[tor-commits] [tor/release-0.3.4] whoops, we still had duplicates from 0.3.3.6

arma at torproject.org arma at torproject.org
Sat Sep 8 21:18:00 UTC 2018


commit aeb398d16e2c394b276626f63d3f78472aac1489
Author: Roger Dingledine <arma at torproject.org>
Date:   Sat Sep 8 17:17:43 2018 -0400

    whoops, we still had duplicates from 0.3.3.6
---
 ChangeLog    |  4 ++--
 ReleaseNotes | 74 +++---------------------------------------------------------
 2 files changed, 5 insertions(+), 73 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index a254c0da5..0062504c1 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -959,9 +959,9 @@ Changes in version 0.3.4.1-alpha - 2018-05-17
     - Tor no longer enables all of its periodic events by default.
       Previously, Tor would enable all possible main loop events,
       regardless of whether it needed them. Furthermore, many of these
-      events are now disabled with Tor is hibernating or DisableNetwork
+      events are now disabled when Tor is hibernating or DisableNetwork
       is set. This is a big step towards reducing client CPU usage by
-      reducing the amount of wake-ups the daemon does. Closes ticket
+      reducing the amount of wake-ups the daemon does. Closes tickets
       25376 and 25762.
     - The bandwidth-limitation logic has been refactored so that
       bandwidth calculations are performed on-demand, rather than every
diff --git a/ReleaseNotes b/ReleaseNotes
index 7a91c87ef..615d41070 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -2,7 +2,7 @@ This document summarizes new features and bugfixes in each stable
 release of Tor. If you want to see more detailed descriptions of the
 changes in each development snapshot, see the ChangeLog file.
 
-Changes in version 0.3.4.8  - 2018-09-10
+Changes in version 0.3.4.8 - 2018-09-10
   Tor 0.3.4.8 is the first stable release in its series; it includes
   compilation and portability fixes.
 
@@ -39,9 +39,9 @@ Changes in version 0.3.4.8  - 2018-09-10
     - Tor no longer enables all of its periodic events by default.
       Previously, Tor would enable all possible main loop events,
       regardless of whether it needed them. Furthermore, many of these
-      events are now disabled with Tor is hibernating or DisableNetwork
+      events are now disabled when Tor is hibernating or DisableNetwork
       is set. This is a big step towards reducing client CPU usage by
-      reducing the amount of wake-ups the daemon does. Closes ticket
+      reducing the amount of wake-ups the daemon does. Closes tickets
       25376 and 25762.
     - The bandwidth-limitation logic has been refactored so that
       bandwidth calculations are performed on-demand, rather than every
@@ -62,26 +62,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       operators about unreachable ports (25952); and keeping track of
       Tor's uptime (26009).
 
-  o Major bugfixes (directory authorities, security):
-    - When directory authorities read a zero-byte bandwidth file, they
-      would previously log a warning with the contents of an
-      uninitialised buffer. They now log a warning about the empty file
-      instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha.
-
-  o Major bugfixes (crash):
-    - Avoid a rare assertion failure in the circuit build timeout code
-      if we fail to allow any circuits to actually complete. Fixes bug
-      25733; bugfix on 0.2.2.2-alpha.
-
-  o Major bugfixes (directory authority):
-    - Avoid a crash when testing router reachability on a router that
-      could have an ed25519 ID, but which does not. Fixes bug 25415;
-      bugfix on 0.3.3.2-alpha.
-
-  o Major bugfixes (onion service):
-    - Correctly detect when onion services get disabled after HUP. Fixes
-      bug 25761; bugfix on 0.3.2.1.
-
   o Major bugfixes (protover, voting):
     - Revise Rust implementation of protover to use a more memory-
       efficient voting algorithm and corresponding data structures, thus
@@ -97,11 +77,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       differences between the C and Rust implementations have been
       remedied. Fixes bug 24031; bugfix on 0.3.3.1-alpha.
 
-  o Major bugfixes (relay, denial of service):
-    - Impose a limit on circuit cell queue size. The limit can be
-      controlled by a consensus parameter. Fixes bug 25226; bugfix
-      on 0.2.4.14-alpha.
-
   o Minor features (accounting):
     - When Tor becomes dormant, it now uses a scheduled event to wake up
       at the right time. Previously, we would use the per-second timer
@@ -125,8 +100,6 @@ Changes in version 0.3.4.8  - 2018-09-10
     - Tor now detects versions of OpenSSL 1.1.0 and later compiled with
       the no-deprecated option, and builds correctly with them. Closes
       tickets 19429, 19981, and 25353.
-    - Avoid some compilation warnings with recent versions of LibreSSL.
-      Closes ticket 26006.
 
