Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

tor-0.4.8.12-4.1 RPM for riscv64

From OpenSuSE Ports Tumbleweed for riscv64

Name: tor Distribution: openSUSE Tumbleweed
Version: 0.4.8.12 Vendor: openSUSE
Release: 4.1 Build date: Tue Jun 11 12:05:46 2024
Group: Unspecified Build host: reproducible
Size: 24444375 Source RPM: tor-0.4.8.12-4.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://www.torproject.org/
Summary: Anonymizing overlay network for TCP (The onion router)
Tor is a connection-based low-latency anonymous communication system.

This package provides the "tor" program, which serves as both a client and
a relay node. Scripts will automatically create a "tor" user and
a "tor" group, and set tor up to run as a daemon when the system
is rebooted.

Applications connect to the local Tor proxy using the SOCKS
protocol. The tor client chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.

Warnings: Tor does no protocol cleaning.  That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy or
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.

Provides

Requires

License

BSD-3-Clause

Changelog

* Tue Jun 11 2024 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.8.12
    * Minor features and bugfixes
    * See https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes
* Thu Apr 11 2024 Bernhard Wiedemann <bwiedemann@suse.de>
  - tor 0.4.8.11
    * Minor features and bugfixes
    * See https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes
* Wed Feb 14 2024 Martin Pluskal <mpluskal@suse.com>
  - Enables scrypt support unconditionally
* Mon Feb 05 2024 Andreas Stieger <andreas.stieger@gmx.de>
  - fix users/groups with rpm 4.19
* Fri Dec 08 2023 Bernhard Wiedemann <bwiedemann@suse.de>
  - tor 0.4.8.10:
    * (TROVE-2023-007, exit) (boo#1217918)
    - fix a a UAF and NULL pointer dereference crash on Exit relays
* Thu Nov 09 2023 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.8.9:
    * (onion service, TROVE-2023-006):
    - Fix a possible hard assert on a NULL pointer
    * (guard usage):
    - When Tor excluded a guard due to temporary circuit restrictions,
      it considered *additional* primary guards for potential usage by
      that circuit.
* Fri Nov 03 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.8:
    * Mitigate an issue when Tor compiled with OpenSSL can crash during
      handshake with a remote relay. (TROVE-2023-004, boo#1216873)
    * Regenerate fallback directories generated on November 03, 2023.
    * Update the geoip files to match the IPFire Location Database, as
      retrieved on 2023/11/03
    * directory authority: Look at the network parameter
      "maxunmeasuredbw" with the correct spelling
    * vanguards addon support: Count the conflux linked cell as
      valid when it is successfully processed. This will quiet a
      spurious warn in the vanguards addon
* Mon Sep 25 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.7:
    * Fix an issue that prevented us from pre-building more conflux
      sets after existing sets had been used
* Tue Sep 19 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.6:
    * onion service: Fix a reliability issue where services were
      expiring their introduction points every consensus update.
      This caused connectivity issues for clients caching the old
      descriptor and intro points
    * Log the input and output buffer sizes when we detect a potential
      compression bomb
    * Disable multiple BUG warnings of a missing relay identity key when
      starting an instance of Tor compiled without relay support
    * When reporting a pseudo-networkstatus as a bridge authority, or
      answering "ns/purpose/*" controller requests, include accurate
      published-on dates from our list of router descriptors
    * Use less frightening language and lower the log-level of our
      run-time ABI compatibility check message in our Zstd
      compression subsystem
* Wed Aug 30 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.5:
    * bugfixes creating log BUG stacktrace
* Sun Aug 27 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.4:
    * Extend DoS protection to partially opened channels and known
      relays
    * Dynamic Proof-Of-Work protocol to thwart flooding DoS attacks
      against hidden services. Disabled by default, enable via
      "HiddenServicePoW" in torrc
    * Implement conflux traffic splitting
    * Directory authorities and relays now interact properly with
      directory authorities if they change addresses
* Sun Jul 30 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.14:
    * bugfix affecting vanguards (onion service), and minor fixes
* Fri Mar 10 2023 Martin Pluskal <mpluskal@suse.com>
  - Enable support for scrypt()
* Fri Jan 13 2023 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.7.13:
    * fix SafeSocks option to avoid DNS leaks (boo#1207110, TROVE-2022-002)
    * improve congestion control
    * fix relay channel handling
* Tue Dec 06 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.12:
    * new key for moria1
    * new metrics are exported on the MetricsPort for the congestion
      control subsystem
* Thu Nov 10 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.11:
    * Improve security of DNS cache by randomly clipping the TTL
      value (boo#1205307, TROVE-2021-009)
    * Improved defenses against network-wide DoS, multiple counters
      and metrics added to MetricsPorts
    * Apply circuit creation anti-DoS defenses if the outbound
      circuit max cell queue size is reached too many times. This
      introduces two new consensus parameters to control the queue
      size limit and number of times allowed to go over that limit.
    * Directory authority updates
    * IPFire database and geoip updates
    * Bump the maximum amount of CPU that can be used from 16 to 128.
      The NumCPUs torrc option overrides this hardcoded maximum.
    * onion service: set a higher circuit build timeout for opened
      client rendezvous circuit to avoid timeouts and retry load
    * Make the service retry a rendezvous if the circuit is being
      repurposed for measurements
* Fri Aug 12 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.10
    * IPFire location database did not have proper ARIN network
      allocations - affected circuit path selection and relay metrics
