[tor-commits] [tor/master] fold in recent changelog entries
arma at torproject.org
arma at torproject.org
Sun Jan 22 05:16:59 UTC 2012
commit 110a953156af4a0882b934cdc6a2c964a35fdba5
Author: Roger Dingledine <arma at torproject.org>
Date: Sun Jan 22 00:15:45 2012 -0500
fold in recent changelog entries
---
ChangeLog | 155 +++++++++++++++++++++++++++++++----------
changes/absolute_cookie_file | 3 -
changes/aes_ctr_test | 5 --
changes/badexitcc | 3 -
changes/bug1983_win64 | 3 -
changes/bug2434 | 6 --
changes/bug3325 | 3 -
changes/bug4012 | 8 --
changes/bug4012_022 | 3 -
changes/bug4413 | 5 --
changes/bug4533_part2 | 5 --
changes/bug4650 | 7 --
changes/bug4746 | 2 -
changes/bug4837 | 4 -
changes/bug4856 | 3 -
changes/clean_asprintf | 5 --
changes/dirauth_log | 3 -
changes/fast_bw_param | 8 --
changes/feature3457 | 12 ---
changes/readable_ssl_versions | 6 --
changes/renaming_identifiers | 9 ---
changes/tor_socket_tests | 11 ---
22 files changed, 118 insertions(+), 151 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index d01eecc..9cc692d 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,4 +1,4 @@
-Changes in version 0.2.3.11-alpha - 2012-01-0?
+Changes in version 0.2.3.11-alpha - 2012-01-??
o Major features:
- Now that Tor 0.2.0.x is completely deprecated, enable the final
part of "Proposal 110: Avoiding infinite length circuits" by
@@ -32,26 +32,24 @@ Changes in version 0.2.3.11-alpha - 2012-01-0?
to make sure that the bug can't happen.
o Major bugfixes:
+ - Fix the SOCKET_OK test that we use to tell when socket
+ creation fails so that it works on Win64. Fixes part of bug 4533;
+ bugfix on 0.2.2.29-beta. Bug found by wanoskarnet.
- Correct our replacements for the timeradd() and timersub() functions
on platforms that lack them (for example, Windows). The timersub()
function is used when expiring circuits, while timeradd() is
- currently unused. Bug report and patch by Vektor. Bugfix on
- 0.2.2.24-alpha and 0.2.3.1-alpha; fixes bug 4778.
+ currently unused. Bug report and patch by Vektor. Fixes bug 4778;
+ bugfix on 0.2.2.24-alpha and 0.2.3.1-alpha.
- Do not use OpenSSL 1.0.0's counter mode: it has a critical bug
- that was fixed in OpenSSL 1.0.0a. Fixes bug 4779; bugfix on
- Tor 0.2.3.9-alpha. Found by Pascal.
+ that was fixed in OpenSSL 1.0.0a. We test for the counter mode
+ bug at runtime, not compile time, because some distributions hack
+ their OpenSSL to mis-report its version. Fixes bug 4779; bugfix
+ on 0.2.3.9-alpha. Found by Pascal.
- o Minor features:
- - Directory servers now reject versions of Tor older than 0.2.1.30,
- and Tor versions between 0.2.2.1-alpha and 0.2.2.20-alpha
- (inclusive). These versions accounted for only a small fraction of
- the Tor network, and have numerous known security issues. Resolves
- issue 4788.
+ o Minor features (controller):
- Use absolute path names when reporting the torrc filename in the
control protocol, so a controller can more easily find the torrc
file. Resolves bug 1101.
- - If EntryNodes are given, but UseEntryGuards is set to 0, warn that
- EntryNodes will have no effect. Resolves issue 2571.
- Extend the control protocol to report flags that control a circuit's
path selection in CIRC events and in replies to 'GETINFO
circuit-status'. Implements part of ticket 2411.
@@ -59,6 +57,44 @@ Changes in version 0.2.3.11-alpha - 2012-01-0?
and current state of a hidden-service-related circuit in CIRC
events and in replies to 'GETINFO circuit-status'. Implements part
of ticket 2411.
+ - When reporting the path to the cookie file to the controller,
+ give an absolute path. Resolves ticket 4881.
+ - Allow controllers to request an event notification whenever a
+ circuit is cannibalized or its purpose is changed. Implements
+ part of ticket 3457.
+ - Include the creation time of a circuit in CIRC and CIRC2
+ control-port events and the list produced by the 'GETINFO
+ circuit-status' control-port command.
