From 4bb432f633f728e54cd5c6bef7299019578f2ea9 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Mon, 21 Mar 2016 11:18:15 -0400 Subject: [PATCH] Sort changes files into changelog. --- ChangeLog | 256 ++++++++++++++++++++++++++++++++ changes/assert_event_base | 5 - changes/bug14821 | 4 - changes/bug15221 | 4 - changes/bug15937 | 7 - changes/bug16023 | 4 - changes/bug16248 | 8 - changes/bug16825 | 7 - changes/bug17153 | 4 - changes/bug17732 | 10 -- changes/bug17852 | 10 -- changes/bug18051 | 5 - changes/bug18116 | 4 - changes/bug18123 | 4 - changes/bug18162 | 7 - changes/bug18184 | 5 - changes/bug18204_028 | 3 - changes/bug18208 | 5 - changes/bug18221 | 3 - changes/bug18242 | 6 - changes/bug18258 | 12 -- changes/bug18259 | 4 - changes/bug18261 | 6 - changes/bug18296 | 4 - changes/bug18348 | 5 - changes/bug18374 | 3 - changes/bug18384 | 5 - changes/bug18426_18459 | 4 - changes/bug18448 | 6 - changes/bug18454 | 8 - changes/bug18458 | 9 -- changes/bug18570 | 7 - changes/bug18600 | 3 - changes/bug8976 | 5 - changes/build18490 | 4 - changes/feature17840 | 9 -- changes/geoip-february2016 | 4 - changes/geoip-march2016 | 4 - changes/remove_memarea_freelist | 4 - changes/test_asan | 3 - changes/ticket17744 | 4 - changes/ticket18332 | 10 -- changes/trunnel_update | 5 - 43 files changed, 256 insertions(+), 233 deletions(-) delete mode 100644 changes/assert_event_base delete mode 100644 changes/bug14821 delete mode 100644 changes/bug15221 delete mode 100644 changes/bug15937 delete mode 100644 changes/bug16023 delete mode 100644 changes/bug16248 delete mode 100644 changes/bug16825 delete mode 100644 changes/bug17153 delete mode 100644 changes/bug17732 delete mode 100644 changes/bug17852 delete mode 100644 changes/bug18051 delete mode 100644 changes/bug18116 delete mode 100644 changes/bug18123 delete mode 100644 changes/bug18162 delete mode 100644 changes/bug18184 delete mode 100644 changes/bug18204_028 delete mode 100644 changes/bug18208 delete mode 100644 changes/bug18221 delete mode 100644 changes/bug18242 delete mode 100644 changes/bug18258 delete mode 100644 changes/bug18259 delete mode 100644 changes/bug18261 delete mode 100644 changes/bug18296 delete mode 100644 changes/bug18348 delete mode 100644 changes/bug18374 delete mode 100644 changes/bug18384 delete mode 100644 changes/bug18426_18459 delete mode 100644 changes/bug18448 delete mode 100644 changes/bug18454 delete mode 100644 changes/bug18458 delete mode 100644 changes/bug18570 delete mode 100644 changes/bug18600 delete mode 100644 changes/bug8976 delete mode 100644 changes/build18490 delete mode 100644 changes/feature17840 delete mode 100644 changes/geoip-february2016 delete mode 100644 changes/geoip-march2016 delete mode 100644 changes/remove_memarea_freelist delete mode 100644 changes/test_asan delete mode 100644 changes/ticket17744 delete mode 100644 changes/ticket18332 delete mode 100644 changes/trunnel_update diff --git a/ChangeLog b/ChangeLog index c39ea1973d..f6cd2b41e7 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,259 @@ +Changes in version 0.2.8.2-rc - 2016-03-?? + Tor 0.2.8.1-alpha is the first release candidate in its series. + XXXX write more here XXXX + + o New system requirements: + - Tor no longer supports versions of OpenSSL with a broken + implementation of counter mode. (This bug was present in OpenSSL + 1.0.0, and was fixed in OpenSSL 1.0.0a.) Tor still detects, but + no longer runs with, these versions. + - Tor no longer attempts to support platforms where the "time_t" type + is unsigned. (To the best of our knowledge, only OpenVMS does this, + and Tor has never actually built on OpenVMS.) Closes ticket 18184. + + o Removed features: + - Streamline relay-side hsdir handling: when relays consider whether + to accept an uploaded hidden service descriptor, they no longer + check whether they are one of the relays in the network that is + "supposed" to handle that descriptor. Implements ticket 18332. + - We no longer maintain an internal freelist in memarea.c. Allocators + should be good enough to make this code unnecessary, and it's