Commit Graph

  • b41b416f02 Accepting request 867136 from home:bmwiedemann:branches:network Dirk Mueller 2021-01-27 22:20:17 +00:00
  • 7701ec9464 Accepting request 848313 from network Dominique Leuenberger 2020-11-13 17:59:58 +00:00
  • 1cfeaf6042 Accepting request 848207 from home:AndreasStieger:branches:network Bernhard Wiedemann 2020-11-13 09:30:00 +00:00
  • 3e974ec338 tor 0.4.4.6 * Check channels+circuits on relays more thoroughly (TROVE-2020-005) Bernhard Wiedemann 2020-11-12 17:05:35 +00:00
  • 1d5a501d09 Accepting request 836122 from network Dominique Leuenberger 2020-09-23 16:41:49 +00:00
  • 84b9ca65ce tor 0.4.4.5 * Improve guard selection * IPv6 improvements Bernhard Wiedemann 2020-09-15 14:56:46 +00:00
  • f53be98511 Accepting request 828027 from network Dominique Leuenberger 2020-08-20 20:31:01 +00:00
  • 6ff5703724 Accepting request 827818 from home:dimstar:Factory Bernhard Wiedemann 2020-08-20 07:50:47 +00:00
  • a12b5f8323 Accepting request 819777 from network Dominique Leuenberger 2020-07-10 13:30:24 +00:00
  • af47b5e9b1 - tor 0.4.3.6 * Fix a crash due to an out-of-bound memory access (CVE-2020-15572) * Some minor fixes Bernhard Wiedemann 2020-07-09 17:29:09 +00:00
  • 1979bbcaf9 Accepting request 818991 from network Dominique Leuenberger 2020-07-06 14:34:27 +00:00
  • 3989c40b95 nicer version Bernhard Wiedemann 2020-07-06 12:02:20 +00:00
  • 46eb8909e9 Fix logrotate to not fail when tor is stopped (boo#1164275) Bernhard Wiedemann 2020-06-29 09:00:23 +00:00
  • 6547a1dcae Accepting request 808310 from network Dominique Leuenberger 2020-06-23 19:04:26 +00:00
  • 2dac72e7c0 Accepting request 805924 from home:AndreasStieger:branches:network Bernhard Wiedemann 2020-05-17 01:49:50 +00:00
  • f6912aafff Accepting request 786716 from network Dominique Leuenberger 2020-03-20 22:58:18 +00:00
  • 6499a83920 Accepting request 786602 from home:AndreasStieger:branches:network Tomáš Chvátal 2020-03-20 07:20:53 +00:00
  • db00166d17 tor 0.4.2.7 * Fix two denial-of-service issues Bernhard Wiedemann 2020-03-18 21:03:18 +00:00
  • 57f691e52b Accepting request 769011 from network Dominique Leuenberger 2020-01-31 22:57:35 +00:00
  • 3d596f8092 - tor 0.4.2.6 * Correct how we use libseccomp * Fix crash when reloading logging configuration while the experimental sandbox is enabled * Avoid a possible crash when logging an assertion about mismatched magic numbers Bernhard Wiedemann 2020-01-31 08:49:43 +00:00
  • ca45973a42 Accepting request 761967 from network Dominique Leuenberger 2020-01-09 21:50:58 +00:00
  • 1a183fecbf cleanup Bernhard Wiedemann 2020-01-08 20:12:58 +00:00
  • 88d795cfbd Add tor-master.service to allow handling multiple tor daemons Bernhard Wiedemann 2020-01-08 08:53:23 +00:00
  • f98ca7130d Update tor.service and add defaults-torrc to work without dropped torctl (boo#1072274) Bernhard Wiedemann 2020-01-07 11:42:41 +00:00
  • d0dbdc2fe2 Accepting request 757095 from home:AndreasStieger:branches:network Tomáš Chvátal 2019-12-14 21:37:19 +00:00
  • 30056767ae Accepting request 755515 from network Dominique Leuenberger 2019-12-10 21:43:55 +00:00
  • 07ec88196a Accepting request 755466 from home:AndreasStieger:branches:network Tomáš Chvátal 2019-12-10 10:45:31 +00:00
  • 5e72b0a93e Accepting request 736066 from network Dominique Leuenberger 2019-10-08 17:59:43 +00:00
  • 59531a9224 Accepting request 735865 from home:pluskalm:branches:network Bernhard Wiedemann 2019-10-07 13:44:24 +00:00
