[tor-commits] [tor/master] oh, here it is
nickm at torproject.org
nickm at torproject.org
Mon Jan 23 00:40:33 UTC 2017
commit d78ed9fb7362ed5662a5fee52ec69b977bdbf7ec
Author: Nick Mathewson <nickm at torproject.org>
Date: Sun Jan 22 19:40:30 2017 -0500
oh, here it is
---
ChangeLog | 217 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 217 insertions(+)
diff --git a/ChangeLog b/ChangeLog
index 013dddf..d467c95 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,220 @@
+Changes in version 0.3.0.2-alpha - 2017-01-23
+ Blurb here. Lorax ipsum gruvvulus thneed amet, snergelly once-ler
+ lerkim, sed do barbaloot tempor gluppitus ut labore et truffula magna
+ aliqua. Ut enim ad grickle-grass veniam, quis miff-muffered ga-zumpco
+ laboris nisi ut cruffulus ex ea schloppity consequat. Duis aute
+ snarggle in swomeeswans in voluptate axe-hacker esse rippulus crummii
+ eu moof nulla snuvv.
+
+ o Major features (security):
+ - Change the algorithm used to decide DNS TTLs on client and server
+ side, to better resist DNS-based correlation attacks like the
+ DefecTor attack of Greschbach, Pulls, Roberts, Winter, and
+ Feamster). Now relays only return one of two possible DNS TTL
+ values, and clients are willing to believe DNS TTL values up to 3
+ hours long. Closes ticket 19769.
+
+ o Major bugfixes (client, guard, crash):
+ - In circuit_get_global_origin_list(), return the actual list of
+ origin circuits. The previous version of this code returned the
+ list of all the circuits, and could have caused strange bugs,
+ including possible crashes. Fixes bug 21118; bugfix
+ on 0.3.0.1-alpha.
+
+ o Major bugfixes (DNS):
+ - Fix a bug that prevented exit nodes from caching DNS records for
+ more than 60 seconds. Fixes bug 19025; bugfix on 0.2.4.7-alpha.
+
+ o Minor features (directory authority, security):
+ - The default for AuthDirPinKeys is now 1: directory authorities
+ will reject relays where the RSA identity key matches a previously
+ seen value, but the Ed25519 key has changed. Closes ticket 18319.
+
+ o Minor features (controller):
+ - Add GETINFO sr/current and sr/previous keys, to expose shared-
+ random values to the controller. Closes ticket 19925.
+
+ o Minor features (entry guards):
+ - Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not
+ break regresson tests.
+ - Require UseEntryGuards when UseBridges is set in order to make
+ sure bridges aren't bypassed. Resolves ticket 20502.
+
+ o Minor features (fallback directories):
+ - Allow 3 fallbacks per operator. (This is safe now we are choosing
+ 200 fallbacks.) Closes ticket 20912.
+ - Display the fingerprint when downloading consensuses from
+ fallbacks. Closes ticket 20908.
+ - Exclude relays affected by 20499 from the fallback list. Exclude
+ known affected versions, and any relay that delivers a stale
+ consensus, as long as that consensus expired more than 24 hours
+ ago. Closes ticket 20539.
+ - Make it easier to change the output sort order of fallbacks.
+ Closes ticket 20822.
+ - Provide bandwidth and consensus weight for each candidate fallback
+ in updateFallbackDirs.py. Closes ticket 20878.
+ - Reduce the minimum fallback bandwidth to 1 MByte/s. Part of
+ ticket 18828.
+ - Require fallback directories to have the same address and port for
+ 7 dayss. (Due to the number of relays with enough stability.)
+ Relays whose OnionOO stability timer is reset on restart by bug
+ 18050 should upgrade to Tor 0.2.8.7 or later, which has a fix for
+ this issue. Closes ticket 20880; maintains short-term fix
+ in 0.2.8.2-alpha.
+ - Require fallbacks to have flags for 90% of the time (weighted
+ decaying average), rather than 95%. This allows at least 73% of
+ clients to bootstrap in the first 5 seconds without contacting an
+ authority. Part of ticket 18828.
+ - Select 200 fallback directories for each release. Closes
+ ticket 20881.
+
+ o Minor features (geoip):
+ - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
+ Country database.
+
+ o Minor features (hidden service directories):
+ - Relays are now willing act as v3 hidden service directories,
+ regardless of the EnableOnionServicvesV3 parameter. Implements
+ ticket 19899.
+
+ o Minor features (linting):
+ - Enhance the changes file linter to warn on Tor versions that are
+ prefixed with 'tor-'. Closes ticket 21096.
+
+ o Minor features (logging):
+ - In several places, describe unset ed25519 keys as "<unset>",
+ rather than "AAAAAAAA...AAA". Closes ticket 21037.
+
+ o Minor bugfix (control protocol):
+ - The reply to a "GETINFO config/names" request via the control
+ protocol now spells the type "Dependent" correctly. This is a
+ breaking change in the control protocol. (It seems to be ignored
+ by the most common known clients.) Fixes bug 18146; bugfix
+ on 0.1.1.4-alpha.
+
+ o Minor bugfixes (bug resilience):
+ - Fix an (unreachable) size_t overflow in base64_decode(). Fixes bug
+ 19222; bugfix on 0.2.0.9-alpha. Found by Guido Vranken; fixed by
+ Hans Jerry Illikainen.
+
+ o Minor bugfixes (build):
+ - Replace obsolete Autoconf macros with their modern equivalent and
+ prevent similar issues in the future. Fixes bug 20990; bugfix
+ on 0.1.0.1-rc.