doubtful + that it ever had any performance benefit. + + o Major bugfixes (dns proxy mode, crash): + - Avoid crashing when running as a DNS proxy. Fixes bug 16248; bugfix on + 0.2.0.1-alpha. Patch from 'cypherpunks'. + + o Major bugfixes (security, pointers): + - Avoid a difficult-to-trigger heap corruption attack when extending + a smartlist to contain over 16GB of pointers. Fixes bug 18162; + bugfix on Tor 0.1.1.11-alpha, which fixed a related bug + incompletely. Reported by Guido Vranken. + + o Major bugfixes (compilation): + - Repair hardened builds under the clang compiler. Previously, + our use of _FORTIFY_SOURCE would conflict with clang's address + sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha. + + o Major bugfixes (crash on shutdown): + - Correctly handle detaching circuits from cmuxes when doing + circuit_free_all() on shutdown. Fixes bug 18116; bugfix on + 0.2.8.1-alpha. + + o Major bugfixes (relays, bridge clients): + - Ensure relays always allow IPv4 OR and Dir connections. + Ensure bridge clients use the address configured in the bridge line. + Fixes bug 18348; bugfix on 0.2.8.1-alpha. + Reported by sysrqb, patch by teor. + + o Minor feature (IPv6): + - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set + to 1, tor prefers IPv6 directory addresses. + - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor + avoids using IPv4 for client OR and directory connections. + - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and + ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and + ClientPreferIPv6DirPort. + Closes ticket 17840; patch by "teor". + + o Minor features (bug-resistance): + - Make Tor survive errors involving connections without a corresponding + event object. Previously we'd fail with an assertion; now we produce a + log message. Related to bug 16248. + + o Minor features (build): + - Detect systems with FreeBSD-derived kernels (such as GNU/kFreeBSD) as + having possible IPfW support. Closes ticket 18448. Patch from + Steven Chamberlain. + + o Minor features (code hardening): + - Use tor_snprintf() and tor_vsnprintf() even in external and + low-level code, to harden against accidental failures to NUL- + terminate. Part of ticket 17852. Patch from 'jsturgix'. Found + with Flawfinder. + + o Minor features (compilation): + - Note our minimum required autoconf/automake versions in the + appropriate locations. Closes ticket 17732. + + o Minor features (crypto): + - Fix a segfault during startup: If unix socket was configured as + listener (such as a ControlSocket or a SocksPort unix socket), and + tor was started as root but not configured to switch to another + user, tor would segfault while trying to string compare a NULL + value. Fixes bug 18261; bugfix on 0.2.8.1-alpha. Patch by weasel. + - Validate the Diffie-Hellman hard coded parameters and ensure that + p is a safe prime, and g is suitable. Closes ticket 18221. + + o Minor features (geoip): + - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2 + Country database. + + o Minor features (robustness): + - Exit immediately with an error message if the code attempts to + use libevent without having initialized it. This should resolve + some frequently-made mistakes in our unit tests. Closes ticket + 18241. + + o Minor features (unix domain sockets): + - Since some operating systems do not consider the actual modes on a + UNIX domain socket itself, tor does not allow creating such a + socket in a directory that is group or world accessible if it is + supposed to be private. Likewise, it will not allow only group + accessible sockets in a world accessible directory. + However, on some operating systems this is unnecessary, so + add a per-socket option called RelaxDirModeCheck. + Closes ticket 18458. Patch by weasel. + + o Minor features: + - Update geoip and geoip6 to the February 2 2016 Maxmind GeoLite2 + Country database. + + o Minor bugfixes (build): + - Do not link the unit tests against both the testing and non-testing + versions of the static libraries. Fixes bug 18490; bugfix on + 0.2.7.1-alpha. + + o Minor bugfixes (client): + - Count receipt of new microdescriptors as progress towards + bootstrapping. Now, when a user who has set EntryNodes finishes + bootstrapping, Tor automatically repopulates the guard set based + on this new directory information. Fixes bug 16825; bugfix on + 0.2.3.1-alpha. + + o Minor bugfixes (code correctness): + - Update to the latest version of Trunnel, which tries harder + to avoid generating code that can invoke memcpy(p,NULL,0). + Bug found by clang address sanitizer. Fixes bug 18373; bugfix + on 0.2.7.2-alpha. + + o Minor bugfixes (configuration): + - Fix a tiny memory leak when parsing a port configuration ending in + ":auto". Fixes bug 18374; bugfix on 0.2.3.3-alpha. + + o Minor bugfixes (containers): + - If we somehow attempt to construct a heap with more than + 1073741822 elements, avoid an integer overflow when maintaining + the heap property. Fixes bug 18296; bugfix on 0.1.2.1-alpha. + + o Minor bugfixes (correctness): + - Fix a bad memory handling bug that would occur if we had queued + a cell on a channel's incoming queue. Fortunately, we can't actually + queue a cell like that as our code is constructed today, but it's best + to avoid this kind of error, even if there isn't any code that triggers + it today. Fixes bug 18570; bugfix on 0.2.4.4-alpha. + + o Minor bugfixes (crypto, static analysis): + - Silence spurious clang-scan warnings in the ed25519_donna code + by explicitly initialising some objects. + Fixes bug 18384; bugfix on 0f3eeca9 in 0.2.7.2-alpha. + Patch by "teor". + + o Minor bugfixes (directory): + - When generating a URL for a directory server on an IPv6 address, + wrap the IPv6 address in square brackets. Fixes bug 18051; + bugfix on 0.2.3.9-alpha. Patch from Malek. + + o Minor bugfixes (exit policies, security): + - Refresh an exit relay's exit policy when interface addresses change. + Previously, tor only refreshed the exit policy when the configured + external address changed. + Fixes bug 18208; bugfix on tor 0.2.7.3. Patch by "teor". + + o Minor bugfixes (hidden service client): + - Seven very fast consecutive requests to the same .onion address + triggers 7 descriptor fetches. The first six each pick a directory + (there are 6 overall) and the seventh one wasn't able to pick one + which was triggering a close on all current directory connections. It + has been fixed by not closing them if we have pending directory fetch. + Fixes bug 15937; bugfix on tor-0.2.7.1-alpha. + + o Minor bugfixes (hidden service, control port): + - Add the onion address to the HS_DESC event for the UPLOADED action + both on success or failure. It was previously hardcoded with UNKNOWN. + Fixes bug 16023; bugfix on 0.2.7.2-alpha. + + o Minor bugfixes (logging): + - Scrub service in from "unrecognized service ID" log messages. + Fixes bug 18600; bugfix on 0.2.4.11-alpha. + + o Minor bugfixes (memory safety): + - Avoid freeing an uninitialised pointer when opening a socket fails + in get_interface_addresses_ioctl. + Fixes bug 18454; bugfix on 9f06ec0c in tor-0.2.3.11-alpha. + Reported by "toralf" and "cypherpunks", patch by "teor". + - Correctly duplicate addresses in get_interface_address6_list. + Fixes bug 18454; bugfix on 110765f5 in tor-0.2.8.1-alpha. + Reported by "toralf", patch by "cypherpunks". + + o Minor bugfixes (private directory): + - Prevent a race condition when creating private directories. + Fixes part of bug 17852; bugfix on 0.2pre13. Part of ticket + 17852. Patch from 'jsturgix'. Found with Flawfinder. + + o Minor bugfixes (sandbox): + - Allow the setrlimit syscall, and the prlimit and prlimit64 syscalls, + which some libc implementations + use under the hood. Fixes bug 15221; bugfix on 0.2.5.1-alpha. + + o Minor bugfixes (security, hidden services): + - Prevent hidden services connecting to client-supplied rendezvous + addresses that are reserved as internal or multicast. + Fixes bug 8976; bugfix on b7c172c9e in tor-0.2.3.21. + Patch by "dgoulet" and "teor". + + o Minor bugfixes (security, win32): + - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing + attack. + Fixes