  • cfff7e3b63 Accepting request 733468 from network Dominique Leuenberger 2019-09-26 18:46:49 +00:00
  • 160ccb960e update to 0.4.1.6 * Tolerate systems (including some Linux installations) where madvise MADV_DONTFORK / MADV_DONTDUMP are available at build-time, but not at run time. * Do not include the deprecated <sys/sysctl.h> on Linux * Fix the MAPADDRESS controller command to accept one or more arguments * Always retry v2+v3 single onion service intro and rendezvous circuits with a 3-hop path * Use RFC 2397 data URL scheme to embed an image into tor-exit-notice.html Bernhard Wiedemann 2019-09-19 13:07:11 +00:00
  • cac29e897e Accepting request 725000 from network Dominique Leuenberger 2019-08-22 08:54:02 +00:00
  • a36e03f995 Add fix-test.patch to workaround a LTO-induced test-failure Bernhard Wiedemann 2019-08-21 09:37:55 +00:00
  • 66457c518d Compile without -Werror to build with LTO (boo#1146548) Bernhard Wiedemann 2019-08-21 08:27:35 +00:00
  • e768c2ad23 - update to 0.4.1.5 * Onion service clients now add padding cells at the start of their INTRODUCE and RENDEZVOUS circuits to make it look like Exit traffic * Add a generic publish-subscribe message-passing subsystem * Controller commands are now parsed using a generalized parsing subsystem * Implement authenticated SENDMEs as detailed in proposal 289 * Our node selection algorithm now excludes nodes in linear time * Construct a fast secure pseudorandom number generator for each thread, to use when performance is critical * Consider our directory information to have changed when our list of bridges changes * Do not count previously configured working bridges towards our total of working bridges * When considering upgrading circuits from "waiting for guard" to "open", always ignore circuits that are marked for close * Properly clean up the introduction point map when circuits change purpose * Fix an unreachable bug in which an introduction point could try to send an INTRODUCE_ACK * Clients can now handle unknown status codes from INTRODUCE_ACK cells - Remove upstreamed tor-0.3.5.8-no-ssl-version-warning.patch Bernhard Wiedemann 2019-08-20 15:55:51 +00:00
  • 7d214eab59 Accepting request 718874 from home:mgerstner:branches:network Tomáš Chvátal 2019-07-29 13:13:35 +00:00
  • 861933af11 Accepting request 704260 from network Dominique Leuenberger 2019-05-21 08:40:22 +00:00
  • e75f3e5460 Accepting request 704249 from home:cgiboudeaux:branches:network Tomáš Chvátal 2019-05-20 13:27:07 +00:00
  • dfc3e5a065 Accepting request 702484 from network Dominique Leuenberger 2019-05-13 12:51:57 +00:00
  • 9b5ff7bb33 Accepting request 701964 from home:AndreasStieger:branches:network Lars Vogdt 2019-05-12 12:55:32 +00:00
  • 64209d1ee0 update ssl-version-warning patch Bernhard Wiedemann 2019-04-16 19:39:40 +00:00
  • 4a09736311 - Add tor-0.3.5.8-no-ssl-version-warning.patch (boo#1129411) - Update tor.tmpfiles to use /run instead of /var/run Bernhard Wiedemann 2019-04-15 13:04:44 +00:00
  • af3258b8c2 Accepting request 678960 from network Dominique Leuenberger 2019-02-26 21:20:08 +00:00
  • 90f03c7b41 Add tor-0.3.5.8-nonetwork.patch to fix test failures without network Bernhard Wiedemann 2019-02-25 15:56:30 +00:00
  • 09c7de71ed - tor 0.3.5.8: * CVE-2019-8955 prevent attackers from making tor run out of memory and crash * Allow SOCKS5 with empty username+password * Update geoip and geoip6 to the February 5 2019 Maxmind GeoLite2 Country database * Select guards even if the consensus has expired, as long as the consensus is still reasonably live Bernhard Wiedemann 2019-02-22 15:11:14 +00:00
