clean up changelog for 0.3.0.2-alpha release

This commit is contained in:
Roger Dingledine 2017-01-22 22:08:15 -05:00
parent 5066facb23
commit 4fc0a31287

149
ChangeLog
View File

@ -1,19 +1,23 @@
Changes in version 0.3.0.2-alpha - 2017-01-23 Changes in version 0.3.0.2-alpha - 2017-01-23
Blurb here. Lorax ipsum gruvvulus thneed amet, snergelly once-ler Tor 0.3.0.2-alpha improves how exit relays and clients handle DNS
lerkim, sed do barbaloot tempor gluppitus ut labore et truffula magna time-to-live values, makes directory authorities enforce the 1-to-1
aliqua. Ut enim ad grickle-grass veniam, quis miff-muffered ga-zumpco mapping of relay RSA identity keys to ED25519 identity keys, fixes a
laboris nisi ut cruffulus ex ea schloppity consequat. Duis aute client-side onion service reachability bug, does better at selecting
snarggle in swomeeswans in voluptate axe-hacker esse rippulus crummii the set of fallback directories, and more.
eu moof nulla snuvv.
o Major features (security): o Major features (security):
- Change the algorithm used to decide DNS TTLs on client and server - Change the algorithm used to decide DNS TTLs on client and server
side, to better resist DNS-based correlation attacks like the side, to better resist DNS-based correlation attacks like the
DefecTor attack of Greschbach, Pulls, Roberts, Winter, and DefecTor attack of Greschbach, Pulls, Roberts, Winter, and
Feamster). Now relays only return one of two possible DNS TTL Feamster. Now relays only return one of two possible DNS TTL
values, and clients are willing to believe DNS TTL values up to 3 values, and clients are willing to believe DNS TTL values up to 3
hours long. Closes ticket 19769. hours long. Closes ticket 19769.
o Major features (directory authority, security):
- The default for AuthDirPinKeys is now 1: directory authorities
will reject relays where the RSA identity key matches a previously
seen value, but the Ed25519 key has changed. Closes ticket 18319.
o Major bugfixes (client, guard, crash): o Major bugfixes (client, guard, crash):
- In circuit_get_global_origin_list(), return the actual list of - In circuit_get_global_origin_list(), return the actual list of
origin circuits. The previous version of this code returned the origin circuits. The previous version of this code returned the
@ -25,10 +29,10 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
- Fix a client-side onion service reachability bug, where multiple - Fix a client-side onion service reachability bug, where multiple
socks requests to an onion service (or a single slow request) could socks requests to an onion service (or a single slow request) could
cause us to mistakenly mark some of the service's introduction cause us to mistakenly mark some of the service's introduction
points as failed, and we cache that failure so eventually we points as failed, and we cache that failure so eventually we run
run out and can't reach the service. Also resolves a mysterious out and can't reach the service. Also resolves a mysterious "Remote
"Remote server sent bogus reason code 65021" log warning. The bug server sent bogus reason code 65021" log warning. The bug was
was introduced in task 17218, where we tried to remember the circuit introduced in ticket 17218, where we tried to remember the circuit
end reason as a uint16_t, which mangled negative values. Partially end reason as a uint16_t, which mangled negative values. Partially
fixes bug 21056 and fixes bug 20307; bugfix on 0.2.8.1-alpha. fixes bug 21056 and fixes bug 20307; bugfix on 0.2.8.1-alpha.
@ -36,38 +40,30 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
- Fix a bug that prevented exit nodes from caching DNS records for - Fix a bug that prevented exit nodes from caching DNS records for
more than 60 seconds. Fixes bug 19025; bugfix on 0.2.4.7-alpha. more than 60 seconds. Fixes bug 19025; bugfix on 0.2.4.7-alpha.
o Minor features (directory authority, security):
- The default for AuthDirPinKeys is now 1: directory authorities
will reject relays where the RSA identity key matches a previously
seen value, but the Ed25519 key has changed. Closes ticket 18319.
o Minor features (controller): o Minor features (controller):
- Add GETINFO sr/current and sr/previous keys, to expose shared- - Add "GETINFO sr/current" and "GETINFO sr/previous" keys, to
random values to the controller. Closes ticket 19925. expose shared-random values to the controller. Closes ticket 19925.
o Minor features (entry guards): o Minor features (entry guards):
- Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not - Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not
break regresson tests. break regression tests.