+
+ o Minor features (directory authorities):
+ - Directory authorities now reject versions of Tor older than
+ 0.2.1.30, and Tor versions between 0.2.2.1-alpha and 0.2.2.20-alpha
+ inclusive. These versions accounted for only a small fraction of
+ the Tor network, and have numerous known security issues. Resolves
+ issue 4788.
+ - Authority operators can now vote for all routers in a given
+ country to be BadDir/BadExit/Invali/Rejected.
+ - Provide two consensus parameters (FastFlagMinThreshold and
+ FastFlagMaxThreshold) to control the range of allowable bandwidths
+ for the Fast directory flag. These allow authorities to run
+ experiments on appropriate requirements for being a "Fast" node.
+ The AuthDirFastGuarantee config value still applies.
+ - Document the GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays
+ directory authority option (introduced in Tor 0.2.2.34).
+
+ o Minor features (other):
+ - Don't disable the DirPort when we cannot exceed our AccountingMax
+ limit during this interval because the effective bandwidthrate is
+ low enough. This is useful in a situation where AccountMax is only
+ used as an additional safeguard or to provide statistics.
+ - Prepend an informative header to generated dynamic_dh_params files.
+ - If EntryNodes are given, but UseEntryGuards is set to 0, warn that
+ EntryNodes will have no effect. Resolves issue 2571.
+ - Log more useful messages when we fail to disable debugger
+ attachment.
+ - Log which authority we're missing votes from when we go to fetch
+ them from the other auths.
+ - Log (at debug level) whenever a circuit's purpose is changed.
- Update to the January 3 2012 Maxmind GeoLite Country database.
o Minor bugfixes (hidden services):
@@ -71,12 +107,12 @@ Changes in version 0.2.3.11-alpha - 2012-01-0?
after the normal CBT. Now, we mark them as 'timed out', and launch
another rendezvous attempt in parallel. This behavior change can
be disabled using the new CloseHSClientCircuitsImmediatelyOnTimeout
- option. Bugfix on 0.2.2.2-alpha; fixes part of bug 1297.
+ option. Fixes part of bug 1297; bugfix on 0.2.2.2-alpha.
- Don't close hidden-service-side rendezvous circuits when they
reach the normal circuit-build timeout. This behaviour change can
be disabled using the new
- CloseHSServiceRendCircuitsImmediatelyOnTimeout option. Bugfix on
- 0.2.2.2-alpha; fixes the remaining part of bug 1297.
+ CloseHSServiceRendCircuitsImmediatelyOnTimeout option. Fixes the
+ remaining part of bug 1297; bugfix on 0.2.2.2-alpha.
- Make sure we never mark the wrong rendezvous circuit as having
had its introduction cell acknowleged by the introduction-point
relay. Previously, when we received an INTRODUCE_ACK cell on a
@@ -84,15 +120,46 @@ Changes in version 0.2.3.11-alpha - 2012-01-0?
marked a rendezvous circuit other than the one we specified in
the INTRODUCE1 cell as INTRO_ACKED, which would have produced
a warning message and interfered with the hidden service
- connection-establishment process. Bugfix on 0.2.3.3-alpha, when we
- added the stream-isolation feature which might cause Tor to open
- multiple rendezvous circuits for the same hidden service. Fixes
- bug 4759.
+ connection-establishment process. Fixes bug 4759; bugfix on
+ 0.2.3.3-alpha, when we added the stream-isolation feature which
+ might cause Tor to open multiple rendezvous circuits for the same
+ hidden service.
- Don't trigger an assertion failure when we mark a new client-side
hidden-service introduction circuit for close during the process
- of creating it. Bugfix on 0.2.3.6-alpha. Fixes bug 4796; reported
+ of creating it. Fixes bug 4796; bugfix on 0.2.3.6-alpha. Reported
by murb.
+ o Minor bugfixes (log messages):
+ - Correctly spell "connect" in a log message on failure to create a
+ controlsocket. Fixes bug 4803; bugfix on 0.2.2.26-beta and
+ 0.2.3.2-alpha.
+ - Fix a typo in a log message in rend_service_rendezvous_has_opened().
+ Fixes bug 4856; bugfix on Tor 0.0.6.
+ - Fix the log message describing how we work around discovering
+ that our version is the ill-fated OpenSSL 0.9.8l. Fixes bug
+ 4837; bugfix on 0.2.2.9-alpha.
+ - When logging about a disallowed .exit name, do not also call it
+ an "invalid onion address". Fixes bug 3325; bugfix on 0.2.2.9-alpha.
