Commit Graph

84 Commits

Author SHA1 Message Date
Rui Salvaterra 570ee10a13 tor: update to 0.4.8.11 stable
Minor release, see the changelog [1] for what's new.

[1] https://gitlab.torproject.org/tpo/core/tor/-/raw/tor-0.4.8.11/ChangeLog

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2024-04-16 09:28:27 +01:00
Rui Salvaterra ee8b29de2c tor: update to 0.4.8.10 stable
Bugfix release, see the changelog [1] for what's new.

[1] https://gitlab.torproject.org/tpo/core/tor/-/raw/tor-0.4.8.10/ChangeLog

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2024-03-31 18:46:18 +01:00
Fabrice Fontaine 63c942cedb net/tor: add license
tor is licensed under BSD-3-Clause

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
2024-01-31 16:01:07 -08:00
Rui Salvaterra 5cb304e2b3 tor: update to 0.4.8.7 stable
Bugfix release, see the changelog [1] for what's new.

[1] https://gitlab.torproject.org/tpo/core/tor/-/raw/tor-0.4.8.7/ChangeLog

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2023-10-26 19:43:59 +01:00
ValdikSS ValdikSS af58942738 tor: fix daemon reloading
procd requires init script name, not the path to executable

Signed-off-by: ValdikSS ValdikSS <iam@valdikss.org.ru>
2023-10-22 22:57:49 +02:00
Rui Salvaterra 1b2c1ddbb2 tor: update to 0.4.8.4 stable
First release of the 0.4.8.x series, see the changelog [1] for what's new.

[1] https://gitlab.torproject.org/tpo/core/tor/-/raw/tor-0.4.8.4/ChangeLog

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2023-09-03 01:14:29 +02:00
Andre Heider e7d9c86503 treewide: refactor to use PKG_BUILD_FLAGS:=lto
See commit 07730ff3 "treewide: add support for "lto" in PKG_BUILD_FLAGS"
on the main repository.

Note: Some packages only added `-flto` to CFLAGS and not LDFLAGS. This
fixes it and properly enables LTO.

Signed-off-by: Andre Heider <a.heider@gmail.com>
2023-04-08 08:38:54 +02:00
Andre Heider 35f4ef76e0 treewide: refactor to use PKG_BUILD_FLAGS:=gc-sections
See commit da370098 "treewide: add support for "gc-sections" in
PKG_BUILD_FLAGS" on the main repository.

Note: This only touches packages which use all three parts
(-ffunction-sections, -fdata-sections and -Wl,--gc-sections) enabled by
this build flag. Some packages only use a subset, and these are left
unchanged for now.

Signed-off-by: Andre Heider <a.heider@gmail.com>
2023-04-08 08:38:54 +02:00
Daniel Bermond 5f0a9ec722 tor: update to version 0.4.7.13
Maintainers  : @hauke (Hauke Mehrtens) and @tripolar (Peter Wagner)
Build system : Arch Linux x86_64
Build tested : r7800 OpenWrt git master (r22104-01262c921c)
Run tested   : r7800 OpenWrt git master (r22104-01262c921c)

Signed-off-by: Daniel Bermond <danielbermond@gmail.com>
2023-02-24 16:08:02 -08:00
Rui Salvaterra 3fd37a234c tor: bump to 0.4.7.12 stable
Quoting the changelog:

Changes in version 0.4.7.12 - 2022-12-06
  This version contains a major change that is a new key for moria1. Also, new
  metrics are exported on the MetricsPort for the congestion control
  subsystem.

  o Directory authority changes (moria1):
    - Rotate the relay identity key and v3 identity key for moria1. They
      have been online for more than a decade and refreshing keys
      periodically is good practice. Advertise new ports too, to avoid
      confusion. Closes ticket 40722.

  o Minor feature (Congestion control metrics):
    - Add additional metricsport relay metrics for congestion control.
      Closes ticket 40724.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on December 06, 2022.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/12/06.

  o Minor bugfixes (cpuworker, relay):
    - Fix an off by one overload calculation on the number of CPUs being
      used by our thread pool. Fixes bug 40719; bugfix on 0.3.5.1-alpha.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-12-19 07:43:35 +08:00
Rui Salvaterra 9136ff1532 tor: bump to 0.4.7.11 stable
Quoting the changelog:

Changes in version 0.4.7.11 - 2022-11-10
  This version contains several major fixes aimed at helping defend against
  network denial of service. It is also extending drastically the MetricsPort
  for relays to help us gather more internal data to investigate performance
  and attacks.

