Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

ports/130849: [PATCH]security/tor: update to 0.2.0.33

0 views
Skip to first unread message

bf

unread,
Jan 21, 2009, 6:42:36 PM1/21/09
to freebsd-gn...@freebsd.org

>Number: 130849
>Category: ports
>Synopsis: [PATCH]security/tor: update to 0.2.0.33
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: update
>Submitter-Id: current-users
>Arrival-Date: Wed Jan 21 23:50:01 UTC 2009
>Closed-Date:
>Last-Modified:
>Originator: bf
>Release: 8-CURRENT i386
>Organization:
-
>Environment:
>Description:
N.B.: Includes security fixes. From the ChangeLog:

Changes in version 0.2.0.33 - 2009-01-21
o Security fixes:
- Fix a heap-corruption bug that may be remotely triggerable on
some platforms. Reported by Ilja van Sprundel.

o Major bugfixes:
- When a stream at an exit relay is in state "resolving" or
"connecting" and it receives an "end" relay cell, the exit relay
would silently ignore the end cell and not close the stream. If
the client never closes the circuit, then the exit relay never
closes the TCP connection. Bug introduced in Tor 0.1.2.1-alpha;
reported by "wood".
- When sending CREATED cells back for a given circuit, use a 64-bit
connection ID to find the right connection, rather than an addr:port
combination. Now that we can have multiple OR connections between
the same ORs, it is no longer possible to use addr:port to uniquely
identify a connection.
- Bridge relays that had DirPort set to 0 would stop fetching
descriptors shortly after startup, and then briefly resume
after a new bandwidth test and/or after publishing a new bridge
descriptor. Bridge users that try to bootstrap from them would
get a recent networkstatus but would get descriptors from up to
18 hours earlier, meaning most of the descriptors were obsolete
already. Reported by Tas; bugfix on 0.2.0.13-alpha.
- Prevent bridge relays from serving their 'extrainfo' document
to anybody who asks, now that extrainfo docs include potentially
sensitive aggregated client geoip summaries. Bugfix on
0.2.0.13-alpha.
- If the cached networkstatus consensus is more than five days old,
discard it rather than trying to use it. In theory it could be
useful because it lists alternate directory mirrors, but in practice
it just means we spend many minutes trying directory mirrors that
are long gone from the network. Also discard router descriptors as
we load them if they are more than five days old, since the onion
key is probably wrong by now. Bugfix on 0.2.0.x. Fixes bug 887.


o Minor bugfixes:
- Do not mark smartlist_bsearch_idx() function as ATTR_PURE. This bug
could make gcc generate non-functional binary search code. Bugfix
on 0.2.0.10-alpha.
- Build correctly on platforms without socklen_t.
- Compile without warnings on solaris.
- Avoid potential crash on internal error during signature collection.
Fixes bug 864. Patch from rovv.
- Correct handling of possible malformed authority signing key
certificates with internal signature types. Fixes bug 880.
Bugfix on 0.2.0.3-alpha.
- Fix a hard-to-trigger resource leak when logging credential status.
CID 349.
- When we can't initialize DNS because the network is down, do not
automatically stop Tor from starting. Instead, we retry failed
dns_inits() every 10 minutes, and change the exit policy to reject
*:* until one succeeds. Fixes bug 691.
- Use 64 bits instead of 32 bits for connection identifiers used with
the controller protocol, to greatly reduce risk of identifier reuse.
- When we're choosing an exit node for a circuit, and we have
no pending streams, choose a good general exit rather than one that
supports "all the pending streams". Bugfix on 0.1.1.x. Fix by rovv.
- Fix another case of assuming, when a specific exit is requested,
that we know more than the user about what hosts it allows.
Fixes one case of bug 752. Patch from rovv.
- Clip the MaxCircuitDirtiness config option to a minimum of 10
seconds. Warn the user if lower values are given in the
configuration. Bugfix on 0.1.0.1-rc. Patch by Sebastian.
- Clip the CircuitBuildTimeout to a minimum of 30 seconds. Warn the
user if lower values are given in the configuration. Bugfix on
0.1.1.17-rc. Patch by Sebastian.
- Fix a memory leak when we decline to add a v2 rendezvous descriptor to
the cache because we already had a v0 descriptor with the same ID.
Bugfix on 0.2.0.18-alpha.
- Fix a race condition when freeing keys shared between main thread
and CPU workers that could result in a memory leak. Bugfix on
0.1.0.1-rc. Fixes bug 889.
- Send a valid END cell back when a client tries to connect to a
nonexistent hidden service port. Bugfix on 0.1.2.15. Fixes bug
840. Patch from rovv.
- Check which hops rendezvous stream cells are associated with to
prevent possible guess-the-streamid injection attacks from
intermediate hops. Fixes another case of bug 446. Based on patch
from rovv.
- If a broken client asks a non-exit router to connect somewhere,
do not even do the DNS lookup before rejecting the connection.
Fixes another case of bug 619. Patch from rovv.
- When a relay gets a create cell it can't decrypt (e.g. because it's
using the wrong onion key), we were dropping it and letting the
client time out. Now actually answer with a destroy cell. Fixes
bug 904. Bugfix on 0.0.2pre8.

