diff options
author | Roger Dingledine <arma@torproject.org> | 2011-09-09 13:51:15 -0400 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2011-09-09 13:51:15 -0400 |
commit | ae2856b6f6c3f270f5713a622822106df6be318c (patch) | |
tree | 74378cbb0a18cebd4fc286e5beedfd97f6a69688 | |
parent | a41f1fc6127a688485b90c1fc2bfcbeb59e41f0b (diff) | |
download | tor-ae2856b6f6c3f270f5713a622822106df6be318c.tar.gz tor-ae2856b6f6c3f270f5713a622822106df6be318c.zip |
start an 0.2.3.4-alpha changelog
-rw-r--r-- | ChangeLog | 64 | ||||
-rw-r--r-- | changes/bug2649a | 5 | ||||
-rw-r--r-- | changes/bug2649b | 5 | ||||
-rw-r--r-- | changes/bug3327 | 14 | ||||
-rw-r--r-- | changes/bug3421 | 6 | ||||
-rw-r--r-- | changes/bug3428b | 9 | ||||
-rw-r--r-- | changes/bug3851 | 4 | ||||
-rw-r--r-- | changes/bug3894 | 4 | ||||
-rw-r--r-- | changes/bug3909 | 3 | ||||
-rw-r--r-- | changes/bug3923 | 5 | ||||
-rw-r--r-- | changes/replay-firstpart | 13 | ||||
-rw-r--r-- | changes/split_entry_conn | 5 |
12 files changed, 64 insertions, 73 deletions
@@ -1,3 +1,67 @@ +Changes in version 0.2.3.4-alpha - 2011-09-?? + o Major bugfixes: + - Avoid an assertion failure when reloading a configuration with + TrackExitHosts changes. Found and fixed by 'laruldan'. Fixes bug + 3923; bugfix on 0.2.2.25-alpha. + + o Major features: + - Relays now try regenerating and uploading their descriptor more + frequently if they are not listed in the consensus, or if the + version of their descriptor listed in the consensus is too + old. This fix should prevent situations where a server declines + to re-publish itself because it has done so too recently, even + though the authorities decided not to list its recent-enough + descriptor. Fix for bug 3327. + + o Minor features (security): + - Check for replays of the public-key encrypted portion of an + INTRODUCE1 cell, in addition to the current check for replays of + the g^x value. This prevents a possible class of active attacks + by an attacker who controls both an introduction point and a + rendezvous point, and who uses the malleability of AES-CTR to + alter the encrypted g^x portion of the INTRODUCE1 cell. We think + that these attacks is infeasible (requiring the attacker to send + on the order of zettabytes of altered cells in a short interval), + but we'd rather block them off in case there are any classes of + this attack that we missed. Reported by Willem Pinckaers. + + o Minor features: + - Add a VoteOnHidServDirectoriesV2 configuration option to allow + directory authorities to abstain from voting on assignment of + the HSDir consensus flag. Related to bug 2649. + - Relays now include a reason for regenerating their descriptors + an HTTP header when uploading to the authorities. This will + make it easier to debug descriptor-upload issues in the future. + - When starting as root and then changing our UID via the User + control option, if we are running with ControlSocket, make sure + that the ControlSocket is owned by the same account that Tor will + run under. Implements ticket 3421; fix by Jérémy Bobbio. + + o Minor bugfixes: + - Change the default required uptime for a relay to be accepted as + a HSDir from 24 hours to 25 hours. Bugfix on 0.2.0.10-alpha; + fixes bug 2649. + - Abort if tor_vasprintf fails in connection_printf_to_buf (a + utility function used in the control-port code). This shouldn't + ever happen unless Tor is completely out of memory, but if it + did happen and Tor somehow recovered from it, Tor could have + sent a log message to a control port in the middle of a reply to + a controller command. Fixes part of bug 3428. + - Make 'FetchUselessDescriptors' cause all descriptor types and + all consensus types to get fetched. Fixes bug 3851; bugfix on + 0.2.3.1-alpha. + + o Build fixes: + - Clean up some code issues that prevented Tor from building on older + BSDs. Fixes bug 3894; reported by "grarpamp". + - Search for a platform-specific version of "ar" when cross-compiling. + Should fix builds on iOS. Found by Marco Bonetti. + + o Code refactoring: + - Make a new "entry connection" struct as an internal subtype of "edge + connection", to simplify the code and make exit connections smaller. + + Changes in version 0.2.3.3-alpha - 2011-09-01 Tor 0.2.3.3-alpha adds a new "stream isolation" feature to improve Tor's security, and provides client-side support for the microdescriptor diff --git a/changes/bug2649a b/changes/bug2649a deleted file mode 100644 index 4ee31ebdb6..0000000000 --- a/changes/bug2649a +++ /dev/null @@ -1,5 +0,0 @@ - o Minor features: - - Add a VoteOnHidServDirectoriesV2 configuration option to allow - directory authorities to abstain from voting on