[tor-commits] [tor/master] Start work on an 0.2.5.3-alpha changelog.

nickm at torproject.org nickm at torproject.org
Wed Mar 12 19:59:25 UTC 2014


commit 6b5ef3889d83c715973dd2e08556d3467bc3055e
Author: Nick Mathewson <nickm at torproject.org>
Date:   Wed Mar 12 15:53:58 2014 -0400

    Start work on an 0.2.5.3-alpha changelog.
    
    This collects all the changes file, and find the stuff that also
    appeared new in 0.2.4.21.
---
 ChangeLog |  193 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-
 1 file changed, 192 insertions(+), 1 deletion(-)

diff --git a/ChangeLog b/ChangeLog
index 78c5094..e03205f 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,194 @@
+Changes in version 0.2.5.3-alpha - 2014-03-??
+
+  o Major features:
+    - Also consider stream buffer sizes when calculating OOM
+      conditions. Rename MaxMemInCellQueues to MaxMemInQueues. Fixes
+      bug 10169.
+
+  o Minor bugfixes:
+    - Exit immediately when exiting because of dropped connection from
+      a process-owning controller. Previously, if we were running in
+      server mode, we would wait for a little while as in the when we
+      got an INT signal--but this was problematic, since there was no
+      feedback for the user. Controllers that want to do a clean
+      shutdown should send an INT signal, and let the user know what's
+      going on. Fix for bug 10449; bugfix on 0.2.2.28-beta.
+
+  o Minor bugfixes:
+    - Log an improved message when excluding hidden service directory
+      nodes prevents a hidden service from working.
+      Improves on our fix for bug #10722, which was a bugfix on
+      0.2.0.10-alpha.
+
+  o Removed code
+    - Remove all code for hidden service authorities to accept and serve
+      version 0 descriptors and left-over code for hidden services and
+      hidden service clients to upload and fetch version 0 descriptors.
+      Version 0 descriptors are not in use anymore since 0.2.2.1-alpha.
+      Fixes the rest of bug 10841.
+
+  o Minor features:
+    - Bridges write the SHA1 digest of their identity key fingerprint to
+      notice-level logs and to hashed-fingerprint, so that bridge
+      operators can look up their bridge in Globe and similar tools.
+
+  o Minor bugfixes (new since 0.2.5.2-alpha, also in 0.2.4.21):
+    - Build without warnings under clang 3.4. (We have some macros that
+      define static functions only some of which will get used later in
+      the module. Starting with clang 3.4, these give a warning unless the
+      unused attribute is set on them.) Resolves ticket 10904.
+    - Fix build warnings about missing "a2x" comment when building the
+      manpages from scratch on OpenBSD; OpenBSD calls it "a2x.py".
+      Fixes bug 10929; bugfix on 0.2.2.9-alpha. Patch from Dana Koch.
+
+  o Minor bugfixes (unit tests);
+    - Fix a small bug in the unit tests that might have made the tests
+      call 'chmod' with an uninitialized bitmask.
+      Fixes bug 10928; bugfix on 0.2.5.1-alpha. Patch from Dana Koch.
+
+  o Minor bugfixes
+    - Fix IPv6 support when using the SocksPort with SOCKS5. Using IPv6
+      through a SOCKS5 using the SocksPort option will now work with
+      this fix. This part of the code has never been updated to support
+      IPv6 thus this does not fix a previously introduced regression.
+      Fixes bug 10987; bugfix on 0.2.4.7-alpha.
+
+  o Minor features (log messages):
+    - Improve the message that gets displayed when Tor as a bridge is
+      using pluggable transports but doesn't have an Extended ORPort
+      listener. Furthermore, we now log the message in the log file
+      too. Resolves ticket 11043.
+
+  o Minor bugfixes:
+    - Build using the -fasynchronous-unwind-tables option so that more
+      platforms (in particular, ones like 32-bit Intel where the
+      -fomit-frame-pointer option is on by default and table
+      generation is not) will support generating backtraces. This
+      doesn't yet add Windows support yet; only Linux, OSX, and some BSD
+      are affected. Reported by 'cypherpunks'; fixes bug 11047; bugfix
+      on 0.2.5.2-alpha.
+
+  o Minor bugfixes:
+    - Avoid strange behavior if two threads hit failed asswertions
+      at the same time and both try to log backtraces at
+      once. (Previously, if this had happened, both threads would
+      have stored their intermediate results in the same buffer, and
+      generated junk outputs.) Reported by "cypherpunks". Fixes bug
+      11048; bugfix on 0.2.5.2-alpha.
+
+  o Minor bugfixes (clients):
+    - Fix tor so that it raises a control port warning when we fail to
+      connect to all of our bridges. Fixes bug 11069; bugfix on
+      tor-0.2.1.2-alpha.
+
+  o Minor features:
+    - Warn the user if they put any ports in the SocksPolicy,
+      DirPolicy, AuthDirReject, AuthDirInvalid, AuthDirBadDir, or
+      AuthDirBadExit options. Fixes ticket #11108.