bug 18123; bugfix on all tor versions. Patch by "teor". + + o Minor bugfixes (test networks, IPv6): + - Allow internal IPv6 addresses in descriptors in test networks. + Fixes bug 17153; bugfix on 6b4af1071 in 0.2.3.16-alpha. + Patch by "teor", reported by "karsten". + + o Minor bugfixes (testing): + - We no longer disable assertions in the unit tests when coverage + is enabled. Instead, we require you to say --disable-asserts-in-tests + to the configure script if you need assertions disabled in the + unit tests (for example, if you want to perform branch coverage). + Fixes bug 18242; bugfix on 0.2.7.1-alpha. + + o Minor bugfixes: + - Bridges now refuse "rendezvous2" (hidden service descriptor) + publish attempts. Suggested by ticket 18332. + + o Code simplification and refactoring: + - Quote all the string interpolations in configure.ac -- even + those which we are pretty sure can't contain spaces. Closes + ticket 17744. Patch from "zerosion". + - Remove specialized code for non-inplace AES_CTR. 99% of our AES + is inplace, so there's no need to have a separate implementation + for the non-inplace code. Closes ticket 18258. Patch from + Malek. + - Simplify return types for some crypto functions that can't + actually fail. Patch from Hassan Alsibyani. Closes ticket + 18259. + + o Dependency updates: + - Tor now uses Autoconf version 2.63 or later, and Automake 1.11 or later + (released in 2008 and 2009 respectively). If you are building Tor from + the git repository instead of from the source distribution, and your + tools are older than this, you will need to upgrade. + Closes ticket 17732. + + o Documentation: + - Change build messages to refer to "Fedora" instead of "Fedora Core", + and "dnf" instead of "yum". Closes tickets 18459 and 18426. + Patches from "icanhasaccount" and "cypherpunks". + + o Testing: + - Fix several warnings from clang's address sanitizer produced in the + unit tests. + - Treat backtrace test failures as expected on FreeBSD until we + solve bug 17808. Closes ticket 18204. + + Changes in version 0.2.8.1-alpha - 2016-02-04 Tor 0.2.8.1-alpha is the first alpha release in its series. It includes numerous small features and bugfixes against previous Tor diff --git a/changes/assert_event_base b/changes/assert_event_base deleted file mode 100644 index b887795518..0000000000 --- a/changes/assert_event_base +++ /dev/null @@ -1,5 +0,0 @@ - o Minor features (robustness): - - Exit immediately with an error message if the code attempts to - use libevent without having initialized it. This should resolve - some frequently-made mistakes in our unit tests. Closes ticket - 18241. diff --git a/changes/bug14821 b/changes/bug14821 deleted file mode 100644 index e9ccc2fd1b..0000000000 --- a/changes/bug14821 +++ /dev/null @@ -1,4 +0,0 @@ - o Major bugfixes (compilation): - - Repair hardened builds under the clang compiler. Previously, - our use of _FORTIFY_SOURCE would conflict with clang's address - sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha. diff --git a/changes/bug15221 b/changes/bug15221 deleted file mode 100644 index d466e1db22..0000000000 --- a/changes/bug15221 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (sandbox): - - Allow the setrlimit syscall, and the prlimit and prlimit64 syscalls, - which some libc implementations - use under the hood. Fixes bug 15221; bugfix on 0.2.5.1-alpha. diff --git a/changes/bug15937 b/changes/bug15937 deleted file mode 100644 index 88adbe47f9..0000000000 --- a/changes/bug15937 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor bugfixes (hidden service client): - - Seven very fast consecutive requests to the same .onion address - triggers 7 descriptor fetches. The first six each pick a directory - (there are 6 overall) and the seventh one wasn't able to pick one - which was triggering a close on all current directory connections. It - has been fixed by not closing them if we have pending directory fetch. - Fixes bug 15937; bugfix on tor-0.2.7.1-alpha. diff --git a/changes/bug16023 b/changes/bug16023 deleted file mode 100644 index 