[UVFe] please update tor 0.1.2.17 from debian sid

Bug #137032 reported by noah
10
Affects Status Importance Assigned to Milestone
tor (Ubuntu)
Fix Released
Wishlist
Martin Pitt

Bug Description

Binary package hint: tor

A new version is out.
http://archives.seul.org/or/announce/Aug-2007/msg00001.html

Changes in version 0.1.2.17 - 2007-08-30
  o Major bugfixes (security):
    - We removed support for the old (v0) control protocol. It has been
      deprecated since Tor 0.1.1.1-alpha, and keeping it secure has
      become more of a headache than it's worth.

  o Major bugfixes (load balancing):
    - When choosing nodes for non-guard positions, weight guards
      proportionally less, since they already have enough load. Patch
      from Mike Perry.
    - Raise the "max believable bandwidth" from 1.5MB/s to 10MB/s. This
      will allow fast Tor servers to get more attention.
    - When we're upgrading from an old Tor version, forget our current
      guards and pick new ones according to the new weightings. These
      three load balancing patches could raise effective network capacity
      by a factor of four. Thanks to Mike Perry for measurements.

  o Major bugfixes (stream expiration):
    - Expire not-yet-successful application streams in all cases if
      they've been around longer than SocksTimeout. Right now there are
      some cases where the stream will live forever, demanding a new
      circuit every 15 seconds. Fixes bug 454; reported by lodger.

  o Minor features (controller):
    - Add a PROTOCOLINFO controller command. Like AUTHENTICATE, it
      is valid before any authentication has been received. It tells
      a controller what kind of authentication is expected, and what
      protocol is spoken. Implements proposal 119.

  o Minor bugfixes (performance):
    - Save on most routerlist_assert_ok() calls in routerlist.c, thus
      greatly speeding up loading cached-routers from disk on startup.
    - Disable sentinel-based debugging for buffer code: we squashed all
      the bugs that this was supposed to detect a long time ago, and now
      its only effect is to change our buffer sizes from nice powers of
      two (which platform mallocs tend to like) to values slightly over
      powers of two (which make some platform mallocs sad).

  o Minor bugfixes (misc):
    - If exit bandwidth ever exceeds one third of total bandwidth, then
      use the correct formula to weight exit nodes when choosing paths.
      Based on patch from Mike Perry.
    - Choose perfectly fairly among routers when choosing by bandwidth and
      weighting by fraction of bandwidth provided by exits. Previously, we
      would choose with only approximate fairness, and correct ourselves
      if we ran off the end of the list.
    - If we require CookieAuthentication but we fail to write the
      cookie file, we would warn but not exit, and end up in a state
      where no controller could authenticate. Now we exit.
    - If we require CookieAuthentication, stop generating a new cookie
      every time we change any piece of our config.
    - Refuse to start with certain directory authority keys, and
      encourage people using them to stop.
    - Terminate multi-line control events properly. Original patch
      from tup.
    - Fix a minor memory leak when we fail to find enough suitable
      servers to choose a circuit.
    - Stop leaking part of the descriptor when we run into a particularly
      unparseable piece of it.

Tags: upgrade
Revision history for this message
Vincent Legout (vlegout) wrote :

I add the tag upgrade and mark as triaged.

Changed in tor:
importance: Undecided → Wishlist
status: New → Triaged
Revision history for this message
Áron Sisak (asisak) wrote :
Revision history for this message
Áron Sisak (asisak) wrote :
Changed in tor:
assignee: nobody → asisak
status: Triaged → In Progress
Revision history for this message
Áron Sisak (asisak) wrote :

ChangeLog diff in the description, no NEWS file.

Revision history for this message
Áron Sisak (asisak) wrote :

$ sudo dpkg --install /var/cache/pbuilder/result/tor_0.1.2.17-1_i386.deb
[sudo] password for aron:
(Reading database ... 170353 files and directories currently installed.)
Preparing to replace tor 0.1.2.16-1 (using .../result/tor_0.1.2.17-1_i386.deb) ...
Stopping tor daemon: tor.
Unpacking replacement tor ...
Setting up tor (0.1.2.17-1) ...
debian-tor uid check: ok
debian-tor homedir check: ok
Raising maximum number of filedescriptors (ulimit -n) to 8192.
Starting tor daemon: tor...
Oct 02 16:26:02.841 [notice] Tor v0.1.2.17. This is experimental software. Do not rely on it for strong anonymity.
Oct 02 16:26:02.843 [notice] Initialized libevent version 1.3b using method epoll. Good.
Oct 02 16:26:02.843 [notice] Opening Socks listener on 127.0.0.1:9050
done.

Revision history for this message
Scott Kitterman (kitterman) wrote : Re: [Bug 137032] Re: [UVFe] please update tor 0.1.2.17 from debian sid

For Tor, I'll ack for unlimited freebie upgrades up until pitti removes it
from the archive (or we release).

Revision history for this message
Soren Hansen (soren) wrote :

+1

Changed in tor:
status: In Progress → Confirmed
Revision history for this message
Áron Sisak (asisak) wrote :

Sync acked by MOTU UVF (ScottK and Soren). Please, sync.

Revision history for this message
Martin Pitt (pitti) wrote :

Synced.

Changed in tor:
assignee: asisak → pitti
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.