Commit Graph

172 Commits

Author SHA1 Message Date
Yuri Victorovich
fe8ab18362 security/tor: Update 0.4.1.5 -> 0.4.1.6
Reported by:	upstream notification
2019-09-19 15:04:55 +00:00
Yuri Victorovich
2c9aa99585 security/tor: Update 0.4.0.5 -> 0.4.1.5
Reported by:	upstream notification
2019-08-20 19:58:29 +00:00
Mathieu Arnold
bc89cd3d2c Convert to UCL & cleanup pkg-message (categories s) 2019-08-14 12:16:12 +00:00
Jan Beich
f18538b989 devel/libevent2: update to 2.1.11
Changes:	https://github.com/libevent/libevent/releases/tag/release-2.1.11-stable
ABI:		https://abi-laboratory.pro/tracker/timeline/libevent/
PR:		239599
Reported by:	GitHub (watch releases)
Approved by:	zeising (maintainer)
MFH:		2019Q3 (maybe security, partially restores 2.1.8 ABI)
Differential Revision:	https://reviews.freebsd.org/D21133
2019-08-02 13:30:40 +00:00
Gerald Pfeifer
ea8c8ec7da Bump PORTREVISION for ports depending on the canonical version of GCC
as defined in Mk/bsd.default-versions.mk which has moved from GCC 8.3
to GCC 9.1 under most circumstances now after revision 507371.

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using Mk/bsd.octave.mk which in turn features USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
   c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, everything INDEX-11 shows with a dependency on lang/gcc9 now.

PR:		238330
2019-07-26 20:46:53 +00:00
Jan Beich
338d1782dc security/tor: force rebuild after r503790
evutil_secure_rng_add_bytes became nop in r478104 on all FreeBSD
releases due to a bug in arc4random_addrandom ifdef. libevent 2.1.10
hidden it based on configure check. Looks like there were consumers.

PR:		238433
Reported by:	yuri
2019-06-09 11:26:26 +00:00
Yuri Victorovich
d52e9b9423 security/tor: Update 0.3.5.8 -> 0.4.0.5
Reported by:	upstream notification
2019-05-03 01:42:25 +00:00
Yuri Victorovich
3c5122a8b8 security/tor: 0.3.5.7 -> 0.3.5.8
Changelog: https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.3.5.8

Reported by:	upstream notifucation
2019-02-22 02:41:07 +00:00
Yuri Victorovich
2a08076c51 security/tor: Update 0.3.4.9 -> 0.3.5.7
The TOR2WEB option is retired by the upstream.

Reported by:	upstream notification
2019-01-08 07:48:29 +00:00
Gerald Pfeifer
a9f015d155 Bump PORTREVISION for ports depending on the canonical version of GCC
defined via Mk/bsd.default-versions.mk which has moved from GCC 7.4 t
GCC 8.2 under most circumstances.

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using Mk/bsd.octave.mk which in turn features USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c11, c++0x, c++11-lang,
   c++11-lib, c++14-lang, c++17-lang, or gcc-c++11-lib
plus, as a double check, everything INDEX-11 showed depending on lang/gcc7.

PR:		231590
2018-12-12 01:35:33 +00:00
Yuri Victorovich
6e5e5d9012 security/tor: Update 0.3.4.8 -> 0.3.4.9
Changelog:
https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.3.4.9

Reported by:	upstream notification
2018-11-02 19:05:38 +00:00
Yuri Victorovich
f188497994 security/tor: Fix build with mips64, powerpc64 and sparc64
Port changes:
* Add USES=compiler:c11
* Add USE_CSTD=gnu99

Situation with MIPS isn't clear, Nathan <ndowens@yahoo.com> says that it works only after adding USES=autoreconf.
The Tor Project should resolve this discrepancy that autoreconf alters the outcome: https://trac.torproject.org/projects/tor/ticket/27901

PR:		231779
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl> (initial version)
2018-09-30 01:55:03 +00:00
Yuri Victorovich
56fdf45cf7 security/tor: Update 0.3.3.9 -> 0.3.4.8
Changelog:
https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.3.4.8

