From 4ee4fe56ee4860b6762f41efd01065d0358a0665 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Thu, 24 Sep 2015 10:57:22 -0400 Subject: [PATCH] Reformat the changelog --- ChangeLog | 194 +++++++++++++++++++++++++++--------------------------- 1 file changed, 96 insertions(+), 98 deletions(-) diff --git a/ChangeLog b/ChangeLog index 03cfa1f0c4..4f817e4152 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,58 +1,58 @@ Changes in version 0.2.7.3-rc - 2015-09-2? - - Tor 0.2.7.3-rc is the first release candidate in the 0.2.7 series. It + Tor 0.2.7.3-rc is the first release candidate in the 0.2.7 series. It contains numerous usability fixes for Ed25519 keys, safeguards against - several misconfiguration problems, significant simplifications to Tor's - callgraph, and numerous bugfixes and small - features. + several misconfiguration problems, significant simplifications to + Tor's callgraph, and numerous bugfixes and small features. This is the most tested release of Tor to date. The unit tests cover 39.40% of the code, and the integration tests (accessible with "make - test-full-online", requiring stem and chutney and a network connection) - raise the coverage to XXX. + test-full-online", requiring stem and chutney and a network + connection) raise the coverage to XXX. If this is your first time upgrading a relay to Tor 0.2.7, your Tor - relay will, by default, generate a new Ed25519 identity key. If you + relay will, by default, generate a new Ed25519 identity key. If you would prefer to keep your Ed25519 identity key offline or encrypted - for improved security, you can do so by following the instructions at - XXX. + for improved security, you can do so by following the instructions + at XXX. o Major features (security, hidden services): - - Hidden services are required to use more than one EntryNode, - to avoid a guard discovery attack. See ticket for more - information. Fixes ticket 14917. - - o Major features (relay, Ed25519): - - Significant usability improvements for Ed25519 - key management. Log messages are better, and the code can recover - from far more failure conditions. Thanks to "s7r" for reporting - and diagnosing so many of these! - - On receiving a HUP signal, check to see whether the Ed25519 - signing key has changed, and reload it if so. Closes ticket 16790. + - Hidden services are required to use more than one EntryNode, to + avoid a guard discovery attack. See ticket for more information. + Fixes ticket 14917. o Major features (ed25519 performance): - - Improve the speed of Ed25519 operations and Curve25519 - keypair generation when built targeting 32 bit x86 platforms with - SSE2 available. Implements ticket 16535. + - Improve the speed of Ed25519 operations and Curve25519 keypair + generation when built targeting 32 bit x86 platforms with SSE2 + available. Implements ticket 16535. - Improve the runtime speed of Ed25519 signature verification by - using Ed25519-donna's batch verification support. Implements ticket 16533. + using Ed25519-donna's batch verification support. Implements + ticket 16533. o Major features (performance testing): - The test-network.sh script now supports performance testing. - Requires corresponding chutney performance testing changes. - Patch by "teor". Closes ticket 14175. + Requires corresponding chutney performance testing changes. Patch + by "teor". Closes ticket 14175. + + o Major features (relay, Ed25519): + - Significant usability improvements for Ed25519 key management. Log + messages are better, and the code can recover from far more + failure conditions. Thanks to "s7r" for reporting and diagnosing + so many of these! + - On receiving a HUP signal, check to see whether the Ed25519 + signing key has changed, and reload it if so. Closes ticket 16790. o Major bugfixes (relay, Ed25519): - Avoid crashing on 'tor --keygen'. Fixes bug 16679; bugfix on 0.2.7.2-alpha. Reported by "s7r". - - Improve handling of expired signing keys with offline master - keys. Fixes bug 16685; bugfix on 0.2.7.2-alpha. Reported by "s7r". + - Improve handling of expired signing keys with offline master keys. + Fixes bug 16685; bugfix on 0.2.7.2-alpha. Reported by "s7r". o Minor features (client-side privacy): - - New KeyAliveSOCKSAuth option to indefinitely extend circuit lifespan - when IsolateSOCKSAuth and streams with SOCKS authentication are attached - to the circuit. This allows applications like TorBrowser to - manage circuit lifetime on their