Re: [freenet-support] Stable build 5086 and major vulnerability fix

2004-07-23 Thread sysrq
Just went through the update the the web interface and log still say im 
running 5085.

On Sat, Jul 24, 2004 at 12:48:53AM +0100, Toad wrote:
 Stable build 5086 is now available. The snapshots have been updated.
 Please upgrade ASAP (if you are running the stable branch, which most
 Freenet users are). This build fixes a fairly major vulnerability to
 passive traffic analysis whereby an attacker could determine (on
 uncongested links) the types of messages being transferred, and perhaps
 the MRI, and with help from a node from within the network, he could
 perhaps trace a message chain's path across much of the network (with a
 lot of luck), and perhaps find compromizing information. This is the
 initial fix and it may be somewhat wasteful of bandwidth. We will
 develop better fixes in the near future, but it is at least backwards 
 compatible: You should not need to reseed.
 How to update:
 On POSIX-like systems such as Linux and MacOS/X (or Darwin):
 ./stop-freenet.sh
 ./update.sh
 ./start-freenet.sh
 On Windows, you can use the update option on the start menu.
 On any platform, you can stop the node, download
 http://freenetproject.org/snapshots/freenet-latest.jar over your
 existing freenet.jar, and then start the node up again.
 
 The next build, 5087, will probably contain a significant CPU usage
 improvement by means of using native code to speed up some of the
 heaviest crypto and routing operations. That code is not quite ready
 yet; look for a release later on Saturday, or perhaps Monday.
 -- 
 Matthew J Toseland - [EMAIL PROTECTED]
 Freenet Project Official Codemonkey - http://freenetproject.org/
 ICTHUS - Nothing is impossible. Our Boss says so.



 ___
 Support mailing list
 [EMAIL PROTECTED]
 http://news.gmane.org/gmane.network.freenet.support
 Unsubscribe at http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/support
 Or mailto:[EMAIL PROTECTED]


pgp3r2m3KkRZI.pgp
Description: PGP signature
___
Support mailing list
[EMAIL PROTECTED]
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]

Re: [freenet-support] start-freenet.sh patch to disable NPTL on SuSE Linux

2004-07-25 Thread sysrq
Im running gentoo with nptl and I just commented out the whole if 
statement and the setting of LD_ASSUME_KERNEL and it works fine here. So 
perhaps just not setting it if the user is running gentoo will work for 
others.

On Sun, Jul 25, 2004 at 12:35:22AM -0500, Salah Coronya wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Nomen Nescio wrote:
  On Sat, Jul 24, 2004 at 11:06:23PM +0100, Toad wrote:
 
 Will be committed to unstable soon.
 
 
 
 That might not be such a good idea, it'll blow up Gentoo:
 
 http://bugs.gentoo.org/show_bug.cgi?id=45004
 
 I run into the problem. However NPTL doesn't seem to be causing me any
 problems, I don;t know how to to check to see if the same thing is
 happening here. Freenet merrily chugs along
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.2.4 (MingW32)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 
 iD8DBQFBA0aahctESbvQ8ZwRAuXDAKCIVECRiAnYs00FVYb9Dawr7bc95gCeJxlC
 8Uq6B+Zxi+O+TsuucA6TVq0=
 =7c2Z
 -END PGP SIGNATURE-
 ___
 Support mailing list
 [EMAIL PROTECTED]
 http://news.gmane.org/gmane.network.freenet.support
 Unsubscribe at http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/support
 Or mailto:[EMAIL PROTECTED]


pgpTrCK22wMJQ.pgp
Description: PGP signature
___
Support mailing list
[EMAIL PROTECTED]
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]