- Require UseEntryGuards when UseBridges is set in order to make - Require UseEntryGuards when UseBridges is set, in order to make
sure bridges aren't bypassed. Resolves ticket 20502. sure bridges aren't bypassed. Resolves ticket 20502.
o Minor features (fallback directories): o Minor features (fallback directories):
- Allow 3 fallbacks per operator. (This is safe now we are choosing - Select 200 fallback directories for each release. Closes
200 fallbacks.) Closes ticket 20912. ticket 20881.
- Display the fingerprint when downloading consensuses from - Allow 3 fallback relays per operator, which is safe now that we are
fallbacks. Closes ticket 20908. choosing 200 fallback relays. Closes ticket 20912.
- Exclude relays affected by 20499 from the fallback list. Exclude - Exclude relays affected by bug 20499 from the fallback list. Exclude
known affected versions, and any relay that delivers a stale relays from the fallback list if they are running versions known to
consensus, as long as that consensus expired more than 24 hours be affected by bug 20499, or if in our tests they deliver a stale
ago. Closes ticket 20539. consensus (i.e. one that expired more than 24 hours ago). Closes
- Make it easier to change the output sort order of fallbacks. ticket 20539.
Closes ticket 20822.
- Provide bandwidth and consensus weight for each candidate fallback
in updateFallbackDirs.py. Closes ticket 20878.
- Reduce the minimum fallback bandwidth to 1 MByte/s. Part of - Reduce the minimum fallback bandwidth to 1 MByte/s. Part of
ticket 18828. ticket 18828.
- Require fallback directories to have the same address and port for - Require fallback directories to have the same address and port for
7 dayss. (Due to the number of relays with enough stability.) 7 days (now that we have enough relays with this stability).
Relays whose OnionOO stability timer is reset on restart by bug Relays whose OnionOO stability timer is reset on restart by bug
18050 should upgrade to Tor 0.2.8.7 or later, which has a fix for 18050 should upgrade to Tor 0.2.8.7 or later, which has a fix for
this issue. Closes ticket 20880; maintains short-term fix this issue. Closes ticket 20880; maintains short-term fix
@ -76,35 +72,39 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
decaying average), rather than 95%. This allows at least 73% of decaying average), rather than 95%. This allows at least 73% of
clients to bootstrap in the first 5 seconds without contacting an clients to bootstrap in the first 5 seconds without contacting an
authority. Part of ticket 18828. authority. Part of ticket 18828.
- Select 200 fallback directories for each release. Closes - Annotate updateFallbackDirs.py with the bandwidth and consensus
ticket 20881. weight for each candidate fallback. Closes ticket 20878.
- Make it easier to change the output sort order of fallbacks.
Closes ticket 20822.
- Display the relay fingerprint when downloading consensuses from
fallbacks. Closes ticket 20908.
o Minor features (geoip): o Minor features (geoip):
- Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2 - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
Country database. Country database.
o Minor features (hidden service directories): o Minor features (next-gen onion service directories):
- Relays are now willing act as v3 hidden service directories, - Remove the "EnableOnionServicesV3" consensus parameter that we
regardless of the EnableOnionServicvesV3 parameter. Implements introduced in 0.3.0.1-alpha: relays are now always willing to act
ticket 19899. as v3 onion service directories. Resolves ticket 19899.
o Minor features (linting): o Minor features (linting):
- Enhance the changes file linter to warn on Tor versions that are - Enhance the changes file linter to warn on Tor versions that are
prefixed with 'tor-'. Closes ticket 21096. prefixed with "tor-". Closes ticket 21096.
o Minor features (logging): o Minor features (logging):
- In several places, describe unset ed25519 keys as "<unset>", - In several places, describe unset ed25519 keys as "<unset>",
rather than "AAAAAAAA...AAA". Closes ticket 21037. rather than the scary "AAAAAAAA...AAA". Closes ticket 21037.
