Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

tor-0.4.8.10-1.1 RPM for s390x

From OpenSuSE Ports Tumbleweed for s390x

Name: tor Distribution: openSUSE:Factory:zSystems
Version: 0.4.8.10 Vendor: openSUSE
Release: 1.1 Build date: Tue Dec 12 04:59:43 2023
Group: Unspecified Build host: s390zl28
Size: 18869781 Source RPM: tor-0.4.8.10-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://www.torproject.org/
Summary: Anonymizing overlay network for TCP (The onion router)
Tor is a connection-based low-latency anonymous communication system.

This package provides the "tor" program, which serves as both a client and
a relay node. Scripts will automatically create a "tor" user and
a "tor" group, and set tor up to run as a daemon when the system
is rebooted.

Applications connect to the local Tor proxy using the SOCKS
protocol. The tor client chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.

Warnings: Tor does no protocol cleaning.  That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy or
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.

Provides

Requires

License

BSD-3-Clause

Changelog

* Fri Dec 08 2023 Bernhard Wiedemann <bwiedemann@suse.de>
  - tor 0.4.8.10:
    * (TROVE-2023-007, exit) (boo#1217918)
    - fix a a UAF and NULL pointer dereference crash on Exit relays
* Thu Nov 09 2023 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.8.9:
    * (onion service, TROVE-2023-006):
    - Fix a possible hard assert on a NULL pointer
    * (guard usage):
    - When Tor excluded a guard due to temporary circuit restrictions,
      it considered *additional* primary guards for potential usage by
      that circuit.
* Fri Nov 03 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.8:
    * Mitigate an issue when Tor compiled with OpenSSL can crash during
      handshake with a remote relay. (TROVE-2023-004, boo#1216873)
    * Regenerate fallback directories generated on November 03, 2023.
    * Update the geoip files to match the IPFire Location Database, as
      retrieved on 2023/11/03
    * directory authority: Look at the network parameter
      "maxunmeasuredbw" with the correct spelling
    * vanguards addon support: Count the conflux linked cell as
      valid when it is successfully processed. This will quiet a
      spurious warn in the vanguards addon
* Mon Sep 25 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.7:
    * Fix an issue that prevented us from pre-building more conflux
      sets after existing sets had been used
* Tue Sep 19 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.6:
    * onion service: Fix a reliability issue where services were
      expiring their introduction points every consensus update.
      This caused connectivity issues for clients caching the old
      descriptor and intro points
    * Log the input and output buffer sizes when we detect a potential
      compression bomb
    * Disable multiple BUG warnings of a missing relay identity key when
      starting an instance of Tor compiled without relay support
    * When reporting a pseudo-networkstatus as a bridge authority, or
      answering "ns/purpose/*" controller requests, include accurate
      published-on dates from our list of router descriptors
    * Use less frightening language and lower the log-level of our
      run-time ABI compatibility check message in our Zstd
      compression subsystem
* Wed Aug 30 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.5:
    * bugfixes creating log BUG stacktrace
* Sun Aug 27 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.8.4:
    * Extend DoS protection to partially opened channels and known
      relays
    * Dynamic Proof-Of-Work protocol to thwart flooding DoS attacks
      against hidden services. Disabled by default, enable via
      "HiddenServicePoW" in torrc
    * Implement conflux traffic splitting
    * Directory authorities and relays now interact properly with
      directory authorities if they change addresses
* Sun Jul 30 2023 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.14:
    * bugfix affecting vanguards (onion service), and minor fixes
* Fri Mar 10 2023 Martin Pluskal <mpluskal@suse.com>
  - Enable support for scrypt()
* Fri Jan 13 2023 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.7.13:
    * fix SafeSocks option to avoid DNS leaks (boo#1207110, TROVE-2022-002)
    * improve congestion control
    * fix relay channel handling
* Tue Dec 06 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.12:
    * new key for moria1
    * new metrics are exported on the MetricsPort for the congestion
      control subsystem
* Thu Nov 10 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.11:
    * Improve security of DNS cache by randomly clipping the TTL
      value (boo#1205307, TROVE-2021-009)
    * Improved defenses against network-wide DoS, multiple counters
      and metrics added to MetricsPorts
    * Apply circuit creation anti-DoS defenses if the outbound
      circuit max cell queue size is reached too many times. This
      introduces two new consensus parameters to control the queue
      size limit and number of times allowed to go over that limit.
    * Directory authority updates
    * IPFire database and geoip updates
    * Bump the maximum amount of CPU that can be used from 16 to 128.
      The NumCPUs torrc option overrides this hardcoded maximum.
    * onion service: set a higher circuit build timeout for opened
      client rendezvous circuit to avoid timeouts and retry load
    * Make the service retry a rendezvous if the circuit is being
      repurposed for measurements
* Fri Aug 12 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.10
    * IPFire location database did not have proper ARIN network
      allocations - affected circuit path selection and relay metrics
* Thu Aug 11 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.9 (boo#1202336)
    * major fixes aimed at reducing memory pressure on relays
    * prevent a possible side-channel
    * major bugfix related to congestion control
    * major bugfix related to Vanguard L2 layer node selection
* Thu Jun 16 2022 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.7.8
    * Fix a scenario where RTT estimation can become wedged, seriously
      degrading congestion control performance on all circuits. This
      impacts clients, onion services, and relays, and can be triggered
      remotely by a malicious endpoint.
      (TROVE-2022-001, CVE-2022-33903, boo#1200672)
    * Regenerate fallback directories generated on June 17, 2022.
    * Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/06/17.
    * Allow the rseq system call in the sandbox
    * logging bug fixes
* Wed Apr 27 2022 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.7.7
    * New feature: Congestion control to improve traffic speed and
      stability on the network once a majority of Exit nodes upgrade
      boo#1198949
    * Directory authorities: improved handling of "MiddleOnly" relays
    * Improved mitigation against guard discovery attacks on clients
      and short-lived services
    * Improve observed performance under DNS load