Reported by:	Upstream notification
2018-09-11 01:51:56 +00:00
Yuri Victorovich
214a8d95db security/tor: Update 0.3.3.8 -> 0.3.3.9
Changelog:
https://gitweb.torproject.org/tor.git/tree/ReleaseNotes?h=tor-0.3.3.9

Reported by:	upstream notification
2018-07-13 22:20:43 +00:00
Yuri Victorovich
0015cb2ad0 security/tor: Update 0.3.3.7 -> 0.3.3.8
Changelog:
https://gitweb.torproject.org/tor.git/tree/ChangeLog?id=99f9816efa08ab83f90a307ea41844d693488fde

Reported by:	upstream notification
2018-07-09 20:30:31 +00:00
Yuri Victorovich
d73afed2c7 security/tor: Update 0.3.3.6 -> 0.3.3.7
Changelog:
https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.3.3.7

Reported by:	Nick Mathewson <nickm@torproject.org> (upstream notification)
2018-06-12 17:43:15 +00:00
Yuri Victorovich
5c268b0672 security/tor: Update 0.3.2.10 -> 0.3.3.6
Changelog:
https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.3.3.6

Reported by:	Nick Mathewson <nickm@torproject.org> (upstream notification)
2018-05-22 22:41:57 +00:00
Yuri Victorovich
5c3a344f6e security/tor: Update to 0.3.2.10
Backport of countermeasures to mitigate denial-of-service
attacks against the Tor network.

Changelog is in:
https://gitweb.torproject.org/tor.git/tree/ChangeLog

None of these fixes appear to be essential for clients, but relays
should upgrade.

Port changes:
* Changed the implementation of 'tor_setuid': now it is done through
  the command line argument, instead of the torrc file.

Reported by:	Nick Mathewson <nickm@torproject.org> (notification)
Approved by:	tcberner (mentor, implicit)
2018-03-03 16:00:48 +00:00
Yuri Victorovich
f0ad21c6bb security/tor: Update to 0.3.2.9
This release contains many new features and many bugfixes.
Plesee see the complete list here:
https://blog.torproject.org/tor-0329-released-we-have-new-stable-series

Additionally, this update adds "#include <osreldate.h>" to qualm the
compiler warning that was caused by the previous fix.

Now security/tor and security/tor-devel are identical.

Submitted by:	myself
Reported by:	upstream notification
Approved by:	adamw (mentor)
Differential Revision:	https://reviews.freebsd.org/D13820
2018-01-14 19:24:40 +00:00
Yuri Victorovich
5fdbf108c4 security/tor: Unbreaking on systems without timingsafe_memcmp(3)
timingsafe_memcmp(3) has only been introduced in 12, therefore limiting its use to 12.

Reported by:	Martin Gehlen <zitlo@zitlo.de> (bug reporter)
Approved by:	adamw (mentor)
Differential Revision:	https://reviews.freebsd.org/D13502
2017-12-18 21:52:04 +00:00
Yuri Victorovich
5dff2c9118 security/tor: Update to 0.3.1.9 (security update)
Approved by:	tcberner (mentor)
Differential Revision:	https://reviews.freebsd.org/D13321
2017-12-02 01:48:15 +00:00
Steve Wills
90310bba1c security/tor: Update to 0.3.1.8
PR:		223239
Submitted by:	Yuri Victorovich <yuri@rawbw.com> (maintainer)
2017-10-26 10:45:51 +00:00
Kurt Jaeger
d077c67d1b security/tor: update 0.3.0.10 -> 0.3.1.7
- Adds Lzma and Zstd compression
- Rework some options to options_ng

PR:		222431
Submitted by:	brnrd, Yuri Victorovich <yuri@rawbw.com> (maintainer)
2017-10-01 20:19:49 +00:00
Gerald Pfeifer
e59c88cece Bump PORTREVISION for ports depending on the canonical version of GCC
(via Mk/bsd.default-versions.mk and lang/gcc) which has moved from
GCC 5.4 to GCC 6.4 under most circumstances.

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using Mk/bsd.octave.mk which in turn features USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c++11-lib, c++11-lang,
   c++14-lang, c++0x, c11, or gcc-c++11-lib.

