summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Faulhammer <fauli@gentoo.org>2009-02-13 10:37:01 +0000
committerChristian Faulhammer <fauli@gentoo.org>2009-02-13 10:37:01 +0000
commit26f2c49ef64b59e9500376b384448fca3872a27f (patch)
tree21367a270ed897704caef9eb13a559d1cff266be /net-misc/tor
parentVersion bump. (diff)
downloadhistorical-26f2c49ef64b59e9500376b384448fca3872a27f.tar.gz
historical-26f2c49ef64b59e9500376b384448fca3872a27f.tar.bz2
historical-26f2c49ef64b59e9500376b384448fca3872a27f.zip
version bump for security bug 258833, reported by Jesse Adelman <jesse AT boldandbusted DOT com>
Package-Manager: portage-2.1.6.4/cvs/Linux 2.6.27-gentoo-r8 i686
Diffstat (limited to 'net-misc/tor')
-rw-r--r--net-misc/tor/ChangeLog8
-rw-r--r--net-misc/tor/Manifest14
-rw-r--r--net-misc/tor/tor-0.2.0.34.ebuild88
3 files changed, 108 insertions, 2 deletions
diff --git a/net-misc/tor/ChangeLog b/net-misc/tor/ChangeLog
index 4e63aa06a439..b5e0e2f6c7e2 100644
--- a/net-misc/tor/ChangeLog
+++ b/net-misc/tor/ChangeLog
@@ -1,6 +1,12 @@
# ChangeLog for net-misc/tor
# Copyright 2000-2009 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.157 2009/02/08 22:45:38 fauli Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.158 2009/02/13 10:37:01 fauli Exp $
+
+*tor-0.2.0.34 (13 Feb 2009)
+
+ 13 Feb 2009; Christian Faulhammer <fauli@gentoo.org> +tor-0.2.0.34.ebuild:
+ version bump for security bug 258833, reported by Jesse Adelman <jesse AT
+ boldandbusted DOT com>
08 Feb 2009; Christian Faulhammer <fauli@gentoo.org> tor-0.2.0.33.ebuild:
kill logrotate USE flag as requested by bangert on bug 258188
diff --git a/net-misc/tor/Manifest b/net-misc/tor/Manifest
index 0ec2f3e3ca6a..71514ca6e656 100644
--- a/net-misc/tor/Manifest
+++ b/net-misc/tor/Manifest
@@ -1,9 +1,21 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
AUX tor-0.2.0.30-logrotate.patch 291 RMD160 256507536cb7629a21c855816428885b3587f14c SHA1 e1592a63df6677c8e2537ae5363eda39c4a3aeb1 SHA256 8c8c4d33d758127eedb234cda6836be625188c09e9eadfea290f6cf575516c22
AUX tor-0.2.0.33-no-internal-libevent.patch 5026 RMD160 c263d14eaf776ba1ba90bdc86308219dc802705c SHA1 7e9b1595380a518f849901dc7419a3cb4acf5bf3 SHA256 cc57416b5b5fb8562fcf69f5b096a168bf693cd08b4bd02105d84531192f7647
AUX tor.conf 89 RMD160 3ed95351d715ed05db3baa3dd8802832cb06989f SHA1 ec2a2cb216c35e37803b29a508d0914639a7f82b SHA256 3ed15ecce5c312fb4d50e0e8f3a645d67c660e2930a9dbadf010803b8fd095a0
AUX tor.initd-r4 1549 RMD160 2f36cbc9e14c0021139212634b8e0ac585058e44 SHA1 4593e7a1b482bc7b8e787b57d0160f57415b9817 SHA256 0b3c6fdb62b0ce1f4812b0e3ce19dcc7176d4b723cb24b46e4c8474d5b119222
AUX torrc.sample-0.1.2.6.patch 1145 RMD160 3656774f05abe54ec22a121954a1d437fe1da520 SHA1 a0c658eafc8feb134e4ce8c7a5cdf94074ad79f5 SHA256 5b94e1d8c097626402b0b388fefb15f11b95db112b23d358e04cfe55331911f1
DIST tor-0.2.0.33.tar.gz 2167542 RMD160 8649ec953f99a7cd27a25019b26302fd300c84f9 SHA1 4cc94dd6fdb5eb0bd4854631cc5f3cddba7a815f SHA256 33df58455bb6e524350f69f6892627258f6cb0b56a953c80c13beff85f1731ad
+DIST tor-0.2.0.34.tar.gz 2170871 RMD160 a7a1a78b32072524472c6b2973117689aab4823b SHA1 6797b85cf4bd44a3a1c3ff1ccb9c46b55f9391f9 SHA256 1bb19bcc52d365b47dd0e7bc06e3208786447a1cf759d6595c516a0f0cde3cb2
EBUILD tor-0.2.0.33.ebuild 2607 RMD160 e5effcfbd13e180c2ae1981ae6e7a741150c0877 SHA1 062c471c1d82d0e90ca28dafee0d90c864a4fcdc SHA256 d614a0eb0570bfbf837bc1f50a51a7ba9ae637be67dcb63e409a4da4cb6619f8
-MISC ChangeLog 23153 RMD160 6a63ad6d06ac673cdb6e30e3b12973629fa0f382 SHA1 8a9464de7d5dcc6148019659762d1992f7798815 SHA256 f10e719b87c7f8594cb9a7079ec8e1b939e23fe6203fe9e85332af0b0be193c6