+
+ o Minor bugfixes (build fixes):
+ - During configure, search for library containing cos function as
+ libm lives in libcore on some platforms (BeOS/Haiku). Linking
+ against libm was hard-coded before. Fixes the first part of bug
+ 4727; bugfix on 0.2.2.2-alpha. Patch and analysis by Martin Hebnes
+ Pedersen.
+ - Preprocessor directives should not be put inside the arguments
+ of a macro. This would break compilation with GCC releases prior
+ to version 3.3. We would never recommend such an old GCC version,
+ but it is apparently required for binary compatibility on some
+ platforms (namely, certain builds of Haiku). Fixes the other part
+ of bug 4727; bugfix on 0.2.3.3-alpha. Patch and analysis by Martin
+ Hebnes Pedersen.
+ - Use an appropriate-width type for sockets in tor-fw-helper on
+ win64. Fixes bug 1983 at last. Bugfix on 0.2.3.9-alpha.
+ - Detect attempts to build Tor on (as yet hypothetical) versions
+ of Windows where sizeof(intptr_t) != sizeof(SOCKET). Partial
+ fix for bug 4533. Bugfix on 0.2.2.28-beta.
+
o Minor bugfixes (other):
- Fix null-pointer access that could occur if TLS allocation failed.
Fixes bug 4531; bugfix on 0.2.0.20-rc. Found by "troll_un". This was
@@ -113,23 +180,21 @@ Changes in version 0.2.3.11-alpha - 2012-01-0?
platform specific, and particularly the hurd has ENOENT at
0x40000002. Construct expected string at runtime, using the correct
value for ENOENT. Fixes bug 4733; bugfix on 0.2.3.1-alpha.
- - Correctly spell "connect" in a log message on failure to create a
- controlsocket. Fixes bug 4803; bugfix on 0.2.2.26-beta and
- 0.2.3.2-alpha.
- - During configure, search for library containing cos function as
- libm lives in libcore on some platforms (BeOS/Haiku).
- Linking against libm was hard-coded before. Bugfix on
- 0.2.2.2-alpha; fixes the first part of bug 4727. Patch and
- analysis by Martin Hebnes Pedersen.
- - Preprocessor directives should not be put inside the arguments
- of a macro. This would break compilation with GCC releases prior
- to version 3.3. We would never recommend such an old GCC
- version, but it is apparently required for binary compatibility
- on some platforms (namely, certain builds of Haiku). Bugfix on
- 0.2.3.3-alpha; fixes the other part of bug 4727. Patch and
- analysis by Martin Hebnes Pedersen.
-
- - Feature removal:
+ - Fix our implementation of crypto_random_hostname() so it can't
+ overflow on ridiculously large inputs. (No Tor version has ever
+ provided this kind of bad inputs, but let's be correct in depth.)
+ Fixes bug 4413; bugfix on 0.2.2.9-alpha. Fix by Stephen Palmateer.
+ - Reject attempts to disable DisableDebuggerAttachment while Tor is
+ running. Fixes bug 4650; bugfix on 0.2.3.9-alpha.
+ - Find more places in the code that should have been testing for
+ invalid sockets using the SOCKET_OK macro. Required for a fix
+ for bug 4533. Bugfix on 0.2.2.28-beta.
+ - Add missing documentation for the MaxClientCircuitsPending,
+ UseMicrodescriptors, UserspaceIOCPBuffers, and
+ _UseFilteringSSLBufferevents options, all introduced during
+ the 0.2.3.x series.
+
+ o Feature removal:
- When sending or relaying a RELAY_EARLY cell, we used to convert
it to a RELAY cell if the connection was using the v1 link
protocol. This was a workaround for older versions of Tor, which
@@ -145,6 +210,22 @@ Changes in version 0.2.3.11-alpha - 2012-01-0?
- Use OpenSSL's built-in SSL_state_string_long() instead of our
own homebrewed ssl_state_to_string() replacement. Patch from
Emile Snyder. Fixes bug 4653.
+ - Use macros to indicate OpenSSL versions, so we don't need to worry
+ about accidental hexadecimal bit shifts.
+ - Remove some workaround code for OpenSSL 0.9.6 (which is no longer
+ supported).
+ - Convert more instances of tor_snprintf+tor_strdup into tor_asprintf.
+ - Use the smartlist_add_asprintf() alias more consistently.
+ - Use a TOR_INVALID_SOCKET macro when initializing a socket to an
+ invalid value, rather than just -1.