o Minor bugfix (control protocol): o Minor bugfix (control protocol):
- The reply to a "GETINFO config/names" request via the control - The reply to a "GETINFO config/names" request via the control
protocol now spells the type "Dependent" correctly. This is a protocol now spells the type "Dependent" correctly. This is a
breaking change in the control protocol. (It seems to be ignored breaking change in the control protocol. (The field seems to be
by the most common known clients.) Fixes bug 18146; bugfix ignored by the most common known controllers.) Fixes bug 18146;
on 0.1.1.4-alpha. bugfix on 0.1.1.4-alpha.
o Minor bugfixes (bug resilience): o Minor bugfixes (bug resilience):
- Fix an (unreachable) size_t overflow in base64_decode(). Fixes bug - Fix an unreachable size_t overflow in base64_decode(). Fixes bug
19222; bugfix on 0.2.0.9-alpha. Found by Guido Vranken; fixed by 19222; bugfix on 0.2.0.9-alpha. Found by Guido Vranken; fixed by
Hans Jerry Illikainen. Hans Jerry Illikainen.
@ -123,9 +123,10 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha. installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
o Minor bugfixes (config): o Minor bugfixes (config):
- Don't assert when trying to get the options list when - Don't assert on startup when trying to get the options list and
LearnCircuitBuildTimeout is set to 0 and we are actually currently LearnCircuitBuildTimeout is set to 0: we are currently parsing
parsing the options. Fixes bug 21062; bugfix on 0.2.9.3-alpha. the options so of course they aren't ready yet. Fixes bug 21062;
bugfix on 0.2.9.3-alpha.
o Minor bugfixes (controller): o Minor bugfixes (controller):
- Make the GETINFO interface for inquiring about entry guards - Make the GETINFO interface for inquiring about entry guards
@ -133,50 +134,45 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
on 0.3.0.1-alpha. on 0.3.0.1-alpha.
o Minor bugfixes (dead code): o Minor bugfixes (dead code):
- Remove a rendundant check for PidFile changes at runtime in - Remove a redundant check for PidFile changes at runtime in
options_transition_allowed(): this check is already performed options_transition_allowed(): this check is already performed
regardless of whether the sandbox is active. Fixes bug 21123; regardless of whether the sandbox is active. Fixes bug 21123;
bugfix on commit 2ae47d3 in 0.2.5.4-alpha. bugfix on 0.2.5.4-alpha.
o Minor bugfixes (documentation): o Minor bugfixes (documentation):
- Update the tor manual page to document every option that can not - Update the tor manual page to document every option that can not
be changed while tor is running. Fixes bug 21122; bugfix on be changed while tor is running. Fixes bug 21122.
multiple tor versions.
o Minor bugfixes (fallback directories): o Minor bugfixes (fallback directories):
- Stop failing when a relay has no uptime data in
updateFallbackDirs.py. Fixes bug 20945; bugfix on 0.2.8.1-alpha.
- Avoid checking fallback candidates' DirPorts if they are down in - Avoid checking fallback candidates' DirPorts if they are down in
OnionOO. When a relay operator has multiple relays, this OnionOO. When a relay operator has multiple relays, this
prioritises relays that are up over relays that are down. Fixes prioritizes relays that are up over relays that are down. Fixes
bug 20926; bugfix on 0.2.8.3-alpha. bug 20926; bugfix on 0.2.8.3-alpha.
- Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py. - Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py.
Fixes bug 20877; bugfix on 0.2.8.3-alpha. Fixes bug 20877; bugfix on 0.2.8.3-alpha.