96c09046fe..0000000000 --- a/changes/bug16023 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (hidden service, control port): - - Add the onion address to the HS_DESC event for the UPLOADED action - both on success or failure. It was previously hardcoded with UNKNOWN. - Fixes bug 16023; bugfix on 0.2.7.2-alpha. diff --git a/changes/bug16248 b/changes/bug16248 deleted file mode 100644 index a07eba906c..0000000000 --- a/changes/bug16248 +++ /dev/null @@ -1,8 +0,0 @@ - o Major bugfixes (dns proxy mode, crash): - - Avoid crashing when running as a DNS proxy. Fixes bug 16248; bugfix on - 0.2.0.1-alpha. Patch from 'cypherpunks'. - - o Minor features (bug-resistance): - - Make Tor survive errors involving connections without a corresponding - event object. Previously we'd fail with an assertion; now we produce a - log message. Related to bug 16248. diff --git a/changes/bug16825 b/changes/bug16825 deleted file mode 100644 index ab0879a318..0000000000 --- a/changes/bug16825 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor bugfixes (client): - - Count receipt of new microdescriptors as progress towards - bootstrapping. Now, when a user who has set EntryNodes finishes - bootstrapping, Tor automatically repopulates the guard set based - on this new directory information. Fixes bug 16825; bugfix on - 0.2.3.1-alpha. - diff --git a/changes/bug17153 b/changes/bug17153 deleted file mode 100644 index 15a53c16f7..0000000000 --- a/changes/bug17153 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (test networks, IPv6): - - Allow internal IPv6 addresses in descriptors in test networks. - Fixes bug 17153; bugfix on 6b4af1071 in 0.2.3.16-alpha. - Patch by "teor", reported by "karsten". diff --git a/changes/bug17732 b/changes/bug17732 deleted file mode 100644 index 010645d3c9..0000000000 --- a/changes/bug17732 +++ /dev/null @@ -1,10 +0,0 @@ - o Minor features (compilation): - - Note our minimum required autoconf/automake versions in the - appropriate locations. Closes ticket 17732. - - o Dependency updates: - - Tor now uses Autoconf version 2.63 or later, and Automake 1.11 or later - (released in 2008 and 2009 respectively). If you are building Tor from - the git repository instead of from the source distribution, and your - tools are older than this, you will need to upgrade. - Closes ticket 17732. diff --git a/changes/bug17852 b/changes/bug17852 deleted file mode 100644 index b36b55f9d6..0000000000 --- a/changes/bug17852 +++ /dev/null @@ -1,10 +0,0 @@ - o Minor features (code hardening): - - Use tor_snprintf() and tor_vsnprintf() even in external and - low-level code, to harden against accidental failures to NUL- - terminate. Part of ticket 17852. Patch from 'jsturgix'. Found - with Flawfinder. - - o Minor bugfixes (private directory): - - Prevent a race condition when creating private directories. - Fixes part of bug 17852; bugfix on 0.2pre13. Part of ticket - 17852. Patch from 'jsturgix'. Found with Flawfinder. diff --git a/changes/bug18051 b/changes/bug18051 deleted file mode 100644 index 0dd32f054d..0000000000 --- a/changes/bug18051 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (directory): - - When generating a URL for a directory server on an IPv6 address, - wrap the IPv6 address in square brackets. Fixes bug 18051; - bugfix on 0.2.3.9-alpha. Patch from Malek. - diff --git a/changes/bug18116 b/changes/bug18116 deleted file mode 100644 index bcb96e8560..0000000000 --- a/changes/bug18116 +++ /dev/null @@ -1,4 +0,0 @@ - o Major bugfixes (crash on shutdown): - - Correctly handle detaching circuits from cmuxes when doing - circuit_free_all() on shutdown. Fixes bug 18116; bugfix on - 0.2.8.1-alpha. diff --git a/changes/bug18123 b/changes/bug18123 deleted file mode 100644 index 1359b4ef67..0000000000 --- a/changes/bug18123 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (security, win32): - - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing - attack. - Fixes bug 18123; bugfix on all tor versions. Patch by "teor". diff --git a/changes/bug18162 b/changes/bug18162 deleted file mode 100644 index 88d19a87cc..0000000000 --- a/changes/bug18162 +++ /dev/null @@ -1,7 +0,0 @@ - o Major bugfixes (security, pointers): - - - Avoid a difficult-to-trigger heap corruption attack when extending - a smartlist to contain over 16GB of pointers. Fixes bug 18162; - bugfix on Tor 0.1.1.11-alpha, which fixed a related bug - incompletely. Reported by Guido Vranken. - diff --git a/changes/bug18184 b/changes/bug18184 deleted file mode 100644 index 01b97d43e0..0000000000 --- a/changes/bug18184 +++ /dev/null @@ -1,5 +0,0 @@ - o New system requirements: - - Tor no longer attempts to support platforms where the "time_t" type - is unsigned. (To the best of our knowledge, only OpenVMS does this, - and Tor has never actually built on OpenVMS.) Closes ticket 18184. - diff --git a/changes/bug18204_028 b/changes/bug18204_028 deleted file mode 100644 index 3a1a11620e..0000000000 --- a/changes/bug18204_028 +++ /dev/null @@ -1,3 +0,0 @@ - o Testing: - - Treat backtrace test failures as expected on FreeBSD until we - solve bug 17808. Closes ticket 18204. diff --git a/changes/bug18208 b/changes/bug18208 deleted file mode 100644 index a5e1cd6b92..0000000000 --- a/changes/bug18208 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (exit policies, security): - - Refresh an exit relay's exit policy when interface addresses change. - Previously, tor only refreshed the exit policy when the configured - external address changed. - Fixes bug 18208; bugfix on tor 0.2.7.3. Patch by "teor". diff --git a/changes/bug18221 b/changes/bug18221 deleted file mode 100644 index afc240422a..0000000000 --- a/changes/bug18221 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor features (crypto): - - Validate the Diffie-Hellman hard coded parameters and ensure that - p is a safe prime, and g is suitable. Closes ticket 18221. diff --git a/changes/bug18242 b/changes/bug18242 deleted file mode 100644 index e91f6d5eb3..0000000000 --- a/changes/bug18242 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor bugfixes (testing): - - We no longer disable assertions in the unit tests when coverage - is enabled. Instead, we require you to say --disable-asserts-in-tests - to the configure script if you need assertions disabled in the - unit tests (for example, if you want to perform branch coverage). - Fixes bug 18242; bugfix on 0.2.7.1-alpha. diff --git a/changes/bug18258 b/changes/bug18258 deleted file mode 100644 index 00e122466f..0000000000 --- a/changes/bug18258 +++ /dev/null @@ -1,12 +0,0 @@ - o Code simplification and refactoring: - - Remove specialized code for non-inplace AES_CTR. 99% of our AES - is inplace, so there's no need to have a separate implementation - for the non-inplace code. Closes ticket 18258. Patch from - Malek. - - o New requirements: - - Tor no longer supports versions of OpenSSL with a broken - implementation of counter mode. (This bug was present in OpenSSL - 1.0.0, and was fixed in OpenSSL 1.0.0a.) Tor still detects, but - no longer runs with, these versions. - diff --git a/changes/bug18259 b/changes/bug18259 deleted file mode 100644 index 1084b8f524..0000000000 --- a/changes/bug18259 +++ /dev/null @@ -1,4 +0,0 @@ - o Code simplification and refactoring: - - Simplify return types for some crypto functions that can't - actually fail. Patch from Hassan Alsibyani. Closes ticket - 18259. diff --git a/changes/bug18261 b/changes/bug18261 deleted file mode 100644 index df4c74f337..0000000000 --- a/changes/bug18261 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor features (crypto): - - Fix a segfault during startup: If unix socket was configured as - listener (such as a ControlSocket or a SocksPort unix socket), and - tor was started as root but not configured to switch to another - user, tor would segfault while trying to string compare a NULL - value. Fixes bug 18261; bugfix on 0.2.8.1-alpha. Patch by weasel. diff --git a/changes/bug18296 b/changes/bug18296 deleted file mode 100644 index 1e98200be9..0000000000 --- a/changes/bug18296 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (containers): - - If we somehow attempt to construct a heap with more