+ - Rename a handful of old identifiers, mostly related to crypto
+ structures and crypto functions. By convention, our "create an
+ object" functions are called "type_new()", our "free an object"
+ functions are called "type_free()", and our types indicate that
+ they are types only with a final "_t". But a handful of older
+ types and functions broke these rules, with function names like
+ "type_create" or "subsystem_op_type", or with type names like
+ type_env_t.
Changes in version 0.2.3.10-alpha - 2011-12-16
diff --git a/changes/absolute_cookie_file b/changes/absolute_cookie_file
deleted file mode 100644
index db9f7be..0000000
--- a/changes/absolute_cookie_file
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (controller):
- - When reporting the path to the cookie file to the controller,
- give an absolute path. Resolves ticket 4881.
diff --git a/changes/aes_ctr_test b/changes/aes_ctr_test
deleted file mode 100644
index 8b5af45..0000000
--- a/changes/aes_ctr_test
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes
- - Test for the OpenSSL 1.0.0 counter mode bug at runtime, not compile
- time. This is necessary because OpenSSL has been hacked to mis-report
- its version on a few distributions.
- Bugfix on Tor 0.2.3.11-alpha.
diff --git a/changes/badexitcc b/changes/badexitcc
deleted file mode 100644
index 6b10ab1..0000000
--- a/changes/badexitcc
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (directory authority):
- - Authority operators can now vote for all routers in a given
- country to be BadDir/BadExit/Invali/Rejected.
diff --git a/changes/bug1983_win64 b/changes/bug1983_win64
deleted file mode 100644
index 6d2eae3..0000000
--- a/changes/bug1983_win64
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes
- - Use an appropriate-width type for sockets in tor-fw-helper on
- win664. Fixes bug 1983 at last. Bugfix on 0.2.3.9-alpha.
diff --git a/changes/bug2434 b/changes/bug2434
deleted file mode 100644
index 5fd3d11..0000000
--- a/changes/bug2434
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features:
- - Don't disable the DirPort when we cannot exceed our AccountingMax
- limit during this interval because the effective bandwidthrate is
- low enough. This is useful in a situation where AccountMax is only
- used as an additional safeguard or to provide statistics.
-
diff --git a/changes/bug3325 b/changes/bug3325
deleted file mode 100644
index d32b548..0000000
--- a/changes/bug3325
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes:
- - When logging about a disallowed .exit name, do not also call it
- an "invalid onion address". Fixes bug 3325; bugfix on 0.2.2.9-alpha.
diff --git a/changes/bug4012 b/changes/bug4012
deleted file mode 100644
index 082f39d..0000000
--- a/changes/bug4012
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (documentation):
- - Add missing documentation for the MaxClientCircuitsPending,
- UseMicrodescriptors, UserspaceIOCPBuffers, and
- _UseFilteringSSLBufferevents options, all introduced during
- the 0.2.3.x series.
-
-
-
diff --git a/changes/bug4012_022 b/changes/bug4012_022
deleted file mode 100644
index f101db5..0000000
--- a/changes/bug4012_022
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (documentation):
- - Document the GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays
- directory authority option (introduced in Tor 0.2.2.34).
diff --git a/changes/bug4413 b/changes/bug4413
deleted file mode 100644
index 673e28f..0000000
--- a/changes/bug4413
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes:
- - Fix our implementation of crypto_random_hostname() so it can't
- overflow on ridiculously large inputs. (No Tor version has ever
- provided this kind of bad inputs, but let's be correct in depth.)
- Fixes bug 4413; bugfix on 0.2.2.9-alpha. Fix by Stephen Palmateer.
diff --git a/changes/bug4533_part2 b/changes/bug4533_part2
deleted file mode 100644
index 7e0f7c3..0000000
--- a/changes/bug4533_part2
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes:
- - Fix the SOCKET_OK test that we use to tell when socket
- creation fails so that it works on Win64. Fixes part of bug
- 4533; bugfix on 0.2.2.29-beta. Bug found by wanoskarnet.
-
diff --git a/changes/bug4650 b/changes/bug4650
deleted file mode 100644
index 44161f8..0000000
--- a/changes/bug4650
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor features:
- - Log more useful messages when we fail to disable debugger attachment.
-
- o Minor bugfixes:
- - Reject attempts to disable DisableDebuggerAttachment while Tor is
- running. Fixes bug 4650; bugfix on 0.2.3.9-alpha.
