mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
reflow changelog.
This commit is contained in:
parent
f6559d8dcb
commit
03ce73327c
53
ChangeLog
53
ChangeLog
@ -3,9 +3,9 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
|
||||
improvements for clients and relays, including blacklisting authority
|
||||
signing keys that were used while susceptible to the OpenSSL
|
||||
"heartbleed" bug, fixing two expensive functions on busy relays,
|
||||
improved TLS ciphersuite preference lists, support for run-time hardening
|
||||
on compilers that support AddressSanitizer, and more work on the Linux
|
||||
sandbox code.
|
||||
improved TLS ciphersuite preference lists, support for run-time
|
||||
hardening on compilers that support AddressSanitizer, and more work on
|
||||
the Linux sandbox code.
|
||||
|
||||
There are also several usability fixes for clients (especially clients
|
||||
that use bridges), two new TransPort protocols supported (one on
|
||||
@ -52,15 +52,15 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
|
||||
uniform criteria, and includes all OpenSSL ciphersuites with
|
||||
acceptable strength and forward secrecy. Previously, we had left
|
||||
some perfectly fine ciphersuites unsupported due to omission or
|
||||
typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported
|
||||
by 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
|
||||
typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
|
||||
'cypherpunks'. Bugfix on 0.2.4.8-alpha.
|
||||
- Relays now trust themselves to have a better view than clients of
|
||||
which TLS ciphersuites are better than others. (Thanks to bug 11513,
|
||||
the relay list is now well-considered, whereas the client list has
|
||||
been chosen mainly for anti-fingerprinting purposes.) Relays
|
||||
prefer: AES over 3DES; then ECDHE over DHE; then GCM over CBC;
|
||||
then SHA384 over SHA256 over SHA1; and last, AES256 over AES128.
|
||||
Resolves ticket 11528.
|
||||
which TLS ciphersuites are better than others. (Thanks to bug
|
||||
11513, the relay list is now well-considered, whereas the client
|
||||
list has been chosen mainly for anti-fingerprinting purposes.)
|
||||
Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
|
||||
CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
|
||||
AES128. Resolves ticket 11528.
|
||||
- Clients now try to advertise the same list of ciphersuites as
|
||||
Firefox 28. This change enables selection of (fast) GCM
|
||||
ciphersuites, disables some strange old ciphers, and stops
|
||||
@ -77,18 +77,18 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
|
||||
FreeBSD. To enable it, set "TransProxyType ipfw". Resolves ticket
|
||||
10267; patch from "yurivict".
|
||||
- Support OpenBSD's divert-to rules with the pf firewall for
|
||||
transparent proxy ports. To enable it, set "TransProxyType
|
||||
pf-divert". This allows Tor to run a TransPort transparent proxy
|
||||
port on OpenBSD 4.4 or later without root privileges. See the
|
||||
transparent proxy ports. To enable it, set "TransProxyType pf-
|
||||
divert". This allows Tor to run a TransPort transparent proxy port
|
||||
on OpenBSD 4.4 or later without root privileges. See the
|
||||
pf.conf(5) manual page for information on configuring pf to use
|
||||
divert-to rules. Closes ticket 10896; patch from Dana Koch.
|
||||
|
||||
o Minor features (security):
|
||||
- New --enable-expensive-hardening option to enable security
|
||||
hardening options that consume nontrivial amounts of CPU and
|
||||
memory. Right now, this includes AddressSanitizer and UbSan,
|
||||
which are supported in newer versions of GCC and Clang. Closes
|
||||
ticket 11477.
|
||||
memory. Right now, this includes AddressSanitizer and UbSan, which
|
||||
are supported in newer versions of GCC and Clang. Closes ticket
|
||||
11477.
|
||||
|
||||
o Minor features (log verbosity):
|
||||
- Demote the message that we give when a flushing connection times
|
||||
@ -98,8 +98,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
|
||||
about downloading descriptors. Previously, we'd log a notice
|
||||
whenever we learned about more routers. Now, we only log a notice
|
||||
at every 5% of progress. Fixes bug 9963.
|
||||
- Warn less verbosely when receiving a malformed ESTABLISH_RENDEZVOUS
|
||||
cell. Fixes ticket 11279.
|
||||
- Warn less verbosely when receiving a malformed
|
||||
ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279.
|
||||
- When we run out of usable circuit IDs on a channel, log only one
|
||||
warning for the whole channel, and describe how many circuits
|
||||
there were on the channel. Fixes part of ticket 11553.
|
||||
@ -153,8 +153,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
|
||||
just the wrong time. Re-fixes bug 11156; bugfix on 0.2.5.3-alpha.
|
||||
|
||||
o Minor bugfixes (client, logging during bootstrap):
|
||||
- Warn only once if we start logging in an unsafe way. Previously, we
|
||||
complain as many times as we had problems. Fixes bug 9870;
|
||||
- Warn only once if we start logging in an unsafe way. Previously,
|
||||
we complain as many times as we had problems. Fixes bug 9870;
|
||||
bugfix on 0.2.5.1-alpha.
|
||||
- Only report the first fatal bootstrap error on a given OR
|
||||
connection. This stops us from telling the controller bogus error
|
||||
@ -208,15 +208,16 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
|
||||
harmless memory leak. Fixes bug 11278; bugfix on 0.2.5.1-alpha.
|
||||
- Don't re-initialize a second set of OpenSSL mutexes when starting
|
||||
up. Previously, we'd make one set of mutexes, and then immediately
|
||||
replace them with another. Fixes bug 11726; bugfix on 0.2.5.3-alpha.
|
||||
replace them with another. Fixes bug 11726; bugfix on
|
||||
0.2.5.3-alpha.
|
||||
- Resolve some memory leaks found by coverity in the unit tests, on
|
||||
exit in tor-gencert, and on a failure to compute digests for our
|
||||
own keys when generating a v3 networkstatus vote. These leaks
|
||||
should never have affected anyone in practice.
|
||||
|
||||
o Minor bugfixes (hidden service):
|
||||
- Only retry attempts to connect to a chosen rendezvous point 8 times,
|
||||
not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
|
||||
- Only retry attempts to connect to a chosen rendezvous point 8
|
||||
times, not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
|
||||
|
||||
o Minor bugfixes (misc code correctness):
|
||||
- Fix various instances of undefined behavior in channeltls.c,
|
||||
@ -226,8 +227,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
|
||||
exist.) Fixes bug 10363; bugfixes on 0.1.1.1-alpha, 0.1.2.1-alpha,
|
||||
0.2.0.10-alpha, and 0.2.3.6-alpha. Reported by "bobnomnom".
|
||||
- Use the AddressSanitizer and Ubsan sanitizers (in clang-3.4) to
|
||||
fix some miscellaneous errors in our tests and codebase. Fixes
|
||||
bug 11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
|
||||
fix some miscellaneous errors in our tests and codebase. Fixes bug
|
||||
11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
|
||||
- Always check return values for unlink, munmap, UnmapViewOfFile;
|
||||
check strftime return values more often. In some cases all we can
|
||||
do is report a warning, but this may help prevent deeper bugs from
|
||||
|
Loading…
Reference in New Issue
Block a user