Tor 0.2.1.7-alpha is out
Kyle Williams
kyle.kwilliams at gmail.com
Fri Nov 21 02:55:40 UTC 2008
I did a build with Tor 0.2.1.7-alpha about 5 days ago.
Is this the same exact version, or were there updates in the last few days?
Thanks!
- Kyle
On Thu, Nov 20, 2008 at 3:50 PM, Roger Dingledine <arma at mit.edu> wrote:
> Tor 0.2.1.7-alpha fixes a major security problem in Debian and Ubuntu
> packages (and maybe other packages) noticed by Theo de Raadt, fixes
> a smaller security flaw that might allow an attacker to access local
> services, adds better defense against DNS poisoning attacks on exit
> relays, further improves hidden service performance, and fixes a variety
> of other issues.
>
> https://www.torproject.org/download.html.en
>
> Changes in version 0.2.1.7-alpha - 2008-11-08
> o Security fixes:
> - The "ClientDNSRejectInternalAddresses" config option wasn't being
> consistently obeyed: if an exit relay refuses a stream because its
> exit policy doesn't allow it, we would remember what IP address
> the relay said the destination address resolves to, even if it's
> an internal IP address. Bugfix on 0.2.0.7-alpha; patch by rovv.
> - The "User" and "Group" config options did not clear the
> supplementary group entries for the Tor process. The "User" option
> is now more robust, and we now set the groups to the specified
> user's primary group. The "Group" option is now ignored. For more
> detailed logging on credential switching, set CREDENTIAL_LOG_LEVEL
> in common/compat.c to LOG_NOTICE or higher. Patch by Jacob Appelbaum
> and Steven Murdoch. Bugfix on 0.0.2pre14. Fixes bug 848.
> - Do not use or believe expired v3 authority certificates. Patch
> from Karsten. Bugfix in 0.2.0.x. Fixes bug 851.
>
> o Minor features:
> - Now NodeFamily and MyFamily config options allow spaces in
> identity fingerprints, so it's easier to paste them in.
> Suggested by Lucky Green.
> - Implement the 0x20 hack to better resist DNS poisoning: set the
> case on outgoing DNS requests randomly, and reject responses that do
> not match the case correctly. This logic can be disabled with the
> ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
> of servers that do not reliably preserve case in replies. See
> "Increased DNS Forgery Resistance through 0x20-Bit Encoding"
> for more info.
> - Preserve case in replies to DNSPort requests in order to support
> the 0x20 hack for resisting DNS poisoning attacks.
>
> o Hidden service performance improvements:
> - When the client launches an introduction circuit, retry with a
> new circuit after 30 seconds rather than 60 seconds.
> - Launch a second client-side introduction circuit in parallel
> after a delay of 15 seconds (based on work by Christian Wilms).
> - Hidden services start out building five intro circuits rather
> than three, and when the first three finish they publish a service
> descriptor using those. Now we publish our service descriptor much
> faster after restart.
>
> o Minor bugfixes:
> - Minor fix in the warning messages when you're having problems
> bootstrapping; also, be more forgiving of bootstrap problems when
> we're still making incremental progress on a given bootstrap phase.
> - When we're choosing an exit node for a circuit, and we have
> no pending streams, choose a good general exit rather than one that
> supports "all the pending streams". Bugfix on 0.1.1.x. Fix by rovv.
> - Send a valid END cell back when a client tries to connect to a
> nonexistent hidden service port. Bugfix on 0.1.2.15. Fixes bug
> 840. Patch from rovv.
> - If a broken client asks a non-exit router to connect somewhere,
> do not even do the DNS lookup before rejecting the connection.
> Fixes another case of bug 619. Patch from rovv.
> - Fix another case of assuming, when a specific exit is requested,
> that we know more than the user about what hosts it allows.
> Fixes another case of bug 752. Patch from rovv.
> - Check which hops rendezvous stream cells are associated with to
> prevent possible guess-the-streamid injection attacks from
> intermediate hops. Fixes another case of bug 446. Based on patch
> from rovv.
> - Avoid using a negative right-shift when comparing 32-bit
> addresses. Possible fix for bug 845 and bug 811.
> - Make the assert_circuit_ok() function work correctly on circuits that
> have already been marked for close.
> - Fix read-off-the-end-of-string error in unit tests when decoding
> introduction points.
> - Fix uninitialized size field for memory area allocation: may improve
> memory performance during directory parsing.
> - Treat duplicate certificate fetches as failures, so that we do
> not try to re-fetch an expired certificate over and over and over.
> - Do not say we're fetching a certificate when we'll in fact skip it
> because of a pending download.
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.6 (GNU/Linux)
>
> iD8DBQFJJfe061qJaiiYi/URAjQ1AJ9YANIWukD/iWzDf0mhmcdUeFSaywCfa+gh
> 1Ycg6IFC+DACu48XnQ2nN30=
> =64Rm
> -----END PGP SIGNATURE-----
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20081120/67238c85/attachment.htm>
More information about the tor-talk
mailing list