    * Improve handling of overload state
    * end-of-life relays running version 0.4.2.x, 0.4.3.x,
      0.4.4.x and 0.4.5 alphas/rc, 0.3.5.x are now rejected
    * Onion service v2 addresses are no longer recognized
* Sun Feb 06 2022 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.6.10
    * minor bugfixes and features
    * https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.6/ReleaseNotes
* Fri Dec 17 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.6.9:
    * remove the DNS timeout metric from the overload general signal
    * regenerate fallback directories generated on December 15, 2021
    * Update the geoip files to match the IPFire Location Database,
      as retrieved on 2021/12/15
    * Reject IPv6-only DirPort
* Sat Nov 13 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.6.8:
    * Improving reporting of general overload state for DNS timeout
      errors by relays
    * Regenerate fallback directories for October 2021
    * Bug fixes for onion services
    * CVE-2021-22929: do not log v2 onion services access attempt
      warnings on disk excessively (TROVE-2021-008, boo#1192658)
* Tue Aug 24 2021 Jan Engelhardt <jengelh@inai.de>
  - Reduce boilerplate generated by %service_*.
* Tue Aug 17 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.6.7:
    * Fix a DoS via a remotely triggerable assertion failure
      (boo#1189489, TROVE-2021-007, CVE-2021-38385)
* Tue Jul 06 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - Add missing service_add_pre tor-master.service
* Thu Jul 01 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.6.6:
    * Fix a compilation error with gcc 7, drop tor-0.4.6.5-gcc7.patch
    * Enable the deterministic RNG for unit tests that covers the
      address set bloomfilter-based API's
* Wed Jun 16 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.6.5
    * Add controller support for creating v3 onion services with
      client auth
    * When voting on a relay with a Sybil-like appearance, add the
      Sybil flag when clearing out the other flags. This lets a relay
      operator know why their relay hasn't been included in the
      consensus
    * Relays now report how overloaded they are
    * Add a new DoS subsystem to control the rate of client
      connections for relays
    * Relays now publish statistics about v3 onions services
    * Improve circuit timeout algorithm for client performance
  - add tor-0.4.6.5-gcc7.patch to fix build with gcc7
* Mon Jun 14 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.5.9
    * Don't allow relays to spoof RELAY_END or RELAY_RESOLVED cell (CVE-2021-34548, boo#1187322)
    * Detect more failure conditions from the OpenSSL RNG code (boo#1187323)
    * Resist a hashtable-based CPU denial-of-service attack against relays (CVE-2021-34549, boo#1187324)
    * Fix an out-of-bounds memory access in v3 onion service descriptor parsing (CVE-2021-34550, boo#1187325)
* Tue May 11 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.5.8
    * https://lists.torproject.org/pipermail/tor-announce/2021-May/000219.html
    * allow Linux sandbox with Glibc 2.33
    * work with autoconf 2.70+
    * several other minor features and bugfixes (see announcement)
* Sat Apr 24 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - fix packaging warnings related to tor-master service
* Fri Apr 23 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - Fix logging issue due to systemd picking up stdout - boo#1181244
    Continue to log notices to syslog by default.
  - actually build with lzma/zstd
  - skip i586 tests (boo#1179331)
* Tue Mar 16 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.5.7
    * https://lists.torproject.org/pipermail/tor-announce/2021-March/000216.html
    * Fix 2 denial of service security issues (boo#1183726)
      + Disable the dump_desc() function that we used to dump unparseable
      information to disk (CVE-2021-28089)
      + Fix a bug in appending detached signatures to a pending consensus
      document that could be used to crash a directory authority
      (CVE-2021-28090)
    * Ship geoip files based on the IPFire Location Database
* Tue Feb 16 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.5.6
    * https://lists.torproject.org/pipermail/tor-announce/2021-February/000214.html
    * Introduce a new MetricsPort HTTP interface
    * Support IPv6 in the torrc Address option
    * Add event-tracing library support for USDT and LTTng-UST
    * Try to read N of N bytes on a TLS connection
  - Drop upstream tor-practracker.patch
* Fri Feb 05 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.4.7
    * https://blog.torproject.org/node/1990
    * Stop requiring a live consensus for v3 clients and services
    * Re-entry into the network is now denied at the Exit level
    * Fix undefined behavior on our Keccak library
    * Strip '\r' characters when reading text files on Unix platforms
    * Handle partial SOCKS5 messages correctly
  - Add tor-practracker.patch to fix tests
* Wed Jan 27 2021 Bernhard Wiedemann <bwiedemann@suse.com>
  - Restrict service permissions with systemd
* Thu Nov 12 2020 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.4.6
    * Check channels+circuits on relays more thoroughly
      (TROVE-2020-005, boo#1178741)
* Tue Sep 15 2020 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.4.5
    * Improve guard selection
    * IPv6 improvements
* Wed Aug 19 2020 Dominique Leuenberger <dimstar@opensuse.org>
  - Use %{_tmpfilesdir} instead of abusing %{_libexecdir}/tmpfiles.d.
* Thu Jul 09 2020 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.3.6
    * Fix a crash due to an out-of-bound memory access (CVE-2020-15572)
    * Some minor fixes
* Mon Jun 29 2020 Bernhard Wiedemann <bwiedemann@suse.com>
  - Fix logrotate to not fail when tor is stopped (boo#1164275)
* Fri May 15 2020 Andreas Stieger <andreas.stieger@gmx.de>
  - tor 0.4.3.5:
    * first stable release in the 0.4.3.x series
    * implement functionality needed for OnionBalance with v3 onion
      services
    * significant refactoring of our configuration and controller
      functionality
    * Add support for banning a relay's ed25519 keys in the
      approved-routers file in support for migrating away from RSA
    * support OR connections through a HAProxy server
* Wed Mar 18 2020 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.2.7
    * CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013)
    * CVE-2020-10593: circuit padding memory leak (boo#1167014)
    * Directory authorities now signal bandwidth pressure to clients
    * Avoid excess logging on bug when flushing a buffer to a TLS connection
* Fri Jan 31 2020 Bernhard Wiedemann <bwiedemann@suse.com>
  - tor 0.4.2.6
    * Correct how we use libseccomp
    * Fix crash when reloading logging configuration while the
      experimental sandbox is enabled
    * Avoid a possible crash when logging an assertion
      about mismatched magic numbers
* Tue Jan 07 2020 Bernhard Wiedemann <bwiedemann@suse.com>
  - Update tor.service and add defaults-torrc
    to work without dropped torctl (boo#1072274)
  - Add tor-master.service to allow handling multiple tor daemons

