From: openbsd@systemfailure.net Subject: net/tor: update to 0.4.8.13 with PoW defense To: ports@openbsd.org,pascal@stumpf.co,Solene Rapenne Date: Mon, 28 Oct 2024 09:03:47 +0000 Hello, tor-0.4.8.13 is out, this is a bugfix release [1]. Attached is a patch updating tor to 0.4.8.13, while also enabling Proof-of-Work defense as I proposed a few days ago [2]. The only test failing is the same that failed consistently with previous versions or tor, and it doesn't prevent the port to build and run fine, at least on amd64. Best regards. -- [1] https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes [2] https://marc.info/?l=openbsd-ports&m=172926299413404&w=2 Index: Makefile =================================================================== RCS file: /cvs/ports/net/tor/Makefile,v diff -u -p -r1.165 Makefile --- Makefile 8 Jun 2024 08:22:17 -0000 1.165 +++ Makefile 27 Oct 2024 14:53:44 -0000 @@ -1,12 +1,12 @@ COMMENT= anonymity service using onion routing -DISTNAME= tor-0.4.8.12 +DISTNAME= tor-0.4.8.13 CATEGORIES= net HOMEPAGE= https://www.torproject.org/ MAINTAINER= Pascal Stumpf -# BSD +# GPL PERMIT_PACKAGE= Yes WANTLIB += c crypto event_core event_extra execinfo m pthread ssl z @@ -21,7 +21,8 @@ CONFIGURE_ARGS= --with-ssl-dir=/usr \ --with-libevent-dir="${LOCALBASE}" \ --disable-gcc-hardening \ --disable-lzma \ - --disable-zstd + --disable-zstd \ + --enable-gpl CONFIGURE_ENV+=ac_cv_member_struct_ssl_method_st_get_cipher_by_char=no CFLAGS+= -DDISABLE_ENGINES Index: distinfo =================================================================== RCS file: /cvs/ports/net/tor/distinfo,v diff -u -p -r1.132 distinfo --- distinfo 8 Jun 2024 08:22:17 -0000 1.132 +++ distinfo 27 Oct 2024 14:53:44 -0000 @@ -1,2 +1,2 @@ -SHA256 (tor-0.4.8.12.tar.gz) = ynzHNdmON0e1jy88wU+ATdeJ+g+zM6hNy2vXCtu4yHQ= -SIZE (tor-0.4.8.12.tar.gz) = 9687430 +SHA256 (tor-0.4.8.13.tar.gz) = m68mw4eiggs5QtpXIUbm63fCvGaGKvYpfNAqB05vuig= +SIZE (tor-0.4.8.13.tar.gz) = 9912610