  • b292986deb Accepting request 663471 from network Dominique Leuenberger 2019-01-10 14:20:49 +00:00
  • f263ca0a0c tor 0.3.4.10 Andreas Stieger 2019-01-07 23:26:14 +00:00
  • d67032f3df tor 0.3.4.10 Andreas Stieger 2019-01-07 23:05:09 +00:00
  • a79210e9a6 Accepting request 646176 from network Dominique Leuenberger 2018-11-06 13:33:57 +00:00
  • 7a1f571b20 Accepting request 646175 from home:AndreasStieger:branches:network Andreas Stieger 2018-11-03 08:51:41 +00:00
  • dec468df3f Accepting request 634782 from network Yuchen Lin 2018-09-15 13:37:26 +00:00
  • 748409109f - tor 0.3.4.8 (boo#1107847): * improvements for running in low-power and embedded environments * preliminary changes for new bandwidth measurement system * refine anti-denial-of-service code Andreas Stieger 2018-09-10 15:54:01 +00:00
  • 035e2fa035 tor 0.3.3.10 Andreas Stieger 2018-09-10 14:00:04 +00:00
  • df98ead8d2 Accepting request 622849 from network Dominique Leuenberger 2018-07-17 07:41:22 +00:00
  • 6d86b43cf0 Accepting request 622848 from home:AndreasStieger:branches:network Andreas Stieger 2018-07-14 18:43:12 +00:00
  • ede30ae52d Accepting request 621774 from network Dominique Leuenberger 2018-07-10 14:16:51 +00:00
  • 8d98642171 tor 0.3.3.8 Andreas Stieger 2018-07-09 19:50:57 +00:00
  • cab7480dd8 Accepting request 616357 from network Yuchen Lin 2018-06-19 09:57:12 +00:00
  • 2cc5e16714 Accepting request 616356 from home:AndreasStieger:branches:network Andreas Stieger 2018-06-12 17:15:02 +00:00
  • 09a80a13a3 Accepting request 612507 from network Dominique Leuenberger 2018-05-29 08:48:18 +00:00
  • 6c647a48b0 tor 0.3.3.6 * Revent DoS via malicious protocol version string (boo#1094283) Andreas Stieger 2018-05-27 11:47:27 +00:00
  • 3bd9692cc4 Accepting request 582239 from network Dominique Leuenberger 2018-03-09 09:37:12 +00:00
  • ef4f6fadc1 tor 0.3.2.10: * CVE-2018-0490: remote crash vulnerability against directory authorities (boo#1083845, TROVE-2018-001) * CVE-2018-0491: remote relay crash (boo#1083846, TROVE-2018-002) * New system for improved resistance to DoS attacks against relays * Various other bug fixes Andreas Stieger 2018-03-03 18:44:29 +00:00
  • 3961ce730e Accepting request 567207 from network Dominique Leuenberger 2018-01-19 10:53:55 +00:00
  • 4c6c6828ae tor 0.3.2.9 Andreas Stieger 2018-01-10 21:38:59 +00:00
  • 3454b72e59 Accepting request 547269 from network Dominique Leuenberger 2017-12-18 07:57:22 +00:00
  • 4f813dee19 Accepting request 547268 from home:AndreasStieger:branches:network Andreas Stieger 2017-12-01 20:45:28 +00:00
  • 1e40111c8e Accepting request 536570 from network Dominique Leuenberger 2017-10-26 16:44:32 +00:00
  • 1ac186439e OBS-URL: https://build.opensuse.org/package/show/network/tor?expand=0&rev=131 Andreas Stieger 2017-10-25 15:09:55 +00:00
  • 9af2c511c5 Accepting request 536568 from home:AndreasStieger:branches:network Andreas Stieger 2017-10-25 15:08:46 +00:00
  • b28fb41c68 Accepting request 527563 from network Dominique Leuenberger 2017-09-21 10:35:12 +00:00
  • 17f17cc5dd update patch Andreas Stieger 2017-09-20 14:44:20 +00:00
  • 35742d30da Accepting request 527118 from home:AndreasStieger:branches:network Andreas Stieger 2017-09-18 19:49:49 +00:00
  • 52e1675249 remove old build dep Andreas Stieger 2017-09-18 18:07:46 +00:00
  • 38100233fa Accepting request 527103 from home:AndreasStieger:branches:network Andreas Stieger 2017-09-18 18:05:31 +00:00