than - 1073741822 elements, avoid an integer overflow when maintaining - the heap property. Fixes bug 18296; bugfix on 0.1.2.1-alpha. diff --git a/changes/bug18348 b/changes/bug18348 deleted file mode 100644 index 44187aef09..0000000000 --- a/changes/bug18348 +++ /dev/null @@ -1,5 +0,0 @@ - o Major bugfixes (relays, bridge clients): - - Ensure relays always allow IPv4 OR and Dir connections. - Ensure bridge clients use the address configured in the bridge line. - Fixes bug 18348; bugfix on 0.2.8.1-alpha. - Reported by sysrqb, patch by teor. diff --git a/changes/bug18374 b/changes/bug18374 deleted file mode 100644 index 4764c53f56..0000000000 --- a/changes/bug18374 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (configuration): - - Fix a tiny memory leak when parsing a port configuration ending in - ":auto". Fixes bug 18374; bugfix on 0.2.3.3-alpha. diff --git a/changes/bug18384 b/changes/bug18384 deleted file mode 100644 index 78befcabaa..0000000000 --- a/changes/bug18384 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (crypto, static analysis): - - Silence spurious clang-scan warnings in the ed25519_donna code - by explicitly initialising some objects. - Fixes bug 18384; bugfix on 0f3eeca9 in 0.2.7.2-alpha. - Patch by "teor". diff --git a/changes/bug18426_18459 b/changes/bug18426_18459 deleted file mode 100644 index 9059d6e47e..0000000000 --- a/changes/bug18426_18459 +++ /dev/null @@ -1,4 +0,0 @@ - o Documentation: - - Change build messages to refer to "Fedora" instead of "Fedora Core", - and "dnf" instead of "yum". Closes tickets 18459 and 18426. - Patches from "icanhasaccount" and "cypherpunks". diff --git a/changes/bug18448 b/changes/bug18448 deleted file mode 100644 index e328ce367a..0000000000 --- a/changes/bug18448 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor features (build): - - Detect systems with FreeBSD-derived kernels (such as GNU/kFreeBSD) as - having possible IPfW support. Closes ticket 18448. Patch from - Steven Chamberlain. - - diff --git a/changes/bug18454 b/changes/bug18454 deleted file mode 100644 index c573dae417..0000000000 --- a/changes/bug18454 +++ /dev/null @@ -1,8 +0,0 @@ - o Minor bugfixes (memory safety): - - Avoid freeing an uninitialised pointer when opening a socket fails - in get_interface_addresses_ioctl. - Fixes bug 18454; bugfix on 9f06ec0c in tor-0.2.3.11-alpha. - Reported by "toralf" and "cypherpunks", patch by "teor". - - Correctly duplicate addresses in get_interface_address6_list. - Fixes bug 18454; bugfix on 110765f5 in tor-0.2.8.1-alpha. - Reported by "toralf", patch by "cypherpunks". diff --git a/changes/bug18458 b/changes/bug18458 deleted file mode 100644 index ea0fa3f4ca..0000000000 --- a/changes/bug18458 +++ /dev/null @@ -1,9 +0,0 @@ - o Minor features (unix domain sockets): - - Since some operating systems do not consider the actual modes on a - UNIX domain socket itself, tor does not allow creating such a - socket in a directory that is group or world accessible if it is - supposed to be private. Likewise, it will not allow only group - accessible sockets in a world accessible directory. - However, on some operating systems this is unnecessary, so - add a per-socket option called RelaxDirModeCheck. - Closes ticket 18458. Patch by weasel. diff --git a/changes/bug18570 b/changes/bug18570 deleted file mode 100644 index 04f72f4c9e..0000000000 --- a/changes/bug18570 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor bugfixes (correctness): - - Fix a bad memory handling bug that would occur if we had queued - a cell on a channel's incoming queue. Fortunately, we can't actually - queue a cell like that as our code is constructed today, but it's best - to avoid this kind of error, even if there isn't any code that triggers - it today. Fixes bug 18570; bugfix on 0.2.4.4-alpha. - diff --git a/changes/bug18600 b/changes/bug18600 deleted file mode 100644 index bf53bfef4b..0000000000 --- a/changes/bug18600 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (logging): - - Scrub service in from "unrecognized service ID" log messages. - Fixes bug 