Date: Sun, 28 Oct 2007 00:59:32 GMT From: bf <bf2006a@yahoo.com> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/117582: [PATCH]security/tor-devel: update to 0.2.0.9-alpha Message-ID: <200710280059.l9S0xWJ6092066@www.freebsd.org> Resent-Message-ID: <200710280110.l9S1A1GX047212@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 117582 >Category: ports >Synopsis: [PATCH]security/tor-devel: update to 0.2.0.9-alpha >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Sun Oct 28 01:10:01 UTC 2007 >Closed-Date: >Last-Modified: >Originator: bf >Release: 6.2-stable i386 >Organization: >Environment: >Description: Changes in version 0.2.0.9-alpha - 2007-10-?? o Major bugfixes: - Stop publishing a new server descriptor just because we HUP or when we find our DirPort to be reachable but won't actually publish it. Extra descriptors without any real changes are dropped by the authorities, and can screw up our "publish every 18 hours" schedule. o Minor features (router descriptor cache): - If we find a cached-routers file that's been sitting around for more than 28 days unmodified, then most likely it's a leftover from when we upgraded to 0.2.0.8-alpha. Remove it. It has no good routers anyway. o Minor bugfixes (directory authorities): - Correct the implementation of "download votes by digest." Bugfix on 0.2.0.8-alpha. - Make the "next period" votes into "current period" votes immediately after publishing the consensus; avoid a heisenbug that made them stick around indefinitely. o Minor bugfixes (memory leaks): - Stop leaking memory on failing case of base32_decode. Bugfix on 0.2.0.7-alpha. o Minor bugfixes (misc): - Make base32_decode() accept upper-case letters. Bugfix on 0.2.0.7-alpha. o Code simplifications and refactoring: - Remove support for the old bw_accounting file: we've been storing bandwidth accounting information in the state file since 0.1.2.5-alpha. This may result in bandwidth accounting errors if you try to upgrade from 0.1.1.x or earlier, or if you try to downgrade to 0.1.1.x or earlier. The following patch includes a dependency on a version of libevent that supersedes the version that is currently in the ports system. If this tor-devel update is approved, and committed before a libevent update, change the libevent library version back to 1.3d: diff -ruN tor-devel.orig/Makefile tor-devel/Makefile --- tor-devel.orig/Makefile Sat Oct 27 17:16:58 2007 +++ tor-devel/Makefile Sat Oct 27 17:41:23 2007 @@ -6,7 +6,7 @@ # PORTNAME= tor -DISTVERSION= 0.2.0.8-alpha +DISTVERSION= 0.2.0.9-alpha CATEGORIES= security net MASTER_SITES= http://www.torproject.org/dist/ \ http://mirror.onionland.org/dist/ @@ -16,7 +16,7 @@ COMMENT= An anonymizing overlay network for TCP RUN_DEPENDS= tsocks:${PORTSDIR}/net/tsocks -LIB_DEPENDS= event-1.3d:${PORTSDIR}/devel/libevent +LIB_DEPENDS= event-1.3e:${PORTSDIR}/devel/libevent GNU_CONFIGURE= yes USE_OPENSSL= yes diff -ruN tor-devel.orig/distinfo tor-devel/distinfo --- tor-devel.orig/distinfo Sat Oct 27 17:16:58 2007 +++ tor-devel/distinfo Sat Oct 27 17:41:23 2007 @@ -1,3 +1,3 @@ -MD5 (tor-0.2.0.8-alpha.tar.gz) = ca6c6e5fd822edc3df2e3da1dd71a77a -SHA256 (tor-0.2.0.8-alpha.tar.gz) = 0022e90f98f009dd74cf0cca8b6714c5d3188126c55e74ad7a03fb36c59adeca -SIZE (tor-0.2.0.8-alpha.tar.gz) = 1413544 +MD5 (tor-0.2.0.9-alpha.tar.gz) = 47523575d2f6b857c453f37fbd4fca10 +SHA256 (tor-0.2.0.9-alpha.tar.gz) = 8a01244b0bebe7b80f8ddbcc2cd3aaac19e4109c908066b16a8b04aa05730e15 +SIZE (tor-0.2.0.9-alpha.tar.gz) = 1428524 >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200710280059.l9S0xWJ6092066>