PR:		219275
2017-09-10 20:55:38 +00:00
Kirill Ponomarev
2843ab3fd7 Update to version 0.3.0.10
PR:		221299
Submitted by:	maintainer
Approved by:	mat (mentor)
Differential Revision:	https://reviews.freebsd.org/D11909
2017-08-07 13:43:28 +00:00
Dmitry Marakasov
833f6610d0 - Update to 0.3.0.9
PR:		220373
Submitted by:	yuri@rawbw.com (maintainer)
Security:	CVE-2017-0377
2017-06-30 11:39:52 +00:00
Mark Linimon
45cb752a04 Begin deorbit burn of ia64. We have not attempted to build packages for
it for many years.

While here, alphabetize ARCHs, pet portlint, and modernize usages.

Approved by:	portmgr (tier-2 blanket)
2017-06-25 00:29:09 +00:00
Jochen Neumeister
325ef4e843 - security/tor: Implemented setuid feature
*The user should add tor_setuid=YES to /etc/rc.conf
  to make tor do setuid in runtime after opening the
  externally provided files.

PR:		218587
Submitted by:	xmj
Approved by:	Yuri Victorovich <yuri at rawbw.com> (maintainer)
Approved by:	miwi (mentor)
Differential Revision:	https://reviews.freebsd.org/D11223
2017-06-17 10:54:54 +00:00
Kurt Jaeger
fb5089e52c security/tor: update 0.3.0.7 -> 0.3.0.8
PR:		219863
Submitted by:	Yuri Victorovich <yuri@rawbw.com> (maintainer)
MFH:		2017Q2
Relnotes:	https://gitweb.torproject.org/tor.git/plain/ReleaseNotes?id=tor-0.3.0.8
Security:	CVE-2017-0375, CVE-2017-0376
2017-06-14 19:00:26 +00:00
Kurt Jaeger
91363d31d1 security/tor: 0.3.0.6 -> 0.3.0.7
- medium-severity security bug in earlier versions of 0.3.0.x, where
  an attacker could cause a Tor relay process to exit

PR:		219246
Relnotes:	https://gitweb.torproject.org/tor.git/plain/ReleaseNotes?id=tor-0.3.0.7
Security:	TROVE-2017-002
Submitted by:	Yuri Victorovich <yuri@rawbw.com> (maintainer)
MFH:		2017Q2
2017-05-19 17:36:02 +00:00
Sunpoet Po-Chuan Hsieh
0a35ac82fe Update to 0.3.0.6
- Add DOCS and MANPAGES options
- Remove TRANSPARENT option
- While I'm here, update WWW

Changes:	https://blog.torproject.org/category/tags/release
		https://gitweb.torproject.org/tor.git/tree/ChangeLog
PR:		219104
Submitted by:	Yuri Victorovich <yuri@rawbw.com> (maintainer)
2017-05-07 21:27:33 +00:00
Mark Linimon
b5fc89bb28 Provide more descriptive error messages for ports failing on powerpc64.
While here, pet portlint.

Approved by:	portmgr (tier-2 blanket)
2017-04-30 04:35:10 +00:00
Shaun Amott
6c3212f7b2 Update to 0.2.9.10.
PR:		217830
Submitted by:	Yuri Victorovich <yuri@rawbw.com> (maintainer)
2017-03-26 18:30:24 +00:00
Jan Beich
a9425224f1 devel/libevent2: drop historical suffix after r362796
PR:		216777
Approved by:	mm (maintainer)
2017-02-20 02:57:04 +00:00
Jan Beich
21a7215c9a devel/libevent2: update to 2.1.8 and cleanup
- DEFAULT_VERSIONS += ssl=openssl-devel is now supported
- devel/py-event and devel/p5-Event-Lib are marked BROKEN