o Minor bugfixes (hidden services):
- Do not throw away existing introduction points on SIGHUP. Bugfix on
0.0.6pre1. Patch by Karsten. Fixes bug 874.

o Minor features:
- Report the case where all signatures in a detached set are rejected
differently than the case where there is an error handling the
detached set.
- When we realize that another process has modified our cached
descriptors, print out a more useful error message rather than
triggering an assertion. Fixes bug 885. Patch from Karsten.
- Implement the 0x20 hack to better resist DNS poisoning: set the
case on outgoing DNS requests randomly, and reject responses that do
not match the case correctly. This logic can be disabled with the
ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
of servers that do not reliably preserve case in replies. See
"Increased DNS Forgery Resistance through 0x20-Bit Encoding"
for more info.
- Check DNS replies for more matching fields to better resist DNS
poisoning.
- Never use OpenSSL compression: it wastes RAM and CPU trying to
compress cells, which are basically all encrypted, compressed, or
both.


>How-To-Repeat:

>Fix:


Patch attached with submission follows:

diff -ruN tor.orig/Makefile tor/Makefile
--- tor.orig/Makefile 2009-01-21 17:46:50.422699984 -0500
+++ tor/Makefile 2009-01-21 18:19:30.784218277 -0500
@@ -6,8 +6,8 @@
#

PORTNAME= tor
-DISTVERSION= 0.2.0.32
-PORTREVISION= 2
+DISTVERSION= 0.2.0.33
+PORTREVISION= 0
CATEGORIES= security net
MASTER_SITES= http://www.torproject.org/dist/ \
http://tor.cypherpunks.at/dist/ \
diff -ruN tor.orig/distinfo tor/distinfo
--- tor.orig/distinfo 2009-01-21 17:46:50.424700238 -0500
+++ tor/distinfo 2009-01-21 18:19:30.784218277 -0500
@@ -1,3 +1,3 @@
-MD5 (tor-0.2.0.32.tar.gz) = fd55489f7ad1ef53c0b0dac857696fc9
-SHA256 (tor-0.2.0.32.tar.gz) = 66669aa2cb74e7b0cf13db05472d88422f42c9c0129ce95ecd463aa123925d27
-SIZE (tor-0.2.0.32.tar.gz) = 2159864
+MD5 (tor-0.2.0.33.tar.gz) = 9ad86a956b99b1ab007d459d74348960
+SHA256 (tor-0.2.0.33.tar.gz) = 33df58455bb6e524350f69f6892627258f6cb0b56a953c80c13beff85f1731ad
+SIZE (tor-0.2.0.33.tar.gz) = 2167542


>Release-Note:
>Audit-Trail:
>Unformatted:

ed...@freebsd.org

unread,
Jan 21, 2009, 6:50:12 PM1/21/09
to ed...@freebsd.org, freebsd-p...@freebsd.org, mi...@freebsd.org
Synopsis: [PATCH]security/tor: update to 0.2.0.33

Responsible-Changed-From-To: freebsd-ports-bugs->miwi
Responsible-Changed-By: edwin
Responsible-Changed-When: Wed Jan 21 23:50:12 UTC 2009
Responsible-Changed-Why:
Over to maintainer (via the GNATS Auto Assign Tool)

http://www.freebsd.org/cgi/query-pr.cgi?pr=130849

rjkm...@gmail.com

unread,
Apr 2, 2020, 9:56:33 AM4/2/20
to
The tiny URL tracker along with a portion of the php program that was injected into all nested families had malware or Trojan embedded code for hackers and high jacks to cross interface with root directory architect. The Unported onion network allows them to go un detected until you wanna cry virus like scenario unfolds by Ryan Murray this original php template file was found by me on the red browser and tor wiki to code multi layer universal program. You used python and auto bots to deploy it to all directories but you didn’t leave out the virus or malware code made to penetrate security protocols

rjkm...@gmail.com

unread,
Apr 2, 2020, 9:58:03 AM4/2/20
to
A big red flag on this bug since it cross interfaces with all platforms
0 new messages