   o Minor features (compilation):
     - When compiling with --enable-openbsd-malloc or --enable-tcmalloc,
@@ -171,11 +144,6 @@ Changes in version 0.3.4.8  - 2018-09-10
     - Add the necessary configuration files for continuous integration
       testing on Windows, via the Appveyor platform. Closes ticket
       25549. Patches from Marcin Cieślak and Isis Lovecruft.
-    - Our .travis.yml configuration now includes support for testing the
-      results of "make distcheck". (It's not uncommon for "make check"
-      to pass but "make distcheck" to fail.) Closes ticket 25814.
-    - Our Travis CI configuration now integrates with the Coveralls
-      coverage analysis tool. Closes ticket 25818.
 
   o Minor features (continuous integration, rust):
     - Use cargo cache in our Travis CI configuration. Closes
@@ -271,11 +239,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       subsystem. Fixes bug 25675; bugfix on 0.2.7.3-rc. Found by
       Coverity; this is CID 1433643.
 
-  o Minor bugfixes (client):
-    - Don't consider Tor running as a client if the ControlPort is open,
-      but no actual client ports are open. Fixes bug 26062; bugfix
-      on 0.2.9.4-alpha.
-
   o Minor bugfixes (code style):
     - Fixed multiple includes of transports.h in src/or/connection.c
       Fixes bug 25261; bugfix on 0.2.5.1-alpha.
@@ -328,12 +291,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       counting bug when STREAM_BW events were enabled. Fixes bug 25400;
       bugfix on 0.2.5.2-alpha.
 
-  o Minor bugfixes (correctness, client):
-    - Upon receiving a malformed connected cell, stop processing the cell
-      immediately.  Previously we would mark the connection for close, but
-      continue processing the cell as if the connection were open. Fixes bug
-      26072; bugfix on 0.2.4.7-alpha.
-
   o Minor bugfixes (correctness, flow control):
     - Upon receiving a stream-level SENDME cell, verify that our window
       has not grown too large. Fixes bug 26214; bugfix on svn
@@ -352,13 +309,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       consensus are waiting for certs. Fixes bug 24740; bugfix
       on 0.2.9.1-alpha.
 
-  o Minor bugfixes (documentation):
-    - Stop saying in the manual that clients cache ipv4 dns answers from
-      exit relays. We haven't used them since 0.2.6.3-alpha, and in
-      ticket 24050 we stopped even caching them as of 0.3.2.6-alpha, but
-      we forgot to say so in the man page. Fixes bug 26052; bugfix
-      on 0.3.2.6-alpha.
-
   o Minor bugfixes (error reporting):
     - Improve tolerance for directory authorities with skewed clocks.
       Previously, an authority with a clock more than 60 seconds ahead
@@ -373,8 +323,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       failure. Fixes bug 26948; bugfix on 0.3.3.1-alpha.
 
   o Minor bugfixes (Linux seccomp2 sandbox):
-    - Allow the nanosleep() system call, which glibc uses to implement
-      sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha.
     - Fix a bug in our sandboxing rules for the openat() syscall.
       Previously, no openat() call would be permitted, which would break
       filesystem operations on recent glibc versions. Fixes bug 25440;
@@ -385,14 +333,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       authenticate direct connections to relays. Fixes bug 26927; bugfix
       on 0.3.0.1-alpha.
 
-  o Minor bugfixes (onion service):
-    - Fix a memory leak when a v3 onion service is configured and gets a
-      SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha.
-    - When parsing the descriptor signature, look for the token plus an
-      extra white-space at the end. This is more correct but also will
-      allow us to support new fields that might start with "signature".
-      Fixes bug 26069; bugfix on 0.3.0.1-alpha.
-
   o Minor bugfixes (onion services):
     - Silence a spurious compiler warning in
       rend_client_send_introduction(). Fixes bug 27463; bugfix
@@ -430,10 +370,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       requests from clients in our counts, and we continue ignoring them
       here.) Fixes bug 24910; bugfix on 0.2.4.17-rc.
 
-  o Minor bugfixes (relay):
-    - Avoid a crash when running with DirPort set but ORPort turned off.
-      Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha.
-
   o Minor bugfixes (rust):
     - Backport test_rust.sh from master. Fixes bug 26497; bugfix
       on 0.3.1.5-alpha.
@@ -606,10 +542,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       key if the want to downgrade to an older version of tor without
       ed25519. Closes ticket 20522.
 
-  o Documentation:
-    - Correct an IPv6 error in the documentation for ExitPolicy. Closes
-      ticket 25857. Patch from "CTassisF".
-
   o Removed features:
     - Directory authorities will no longer support voting according to
       any consensus method before consensus method 25. This keeps



More information about the tor-commits mailing list