Tor 0.2.2.19-alpha is out

Yet another OpenSSL security patch broke its compatibility with Tor:
Tor 0.2.2.19-alpha makes relays work with OpenSSL 0.9.8p and 1.0.0.b.

https://www.torproject.org/download/download

The original announcement is at http://archives.seul.org/or/talk/Nov-2010/msg00172.html

Changes in version 0.2.2.19-alpha - 2010-11-21
Major bugfixes:

  • Resolve an incompatibility with openssl 0.9.8p and openssl 1.0.0b:
    No longer set the tlsext_host_name extension on server SSL objects;
    but continue to set it on client SSL objects. Our goal in setting
    it was to imitate a browser, not a vhosting server. Fixes bug 2204;
    bugfix on 0.2.1.1-alpha.
  • Minor bugfixes:

  • Try harder not to exceed the maximum length of 50 KB when writing
    statistics to extra-info descriptors. This bug was triggered by very
    fast relays reporting exit-port, entry, and dirreq statistics.
    Reported by Olaf Selke. Bugfix on 0.2.2.1-alpha. Fixes bug 2183.
  • Publish a router descriptor even if generating an extra-info
    descriptor fails. Previously we would not publish a router
    descriptor without an extra-info descriptor; this can cause fast
    exit relays collecting exit-port statistics to drop from the
    consensus. Bugfix on 0.1.2.9-rc; fixes bug 2195.