summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2016-03-28 09:29:17 -0400
committerNick Mathewson <nickm@torproject.org>2016-03-28 09:29:17 -0400
commit54dab73464cd7fbe7341b3531d36a035508b29dd (patch)
treea8c8849f9b4682caffb0ab185680408aa2936341
parent474b00d9fd8c75e2befcc864aa6b77a811b26c10 (diff)
downloadtor-54dab73464cd7fbe7341b3531d36a035508b29dd.tar.gz
tor-54dab73464cd7fbe7341b3531d36a035508b29dd.zip
Reflow the 0282 changelog
-rw-r--r--ChangeLog150
1 files changed, 75 insertions, 75 deletions
diff --git a/ChangeLog b/ChangeLog
index 48fd79ec86..d1663db6fe 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,7 +1,7 @@
Changes in version 0.2.8.2-alpha - 2016-03-??
Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
bugs in earlier versions of Tor, including some that prevented
- authorities using Tor 0.2.7 from running correctly. IPv6 and directory
+ authorities using Tor 0.2.7 from running correctly. IPv6 and directory
support should also be much improved.
o New system requirements:
@@ -25,26 +25,6 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
bugfix on Tor 0.1.1.11-alpha, which fixed a related bug
incompletely. Reported by Guido Vranken.
- o Major bugfixes (voting):
- - Actually enable Ed25519-based directory collation. Previously, the
- code had been written, but some debugging code that had
- accidentally been left in the codebase made it stay turned off.
- Fixes bug 17702; bugfix on 0.2.7.2-alpha.
- - When collating votes by Ed25519 identities, authorities now
- include a "NoEdConsensus" flag if the ed25519 value (or lack
- thereof) for a server does not reflect the majority consensus.
- Related to bug 17668; bugfix on 0.2.7.2-alpha.
- - When generating a vote with keypinning disabled, never include two
- entries for the same ed25519 identity. This bug was causing
- authorities to generate votes that they could not parse when a
- router violated key pinning by changing its RSA identity but
- keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
- 18318. Bugfix on 0.2.7.2-alpha.
-
- o Major bugfixes (dns proxy mode, crash):
- - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
- bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'.
-
o Major bugfixes (bridges, pluggable transports):
- Modify the check for OR connections to private addresses. Allow
bridges on private addresses, including pluggable transports that
@@ -58,16 +38,20 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
o Major bugfixes (crash on shutdown):
- - Fix a segfault during startup: If Unix domain socket was configured as
- listener (such as a ControlSocket or a SocksPort "unix:" socket), and
- tor was started as root but not configured to switch to another
- user, tor would segfault while trying to string compare a NULL
- value. Fixes bug 18261; bugfix on 0.2.8.1-alpha. Patch by weasel.
- - Correctly handle detaching circuits from muxes when
- shutting down. Fixes bug 18116; bugfix
- on 0.2.8.1-alpha.
- - Fix an assert-on-exit bug related to counting memory usage
- in rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
+ - Fix a segfault during startup: If Unix domain socket was
+ configured as listener (such as a ControlSocket or a SocksPort
+ "unix:" socket), and tor was started as root but not configured to
+ switch to another user, tor would segfault while trying to string
+ compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha.
+ Patch by weasel.
+ - Correctly handle detaching circuits from muxes when shutting down.
+ Fixes bug 18116; bugfix on 0.2.8.1-alpha.
+ - Fix an assert-on-exit bug related to counting memory usage in
+ rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
+
+ o Major bugfixes (dns proxy mode, crash):
+ - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
+ bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'.
o Major bugfixes (relays, bridge clients):
- Ensure relays always allow IPv4 OR and Dir connections. Ensure
@@ -75,26 +59,27 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
patch by teor.
+ o Major bugfixes (voting):
+ - Actually enable Ed25519-based directory collation. Previously, the
+ code had been written, but some debugging code that had
+ accidentally been left in the codebase made it stay turned off.
+ Fixes bug 17702; bugfix on 0.2.7.2-alpha.
+ - When collating votes by Ed25519 identities, authorities now
+ include a "NoEdConsensus" flag if the ed25519 value (or lack
+ thereof) for a server does not reflect the majority consensus.
+ Related to bug 17668; bugfix on 0.2.7.2-alpha.
+ - When generating a vote with keypinning disabled, never include two
+ entries for the same ed25519 identity. This bug was causing
+ authorities to generate votes that they could not parse when a
+ router violated key pinning by changing its RSA identity but
+ keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
+ 18318. Bugfix on 0.2.7.2-alpha.
+
o Minor features (security, win32):
- Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
attack. Fixes bug 18123; bugfix on all tor versions. Patch
by "teor".
- o Minor features (hidden service directory):
- - Streamline relay-side hsdir handling: when relays consider whether
- to accept an uploaded hidden service descriptor, they no longer
- check whether they are one of the relays in the network that is
- "supposed" to handle that descriptor. Implements ticket 18332.
-
- o Minor features (IPv6):
- - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
- to 1, tor prefers IPv6 directory addresses.
- - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
- avoids using IPv4 for client OR and directory connections.
- - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and
- ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and
- ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor".
-
o Minor features (bug-resistance):
- Make Tor survive errors involving connections without a
corresponding event object. Previously we'd fail with an
@@ -117,17 +102,33 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
o Minor features (crypto):
- Validate the hard-coded Diffie-Hellman parameters and ensure that
- p is a safe prime, and g is a suitable generator. Closes ticket 18221.
+ p is a safe prime, and g is a suitable generator. Closes
+ ticket 18221.
o Minor features (geoip):
- Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
Country database.
