a number of bugs and security issues.
* Made the onion-service-service feature non-experimental.
For a full changelog, refer to the package changelog
(/usr/share/doc/packages/arti/CHANGELOG.md)
OBS-URL: https://build.opensuse.org/request/show/1164178
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=14
- Update to version 1.1.12~0:
Arti 1.1.12 continues work on support for running onion services.
You can now launch an onion service and expect it to run,
though the user experience leaves a lot to be desired.
Don't rely on this onion service implementation for security yet;
there are a number of [missing security features]
we will need to develop before we can recommend them
for actual use.
3c44d849f4/CHANGELOG.md
- Updated the ignored RUSTSEC advisories, as per the project
recommended way of building the crate
OBS-URL: https://build.opensuse.org/request/show/1138965
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=12
- Update to version 1.1.11:
Arti 1.1.11 continues work on support for running onion services.
Onion services are now working in our testing, and we expect we'll
have something testable by others in our next release.
Arti 1.1.11 also increases our MSRV (Minimum Supported Rust Version)
to 1.70, in accordance with our [MSRV policy].
### Onion service development
- Correct our handling of BEGIN and END messages to bring them
into conformance with the C Tor implementation and the specification.
([#1077], [!1694], [!1738])
- In our key manager, use macros to define key specifiers, instead of
repeating the same boilerplate code. ([#1069], [#1093], [!1710],
[!1733])
- Refactoring and refinement on the definitions of onion-service-related
errors. ([!1718], [!1724], [!1750], [!1751], [!1779])
- Add a "time-store" mechanism for (as correctly as possible) storing and loading
future timestamps, even in the presence of system clock skew ([!1723], [!1774])
- Implement a replay-log backend to prevent INTRODUCE replay attacks
against onion services. ([!1725])
- Improved encoding for key-denotators in the key manager. ([#1063],
[#1070], [!1722])
- Allow a single key to have more than one denotator in its path.
([#1112], [!1747])
- Use an order-preserving-encryption back-end to generate
monotonically increasing revision counters for onion service
descriptors. We do this to ensure a reproducible series of counters
without leaking our clock skew. ([#1053], [!1741], [!1744])
- Deprecate key types for INTRODUCE-based authentication:
C tor has never implemented this, and we do not plan to implement it
without additional specification work. ([#1037], [!1749])
OBS-URL: https://build.opensuse.org/request/show/1132326
OBS-URL: https://build.opensuse.org/package/show/network/arti?expand=0&rev=10
oid sha256:1d8364d90a9777b15b8f7e34bb5d44d92c6b38d2b2905e6b335c8f3416e71a52
size 5497794
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.