diff options
author | Christian Faulhammer <fauli@gentoo.org> | 2009-02-13 10:37:01 +0000 |
---|---|---|
committer | Christian Faulhammer <fauli@gentoo.org> | 2009-02-13 10:37:01 +0000 |
commit | 26f2c49ef64b59e9500376b384448fca3872a27f (patch) | |
tree | 21367a270ed897704caef9eb13a559d1cff266be /net-misc/tor | |
parent | Version bump. (diff) | |
download | historical-26f2c49ef64b59e9500376b384448fca3872a27f.tar.gz historical-26f2c49ef64b59e9500376b384448fca3872a27f.tar.bz2 historical-26f2c49ef64b59e9500376b384448fca3872a27f.zip |
version bump for security bug 258833, reported by Jesse Adelman <jesse AT boldandbusted DOT com>
Package-Manager: portage-2.1.6.4/cvs/Linux 2.6.27-gentoo-r8 i686
Diffstat (limited to 'net-misc/tor')
-rw-r--r-- | net-misc/tor/ChangeLog | 8 | ||||
-rw-r--r-- | net-misc/tor/Manifest | 14 | ||||
-rw-r--r-- | net-misc/tor/tor-0.2.0.34.ebuild | 88 |
3 files changed, 108 insertions, 2 deletions
diff --git a/net-misc/tor/ChangeLog b/net-misc/tor/ChangeLog index 4e63aa06a439..b5e0e2f6c7e2 100644 --- a/net-misc/tor/ChangeLog +++ b/net-misc/tor/ChangeLog @@ -1,6 +1,12 @@ # ChangeLog for net-misc/tor # Copyright 2000-2009 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.157 2009/02/08 22:45:38 fauli Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.158 2009/02/13 10:37:01 fauli Exp $ + +*tor-0.2.0.34 (13 Feb 2009) + + 13 Feb 2009; Christian Faulhammer <fauli@gentoo.org> +tor-0.2.0.34.ebuild: + version bump for security bug 258833, reported by Jesse Adelman <jesse AT + boldandbusted DOT com> 08 Feb 2009; Christian Faulhammer <fauli@gentoo.org> tor-0.2.0.33.ebuild: kill logrotate USE flag as requested by bangert on bug 258188 diff --git a/net-misc/tor/Manifest b/net-misc/tor/Manifest index 0ec2f3e3ca6a..71514ca6e656 100644 --- a/net-misc/tor/Manifest +++ b/net-misc/tor/Manifest @@ -1,9 +1,21 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + AUX tor-0.2.0.30-logrotate.patch 291 RMD160 256507536cb7629a21c855816428885b3587f14c SHA1 e1592a63df6677c8e2537ae5363eda39c4a3aeb1 SHA256 8c8c4d33d758127eedb234cda6836be625188c09e9eadfea290f6cf575516c22 AUX tor-0.2.0.33-no-internal-libevent.patch 5026 RMD160 c263d14eaf776ba1ba90bdc86308219dc802705c SHA1 7e9b1595380a518f849901dc7419a3cb4acf5bf3 SHA256 cc57416b5b5fb8562fcf69f5b096a168bf693cd08b4bd02105d84531192f7647 AUX tor.conf 89 RMD160 3ed95351d715ed05db3baa3dd8802832cb06989f SHA1 ec2a2cb216c35e37803b29a508d0914639a7f82b SHA256 3ed15ecce5c312fb4d50e0e8f3a645d67c660e2930a9dbadf010803b8fd095a0 AUX tor.initd-r4 1549 RMD160 2f36cbc9e14c0021139212634b8e0ac585058e44 SHA1 4593e7a1b482bc7b8e787b57d0160f57415b9817 SHA256 0b3c6fdb62b0ce1f4812b0e3ce19dcc7176d4b723cb24b46e4c8474d5b119222 AUX torrc.sample-0.1.2.6.patch 1145 RMD160 3656774f05abe54ec22a121954a1d437fe1da520 SHA1 a0c658eafc8feb134e4ce8c7a5cdf94074ad79f5 SHA256 5b94e1d8c097626402b0b388fefb15f11b95db112b23d358e04cfe55331911f1 DIST tor-0.2.0.33.tar.gz 2167542 RMD160 8649ec953f99a7cd27a25019b26302fd300c84f9 SHA1 4cc94dd6fdb5eb0bd4854631cc5f3cddba7a815f SHA256 33df58455bb6e524350f69f6892627258f6cb0b56a953c80c13beff85f1731ad +DIST tor-0.2.0.34.tar.gz 2170871 RMD160 a7a1a78b32072524472c6b2973117689aab4823b SHA1 6797b85cf4bd44a3a1c3ff1ccb9c46b55f9391f9 SHA256 1bb19bcc52d365b47dd0e7bc06e3208786447a1cf759d6595c516a0f0cde3cb2 EBUILD tor-0.2.0.33.ebuild 2607 RMD160 e5effcfbd13e180c2ae1981ae6e7a741150c0877 SHA1 062c471c1d82d0e90ca28dafee0d90c864a4fcdc SHA256 d614a0eb0570bfbf837bc1f50a51a7ba9ae637be67dcb63e409a4da4cb6619f8 -MISC ChangeLog 23153 RMD160 6a63ad6d06ac673cdb6e30e3b12973629fa0f382 SHA1 8a9464de7d5dcc6148019659762d1992f7798815 SHA256 