+
+  o Documentation:
+    - Explain that SocksPolicy, DirPolicy, and their allies don't take
+      port arguments. Fixes ticket #11108.
+
+  o Documentation:
+    - Fix the max client name length in the manpage's description of
+      HiddenServiceAuthorizeClient description: it should have been
+      16, not 19. Fixes bug 11118; bugfix on 0.2.1.6-alpha.
+
+  o Minor bugfixes (clients):
+    - Fix a bug where we would attempt to connect to bridges before
+      our pluggable transports were configured, which resulted in some
+      erroneous log messages. Fixes bug 11156; bugfix on
+      0.2.3.2-alpha.
+
+  o Minor features:
+    - Don't log at warning severity when we refuse to launch a
+      pluggable transport proxy that we don't need. Resolves ticket
+      5018; bugfix on 0.2.5.2-alpha.
+
+  o Minor bugfixes:
+    - Bridges now never collect statistics that were designed for relays.
+      Fix for bug 5824; bugfix on 0.2.3.8-alpha.
+
+  o Minor bugfixes:
+    - Bridges now report complete directory request statistics. Related to
+      bug 5824; bugfix on 0.2.2.1-alpha.
+
+  o Minor bugfixes:
+    - Avoid crashing on a malformed resolv.conf file when running a
+      server using Libevent 1. Fixes bug 8788; bugfix on 0.1.1.23.
+
+  o Minor bugfixes (testing):
+    - Improve the tinytest implementation of string operation tests
+      so that comparisons NULL strings no longer crash the tests;
+      they now just fail, normally. Fixes bug 9004; bugfix on
+      0.2.2.4-alpha.
+
+  o Minor bugfixes:
+    - Fix a comment about the rend_server_descriptor_t.protocols field
+      to more accurately describe its range. Also, make that
+      field unsigned, to more accurately reflect its usage.
+      Fixes bug 9099; bugfix on 0.2.1.5-alpha.
+
+  o Documentation:
+    - Document in the manpage that "KBytes" may also be written as
+      "kilobytes" or "KB", that "Kbits" may also be written as
+      "kilobits", and so forth. Closes ticket #9222.
+
+  o Minor bugfixes:
+    - Give the correct URL in the warning message that we present
+      when the user is trying to run a Tor relay on an ancient version
+      of Windows. Fixes bug 9393.
+
+  o Minor bugfixes:
+    - Non-exit servers no longer launch mock DNS requests to check for
+      DNS hijacking.  This has been unnecessary since 0.2.1.7-alpha,
+      when non-exit servers stopped servicing DNS requests. Fixes bug
+      965; bugfix on 0.2.1.7-alpha. Patch from Matt Pagan.
+
+  o Minor changes:
+    - Decrease the lower limit of MaxMemInQueues to 256 MBytes, to
+      appease raspberry pi users. Fixes bug 9686.
+
+  o Minor features:
+    - Avoid hash-flooding denial-of-service attacks by using the secure
+      SipHash-2-4 hash function for our hashtables.  Without this
+      feature, an attacker could degrade performance of a targeted
+      client or server by flooding their data structures with a large
+      number of data entries all calculated to be stored at the same
+      hash table position, thereby degrading hash table
+      performance. With this feature, hash table positions are derived
+      from a randomized cryptographic key using SipHash-2-4, and an
+      attacker cannot predict which entries will collide.
+      Closes ticket 4900.
+
+  o Minor features:
+    - Update geoip6 to the February 7 2014 Maxmind GeoLite2 Country
+      database.
+  o Minor features:
+    - Update to the February 7 2014 Maxmind GeoLite2 Country database.
+
+  o Minor features:
+    - Fix our version of the February 7 2014 Maxmind GeoLite2 Country database.
+
+  o Minor bugfixes (compilation):
+    - Fix a 64-to-32-conversion warning in format_number_sigsafe().
+      Bugfix on 0.2.5.2-alpha; patch from Nick Hopper.
+
+  o Code simplifications and refactoring:
+    - Get rid of router->address, since in all cases it was just the
+      string representation of router->addr. Resolves ticket 5528.
+
+  o Minor features:
+    - Made PREDICTED_CIRCS_RELEVANCE_TIME configurable from config
+      file with a new option, PredictedPortsRelevanceTime. Implements
+      ticket #9176. Patch by unixninja92.
+
+  o Testing:
+    - Update to the latest version of tinytest.
+
+
+
 Changes in version 0.2.4.21 - 2014-02-28
   Tor 0.2.4.21 further improves security against potential adversaries who
   find breaking 1024-bit crypto doable, and backports several stability
@@ -59,7 +250,7 @@ Changes in version 0.2.4.21 - 2014-02-28
       flag set. Fixes bug 10470; bugfix on 0.2.3.3-alpha / 0.2.3.16-alpha.
 
 
-Changes in version 0.2.5.2-alpha - 2013-02-13
+Changes in version 0.2.5.2-alpha - 2014-02-13
   Tor 0.2.5.2-alpha includes all the fixes from 0.2.4.18-rc and 0.2.4.20,
   like the "poor random number generation" fix and the "building too many
   circuits" fix. It also further improves security against potential





More information about the tor-commits mailing list