Files

/etc/logrotate.d/tor
/etc/tor
/etc/tor/torrc
/etc/tor/torrc.minimal
/etc/tor/torrc.sample
/usr/bin/tor
/usr/bin/tor-gencert
/usr/bin/tor-print-ed-signing-cert
/usr/bin/tor-resolve
/usr/bin/torify
/usr/lib/systemd/system/tor-master.service
/usr/lib/systemd/system/tor.service
/usr/lib/tmpfiles.d/tor.conf
/usr/sbin/rctor
/usr/sbin/rctor-master
/usr/share/doc/packages/tor
/usr/share/doc/packages/tor/ChangeLog
/usr/share/doc/packages/tor/HACKING
/usr/share/doc/packages/tor/HACKING/CodingStandards.md
/usr/share/doc/packages/tor/HACKING/Fuzzing.md
/usr/share/doc/packages/tor/HACKING/GettingStarted.md
/usr/share/doc/packages/tor/HACKING/HelpfulTools.md
/usr/share/doc/packages/tor/HACKING/HowToReview.md
/usr/share/doc/packages/tor/HACKING/Module.md
/usr/share/doc/packages/tor/HACKING/README.1st.md
/usr/share/doc/packages/tor/HACKING/ReleasingTor.md
/usr/share/doc/packages/tor/HACKING/WritingTests.md
/usr/share/doc/packages/tor/HACKING/tracing
/usr/share/doc/packages/tor/HACKING/tracing/EventsCircuit.md
/usr/share/doc/packages/tor/HACKING/tracing/README.md
/usr/share/doc/packages/tor/README.md
/usr/share/doc/packages/tor/tor-gencert.html
/usr/share/doc/packages/tor/tor-print-ed-signing-cert.html
/usr/share/doc/packages/tor/tor-resolve.html
/usr/share/doc/packages/tor/tor.html
/usr/share/doc/packages/tor/torify.html
/usr/share/licenses/tor
/usr/share/licenses/tor/LICENSE
/usr/share/man/man1/tor-gencert.1.gz
/usr/share/man/man1/tor-print-ed-signing-cert.1.gz
/usr/share/man/man1/tor-resolve.1.gz
/usr/share/man/man1/tor.1.gz
/usr/share/man/man1/torify.1.gz
/usr/share/tor
/usr/share/tor/defaults-torrc
/usr/share/tor/geoip
/usr/share/tor/geoip6
/var/lib/tor
/var/log/tor


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 9 12:50:11 2024