f10e719b87c7f8594cb9a7079ec8e1b939e23fe6203fe9e85332af0b0be193c6 +EBUILD tor-0.2.0.34.ebuild 2622 RMD160 fb13ea06744e449ec27bab71859fa81d798ede96 SHA1 97295ddf12df43a128c40da051c18fd1192d3840 SHA256 f3bc6bafe27940c8376487cefc5c961b515eb7584bfb5809953cacd5d5e51c55 +MISC ChangeLog 23361 RMD160 4044b12da66b3d1e2d8fa84cec9ae422b9477fb8 SHA1 1558fee224390836839575bfec15887dbac751a0 SHA256 5febe18886ac4ac24f3464d7c2342e7707a6f68a1d26dbafa4d5609c5612cad6 MISC metadata.xml 482 RMD160 8dca0b35cd6e529c49031ba66a4c29fd3075a131 SHA1 909c1148521f411a17bcfd3ec97cc1ccadd4f580 SHA256 43850c54cf0ec6651bf3c4ef826b28d84e284e60891ca39c20284e2a3bbdcec9 +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.0.9 (GNU/Linux) + +iEYEARECAAYFAkmVTWwACgkQNQqtfCuFneM68ACghhwHADZU7DCSEayoRs0N4kjG +I94AmgLgwg9ROZFxwB97tPX5L/9hdj1r +=LFZw +-----END PGP SIGNATURE----- diff --git a/net-misc/tor/tor-0.2.0.34.ebuild b/net-misc/tor/tor-0.2.0.34.ebuild new file mode 100644 index 000000000000..c61ecc8ed336 --- /dev/null +++ b/net-misc/tor/tor-0.2.0.34.ebuild @@ -0,0 +1,88 @@ +# Copyright 1999-2009 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.0.34.ebuild,v 1.1 2009/02/13 10:37:01 fauli Exp $ + +EAPI=1 + +inherit eutils + +DESCRIPTION="Anonymizing overlay network for TCP" +HOMEPAGE="http://tor.eff.org" +MY_PV=${PV/_/-} +SRC_URI="http://tor.eff.org/dist/${PN}-${MY_PV}.tar.gz" +S="${WORKDIR}/${PN}-${MY_PV}" + +LICENSE="BSD" +SLOT="0" +KEYWORDS="~amd64 ~ppc ~ppc64 ~sparc ~x86 ~x86-fbsd" +IUSE="+bundledlibevent debug" + +DEPEND="dev-libs/openssl + >=dev-libs/libevent-1.2" +RDEPEND="${DEPEND} + net-proxy/tsocks" + +pkg_setup() { + enewgroup tor + enewuser tor -1 -1 /var/lib/tor tor +} + +src_unpack() { + unpack ${A} + cd "${S}" + epatch "${FILESDIR}"/torrc.sample-0.1.2.6.patch + epatch "${FILESDIR}"/${PN}-0.2.0.30-logrotate.patch + # Normally tor uses a bundled libevent fragment to provide + # asynchronous DNS requests. This is generally a bad idea, but at + # the moment the official libevent does not have the 0x20 hack, so + # anonymity is higher with the bundled variant. Remove patch as + # soon as upstream has installed the autoconf option to use + # system's libevent (0.2.1 or later) + # See http://bugs.noreply.org/flyspray/index.php?do=details&id=920 + # for upstream's report + use bundledlibevent || epatch "${FILESDIR}"/${PN}-0.2.0.33-no-internal-libevent.patch +} + +src_compile() { + econf $(use_enable debug) + emake || die +} + +src_install() { + newinitd "${FILESDIR}"/tor.initd-r4 tor + emake DESTDIR="${D}" install || die + keepdir /var/{lib,log,run}/tor + + dodoc README ChangeLog AUTHORS ReleaseNotes \ + doc/{HACKING,TODO} \ + doc/spec/*.txt + + fperms 750 /var/lib/tor /var/log/tor + fperms 755 /var/run/tor + fowners tor:tor /var/lib/tor /var/log/tor /var/run/tor + + sed -e "s:/lib::" \ + -e "s:/rc.d::" \ + -e "s:\\*:\\*.:" \ + -e "s:sharedscripts:create 0640 tor tor\n\tsharedscripts:" -i contrib/tor.logrotate || die + insinto /etc/logrotate.d + newins contrib/tor.logrotate tor + + # allow the tor user more open files to avoid errors, see bug 251171 + insinto /etc/security/limits.d/ + doins "${FILESDIR}"/tor.conf +} + +pkg_postinst() { + elog "You must create /etc/tor/torrc, you can use the sample that is in that directory" + elog "To have privoxy and tor working together you must add:" + elog "forward-socks4a / localhost:9050 ." + elog "(notice the . at the end of the line)" + elog "to /etc/privoxy/config" + + if ! use bundledlibevent; then + elog + elog "Please be aware that using the system's libevent library will lower your anonymity" + elog "a little bit. If you rely on it, please enable USE=bundledlibevent." + fi +} |