| Commit message (Collapse) | Author | Age |
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
Monotonic timer test expects sleep(200ms) to take at most 1s. On
loaded systems like hydra, it's possible for such a test to take
longer than 1 second.
Tests expecting sleep(200ms) to take at least 175ms weren't removed,
because load shouldn't cause sleep to be shorter.
|
| |
|
| |
|
|
|
|
| |
https://blog.torproject.org/new-release-0425-also-0417-0406-and-0359
|
|
|
|
| |
https://blog.torproject.org/new-release-tor-0416
|
|\
| |
| |
| |
| |
| |
| |
| |
| |
| | |
There ver very many conflicts, basically all due to
name -> pname+version. Fortunately, almost everything was auto-resolved
by kdiff3, and for now I just fixed up a couple evaluation problems,
as verified by the tarball job. There might be some fallback to these
conflicts, but I believe it should be minimal.
Hydra nixpkgs: ?compare=1538299
|
| |
| |
| |
| | |
https://blog.torproject.org/new-release-tor-0415
|
|/
|
|
|
|
|
|
|
| |
treewide replacement of
stdenv.mkDerivation rec {
name = "*-${version}";
version = "*";
to pname
|
|
|
|
| |
https://gitweb.torproject.org/tor.git/plain/ChangeLog?h=tor-0.4.0.5
|
|
|
|
| |
https://github.com/dgoulet/torsocks/blob/v2.3.0/ChangeLog
|
|
|
|
| |
(thank you, update script!)
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
https://lists.torproject.org/pipermail/tor-announce/2019-January/000171.html
FWIW, in the ChangeLog (in the source, sorry) it mentions:
As a reminder, the Tor 0.3.4 series will be supported until 10 June
2019. Some time between now and then, users should switch to the Tor
0.3.5 series, which will receive long-term support until at least 1
Feb 2022.
So we should consider moving to 0.3.5 "soon" :).
|
|
|
|
|
|
|
|
| |
https://gitweb.torproject.org/tor.git/plain/ChangeLog?h=tor-0.3.4.9
Please confirm the sha256 is correct for a verified tarball,
I'm not setup (or know how offhand but docs look promising)
to do this myself.
|
|\ |
|
| | |
|
|/ |
|
| |
|
| |
|
| |
|
|
|
|
| |
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/tor/versions.
|
| |
|
|
|
|
| |
First stable release in the 0.3.3.x series
|
|
|
|
|
| |
Tested briefly, seems to work okay. The gpg stuff could be better,
however.
|
|
|
|
|
| |
Contains fixes for TROVE-2018-001, TROVE-2018-002, TROVE-2018-003, and
TROVE-2018-004.
|
|
|
|
|
|
|
| |
- Adds next-generation onion services[1]
- Lots of fixes, e.g., for CVE-2017-8821, CVE-2017-8820, CVE-2017-8823,
CVE-2017-8819, CVE-2017-8822, CVE-2017-8822
- Adds new option `NoExec` to disallow exec syscalls
|
|
|
|
|
|
| |
More details in the release mail [1].
[1] https://lists.torproject.org/pipermail/tor-announce/2017-December/000147.html
|
| |
|
|
|
|
|
|
|
|
| |
Quoth the release notes:
> It includes several bugfixes, including a bugfix for a crash issue that
had affected relays under memory pressure. It also adds a new directory
authority, Bastet.
|
| |
|
| |
|
|
|
|
|
| |
Fixes TPROXY on linux, fixes potential DOS on openbsd.
Otherwise mostly minor bugfixes.
|
|
|
|
| |
See https://blog.torproject.org/blog/tor-0309-released-security-update-clients
|
|
|
|
|
|
|
| |
Of particular note are fixes for hidden service crashing bugs
(TROVE-2017-004 and TROVE-2017-005).
See https://blog.torproject.org/blog/tor-0308-released-fix-hidden-services-also-are-02429-02514-02612-0278-02814-and-02911
|
|
|
|
|
| |
Contains a fix for TROVE-2017-002, a remotely triggered crashing bug
affecting tor relays (clients & releases pre 0.3.0 unaffected).
|
|
|
|
|
|
| |
First stable release in the 0.3 series.
https://blog.torproject.org/blog/tor-0306-released-new-series-stable
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This patch restructures the expression and wrapper to minimize Nix store
references captured by the user's state directory.
The previous version would write lots of references to the Nix store into
the user's state directory, resulting in synchronization issues between
the Store and the local state directory. At best, this would cause TBB to
stop working when the version used to instantiate the local state was
garbage collected; at worst, a user would continue to use the old version
even after an upgrade.
To solve the issue, hard-code as much as possible at the Store side and
minimize the amount of stuff being copied into the local state dir.
Currently, only a few files generated at firefox startup and fontconfig
cache files end up capturing store paths; these files are simply removed
upon every startup. Otherwise, no capture should occur and the user
should always be using the TBB associated with the tor-browser wrapper
script.
To check for stale Store paths, do
`grep -Ero '/nix/store/[^/]+' ~/.local/share/tor-browser`
This command should *never* return any other store path than the one
associated with the current tor-browser wrapper script, even after an
update (assuming you've run tor-browser at least once after updating).
Deviations from this general rule are considered bugs from now on.
Note that no attempt has been made to support pluggable transports; they
are still broken with this patch (to be fixed in a follow-up patch).
User visible changes:
- Wrapper retains only environment variables required for TBB to work
- pulseaudioSupport can be toggled independently of mediaSupport (the
latter weakly implies the former).
- Store local state under $TBB_HOME. Defaults to $XDG_DATA_HOME/tor-browser
- Stop obnoxious first-run stuff (NoScript redirect, in particular)
- Set desktop item GenericName to Web Browser
Some minor enhancements:
- Disable Hydra builds
- Specify system -> source mapping to make it easier to
extend supported platforms.
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
Saves about 5.2 MiB.
To use geoip, add something like
```
GeoIPFile ${tor.geoip}/share/tor/geoip
GeoIPv6File ${tor.geoip}/share/tor/geoip6
```
to torrc
|
|
|
|
|
|
|
|
|
|
|
|
| |
The 0.2.9 series is now a long-term support release, which will
receive backported security fixes until at least 2020.
tor should now build against libressl, as in
```nix
tor.override { openssl = libressl; }
```
Also re-enable the test-suite; works fine on my end.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
This feature might not be appropriate for all users, leave it off by
default.
See 96be6a11a85e9e253cf733e57ce7c67fd1a3b81c
|
|
|
|
|
|
|
| |
I used nix-prefetch-url to generate the hashes, so of course this
mistake slipped by ...
Ref: 5bbe54272de8689f7bdb2071d528e5d961edadda
|
|
|
|
|
|
|
| |
Updates to firefox-esr 45.7, which fixes several critical
vulnerabilities [1]
[1]: https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
|