Am 10.02.2017 um 19:21 schrieb nusenu:
>> Looks like FreeBSD and most people running BSD is (are) lacking
>> behind - "sudo pkg update && sudo pkg upgrade -y" is not bringing
>> success - what do you recommend there?
>
>
> If you did not get tor 0.2.9.9 via pkg yet you are probably using the
>
Andrew Smith:
> Just to add another data point, the Alpine distribution is currently on
> 0.2.8.12
tor 0.2.8.12 is fine.
0.2.8.x is likely supported until 2018-01-01 (nickm's plan).
(and as the subject says, this is more about 0.2.9.x)
signature.asc
Description: OpenPGP digital signature
Just to add another data point, the Alpine distribution is currently on
0.2.8.12:
https://pkgs.alpinelinux.org/packages?name=tor
On 10 February 2017 at 18:27, nusenu wrote:
> Hello Marcel,
>
> thanks for running a relay.
>
> Marcel Krzystek:
> > Sorry to be a dunce,
Hello Marcel,
thanks for running a relay.
Marcel Krzystek:
> Sorry to be a dunce, but I opened a new relay on Ubuntu 16.10. 0.2.8.8 is
> in the repository. How do I pull 0.2.9.9? Do I need to download/install the
> browser bundle off of torproject.org?
On Ubuntu you should use the torproject
Sorry to be a dunce, but I opened a new relay on Ubuntu 16.10. 0.2.8.8 is
in the repository. How do I pull 0.2.9.9? Do I need to download/install the
browser bundle off of torproject.org?
On Fri, Feb 10, 2017 at 11:21 AM, nusenu wrote:
> > Looks like FreeBSD and most
> Looks like FreeBSD and most people running BSD is (are) lacking
> behind - "sudo pkg update && sudo pkg upgrade -y" is not bringing
> success - what do you recommend there?
If you did not get tor 0.2.9.9 via pkg yet you are probably using the
quarterly [1] and not the latest [2] repo.
On 09.02.2017 23:56, Paul wrote:
> Looks like FreeBSD and most people running BSD is (are) lacking behind -
> "sudo pkg update && sudo pkg upgrade -y" is not bringing success - what do
> you recommend there?
use FreeBSD ports, there is 0.2.9.9 available.
On 02/09/2017 07:25 PM, teor wrote:
>> I haven't been able to upgrade from Tor 0.2.7.5, which ARM tells me in
>> red type is "unrecommended," which seems alarming. I'm running
>> 3.2.0-121-generic-pae GNU/Linux on Ubuntu 12.04 (precise).
>
> If you're on Ubuntu (or Debian) you can get the
> On 10 Feb 2017, at 13:19, Kenneth Freeman wrote:
>
>
>
> On 02/09/2017 02:10 PM, Roger Dingledine wrote:
>> On Thu, Feb 09, 2017 at 09:51:14PM +0100, Maarten A. wrote:
>>> My log indicates Tor 0.2.5.12 (git-6350e21f2de7272f)
>> [...]
>>> I think I read somewhere debian
Looks like FreeBSD and most people running BSD is (are) lacking behind - "sudo
pkg update && sudo pkg upgrade -y" is not bringing success - what do you
recommend there?
Thanks
Paul
Am 09.02.2017 um 22:10 schrieb Roger Dingledine:
> On Thu, Feb 09, 2017 at 09:51:14PM +0100, Maarten A. wrote:
Sorry, I thought I had. I must have hit the wrong reply button. Now copied in.
Apologies for the top post...On 9 Feb 2017 21:58, Roger Dingledine wrote: >
> On Thu, Feb 09, 2017 at 09:57:03PM +, mick wrote: > > Done > > > > Now
running 0.2.9.9. > > Thanks! Can you send this to the list
> could you please tell me which three rodents are still not updated?
If you do not know where you run what version, you can ask onionoo to
give you a list of relays with a given contact string:
https://onionoo.torproject.org/details?contact=ab...@to-surf-and-protect.net=platform,nickname
Nick Mathewson:
> there are still 700 crashable relays on the network.
The account for ~12% CW fraction.
Sadly big operators are on that list as well, i.e:
+---+-+
| contact | tor_version |
On Thu, Feb 09, 2017 at 09:51:14PM +0100, Maarten A. wrote:
> My log indicates Tor 0.2.5.12 (git-6350e21f2de7272f)
[...]
> I think I read somewhere debian does security backport, hence the old
> version numbers. You probably know this already.
>
> I'm running Debian GNU/Linux 8.7 (jessie)
Yep,
Rodger,
My log indicates Tor 0.2.5.12 (git-6350e21f2de7272f)
apt-cache output:
tor:
Installed: 0.2.5.12-4
Candidate: 0.2.5.12-4
Version table:
*** 0.2.5.12-4 0
500 http://ftp.nl.debian.org/debian/ jessie/main amd64 Packages
500 http://security.debian.org/
2017-02-09 20:48 GMT+01:00 mick :
>
> Attempting an upgrade from 0.2.9.8 I get nothing.
>
>
I have Jessie and tor from jessie-backports, tor version is 0.2.9.9.
Sebastian
___
tor-relays mailing list
tor-relays@lists.torproject.org
On Thu, Feb 09, 2017 at 07:48:10PM +, mick wrote:
> I am. (Debian Jessie 8.7 - using the tor repos).
>
> Attempting an upgrade from 0.2.9.8 I get nothing.
Weasel suggests that you run "apt-cache policy tor" and remember
what it says, then "apt-get update", then "apt-cache policy tor"
again
On Thu, 9 Feb 2017 13:36:56 -0500
Roger Dingledine allegedly wrote:
> On Thu, Feb 09, 2017 at 01:04:30PM -0500, Nick Mathewson wrote:
> > If you are on some earlier version of 0.2.9.x, it would be really
> > great if you could update your relay some time soon
>
> And, if you're
On Thu, Feb 09, 2017 at 01:04:30PM -0500, Nick Mathewson wrote:
> If you are on some earlier version of 0.2.9.x, it would be really
> great if you could update your relay some time soon
And, if you're one of the many relays still on 0.2.9.8, and the reason
is something other than "oops, you're
Hi, awesome relay operators!
About two weeks ago, we put out 0.2.9.9, to fix a significant problem
in our build process that led to an easy remote crash attack:
o Major bugfixes (security):
- Downgrade the "-ftrapv" option from "always on" to "only on when
20 matches
Mail list logo