  We strongly recommend to upgrade to this version especially for Exit relays
  in order to help the network defend against this ongoing DDoS.

  o Directory authority changes (dizum, Faravahar):
    - Change dizum IP address. Closes ticket 40687.
    - Remove Faravahar until its operator, Sina, set it back up online
      outside of Team Cymru network. Closes ticket 40688.

  o Major bugfixes (geoip data):
    - IPFire informed us on August 12th that databases generated after
      (including) August 10th did not have proper ARIN network
      allocations. We are updating the database to use the one generated
      on August 9th, 2022. Fixes bug 40658; bugfix on 0.4.5.13.

  o Major bugfixes (onion service):
    - Set a much higher circuit build timeout for opened client rendezvous
      circuit. Before this, tor would time them out very quickly leading to
      unnecessary retries meaning more load on the network. Fixes bug 40694;
      bugfix on 0.3.5.1-alpha.

  o Major bugfixes (OSX):
    - Fix coarse-time computation on Apple platforms (like Mac M1) where
      the Mach absolute time ticks do not correspond directly to
      nanoseconds. Previously, we computed our shift value wrong, which
      led us to give incorrect timing results. Fixes bug 40684; bugfix
      on 0.3.3.1-alpha.

  o Major bugfixes (relay):
    - Improve security of our DNS cache by randomly clipping the TTL
      value. TROVE-2021-009. Fixes bug 40674; bugfix on 0.3.5.1-alpha.

  o Minor feature (Mac and iOS build):
    - Change how combine_libs works on Darwin like platforms to make
      sure we don't include any `__.SYMDEF` and `__.SYMDEF SORTED`
      symbols on the archive before we repack and run ${RANLIB} on the
      archive. This fixes a build issue with recent Xcode versions on
      Mac Silicon and iOS. Closes ticket 40683.

  o Minor feature (metrics):
    - Add various congestion control counters to the MetricsPort. Closes
      ticket 40708.

  o Minor feature (performance):
    - Bump the maximum amount of CPU that can be used from 16 to 128. Note
      that NumCPUs torrc option overrides this hardcoded maximum. Fixes bug
      40703; bugfix on 0.3.5.1-alpha.

  o Minor feature (relay):
    - Make an hardcoded value for the maximum of per CPU tasks into a
      consensus parameter.
    - Two new consensus parameters are added to control the wait time in
      queue of the onionskins. One of them is the torrc
      MaxOnionQueueDelay options which supersedes the consensus
      parameter. Closes ticket 40704.

  o Minor feature (relay, DoS):
    - Apply circuit creation anti-DoS defenses if the outbound circuit
      max cell queue size is reached too many times. This introduces two
      new consensus parameters to control the queue size limit and
      number of times allowed to go over that limit. Closes ticket 40680.

  o Minor feature (relay, metrics):
    - Add DoS defenses counter to MetricsPort.
    - Add congestion control RTT reset counter to MetricsPort.
    - Add counters to the MetricsPort how many connections, per type,
      are currently opened and how many were created.
    - Add relay flags from the consensus to the MetricsPort.
    - Add total number of opened circuits to MetricsPort.
    - Add total number of streams seen by an Exit to the MetricsPort.
    - Add traffic stats as in number of read/written bytes in total.
    - Related to ticket 40194.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on November 10, 2022.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/11/10.

  o Minor bugfixes (authorities, sandbox):
    - Allow to write file my-consensus-<flavor-name> to disk when
      sandbox is activated. Fixes bug 40663; bugfix on 0.3.5.1-alpha.

  o Minor bugfixes (dirauth):
    - Directory authorities stop voting a consensus "Measured" weight
      for relays with the Authority flag. Now these relays will be
      considered unmeasured, which should reserve their bandwidth for
      their dir auth role and minimize distractions from other roles. In
      place of the "Measured" weight, they now include a
      "MeasuredButAuthority" weight (not used by anything) so the
      bandwidth authority's opinion on this relay can be recorded for
      posterity. Lastly, remove the AuthDirDontVoteOnDirAuthBandwidth
      torrc option which never worked right. Fixes bugs 40698 and 40700;
      bugfix on 0.4.7.2-alpha.

  o Minor bugfixes (onion service client):
    - A collapsing onion service circuit should be seen as an
      "unreachable" error so it can be retried. Fixes bug 40692; bugfix
      on 0.3.5.1-alpha.

  o Minor bugfixes (onion service):
    - Make the service retry a rendezvous if the circuit is being
      repurposed for measurements. Fixes bug 40696; bugfix
      on 0.3.5.1-alpha.

