mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-12-02 16:43:32 +01:00
forward-port the 0.2.3.25 changelog and release notes
This commit is contained in:
parent
ea893a3c30
commit
0f9524dbd0
39
ChangeLog
39
ChangeLog
@ -1,3 +1,42 @@
|
|||||||
|
Changes in version 0.2.3.25 - 2012-11-19
|
||||||
|
The Tor 0.2.3 release series is dedicated to the memory of Len "rabbi"
|
||||||
|
Sassaman (1980-2011), a long-time cypherpunk, anonymity researcher,
|
||||||
|
Mixmaster maintainer, Pynchon Gate co-designer, CodeCon organizer,
|
||||||
|
programmer, and friend. Unstinting in his dedication to the cause of
|
||||||
|
freedom, he inspired and helped many of us as we began our work on
|
||||||
|
anonymity, and inspires us still. Please honor his memory by writing
|
||||||
|
software to protect people's freedoms, and by helping others to do so.
|
||||||
|
|
||||||
|
Tor 0.2.3.25, the first stable release in the 0.2.3 branch, features
|
||||||
|
significantly reduced directory overhead (via microdescriptors),
|
||||||
|
enormous crypto performance improvements for fast relays on new
|
||||||
|
enough hardware, a new v3 TLS handshake protocol that can better
|
||||||
|
resist fingerprinting, support for protocol obfuscation plugins (aka
|
||||||
|
pluggable transports), better scalability for hidden services, IPv6
|
||||||
|
support for bridges, performance improvements like allowing clients
|
||||||
|
to skip the first round-trip on the circuit ("optimistic data") and
|
||||||
|
refilling token buckets more often, a new "stream isolation" design
|
||||||
|
to isolate different applications on different circuits, and many
|
||||||
|
stability, security, and privacy fixes.
|
||||||
|
|
||||||
|
o Major bugfixes:
|
||||||
|
- Tor tries to wipe potentially sensitive data after using it, so
|
||||||
|
that if some subsequent security failure exposes Tor's memory,
|
||||||
|
the damage will be limited. But we had a bug where the compiler
|
||||||
|
was eliminating these wipe operations when it decided that the
|
||||||
|
memory was no longer visible to a (correctly running) program,
|
||||||
|
hence defeating our attempt at defense in depth. We fix that
|
||||||
|
by using OpenSSL's OPENSSL_cleanse() operation, which a compiler
|
||||||
|
is unlikely to optimize away. Future versions of Tor may use
|
||||||
|
a less ridiculously heavy approach for this. Fixes bug 7352.
|
||||||
|
Reported in an article by Andrey Karpov.
|
||||||
|
|
||||||
|
o Minor bugfixes:
|
||||||
|
- Fix a harmless bug when opting against publishing a relay descriptor
|
||||||
|
because DisableNetwork is set. Fixes bug 7464; bugfix on
|
||||||
|
0.2.3.9-alpha.
|
||||||
|
|
||||||
|
|
||||||
Changes in version 0.2.4.6-alpha - 2012-11-13
|
Changes in version 0.2.4.6-alpha - 2012-11-13
|
||||||
Tor 0.2.4.6-alpha fixes an assert bug that has been plaguing relays,
|
Tor 0.2.4.6-alpha fixes an assert bug that has been plaguing relays,
|
||||||
makes our defense-in-depth memory wiping more reliable, and begins to
|
makes our defense-in-depth memory wiping more reliable, and begins to
|
||||||
|
1087
ReleaseNotes
1087
ReleaseNotes
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user