  • 4f275a72ba Accepting request 527084 from home:AndreasStieger:branches:network Andreas Stieger 2017-09-18 17:17:17 +00:00
  • 1c3e6160c4 Accepting request 514239 from network Yuchen Lin 2017-08-04 10:00:15 +00:00
  • f6288e3f17 Accepting request 514229 from home:jloehel:branches:network Andreas Stieger 2017-08-03 15:04:21 +00:00
  • ac7b05b135 Accepting request 507338 from network Dominique Leuenberger 2017-06-30 16:43:17 +00:00
  • 4e627b84f3 Accepting request 507336 from home:AndreasStieger:branches:network Andreas Stieger 2017-06-30 12:02:13 +00:00
  • 3f469139ea Accepting request 502413 from network Dominique Leuenberger 2017-06-09 13:57:36 +00:00
  • b270b34306 cl Andreas Stieger 2017-06-08 18:54:25 +00:00
  • f99663e840 - tor 0.3.0.8 fixing a pair of bugs that would allow an attacker to remotely crash a hidden service with an assertion failure * CVE-2017-0375: remotely triggerable assertion failure when a hidden service handles a malformed BEGIN cell (bsc#1043455) * CVE-2017-0376: remotely triggerable assertion failure caused by receiving a BEGIN_DIR cell on a hidden service rendezvous circuit (bsc#1043456 - further bug fixes: * link handshake fixes when changing x509 certificates * Regenerate link and authentication certificates whenever the key that signs them changes; also, regenerate link certificates whenever the signed key changes * When sending an Ed25519 signing->link certificate in a CERTS cell, send the certificate that matches the x509 certificate that was used on the TLS connection * Stop rejecting v3 hidden service descriptors because their size did not match an old padding rule Andreas Stieger 2017-06-08 18:53:57 +00:00
  • 6db6e94877 Accepting request 500053 from network Dominique Leuenberger 2017-06-01 14:33:43 +00:00
  • be70b5687b fix 32 bit Andreas Stieger 2017-05-31 10:02:10 +00:00
  • 006c210f7f cl Andreas Stieger 2017-05-29 09:00:53 +00:00
  • 698ac54205 - fix build with GCC 7: warning-errors on implicit fallthrough add tor-0.3.0.7-gcc7-fallthrough.patch Andreas Stieger 2017-05-28 21:46:59 +00:00
  • ec34e8fdc3 Accepting request 495128 from network Dominique Leuenberger 2017-05-20 08:13:27 +00:00
  • ef86c3a0be Accepting request 495127 from home:AndreasStieger:branches:network Andreas Stieger 2017-05-16 00:30:36 +00:00
  • d8af910758 Accepting request 491410 from network Dominique Leuenberger 2017-04-28 07:14:13 +00:00
  • 644f1600f1 tor 0.3.0.6 Andreas Stieger 2017-04-27 06:31:04 +00:00
  • bdff6505de Accepting request 461735 from network Dominique Leuenberger 2017-03-03 16:53:41 +00:00
  • 206ff18604 Accepting request 461734 from home:AndreasStieger:branches:network Andreas Stieger 2017-03-01 22:56:21 +00:00
  • 88ad7c1d1a Accepting request 452089 from network Dominique Leuenberger 2017-01-24 09:43:17 +00:00
  • a749a87737 Accepting request 452088 from home:AndreasStieger:branches:network Andreas Stieger 2017-01-24 06:43:22 +00:00
  • cd493a4fd2 Accepting request 448473 from network Ludwig Nussel 2017-01-04 18:39:17 +00:00
  • 6fbe813bbe Accepting request 448380 from home:scarabeus_iv:branches:network Dirk Mueller 2017-01-02 10:49:03 +00:00
  • b88dd00a86 Accepting request 447085 from home:AndreasStieger:branches:network Andreas Stieger 2016-12-19 21:04:18 +00:00
  • ba83fa4b06 Accepting request 447081 from home:AndreasStieger:branches:network Andreas Stieger 2016-12-19 20:36:05 +00:00
  • 864eb8b117 Accepting request 445337 from network Dominique Leuenberger 2016-12-13 18:33:34 +00:00