own. Implements feature 15482. + - New KeyAliveSOCKSAuth option to indefinitely extend circuit + lifespan when IsolateSOCKSAuth and streams with SOCKS + authentication are attached to the circuit. This allows + applications like TorBrowser to manage circuit lifetime on their + own. Implements feature 15482. - When logging malformed hostnames from SOCKS5 requests, respect SafeLogging configuration. Fixes bug 16891; bugfix on 0.1.1.16-rc. @@ -73,79 +73,39 @@ Changes in version 0.2.7.3-rc - 2015-09-2? option HiddenServiceStatistics to "1" by default. Closes ticket 15254. - Client now uses an introduction point failure cache to know when - to fetch or keep a descriptor in their cache. Previously, - failures were recorded implicitly, but not explicitly remembered. - Closes ticket 16389. + to fetch or keep a descriptor in their cache. Previously, failures + were recorded implicitly, but not explicitly remembered. Closes + ticket 16389. o Minor features (testing, authorities, documentation): - New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags to - explicitly manage consensus flags in t3esting networks. - Patch by "robgjansen", modified by "teor". Implements part of - ticket 14882. + explicitly manage consensus flags in t3esting networks. Patch by + "robgjansen", modified by "teor". Implements part of ticket 14882. o Minor bugfixes (security, exit policies): - - ExitPolicyRejectPrivate now also rejects - the relay's published IPv6 address (if any), and any publicly - routable IPv4 or IPv6 addresses on any local interfacesn. - ticket 17027. Patch by "teor". Fixes bug 17027; bugfix on 0.2.0.11-alpha. - - o Minor bugfixes (portability): - - Try harder to normalize the exit status of the Tor process to the - standard-provided range. Fixes bug 16975; bugfix on every version - of Tor ever. - - Check correctly for windows socket errors in the workqueue - backend. Fixes bug 16741; bugfix on 0.2.6.3-alpha. - - Fix the behavior of crypto_rand_time_range() when told to consider times - before 1970. (These times were possible when running in a - simulated network environment where time()'s output starts at - zero.) Fixes bug 16980; bugfix on 0.2.7.1-alpha. - - o Minor bugfixes (documentation): - - Fix the usage message of tor-resolve(1) so that it no longer lists - the removed -F option. Fixes bug 16913; bugfix on - 0.2.2.28-beta. - - Fix an error in the manual page and comments for - TestingDirAuthVoteHSDir[IsStrict], which suggested that a HSDir - required "ORPort connectivity". While this is true, it is in no - way unique to the HSDir flag. Of all the flags, only HSDirs need a - DirPort configured in order for the authorities to assign that - particular flag. Patch by "teor". Fixed as part of 14882; bugfix on 0.2.6.3-alpha. - - o Minor bugfixes (relay): - - Ensure that worker threads actually exit when a fatal error or - shutdown is indicated. This fix doesn't currently affect the behaviour - of Tor, because Tor workers never indicates fatal error or shutdown except - in the unit tests. Fixes bug 16868; bugfix on 0.2.6.3-alpha. - - o Minor bugfixes (correctness): - - When calling channel_free_list(), avoid calling smartlist_remove() - while inside a FOREACH loop. This partially reverts commit - 17356fe7fd96af where the correct SMARTLIST_DEL_CURRENT was - incorrectly removed. Fixes bug 16924; bugfix on 0.2.4.4-alpha. + - ExitPolicyRejectPrivate now also rejects the relay's published + IPv6 address (if any), and any publicly routable IPv4 or IPv6 + addresses on any local interfacesn. ticket 17027. Patch by "teor". + Fixes bug 17027; bugfix on 0.2.0.11-alpha. o Minor bug fixes (torrc exit policies): - - In torrc, "accept6 *" and "reject6 *" ExitPolicy lines now - only produce IPv6 wildcard addresses. - Previously they would produce both IPv4 and IPv6 - wildcard addresses. Patch by "teor". Fixes part of bug 16069; bugfix on 0.2.4.7-alpha. - - When parsing torrc ExitPolicies, we now warn for a number of - cases where the user's intent is likely to differ from Tor's - actual behavior. These include: using an IPv4 address - with an accept6 or reject6 line; using "private" on an accept6 - or reject6 line; and including any ExitPolicy lines after - accept *:* or reject *:*. Related to ticket 16069. + - In torrc, "accept6 *" and "reject6 *" ExitPolicy lines now only + produce IPv6 wildcard addresses. Previously they would produce + both IPv4 and IPv6 wildcard addresses. Patch by "teor". Fixes part + of bug 