* Thu Aug 11 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.9 (boo#1202336)
    * major fixes aimed at reducing memory pressure on relays
    * prevent a possible side-channel
    * major bugfix related to congestion control
    * major bugfix related to Vanguard L2 layer node selection
* Thu Jun 16 2022 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.7.8
    * Fix a scenario where RTT estimation can become wedged, seriously
      degrading congestion control performance on all circuits. This
      impacts clients, onion services, and relays, and can be triggered
      remotely by a malicious endpoint.
      (TROVE-2022-001, CVE-2022-33903, boo#1200672)
    * Regenerate fallback directories generated on June 17, 2022.
    * Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/06/17.
    * Allow the rseq system call in the sandbox
    * logging bug fixes
* Wed Apr 27 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.7
    * New feature: Congestion control to improve traffic speed and
      stability on the network once a majority of Exit nodes upgrade
      boo#1198949
    * Directory authorities: improved handling of "MiddleOnly" relays
    * Improved mitigation against guard discovery attacks on clients
      and short-lived services
    * Improve observed performance under DNS load
    * Improve handling of overload state
    * end-of-life relays running version 0.4.2.x, 0.4.3.x,
      0.4.4.x and 0.4.5 alphas/rc, 0.3.5.x are now rejected
    * Onion service v2 addresses are no longer recognized
* Sun Feb 06 2022 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.6.10
    * minor bugfixes and features
    * https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.6/ReleaseNotes
* Fri Dec 17 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.6.9:
    * remove the DNS timeout metric from the overload general signal
    * regenerate fallback directories generated on December 15, 2021
    * Update the geoip files to match the IPFire Location Database,
      as retrieved on 2021/12/15
    * Reject IPv6-only DirPort
* Sat Nov 13 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.6.8:
    * Improving reporting of general overload state for DNS timeout
      errors by relays
    * Regenerate fallback directories for October 2021
    * Bug fixes for onion services
    * CVE-2021-22929: do not log v2 onion services access attempt
      warnings on disk excessively (TROVE-2021-008, boo#1192658)
* Tue Aug 24 2021 Jan Engelhardt <jengelh@inai.de>
  - Reduce boilerplate generated by %service_*.
* Tue Aug 17 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.6.7:
    * Fix a DoS via a remotely triggerable assertion failure
      (boo#1189489, TROVE-2021-007, CVE-2021-38385)
* Tue Jul 06 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - Add missing service_add_pre tor-master.service
* Thu Jul 01 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.6.6:
    * Fix a compilation error with gcc 7, drop tor-0.4.6.5-gcc7.patch
    * Enable the deterministic RNG for unit tests that covers the
      address set bloomfilter-based API's
* Wed Jun 16 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.6.5
    * Add controller support for creating v3 onion services with
      client auth
    * When voting on a relay with a Sybil-like appearance, add the
      Sybil flag when clearing out the other flags. This lets a relay
      operator know why their relay hasn't been included in the
      consensus
    * Relays now report how overloaded they are
    * Add a new DoS subsystem to control the rate of client
      connections for relays
    * Relays now publish statistics about v3 onions services
    * Improve circuit timeout algorithm for client performance
  - add tor-0.4.6.5-gcc7.patch to fix build with gcc7
* Mon Jun 14 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.5.9
    * Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322)
    * Detect more failure conditions from the OpenSSL RNG code (boo#1187323)
    * Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324)
    * Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)
* Tue May 11 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.5.8
    * https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html
    * allow Linux sandbox with Glibc 2.33
    * work with autoconf 2.70+
    * several other minor features and bugfixes (see announcement)
* Sat Apr 24 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - fix packaging warnings related to tor-master service
* Fri Apr 23 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - Fix logging issue due to systemd picking up stdout - boo#1181244
    Continue to log notices to syslog by default.
  - actually build with lzma/zstd
  - skip i586 tests (boo#1179331)
* Tue Mar 16 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.5.7
    * https://lists.torproject.org/pipermail/tor-announce/2021-March/000216.html
    * Fix 2 denial of service security issues (boo#1183726)
      + Disable the dump_desc() function that we used to dump unparseable
      information to disk (CVE-2021-28089)
      + Fix a bug in appending detached signatures to a pending consensus
      document that could be used to crash a directory authority
      (CVE-2021-28090)
    * Ship geoip files based on the IPFire Location Database
* Tue Feb 16 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.5.6
    * https://lists.torproject.org/pipermail/tor-announce/2021-February/000214.html
    * Introduce a new MetricsPort HTTP interface
    * Support IPv6 in the torrc Address option
    * Add event-tracing library support for USDT and LTTng-UST
    * Try to read N of N bytes on a TLS connection
  - Drop upstream tor-practracker.patch
* Fri Feb 05 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.4.7
    * https://blog.torproject.org/node/1990
    * Stop requiring a live consensus for v3 clients and services
    * Re-entry into the network is now denied at the Exit level
    * Fix undefined behavior on our Keccak library
    * Strip '\r' characters when reading text files on Unix platforms
    * Handle partial SOCKS5 messages correctly
  - Add tor-practracker.patch to fix tests
* Wed Jan 27 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - Restrict service permissions with systemd