+
+ o Minor bugfixes (circuit, hidden service):
+ - When closing a circuit, the reason for doing so was assigned from
+ an int value to a uint16_t which is quite a problem for negative
+ values that are our internal reasons (ex:
+ END_CIRC_REASON_IP_NOW_REDUNDANT). On the HS side, this was
+ causing introduction points to be flagged as unusable because the
+ reason wasn't the right one due to the bad conversion. Partially
+ fixes bug 21056 and fixes bug 20307; bugfix on 0.2.8.1-alpha.
+
+ o Minor bugfixes (client, guards):
+ - Fix bug where Tor would think that there are circuits waiting for
+ better guards even though those circuits have been freed. Fixes
+ bug 21142; bugfix on 0.3.0.1-alpha.
+
+ o Minor bugfixes (compilation):
+ - Fix Libevent detection on platforms without Libevent 1 headers
+ installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
+
+ o Minor bugfixes (config):
+ - Don't assert when trying to get the options list when
+ LearnCircuitBuildTimeout is set to 0 and we are actually currently
+ parsing the options. Fixes bug 21062; bugfix on 0.2.9.3-alpha.
+
+ o Minor bugfixes (controller):
+ - Make the GETINFO interface for inquiring about entry guards
+ support the new guards backend. Fixes bug 20823; bugfix
+ on 0.3.0.1-alpha.
+
+ o Minor bugfixes (dead code):
+ - Remove a rendundant check for PidFile changes at runtime in
+ options_transition_allowed(): this check is already performed
+ regardless of whether the sandbox is active. Fixes bug 21123;
+ bugfix on commit 2ae47d3 in 0.2.5.4-alpha.
+
+ o Minor bugfixes (documentation):
+ - Update the tor manual page to document every option that can not
+ be changed while tor is running. Fixes bug 21122; bugfix on
+ multiple tor versions.
+
+ o Minor bugfixes (fallback directories):
+ - Avoid checking fallback candidates' DirPorts if they are down in
+ OnionOO. When a relay operator has multiple relays, this
+ prioritises relays that are up over relays that are down. Fixes
+ bug 20926; bugfix on 0.2.8.3-alpha.
+ - Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py.
+ Fixes bug 20877; bugfix on 0.2.8.3-alpha.
+ - Stop failing when a relay has no uptime data in
+ updateFallbackDirs.py. Fixes bug 20945; bugfix on 0.2.8.1-alpha.
+
+ o Minor bugfixes (guards, bootstrapping):
+ - When connecting to a directory guard during bootstrap, do not mark
+ the guard as successful until we receive a good-looking directory
+ response from it. Fixes bug 20974; bugfix on 0.3.0.1-alpha.
+
+ o Minor bugfixes (hidden service):
+ - Fix the config reload pruning of old vs new services so it
+ actually works when both ephemeral and non ephemeral services were
+ configured which lead to a BUG() stacktrace. Fixes bug 21054;
+ bugfix on 0.3.0.1-alpha.
+ - Restrict the number of introduction point from 0 to the maximum
+ allowed instead of the default value to the maximum. That was
+ stopping operators from using less than 3 introduction points.
+ Fixes bug 21033; bugfix on 0.2.7.2-alpha.
+
+ o Minor bugfixes (IPv6):
+ - Make IP6-using clients try harder to find an IPv6 directory server.
+ Fixes bug 20999; bugfix on 77a9de0 from 17840 in 0.2.8.2-alpha.
+ - When IPv6 addresses have not been downloaded, use hard-coded
+ address info for authorities, fallbacks, and configured bridges.
+ (When IPv6-only clients receive a microdesc consensus, it has no
+ IPv6 addresses, so they can't use it until microdescs are
+ downloaded.) This allows IPv6-only clients to use microdescriptors.
+ Fixes bug 20996; bugfix on b167e82 from 19608 in 0.2.8.5-alpha.
+
+ o Minor bugfixes (memory leaks):
+ - Fix a memory leak when configuring hidden services. Fixes bug
+ 20987; bugfix on 0.3.0.1-alpha.
+
+ o Minor bugfixes (portability):
+ - Avoid crashing when Tor is built using headers that contain
+ CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
+ without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix
+ on 0.2.9.1-alpha.
+
+ o Minor bugfixes (relay):
+ - Honor DataDirectoryGroupReadable when tor is a relay. Previously,
+ the initialization of the keys would reset the DataDirectory to
+ 0700 instead of 0750 if DataeDirectoryGroupReadable was set to 1.
+ Fixes bug 19953; bugfix on 0.0.2pre16. Patch by "redfish".
+
+ o Minor bugfixes (testing):
+ - Remove undefined behavior from the backtrace generator by removing
+ its signal handler. Fixes bug 21026; bugfix on 0.2.5.2-alpha.
+
+ o Minor bugfixes (unit tests):
+ - Allow the unit tests to pass even when DNS lookups of bogus
+ addresses do not fail as expected. Fixes bug 20862 and 20863;
+ bugfix on unit tests introduced in 0.2.8.1-alpha
+ through 0.2.9.4-alpha.
+
+ o Code simplification and refactoring:
+ - Refactor code to manipulate global_origin_circuit_list into
+ separate functions. Closes ticket 20921.
+
+ o Documentation (formatting):
+ - Clean up formatting of tor.1 man page and HTML doc, where <pre>
+ blocks were incorrectly appearing. Closes ticket 20885.
+
+ o Documentation (man page):
+ - Clarify a number of options in tor.1 and add some min/max values
+ for HiddenService options. Closes ticket 21058.
+
+
Changes in version 0.3.0.1-alpha - 2016-12-19
Tor 0.3.0.1-alpha is the first alpha release in the 0.3.0 development
series. It strengthens Tor's link and circuit handshakes by
More information about the tor-commits
mailing list