16069; bugfix on 0.2.4.7-alpha. + - When parsing torrc ExitPolicies, we now warn for a number of cases + where the user's intent is likely to differ from Tor's actual + behavior. These include: using an IPv4 address with an accept6 or + reject6 line; using "private" on an accept6 or reject6 line; and + including any ExitPolicy lines after accept *:* or reject *:*. + Related to ticket 16069. - When parsing torrc ExitPolicies, we now issue an info-level message: when expanding an "accept/reject *" line to include both IPv4 and IPv6 wildcard addresses. Related to ticket 16069. - - In each instance above, usage advice is provided to avoid the message. - Resolves ticket 16069. Patch by "teor". Fixes part of bug + - In each instance above, usage advice is provided to avoid the + message. Resolves ticket 16069. Patch by "teor". Fixes part of bug 16069; bugfix on 0.2.4.7-alpha. - o Minor bugfixes (open file limit): - - Fix set_max_file_descriptors() to set by default the max open file - limit to the current limit when setrlimit() fails. Fixes bug 16274; bugfix on tor- - 0.2.0.10-alpha. Patch by dgoulet. - o Minor bugfixes (authority): - Don't assign "HSDir" to a router if it isn't Valid and Running. Fixes bug 16524; bugfix on 0.2.7.2-alpha. @@ -157,8 +117,26 @@ Changes in version 0.2.7.3-rc - 2015-09-2? bug 16286; bugfix on 0.2.7.2-alpha. o Minor bugfixes (control port): - - Repair a warning and a spurious result when getting the maximum number of file descriptors - from the controller. Fixes bug 16697; bugfix on 0.2.7.2-alpha. + - Repair a warning and a spurious result when getting the maximum + number of file descriptors from the controller. Fixes bug 16697; + bugfix on 0.2.7.2-alpha. + + o Minor bugfixes (correctness): + - When calling channel_free_list(), avoid calling smartlist_remove() + while inside a FOREACH loop. This partially reverts commit + 17356fe7fd96af where the correct SMARTLIST_DEL_CURRENT was + incorrectly removed. Fixes bug 16924; bugfix on 0.2.4.4-alpha. + + o Minor bugfixes (documentation): + - Fix the usage message of tor-resolve(1) so that it no longer lists + the removed -F option. Fixes bug 16913; bugfix on 0.2.2.28-beta. + - Fix an error in the manual page and comments for + TestingDirAuthVoteHSDir[IsStrict], which suggested that a HSDir + required "ORPort connectivity". While this is true, it is in no + way unique to the HSDir flag. Of all the flags, only HSDirs need a + DirPort configured in order for the authorities to assign that + particular flag. Patch by "teor". Fixed as part of 14882; bugfix + on 0.2.6.3-alpha. o Minor bugfixes (Ed25519): - Fix a memory leak when reading router descriptors with expired @@ -170,13 +148,33 @@ Changes in version 0.2.7.3-rc - 2015-09-2? - Allow routers with ed25519 keys to run correctly under the seccomp2 sandbox. Fixes bug 16965; bugfix on 0.2.7.2-alpha. + o Minor bugfixes (open file limit): + - Fix set_max_file_descriptors() to set by default the max open file + limit to the current limit when setrlimit() fails. Fixes bug + 16274; bugfix on tor- 0.2.0.10-alpha. Patch by dgoulet. + o Minor bugfixes (portability): + - Try harder to normalize the exit status of the Tor process to the + standard-provided range. Fixes bug 16975; bugfix on every version + of Tor ever. + - Check correctly for windows socket errors in the workqueue + backend. Fixes bug 16741; bugfix on 0.2.6.3-alpha. + - Fix the behavior of crypto_rand_time_range() when told to consider + times before 1970. (These times were possible when running in a + simulated network environment where time()'s output starts at + zero.) Fixes bug 16980; bugfix on 0.2.7.1-alpha. - Restore correct operation of TLS client-cipher detection on OpenSSL 1.1. Fixes bug 14047; bugfix on 0.2.7.2-alpha. o Minor bugfixes (relay): - - Unblock threads before releasing the work queue mutex to ensure predictable - scheduling behavior. Fixes bug 16644; bugfix on 0.2.6.3-alpha. + - Ensure that worker threads actually exit when a fatal error or + shutdown is indicated. This fix doesn't currently affect the + behaviour of Tor, because Tor workers never indicates fatal error + or shutdown except in the unit tests. Fixes bug 16868; bugfix + on 0.2.6.3-alpha. + - Unblock threads before releasing the work queue mutex to ensure + predictable scheduling behavior. Fixes bug 16644; bugfix + on 0.2.6.3-alpha. o Code simplification and refactoring: - Change the function that's called when we need to retry all