assignment of - the HSDir consensus flag. Related to bug 2649. - diff --git a/changes/bug2649b b/changes/bug2649b deleted file mode 100644 index 1ff14e5569..0000000000 --- a/changes/bug2649b +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes: - - Change the default required uptime for a relay to be accepted as - a HSDir from 24 hours to 25 hours. Bugfix on 0.2.0.10-alpha; - fixes bug 2649. - diff --git a/changes/bug3327 b/changes/bug3327 deleted file mode 100644 index 454eb3156c..0000000000 --- a/changes/bug3327 +++ /dev/null @@ -1,14 +0,0 @@ - o Major features: - - Relays now try regenerating and uploading their descriptor more - frequently if they are not listed in the consensus, or if the - version of their descriptor listed in the consensus is too - old. This fix should prevent situations where a server declines - to re-publish itself because it has done so too recently, even - though the authorities decided not to list its recent-enough - descriptor. Fix for bug 3327. - - o Minor features: - - Relays now include a reason for regenerating their descriptors - an HTTP header when uploading to the authorities. This will - make it easier to debug descriptor-upload issues in the future. - diff --git a/changes/bug3421 b/changes/bug3421 deleted file mode 100644 index 8a4072987f..0000000000 --- a/changes/bug3421 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor features: - - When starting as root and then changing our UID via the User - control option, if we are running with ControlSocket, make sure - that the ControlSocket is owned by the same account that Tor will - run under. Implements ticket 3421; fix by Jérémy Bobbio. - diff --git a/changes/bug3428b b/changes/bug3428b deleted file mode 100644 index 2cdd688f8d..0000000000 --- a/changes/bug3428b +++ /dev/null @@ -1,9 +0,0 @@ - o Minor bugfixes: - - Abort if tor_vasprintf fails in connection_printf_to_buf (a - utility function used in the control-port code). This shouldn't - ever happen unless Tor is completely out of memory, but if it - had happened and Tor somehow recovered from it, Tor could have - sent a log message to a control port in the middle of a reply to - a controller command. Fixes part of bug 3428. - - diff --git a/changes/bug3851 b/changes/bug3851 deleted file mode 100644 index 91572f031b..0000000000 --- a/changes/bug3851 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes: - - Make 'FetchUselessDescriptors' cause all descriptor types and - all consensus types get fetched. Fixes bug 3851; bugfix on - 0.2.3.1-alpha. diff --git a/changes/bug3894 b/changes/bug3894 deleted file mode 100644 index 4c2220aba8..0000000000 --- a/changes/bug3894 +++ /dev/null @@ -1,4 +0,0 @@ - o Build fixes: - - Clean up some code issues that prevented Tor from building on older - BSDs. Fixes bug 3894; reported by grarpamp. - diff --git a/changes/bug3909 b/changes/bug3909 deleted file mode 100644 index 0b4b292030..0000000000 --- a/changes/bug3909 +++ /dev/null @@ -1,3 +0,0 @@ - o Build fixes: - - Search for a platform-specific version of "ar" when cross-compiling. - Should fix builds on iOS. Found by Marco Bonetti. diff --git a/changes/bug3923 b/changes/bug3923 deleted file mode 100644 index 9c0e138826..0000000000 --- a/changes/bug3923 +++ /dev/null @@ -1,5 +0,0 @@ - o Major bugfies: - - Avoid an assertion failure when reloading a configuration with - TrackExitHosts changes. Found and fixed by 'laruldan'. Fixes - bug 3923; bugfix on 0.2.2.25-alpha. - diff --git a/changes/replay-firstpart b/changes/replay-firstpart deleted file mode 100644 index f4a7767fb1..0000000000 --- a/changes/replay-firstpart +++ /dev/null @@ -1,13 +0,0 @@ - o Minor features (security): - - - Check for replays of the public-key encrypted portion of an - INTRODUCE1 cell, in addition to the current check for replays of - the g^x value. This prevents a possible class of active attacks - by an attacker who controls both an introduction point and a - rendezvous point, and who uses the malleability of AES-CTR to - alter the encrypted g^x portion of the INTRODUCE1 cell. We - think that these attacks is infeasible (requiring the attacker - to send on the order of zettabytes of altered cells in a short - interval), but we'd rather block them off in case there are any - classes of this attack that we missed. Reported by dvorak. - diff --git a/changes/split_entry_conn b/changes/split_entry_conn deleted file mode 100644 index c0a2eb6574..0000000000 --- a/changes/split_entry_conn +++ /dev/null @@ -1,5 +0,0 @@ - o Code refactoring: - - Make "entry connection" in to a new internal subtype of "edge - connection", to simplify the code and make exit connections - smaller. - |