-
diff --git a/changes/bug4746 b/changes/bug4746
deleted file mode 100644
index 60fbef4..0000000
--- a/changes/bug4746
+++ /dev/null
@@ -1,2 +0,0 @@
- o Minor features:
- - Prepend an informative header to generated dynamic_dh_params files.
diff --git a/changes/bug4837 b/changes/bug4837
deleted file mode 100644
index 16a61d1..0000000
--- a/changes/bug4837
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes:
- - Fix the log message describing how we work around discovering
- that our version is the ill-fated OpenSSL 0.9.8l. Fixes bug
- 4837; bugfix on 0.2.2.9-alpha.
diff --git a/changes/bug4856 b/changes/bug4856
deleted file mode 100644
index fa284a0..0000000
--- a/changes/bug4856
+++ /dev/null
@@ -1,3 +0,0 @@
- o Trivial bugfixes
- - Fix a typo in a log message in rend_service_rendezvous_has_opened().
- Fixes bug 4856; bugfix on Tor 0.0.6.
diff --git a/changes/clean_asprintf b/changes/clean_asprintf
deleted file mode 100644
index ebaabd7..0000000
--- a/changes/clean_asprintf
+++ /dev/null
@@ -1,5 +0,0 @@
- o Code simplifications and refactoring
- - Use the smartlist_add_asprintf alias more consistently
- throughout the codebase.
- - Convert more instances of tor_snprintf+tor_strdup into
- tor_asprintf.
diff --git a/changes/dirauth_log b/changes/dirauth_log
deleted file mode 100644
index df82314..0000000
--- a/changes/dirauth_log
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features:
- - Log which authority we're missing votes from when we go to fetch them
- from the other auths.
diff --git a/changes/fast_bw_param b/changes/fast_bw_param
deleted file mode 100644
index abe630d..0000000
--- a/changes/fast_bw_param
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor features (directory authority):
- - Provide two consensus parameters (FastFlagMinThreshold and
- FastFlagMaxThreshold) to control the range of allowable bandwidths for
- the Fast directory flag. This allows authorities to run better
- experiments on appropriate requirements for being a "Fast" node.
- The AuthDirFastGuarantee flag still applies.
-
-
diff --git a/changes/feature3457 b/changes/feature3457
deleted file mode 100644
index e2676cb..0000000
--- a/changes/feature3457
+++ /dev/null
@@ -1,12 +0,0 @@
- o Minor features:
-
- - Log (at debug level) whenever a circuit's purpose is changed.
-
- - Allow controllers to request an event notification whenever a
- circuit is cannibalized or its purpose is changed. Implements
- part of ticket 3457.
-
- - Include the creation time of a circuit in CIRC and CIRC2
- control-port events and the list produced by the 'GETINFO
- circuit-status' control-port command.
-
diff --git a/changes/readable_ssl_versions b/changes/readable_ssl_versions
deleted file mode 100644
index f34998c..0000000
--- a/changes/readable_ssl_versions
+++ /dev/null
@@ -1,6 +0,0 @@
- o Code simplification and refactoring:
- - Use macros to indicate OpenSSL versions, so we don't need to worry
- about accidental hexadecimal bit shifts.
- - Remove some workaround code for OpenSSL 0.9.6, which is no longer
- supported.
-
diff --git a/changes/renaming_identifiers b/changes/renaming_identifiers
deleted file mode 100644
index 5a49f8f..0000000
--- a/changes/renaming_identifiers
+++ /dev/null
@@ -1,9 +0,0 @@
- o Code simplifications and refactorings:
- - Rename a handful of old identifiers, mostly related to crypto
- structures and crypto functions. By convention, our "create an
- object" functions are called "type_new()", our "free an object"
- functions are called "type_free()", and our types indicate that
- they are types only with a final "_t". But a handful of older
- types and functions broke these rules, with function names like
- "type_create" or "subsystem_op_type", or with type names like
- type_env_t.
diff --git a/changes/tor_socket_tests b/changes/tor_socket_tests
deleted file mode 100644
index b7ee325..0000000
--- a/changes/tor_socket_tests
+++ /dev/null
@@ -1,11 +0,0 @@
- o Minor bugfixes:
- - Find more places in the code that should have been testing for
- invalid sockets using the SOCKET_OK macro. Required for a fix
- for bug 4533. Bugfix on 0.2.2.28-beta.
- - Detect attempts to build Tor on (as yet hypothetical) versions
- of Windows where sizeof(intptr_t) != sizeof(SOCKET). Partial
- fix for bug 4533. Bugfix on 0.2.2.28-beta.
-
- o Code simplification and refactoring:
- - Use a TOR_INVALID_SOCKET macro when initializing a socket to an
- invalid value, rather than just -1.
More information about the tor-commits
mailing list