Changes:	https://github.com/libevent/libevent/raw/release-2.1.8-stable/whatsnew-2.1.txt
Changes:	https://github.com/libevent/libevent/raw/release-2.1.8-stable/ChangeLog
PR:		216527
Exp-run by:	antoine
Approved by:	mm (maintainer)
2017-02-04 07:56:59 +00:00
Dmitry Marakasov
091e5a5125 - Update to 0.2.9.9
PR:		216417
Submitted by:	neel@neelc.org
Approved by:	yuri@rawbw.com (maintainer)
2017-02-01 11:22:18 +00:00
Dmitry Marakasov
9d79e7b146 - Remove always-true/false conditions after FreeBSD 9, 10.1, 10.2 EOL
Approved by:	portmgr blanket
2017-01-09 13:16:49 +00:00
Kurt Jaeger
f2a239afa9 security/tor: update 2.8.11 -> 2.9.8
PR:		215437
Changes:	https://blog.torproject.org/blog/whats-new-tor-0298
		https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=release-0.2.9&id=tor-0.2.9.8#n1
Submitted by:	Yuri Victorovich <yuri@rawbw.com> (maintainer)
2016-12-23 19:12:21 +00:00
Dmitry Marakasov
e801be7523 - Update to 0.2.8.11
PR:		215183
Submitted by:	neel@neelc.org
Approved by:	yuri@rawbw.com (maintainer)
2016-12-15 10:10:22 +00:00
Rene Ladan
6bf5b725f3 Update security/tor to 0.2.8.10
Update security/tor-devel to 0.2.9.6-rc

PR:		215009
Submitted by:	Neel Chauhan <neel@neelc.org>
Approved by:	maintainer <yuri@rawbw.com>
2016-12-05 21:35:38 +00:00
Jan Beich
6c5afc2ab9 security/tor: improve multi-instance support
- rc.d commands now accept optional instance argument
- `status` command output is no longer ambigous

  before:

    $ service tor status
    tor is running as pid 22222.
    tor is running as pid 33333.
    tor is running as pid 11111.

  after:

    $ service tor status
    tor instance inst1: tor is running as pid 22222.
    tor instance inst2: tor is running as pid 33333.
    tor main instance: tor is running as pid 11111.

    $ service tor restart inst1
    tor instance inst1: Stopping tor.
    Waiting for PIDS: 22222.
    Starting tor.
    [...]

PR:		207129
Submitted by:	Yuri Victorovich <yuri@rawbw.com> (maintainer)
2016-11-07 06:24:37 +00:00
Jan Beich
b12f073fbf security/tor: add multi-instance support
PR:		207129
Submitted by:	yuri@rawbw.com (maintainer)
2016-11-02 02:57:03 +00:00
Rene Ladan
b40dfe3c17 Update security/tor to 0.2.8.9
Update security/tor-devel to 0.2.9.4-alpha

For security/tor:
- fix directory permissions
- mark the TOR2WEB option as "expert"

PR:		212952
Submitted by:	Neel Chauhan <neel@neelc.org>
Approved by:	maintainer <yuri@rawbw.com>
MFH:		2016Q4
Security:	c1dc55dc-9556-11e6-b154-3065ec8fd3ec
2016-10-18 17:31:55 +00:00
Mark Linimon
63be648643 Mark as broken on mips64 and sparc64.
Approved by:	portmgr (tier-2 blanket)
2016-09-18 10:14:35 +00:00
Mathieu Arnold
7cf4f3682f Change security/tor{,-devel} to only have a build dependency on openssl
if built statically.

PR:		202175
Reported by:	barnerd
Sponsored by:	Absolight
2016-09-08 14:13:05 +00:00
Dmitry Marakasov
a252d05f3e - Update to 0.2.8.7 [1]
- Remove broken BUFFEREVENTS and INSTR_DOWNLOADS options [2]
- Switch to USES=ssl

PR:		212124 [1], 210389 [2]
Submitted by:	neel@neelc.org [1], U+039b@0x39b.fr [2]
Approved by:	yuri@rawbw.com (maintainer)
2016-09-07 11:46:01 +00:00
Dmitry Marakasov
9f8958411d - Update to 0.2.8.6
PR:		211944
Submitted by:	neel@neelc.org
Approved by:	yuri@rawbw.com (maintainer)
2016-08-19 13:43:21 +00:00
Wen Heping
698bbd3adb - Pass maintainership to submitter
PR:		210646
Submitted by:	yuri@rawbw.com
2016-06-28 00:48:01 +00:00
Rene Ladan
a01b22a052 Reset ports maintained by bf@ until he has time again to work on them.
PR:		210474
Submitted by:	jbeich
With hat:	portmgr-secretary
2016-06-27 21:30:34 +00:00
Steve Wills
86cd4fbe5a many ports: mark broken on powerpc64 2016-04-21 16:43:14 +00:00