[tor-commits] [bridgedb/master] Add #9874 #12086 #12089 #12090 #12091 and #12147 to CHANGELOG for 0.2.2.
isis at torproject.org
isis at torproject.org
Fri Jun 6 23:39:15 UTC 2014
commit e7b3d6e7b973ad107aa0779f492b40123e69ed88
Author: Isis Lovecruft <isis at torproject.org>
Date: Fri Jun 6 17:26:36 2014 +0000
Add #9874 #12086 #12089 #12090 #12091 and #12147 to CHANGELOG for 0.2.2.
---
CHANGELOG | 79 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 79 insertions(+)
diff --git a/CHANGELOG b/CHANGELOG
index 76fe023..3b07e5b 100644
--- a/CHANGELOG
+++ b/CHANGELOG
@@ -1,3 +1,82 @@
+Changes in version 0.2.2 - 2014-06-XXX
+
+ * FIXES #9874 https://trac.torproject.org/projects/tor/ticket/9874
+ BridgeDB's email and HTTPS distributors were written in a manner
+ that makes them largely impossible to write unittests for. Since
+ the recent rewrite of BridgeDB's email distributor server backends
+ for version 0.2.1, BridgeDB email distributor is now testable and
+ has near 100% code coverage, see
+ https://coveralls.io/r/isislovecruft/bridgedb
+
+ * FIXES #12086 https://trac.torproject.org/projects/tor/ticket/12086
+ BridgeDB was found to accept incoming emails sent to any email
+ address whose local part included the word bridges, e.g. emails
+ sent to 'givemebridges at serious.ly' would be responded to as if
+ they were destined for BridgeDB's real email address.
+ - BridgeDB now strictly checks that the local part of the email
+ address that an incoming email was sent to (after removing plus
+ aliases, i.e. '+es_ES', '+fa', etc.) exactly matches BridgeDB
+ configured email address username.
+ - BridgeDB now checks that the domain name portion of the email
+ address that an incoming email was sent to either matches the
+ domain name portion of BridgeDB's configured email address, or
+ is a subdomain of that domain.
+
+ * FIXES #12089 https://trac.torproject.org/projects/tor/ticket/12089
+ There has been a bug for quite some time now where BridgeDB could
+ be used to email arbitrary email addresses (as long as these
+ addresses were ones which BridgeDB allows, i.e. Gmail or Yahoo
+ email addresses). This was due to BridgeDB not checking that the
+ email address used in the SMTP 'MAIL FROM:' command on an incoming
+ message matched the one used in that email's 'From:'
+ header.
+ - BridgeDB now checks that the email addresses in the SMTP 'MAIL
+ FROM:' and the 'From:' header on that incoming email match, in
+ addition to the previous checks that the email address' domain
+ is in the set of allowed domains.
+
+ * FIXES #12090 https://trac.torproject.org/projects/tor/ticket/12090
+ BridgeDB has been replying with an empty email. I don't actually
+ know for sure if this one is fixed. Before deploying version
+ 0.2.1, the continuous integration tests showed email responses
+ being correctly generated, and I was also able to receive
+ correctly formed email responses from BridgeDB on a local testing
+ instance on my laptop. It appears that this bug occurs only on the
+ deployment server at ponticum.torproject.org, possibly due to the
+ outdated Python version in Debian Wheezy. I have not been able to
+ reproduce this bug on any other machine.
+
+ * FIXES #12091 https://trac.torproject.org/projects/tor/ticket/12091
+ BridgeDB wasn't properly ignoring emails whose DKIM signature
+ verification header read "X-DKIM-Authentication-Results: dunno".
+ - Bridgedb now marks incoming emails which have a
+ "X-DKIM-Authentication-Results: dunno" header as invalid and
+ ignores them.
+
+ * FIXES #12147 https://trac.torproject.org/projects/tor/ticket/12147
+ If a user refreshed https://bridges.torproject.org/bridges after
+ successfully solving a CAPTCHA, BridgeDB would reply with a new
+ set of bridges for each page refresh. This was due to the use of
+ `getIterval()` in `IPBasedDistributor.getBridgesForIP()`.The
+ correct function to use is `getIntervalStart()`. This had been
+ noted in a "XXX FIXME" comment above the call for quite some time,
+ however, when the `bridgedb.schedule` (previously called
+ `bridgedb.Time`) module was revised to support CAPTCHA timeouts
+ (#11215), the call to `getInterval()` was mistakenly not replaced
+ with the correct function.
+ - BridgeDB CAPTCHAs must be solved within 10 minutes.
+ - Hashring rotation for bridges in BridgeDB HTTPS distributor
+ occurs every 3 hours. Refreshing the page with bridges on it
+ will return these same bridges for that time period, and
+ afterwards redirect back to the CAPTCHA page.
+ THANKS TO francisco on IRC and arma for reporting the bug.
+
+And include the following general changes:
+ * FIXES an issue where, when verifying GnuPG signatures made by
+ BridgeDB's email distributor, GnuPG would error, saying, "invalid
+ armor header".
+
+
Changes in version 0.2.1 - 2014-05-16
* FIXES #5463 https://trac.torproject.org/projects/tor/ticket/5463
Emails sent from BridgeDB's email distributor should now be signed.
More information about the tor-commits
mailing list