summaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2020-07-27 08:59:21 -0400
committerNick Mathewson <nickm@torproject.org>2020-07-27 08:59:21 -0400
commitc178d51965bd543d3973ef8d15e97c9ae1105768 (patch)
tree6d3b34be987b2112532d3555e7c8d91f895e904b /ChangeLog
parent7d9e0055ace0b62d33d182747a545ebf0aa76ca4 (diff)
downloadtor-c178d51965bd543d3973ef8d15e97c9ae1105768.tar.gz
tor-c178d51965bd543d3973ef8d15e97c9ae1105768.zip
Start an 0.4.4.3-alpha changelog
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog54
1 files changed, 54 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index 1e2d2164af..982470106a 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,57 @@
+Changes in version 0.4.4.3-alpha - 2020-07-2?
+ Tor 0.4.4.3-alpha fixes several annoyances in previous versions,
+ including one affecting NSS users, and several affecting the Linux
+ seccomp2 sandbox.
+
+ o Major features (fallback directory list):
+ - Replace the 148 fallback directories originally included in Tor
+ 0.4.1.4-rc (of which around 105 are still functional) with a list
+ of 144 fallbacks generated in July 2020. Closes ticket 40061.
+
+ o Major bugfixes (NSS):
+ - When running with NSS enabled, make sure that NSS knows to expect
+ nonblocking sockets. Previously, we set our TCP sockets as
+ blocking, but did not tell NSS about the fact, which in turn could
+ lead to unexpected blocking behavior. Fixes bug 40035; bugfix
+ on 0.3.5.1-alpha.
+
+ o Minor bugfixes (linux seccomp2 sandbox):
+ - Fix a regression on sandboxing rules for the openat() syscall. The
+ fix for bug 25440 fixed the problem on systems with glibc >= 2.27
+ but broke tor on previous versions of glibc. We now apply the
+ correct seccomp rule according to the running glibc version. Patch
+ from Daniel Pinto. Fixes bug 27315; bugfix on 0.3.5.11.
+ - Makes the seccomp sandbox allow the correct syscall for opendir
+ according to the running glibc version. The opendir function
+ either uses open or openat but the current code does not
+ differenciate between opendir and open calls. This adds a new
+ seccomp sandbox rule for opendir. This fixes crashes when
+ reloading torrc with sandbox enabled when running on glibc 2.15 to
+ 2.21 and 2.26. Patch from Daniel Pinto. Fixes bug 40020; bugfix
+ on 0.3.5.11.
+
+ o Minor bugfixes (relay, usability):
+ - Adjust the rules for when to warn about having too many
+ connections to other relays. Previously we'd tolerate up to 1.5
+ connections per relay on average. Now we tolerate more connections
+ for directory authorities, and raise the number of total
+ connections we need to see before we warn. Fixes bug 33880; bugfix
+ on 0.3.1.1-alpha.
+
+ o Documentation:
+ - Replace most http:// URLs in our code and documentation with
+ https:// URLs. (We have left unchanged the code in src/ext/, and
+ the text in LICENSE.) Closes ticket 31812. Patch from Jeremy Rand.
+
+ o Removed features:
+ - Our "check-local" test target no longer tries to use the
+ Coccinelle semantic patching tool parse all the C files. While it
+ is a good idea to try to make sure Coccinelle works on our C
+ before we run a Coccinelle patch, doing so on every test run has
+ proven to be disruptive. You can still run this tool manually with
+ "make check-cocci". Closes ticket 40030.
+
+
Changes in version 0.4.4.2-alpha - 2020-07-09
This is the second alpha release in the 0.4.4.x series. It fixes a few
bugs in the previous release, and solves a few usability,