  o Minor bugfixes (relay overload statistics):
    - Count total create cells vs dropped create cells properly, when
      assessing if our fraction of dropped cells is too high. We only
      count non-client circuits in the denominator, but we would include
      client circuits in the numerator, leading to surprising log lines
      claiming that we had dropped more than 100% of incoming create
      cells. Fixes bug 40673; bugfix on 0.4.7.1-alpha.

  o Code simplification and refactoring (bridges):
    - Remove unused code related to ExtPort connection ID. Fixes bug
      40648; bugfix on 0.3.5.1-alpha.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-12-19 07:43:35 +08:00
Nick Hainke b9cf0cdce6 tor: update to 0.4.7.9
Release Notes:
https://forum.torproject.net/t/urgent-stable-release-0-4-5-14-0-4-6-12-and-0-4-7-10

Signed-off-by: Nick Hainke <vincent@systemli.org>
2022-09-26 11:17:04 +02:00
Rui Salvaterra f47a311269 tor: bump to 0.4.7.8 stable
From the changelog…

  o Major bugfixes (congestion control, TROVE-2022-001):
    - Fix a scenario where RTT estimation can become wedged, seriously
      degrading congestion control performance on all circuits. This
      impacts clients, onion services, and relays, and can be triggered
      remotely by a malicious endpoint. Tracked as CVE-2022-33903. Fixes
      bug 40626; bugfix on 0.4.7.5-alpha.

  o Minor features (fallbackdir):
    - Regenerate fallback directories generated on June 17, 2022.

  o Minor features (geoip data):
    - Update the geoip files to match the IPFire Location Database, as
      retrieved on 2022/06/17.

  o Minor bugfixes (linux seccomp2 sandbox):
    - Allow the rseq system call in the sandbox. This solves a crash
      issue with glibc 2.35 on Linux. Patch from pmu-ipf. Fixes bug
      40601; bugfix on 0.3.5.11.

  o Minor bugfixes (logging):
    - Demote a harmless warn log message about finding a second hop to
      from warn level to info level, if we do not have enough
      descriptors yet. Leave it at notice level for other cases. Fixes
      bug 40603; bugfix on 0.4.7.1-alpha.
    - Demote a notice log message about "Unexpected path length" to info
      level. These cases seem to happen arbitrarily, and we likely will
      never find all of them before the switch to arti. Fixes bug 40612;
      bugfix on 0.4.7.5-alpha.

  o Minor bugfixes (relay, logging):
    - Demote a harmless XOFF log message to from notice level to info
      level. Fixes bug 40620; bugfix on 0.4.7.5-alpha.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-07-05 21:58:40 -07:00
Rui Salvaterra 0b50456514 tor: bump to 0.4.7.7 stable
The first stable release in the 0.4.7.x series.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-04-30 23:58:20 -07:00
Rui Salvaterra 17e78a9790 tor: bump to 0.4.6.10 stable
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-04-01 08:13:08 +01:00
Rui Salvaterra 72974bed43 tor: bump to 0.4.6.9 stable
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2022-01-12 01:56:39 -08:00
Rui Salvaterra 2997d2dcf5 tor: bump to 0.4.6.8 stable
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2021-10-30 01:13:07 -07:00
Rui Salvaterra c12cb0cdde tor: bump to 0.4.6.7
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2021-09-03 11:00:07 +01:00
Rui Salvaterra a45b962eef tor: bump to 0.4.6.6 stable
Run-tested on mvebu/cortexa9 (tor-basic) without issues.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2021-08-02 11:22:36 +01:00
Jan Pavlinec 5c9ab1ff67 tor: update to version 0.4.5.8
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-05-19 17:30:40 +03:00
Jan Pavlinec a68a69a38d
tor: update to version 0.4.5.7
Fixes CVE-2021-28089 and CVE-2021-28090

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-03-16 18:14:30 +01:00
Rui Salvaterra e30f0480c8 tor: fix building without OpenSSL engine support
Otherwise it would fail with linking errors.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2021-02-25 09:31:00 +00:00
Ilya Lipnitskiy 5d8d4fbbcb
treewide: Run refresh on all packages
The crude loop I wrote to come up with this changeset:

  find -L package/feeds/packages/ -name patches | \
  sed 's/patches$/refresh/' | sort | xargs make

Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
2021-02-20 16:02:15 -08:00
Jan Pavlinec 17056742ad
tor: update to version 0.4.5.6
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-02-19 11:34:12 +01:00
Jan Pavlinec f16d79f5f1
tor: update to version 0.4.4.6 (security fix)
Fixes TROVE-2020- 005

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-11-18 12:47:09 +01:00
Rui Salvaterra 6007751c63 tor: disable man pages and html manual generation
We don't need this on an embedded system.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2020-10-28 22:34:01 +00:00
Rui Salvaterra 929a5a9f0c tor: add a basic variant, without relay/bridge support
If relay/bridge support isn't required, this variant is about 300 kiB smaller
than the full tor daemon.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2020-10-28 22:33:53 +00:00
Rui Salvaterra a519b90fd7 tor: improve readability of the packages help text
Whitespace before and after the description makes the package information much
more obvious.

Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
2020-10-28 21:12:26 +00:00
Jan Pavlinec db5f30cc41
tor: update to version 0.4.4.5
Changes:
-Fix PIC configuration to --enable-pic
-disable mallinfo

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-30 13:01:41 +02:00
Jan Pavlinec 3f51a1ee6e
tor: update to version 0.4.3.6 (security fix)
Fixes
CVE-2020- 15572

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-07-21 12:53:57 +02:00
Rosen Penev 0df6c58f82
tor: remove libssp hack
Does not seem to be needed anymore.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-06-18 15:14:33 -07:00
Jan Pavlinec 51aa3e53cb
tor: update to version 0.4.3.5
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-05-20 11:35:30 +02:00
Jan Pavlinec 54c6d6dc0c tor: update to version 0.4.2.7 (security fix)
Fixes:
CVE-2020-10592

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-03-26 08:52:29 -10:00
Rosen Penev acabb2cf50 tor: fix init scripts
pidfile should not be set. tor handles it.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-02-15 03:55:02 -08:00
Jan Pavlinec ca6528f002
tor: update init script
Changes:
-add uci config
-create pid file by procd
-add reload function

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-02-12 23:40:40 +01:00
Jan Pavlinec 6b46b5b6f8
tor: update to version 0.4.2.6
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-02-04 18:54:28 +01:00
Jan Pavlinec 5bce9c3e1d
tor: add respawn to init script
Note:
In some cases when tor daemon starts before
than the router is connected to the Internet.
Tor will exit and you have to run it manually.
This should fix this case.

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-12-30 13:55:02 +01:00
Jan Pavlinec a339e0ede3 tor: update to version 0.4.2.5
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-12-29 17:31:25 +01:00
Jan Pavlinec 390da39191 tor: update to 0.4.1.6
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-10-10 08:58:40 +02:00
Jan Pavlinec 1ac69ffc59 tor: update to version 0.4.1.5
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-08-23 19:04:09 +02:00
Peter Wagner 47a9d74761 tor: update to 0.4.0.5
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-05-05 18:01:21 +02:00
Rosen Penev f18c37e96b
tor: Remove zstd dependency
Now that zstd is in the tree, tor stars to pick it up.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-04-01 00:06:41 -07:00
Jan Pavlinec 8d347f9197 tor: fix CPE ID
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-03-26 20:28:05 +01:00
Peter Wagner c6aa3d1fab tor: always create folders and set ownership
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-03-11 19:58:44 +01:00
Jan Pavlinec 9754ee1dcc tor: Add PKG_CPE_ID for proper CVE tracking.
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-02-26 20:42:26 +01:00
Peter Wagner 03caca8e18 tor: update to 0.3.5.8
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-02-23 12:52:26 +01:00
Peter Wagner c7700bfb15 tor: update to 0.3.5.7
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-01-14 20:19:39 +01:00
Jan Pavlinec f2196c46ea tor: update to version 0.3.4.10
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-01-08 20:44:52 +01:00
Konstantin Demin b7603be359 tor: package improvements
* remove "torify" script
  - "torify" script is just a wrapper around torsocks,
    but torsocks is not currently present in packages.
* tor-geoip: fix "install" recipe:
  - use $(INSTALL_DATA) instead of $(CP) as a proper way
    of installing files
* drop deprecated configure option:
    "--with-ssl-dir" is considered deprecated and obsolete,
    while "--with-openssl-dir" is already present.
* build in parallel
* build with -ffunction-sections, -fdata-sections,
  --gc-sections and -flto
* remove "--disable-largefile" in CONFIGURE_ARGS
* remove "-std=gnu99" in EXTRA_CFLAGS
* use $(FPIC) in EXTRA_CFLAGS
* remove trailing whitespace

Compile- and run-tested on ar71xx/generic,
TP-Link Archer C7 v2 (world-wide version).

Signed-off-by: Konstantin Demin <rockdrilla@gmail.com>
2018-12-08 11:55:41 +01:00
Peter Wagner 555e3ff88b tor:update to 0.3.4.9
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-11-04 18:07:31 +01:00