Files

/etc/logrotate.d/tor
/etc/tor
/etc/tor/torrc
/etc/tor/torrc.minimal
/etc/tor/torrc.sample
/usr/bin/tor
/usr/bin/tor-gencert
/usr/bin/tor-print-ed-signing-cert
/usr/bin/tor-resolve
/usr/bin/torify
/usr/lib/systemd/system/tor-master.service
/usr/lib/systemd/system/tor.service
/usr/lib/tmpfiles.d/tor.conf
/usr/sbin/rctor
/usr/sbin/rctor-master
/usr/share/doc/packages/tor
/usr/share/doc/packages/tor/ChangeLog
/usr/share/doc/packages/tor/HACKING
/usr/share/doc/packages/tor/HACKING/CodingStandards.md
/usr/share/doc/packages/tor/HACKING/Fuzzing.md
/usr/share/doc/packages/tor/HACKING/GettingStarted.md
/usr/share/doc/packages/tor/HACKING/HelpfulTools.md
/usr/share/doc/packages/tor/HACKING/HowToReview.md
/usr/share/doc/packages/tor/HACKING/Module.md
/usr/share/doc/packages/tor/HACKING/README.1st.md
/usr/share/doc/packages/tor/HACKING/ReleasingTor.md
/usr/share/doc/packages/tor/HACKING/WritingTests.md
/usr/share/doc/packages/tor/HACKING/tracing
/usr/share/doc/packages/tor/HACKING/tracing/EventsCircuit.md
/usr/share/doc/packages/tor/HACKING/tracing/README.md
/usr/share/doc/packages/tor/README.md
/usr/share/doc/packages/tor/tor-gencert.html
/usr/share/doc/packages/tor/tor-print-ed-signing-cert.html
/usr/share/doc/packages/tor/tor-resolve.html
/usr/share/doc/packages/tor/tor.html
/usr/share/doc/packages/tor/torify.html
/usr/share/licenses/tor
/usr/share/licenses/tor/LICENSE
/usr/share/man/man1/tor-gencert.1.gz
/usr/share/man/man1/tor-print-ed-signing-cert.1.gz
/usr/share/man/man1/tor-resolve.1.gz
/usr/share/man/man1/tor.1.gz
/usr/share/man/man1/torify.1.gz
/usr/share/tor
/usr/share/tor/defaults-torrc
/usr/share/tor/geoip
/usr/share/tor/geoip6
/var/lib/tor
/var/log/tor


Generated by rpm2html 1.8.1

Fabrice Bellet, Wed Nov 13 00:41:02 2024