+EBUILD tor-0.2.0.34.ebuild 2622 RMD160 fb13ea06744e449ec27bab71859fa81d798ede96 SHA1 97295ddf12df43a128c40da051c18fd1192d3840 SHA256 f3bc6bafe27940c8376487cefc5c961b515eb7584bfb5809953cacd5d5e51c55
+MISC ChangeLog 23361 RMD160 4044b12da66b3d1e2d8fa84cec9ae422b9477fb8 SHA1 1558fee224390836839575bfec15887dbac751a0 SHA256 5febe18886ac4ac24f3464d7c2342e7707a6f68a1d26dbafa4d5609c5612cad6
MISC metadata.xml 482 RMD160 8dca0b35cd6e529c49031ba66a4c29fd3075a131 SHA1 909c1148521f411a17bcfd3ec97cc1ccadd4f580 SHA256 43850c54cf0ec6651bf3c4ef826b28d84e284e60891ca39c20284e2a3bbdcec9
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.9 (GNU/Linux)
+
+iEYEARECAAYFAkmVTWwACgkQNQqtfCuFneM68ACghhwHADZU7DCSEayoRs0N4kjG
+I94AmgLgwg9ROZFxwB97tPX5L/9hdj1r
+=LFZw
+-----END PGP SIGNATURE-----
diff --git a/net-misc/tor/tor-0.2.0.34.ebuild b/net-misc/tor/tor-0.2.0.34.ebuild
new file mode 100644
index 000000000000..c61ecc8ed336
--- /dev/null
+++ b/net-misc/tor/tor-0.2.0.34.ebuild
@@ -0,0 +1,88 @@
+# Copyright 1999-2009 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.2.0.34.ebuild,v 1.1 2009/02/13 10:37:01 fauli Exp $
+
+EAPI=1
+
+inherit eutils
+
+DESCRIPTION="Anonymizing overlay network for TCP"
+HOMEPAGE="http://tor.eff.org"
+MY_PV=${PV/_/-}
+SRC_URI="http://tor.eff.org/dist/${PN}-${MY_PV}.tar.gz"
+S="${WORKDIR}/${PN}-${MY_PV}"
+
+LICENSE="BSD"
+SLOT="0"
+KEYWORDS="~amd64 ~ppc ~ppc64 ~sparc ~x86 ~x86-fbsd"
+IUSE="+bundledlibevent debug"
+
+DEPEND="dev-libs/openssl
+ >=dev-libs/libevent-1.2"
+RDEPEND="${DEPEND}
+ net-proxy/tsocks"
+
+pkg_setup() {
+ enewgroup tor
+ enewuser tor -1 -1 /var/lib/tor tor
+}
+
+src_unpack() {
+ unpack ${A}
+ cd "${S}"
+ epatch "${FILESDIR}"/torrc.sample-0.1.2.6.patch
+ epatch "${FILESDIR}"/${PN}-0.2.0.30-logrotate.patch
+ # Normally tor uses a bundled libevent fragment to provide
+ # asynchronous DNS requests. This is generally a bad idea, but at
+ # the moment the official libevent does not have the 0x20 hack, so
+ # anonymity is higher with the bundled variant. Remove patch as
+ # soon as upstream has installed the autoconf option to use
+ # system's libevent (0.2.1 or later)
+ # See http://bugs.noreply.org/flyspray/index.php?do=details&id=920
+ # for upstream's report
+ use bundledlibevent || epatch "${FILESDIR}"/${PN}-0.2.0.33-no-internal-libevent.patch
+}
+
+src_compile() {
+ econf $(use_enable debug)
+ emake || die
+}
+
+src_install() {
+ newinitd "${FILESDIR}"/tor.initd-r4 tor
+ emake DESTDIR="${D}" install || die
+ keepdir /var/{lib,log,run}/tor
+
+ dodoc README ChangeLog AUTHORS ReleaseNotes \
+ doc/{HACKING,TODO} \
+ doc/spec/*.txt
+
+ fperms 750 /var/lib/tor /var/log/tor
+ fperms 755 /var/run/tor
+ fowners tor:tor /var/lib/tor /var/log/tor /var/run/tor
+
+ sed -e "s:/lib::" \
+ -e "s:/rc.d::" \
+ -e "s:\\*:\\*.:" \
+ -e "s:sharedscripts:create 0640 tor tor\n\tsharedscripts:" -i contrib/tor.logrotate || die
+ insinto /etc/logrotate.d
+ newins contrib/tor.logrotate tor
+
+ # allow the tor user more open files to avoid errors, see bug 251171
+ insinto /etc/security/limits.d/
+ doins "${FILESDIR}"/tor.conf
+}
+
+pkg_postinst() {
+ elog "You must create /etc/tor/torrc, you can use the sample that is in that directory"
+ elog "To have privoxy and tor working together you must add:"
+ elog "forward-socks4a / localhost:9050 ."
+ elog "(notice the . at the end of the line)"
+ elog "to /etc/privoxy/config"
+
+ if ! use bundledlibevent; then
+ elog
+ elog "Please be aware that using the system's libevent library will lower your anonymity"
+ elog "a little bit. If you rely on it, please enable USE=bundledlibevent."
+ fi
+}