- Stop failing when a relay has no uptime data in
updateFallbackDirs.py. Fixes bug 20945; bugfix on 0.2.8.1-alpha.
o Minor bugfixes (guards, bootstrapping): o Minor bugfixes (guards, bootstrapping):
- When connecting to a directory guard during bootstrap, do not mark - When connecting to a directory guard during bootstrap, do not mark
the guard as successful until we receive a good-looking directory the guard as successful until we receive a good-looking directory
response from it. Fixes bug 20974; bugfix on 0.3.0.1-alpha. response from it. Fixes bug 20974; bugfix on 0.3.0.1-alpha.
o Minor bugfixes (hidden service): o Minor bugfixes (onion services):
- Fix the config reload pruning of old vs new services so it - Fix the config reload pruning of old vs new services so it
actually works when both ephemeral and non ephemeral services were actually works when both ephemeral and non-ephemeral services are
configured which lead to a BUG() stacktrace. Fixes bug 21054; configured. Fixes bug 21054; bugfix on 0.3.0.1-alpha.
bugfix on 0.3.0.1-alpha. - Allow the number of introduction points to be as low as 0, rather
- Restrict the number of introduction point from 0 to the maximum than as low as 3. Fixes bug 21033; bugfix on 0.2.7.2-alpha.
allowed instead of the default value to the maximum. That was
stopping operators from using less than 3 introduction points.
Fixes bug 21033; bugfix on 0.2.7.2-alpha.
o Minor bugfixes (IPv6): o Minor bugfixes (IPv6):
- Make IP6-using clients try harder to find an IPv6 directory server. - Make IPv6-using clients try harder to find an IPv6 directory server.
Fixes bug 20999; bugfix on 77a9de0 from 17840 in 0.2.8.2-alpha. Fixes bug 20999; bugfix on 0.2.8.2-alpha.
- When IPv6 addresses have not been downloaded, use hard-coded - When IPv6 addresses have not been downloaded yet (microdesc
address info for authorities, fallbacks, and configured bridges. consensus documents don't list relay IPv6 addresses), use hard-coded
(When IPv6-only clients receive a microdesc consensus, it has no addresses for authorities, fallbacks, and configured bridges. Now
IPv6 addresses, so they can't use it until microdescs are IPv6-only clients can use microdescriptors. Fixes bug 20996;
downloaded.) This allows IPv6-only clients to use microdescriptors. bugfix on b167e82 from 19608 in 0.2.8.5-alpha.
Fixes bug 20996; bugfix on b167e82 from 19608 in 0.2.8.5-alpha.
o Minor bugfixes (memory leaks): o Minor bugfixes (memory leaks):
- Fix a memory leak when configuring hidden services. Fixes bug - Fix a memory leak when configuring hidden services. Fixes bug
@ -190,8 +186,8 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
o Minor bugfixes (relay): o Minor bugfixes (relay):
- Honor DataDirectoryGroupReadable when tor is a relay. Previously, - Honor DataDirectoryGroupReadable when tor is a relay. Previously,
the initialization of the keys would reset the DataDirectory to initializing the keys would reset the DataDirectory to 0700
0700 instead of 0750 if DataeDirectoryGroupReadable was set to 1. instead of 0750 even if DataDirectoryGroupReadable was set to 1.
Fixes bug 19953; bugfix on 0.0.2pre16. Patch by "redfish". Fixes bug 19953; bugfix on 0.0.2pre16. Patch by "redfish".
o Minor bugfixes (testing): o Minor bugfixes (testing):
@ -200,9 +196,8 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
o Minor bugfixes (unit tests): o Minor bugfixes (unit tests):
- Allow the unit tests to pass even when DNS lookups of bogus - Allow the unit tests to pass even when DNS lookups of bogus
addresses do not fail as expected. Fixes bug 20862 and 20863; addresses do not fail as expected. Fixes bug 20862 and 20863; bugfix
bugfix on unit tests introduced in 0.2.8.1-alpha on unit tests introduced in 0.2.8.1-alpha through 0.2.9.4-alpha.
through 0.2.9.4-alpha.
o Code simplification and refactoring: o Code simplification and refactoring:
- Refactor code to manipulate global_origin_circuit_list into - Refactor code to manipulate global_origin_circuit_list into
@ -213,7 +208,7 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
blocks were incorrectly appearing. Closes ticket 20885. blocks were incorrectly appearing. Closes ticket 20885.
o Documentation (man page): o Documentation (man page):
- Clarify a number of options in tor.1 and add some min/max values - Clarify many options in tor.1 and add some min/max values
for HiddenService options. Closes ticket 21058. for HiddenService options. Closes ticket 21058.