Tor 0.2.1.5-alpha is out

otto otto o815 at hotmail.com
Thu Sep 11 05:52:21 UTC 2008


When I try to build Tor 0.2.1.5-alpha on Solaris10 I get the following warning and can't build the binaries.:

geoip.c: In function `geoip_get_client_history':
geoip.c:446: warning: comparison between signed and unsigned
gmake[3]: *** [geoip.o] Error 1
gmake[3]: Leaving directory `/usr/local/lib/tor-0.2.1.5-alpha/src/or'
gmake[2]: *** [all-recursive] Error 1
gmake[2]: Leaving directory `/usr/local/lib/tor-0.2.1.5-alpha/src'
gmake[1]: *** [all-recursive] Error 1
gmake[1]: Leaving directory `/usr/local/lib/tor-0.2.1.5-alpha'
gmake: *** [all] Error 2

Any idea what I'm missing?
(I could build and run tor-0.2.0.31 without any issue)

Thanks.
Otto

> Date: Wed, 10 Sep 2008 14:52:28 -0400
> From: arma at mit.edu
> To: or-talk at freehaven.net
> Subject: Tor 0.2.1.5-alpha is out
> 
> Tor 0.2.1.5-alpha moves us closer to handling IPv6 destinations,
> puts in a lot of the infrastructure for adding authorization to hidden
> services, lays the groundwork for having clients read their load balancing
> information out of the networkstatus consensus rather than the individual
> router descriptors, addresses two potential anonymity issues, and fixes
> a variety of smaller issues.
> 
> This development release has a known bug when you configure it to use
> bridge relays; we recommend that bridge users wait for the next release.
> 
> https://www.torproject.org/download.html.en
> 
> Changes in version 0.2.1.5-alpha - 2008-08-31
>   o Major features:
>     - Convert many internal address representations to optionally hold
>       IPv6 addresses.
>     - Generate and accept IPv6 addresses in many protocol elements.
>     - Make resolver code handle nameservers located at ipv6 addresses.
>     - Begin implementation of proposal 121 ("Client authorization for
>       hidden services"): configure hidden services with client
>       authorization, publish descriptors for them, and configure
>       authorization data for hidden services at clients. The next
>       step is to actually access hidden services that perform client
>       authorization.
>     - More progress toward proposal 141: Network status consensus
>       documents and votes now contain bandwidth information for each
>       router and a summary of that router's exit policy. Eventually this
>       will be used by clients so that they do not have to download every
>       known descriptor before building circuits.
> 
>   o Major bugfixes (on 0.2.0.x and before):
>     - When sending CREATED cells back for a given circuit, use a 64-bit
>       connection ID to find the right connection, rather than an addr:port
>       combination. Now that we can have multiple OR connections between
>       the same ORs, it is no longer possible to use addr:port to uniquely
>       identify a connection.
>     - Relays now reject risky extend cells: if the extend cell includes
>       a digest of all zeroes, or asks to extend back to the relay that
>       sent the extend cell, tear down the circuit. Ideas suggested
>       by rovv.
>     - If not enough of our entry guards are available so we add a new
>       one, we might use the new one even if it overlapped with the
>       current circuit's exit relay (or its family). Anonymity bugfix
>       pointed out by rovv.
> 
>   o Minor bugfixes:
>     - Recover 3-7 bytes that were wasted per memory chunk. Fixes bug
>       794; bug spotted by rovv. Bugfix on 0.2.0.1-alpha.
>     - When using the TransPort option on OpenBSD, and using the User
>       option to change UID and drop privileges, make sure to open /dev/pf
>       before dropping privileges. Fixes bug 782. Patch from Christopher
>       Davis. Bugfix on 0.1.2.1-alpha.
>     - Correctly detect the presence of the linux/netfilter_ipv4.h header
>       when building against recent kernels. Bugfix on 0.1.2.1-alpha.
>     - Add a missing safe_str() call for a debug log message.
>     - Use 64 bits instead of 32 bits for connection identifiers used with
>       the controller protocol, to greatly reduce risk of identifier reuse.
>     - Make the autoconf script accept the obsolete --with-ssl-dir
>       option as an alias for the actually-working --with-openssl-dir
>       option. Fix the help documentation to recommend --with-openssl-dir.
>       Based on a patch by "Dave". Bugfix on 0.2.0.1-alpha.
> 
>   o Minor features:
>     - Rate-limit too-many-sockets messages: when they happen, they happen
>       a lot. Resolves bug 748.
>     - Resist DNS poisoning a little better by making sure that names in
>       answer sections match.
>     - Print the SOCKS5 error message string as well as the error code
>       when a tor-resolve request fails. Patch from Jacob.
> 

_________________________________________________________________
Hotmail to go! Hol' Dir Hotmail aufs Handy!
http://windowslivemobile.msn.com/BrowserServiceHotmail.aspx?lang=de-de
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20080911/28a34a6e/attachment.htm>


More information about the tor-talk mailing list