+ o Minor features (hidden service directory):
+ - Streamline relay-side hsdir handling: when relays consider whether
+ to accept an uploaded hidden service descriptor, they no longer
+ check whether they are one of the relays in the network that is
+ "supposed" to handle that descriptor. Implements ticket 18332.
+
+ o Minor features (IPv6):
+ - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
+ to 1, tor prefers IPv6 directory addresses.
+ - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
+ avoids using IPv4 for client OR and directory connections.
+ - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and
+ ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and
+ ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor".
+
o Minor features (linux seccomp2 sandbox):
- - Reject attempts to change our Address with "Sandbox 1"
- enabled. Changing Address with Sandbox turned on would never
- actually work, but previously it would fail in strange and
- confusing ways. Found while fixing 18548.
+ - Reject attempts to change our Address with "Sandbox 1" enabled.
+ Changing Address with Sandbox turned on would never actually work,
+ but previously it would fail in strange and confusing ways. Found
+ while fixing 18548.
o Minor features (robustness):
- Exit immediately with an error message if the code attempts to use
@@ -137,11 +138,11 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
o Minor features (unix domain sockets):
- Add a new per-socket option, RelaxDirModeCheck, to allow creating
Unix domain sockets without checking the permissions on the parent
- directory. (Tor checks permissions by default because some operating
- systems only check permissions on the parent directory. However, some
- operating systems do look at permissions on the socket, and tor's default
- check is unneeded.) Closes ticket 18458. Patch
- by weasel.
+ directory. (Tor checks permissions by default because some
+ operating systems only check permissions on the parent directory.
+ However, some operating systems do look at permissions on the
+ socket, and tor's default check is unneeded.) Closes ticket 18458.
+ Patch by weasel.
o Minor bugfixes (exit policies, security):
- Refresh an exit relay's exit policy when interface addresses
@@ -159,10 +160,9 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
- Do not link the unit tests against both the testing and non-
testing versions of the static libraries. Fixes bug 18490; bugfix
on 0.2.7.1-alpha.
- - Avoid spurious failures from configure files related
- to calling exit(0) in TOR_SEARCH_LIBRARY.
- Fixes bug 18625; bugfix on 0.2.0.1-alpha.
- Patch from "cypherpunks".
+ - Avoid spurious failures from configure files related to calling
+ exit(0) in TOR_SEARCH_LIBRARY. Fixes bug 18625; bugfix on
+ 0.2.0.1-alpha. Patch from "cypherpunks".
- Silence spurious clang-scan warnings in the ed25519_donna code by
explicitly initialising some objects. Fixes bug 18384; bugfix on
0f3eeca9 in 0.2.7.2-alpha. Patch by "teor".
@@ -170,9 +170,8 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
o Minor bugfixes (client, bootstrap):
- Count receipt of new microdescriptors as progress towards
bootstrapping. Previously, with EntryNodes set, Tor might not
- successfully repopulate the guard set on bootstrapping.
- Fixes bug 16825; bugfix
- on 0.2.3.1-alpha.
+ successfully repopulate the guard set on bootstrapping. Fixes bug
+ 16825; bugfix on 0.2.3.1-alpha.
o Minor bugfixes (code correctness):
- Update to the latest version of Trunnel, which tries harder to
@@ -208,14 +207,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
0.2.4.7-alpha. Reported by "atagar", patch by "teor".
o Minor bugfixes (hidden service, client):
- - Handle the case where the user makes several fast consecutive requests to the same .onion
- address. Previously, the first six requests would each trigger a
- descriptor fetch, each picking a directory
- (there are 6 overall) and the seventh one would fail because no
- directories were left, thereby triggering a close on all current directory
- connections asking for the hidden service.
- The solution here is to not close the directory connections if we have pending directory
- fetch. Fixes bug 15937; bugfix on tor-0.2.7.1-alpha.
+ - Handle the case where the user makes several fast consecutive
+ requests to the same .onion address. Previously, the first six
+ requests would each trigger a descriptor fetch, each picking a
+ directory (there are 6 overall) and the seventh one would fail
+ because no directories were left, thereby triggering a close on
+ all current directory connections asking for the hidden service.
+ The solution here is to not close the directory connections if we
+ have pending directory fetch. Fixes bug 15937; bugfix
+ on tor-0.2.7.1-alpha.
o Minor bugfixes (hidden service, control port):
- Add the onion address to the HS_DESC event for the UPLOADED action
@@ -230,15 +230,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
- Avoid a 10-second delay when starting as a client with "Sandbox 1"
enabled and no DNS resolvers configured. This should help TAILS
start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha.
- - Fix the sandbox's interoprability with unix domain sockets under setuid.
- Fixes bug 18253; bugfix on 0.2.8.1-alpha.
+ - Fix the sandbox's interoprability with unix domain sockets under
+ setuid. Fixes bug 18253; bugfix on 0.2.8.1-alpha.
- Allow the setrlimit syscall, and the prlimit and prlimit64
syscalls, which some libc implementations use under the hood.
Fixes bug 15221; bugfix on 0.2.5.1-alpha.
o Minor bugfixes (logging):
- - When logging information about an unparsable networkstatus vote
- or consensus, do not say "vote" when we mean consensus. Fixes bug
+ - When logging information about an unparsable networkstatus vote or
+ consensus, do not say "vote" when we mean consensus. Fixes bug
18368; bugfix on 0.2.0.8-alpha.
- Scrub service in from "unrecognized service ID" log messages.
Fixes bug 18600; bugfix on 0.2.4.11-alpha.