18600; bugfix on 0.2.4.11-alpha. diff --git a/changes/bug8976 b/changes/bug8976 deleted file mode 100644 index ff1c1a7ae4..0000000000 --- a/changes/bug8976 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (security, hidden services): - - Prevent hidden services connecting to client-supplied rendezvous - addresses that are reserved as internal or multicast. - Fixes bug 8976; bugfix on b7c172c9e in tor-0.2.3.21. - Patch by "dgoulet" and "teor". diff --git a/changes/build18490 b/changes/build18490 deleted file mode 100644 index 466a133cb2..0000000000 --- a/changes/build18490 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (build): - - Do not link the unit tests against both the testing and non-testing - versions of the static libraries. Fixes bug 18490; bugfix on - 0.2.7.1-alpha. diff --git a/changes/feature17840 b/changes/feature17840 deleted file mode 100644 index b8b3b7f5b5..0000000000 --- a/changes/feature17840 +++ /dev/null @@ -1,9 +0,0 @@ - o Minor feature (IPv6): - - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor - avoids using IPv4 for client OR and directory connections. - - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set - to 1, tor prefers IPv6 directory addresses. - - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and - ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and - ClientPreferIPv6DirPort. - Closes ticket 17840; patch by "teor". diff --git a/changes/geoip-february2016 b/changes/geoip-february2016 deleted file mode 100644 index 49a8041fad..0000000000 --- a/changes/geoip-february2016 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features: - - Update geoip and geoip6 to the February 2 2016 Maxmind GeoLite2 - Country database. - diff --git a/changes/geoip-march2016 b/changes/geoip-march2016 deleted file mode 100644 index a66599f5a9..0000000000 --- a/changes/geoip-march2016 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (geoip): - - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2 - Country database. - diff --git a/changes/remove_memarea_freelist b/changes/remove_memarea_freelist deleted file mode 100644 index 63b5c4155a..0000000000 --- a/changes/remove_memarea_freelist +++ /dev/null @@ -1,4 +0,0 @@ - o Removed features: - - We no longer maintain an internal freelist in memarea.c. Allocators - should be good enough to make this code unnecessary, and it's doubtful - that it ever had any performance benefit. diff --git a/changes/test_asan b/changes/test_asan deleted file mode 100644 index ce0aa978ff..0000000000 --- a/changes/test_asan +++ /dev/null @@ -1,3 +0,0 @@ - o Testing: - - Fix several warnings from clang's address sanitizer produced in the - unit tests. diff --git a/changes/ticket17744 b/changes/ticket17744 deleted file mode 100644 index 57a4a595c8..0000000000 --- a/changes/ticket17744 +++ /dev/null @@ -1,4 +0,0 @@ - o Code simplification and refactoring: - - Quote all the string interpolations in configure.ac -- even - those which we are pretty sure can't contain spaces. Closes - ticket 17744. Patch from "zerosion". \ No newline at end of file diff --git a/changes/ticket18332 b/changes/ticket18332 deleted file mode 100644 index d19c617392..0000000000 --- a/changes/ticket18332 +++ /dev/null @@ -1,10 +0,0 @@ - o Removed features: - - Streamline relay-side hsdir handling: when relays consider whether - to accept an uploaded hidden service descriptor, they no longer - check whether they are one of the relays in the network that is - "supposed" to handle that descriptor. Implements ticket 18332. - - o Minor bugfixes: - - Bridges now refuse "rendezvous2" (hidden service descriptor) - publish attempts. Suggested by ticket 18332. - diff --git a/changes/trunnel_update b/changes/trunnel_update deleted file mode 100644 index dd9c26c1f4..0000000000 --- a/changes/trunnel_update +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (code correctness): - - Update to the latest version of Trunnel, which tries harder - to avoid generating code that can invoke memcpy(p,NULL,0). - Bug found by clang address sanitizer. Fixes bug 18373; bugfix - on 0.2.7.2-alpha.