Dir auths reject relays running < Tor 0.1.2.14

Directory authorities now reject Tor relays with versions less than
0.1.2.14. This step cuts out four relays from the current network,
none of which are very big.
This commit is contained in:
Roger Dingledine 2009-09-30 18:34:21 -04:00
parent f7e6e852e8
commit 53a7636a05
2 changed files with 9 additions and 6 deletions

View File

@ -1,8 +1,8 @@
Changes in version 0.2.2.4-alpha - 2009-??-?? Changes in version 0.2.2.4-alpha - 2009-??-??
o Major bugfixes: o Major bugfixes:
- Fix another assert in the circuit_build_times code that causes Tor - Fix another assert in the circuit_build_times code that causes Tor
to fail to start once we have accumulated 5000 build times in the to fail to start once we have accumulated 5000 build times in the
state file. Bugfix on 0.2.2.2-alpha; fixes bug 1108. state file. Bugfix on 0.2.2.2-alpha; fixes bug 1108.
o Minor features: o Minor features:
- Log SSL state transitions at debug level during handshake, and - Log SSL state transitions at debug level during handshake, and
@ -12,6 +12,9 @@ Changes in version 0.2.2.4-alpha - 2009-??-??
during the TLS handshake. during the TLS handshake.
- Revert to the "June 3 2009" ip-to-country file. The September one - Revert to the "June 3 2009" ip-to-country file. The September one
seems to have removed most US IP addresses. seems to have removed most US IP addresses.
- Directory authorities now reject Tor relays with versions less than
0.1.2.14. This step cuts out four relays from the current network,
none of which are very big.
o Code simplifications and refactoring: o Code simplifications and refactoring:
- Revise our unit tests to use the "tinytest" framework, so we - Revise our unit tests to use the "tinytest" framework, so we

View File

@ -371,10 +371,10 @@ dirserv_get_status_impl(const char *id_digest, const char *nickname,
strmap_size(fingerprint_list->fp_by_name), strmap_size(fingerprint_list->fp_by_name),
digestmap_size(fingerprint_list->status_by_digest)); digestmap_size(fingerprint_list->status_by_digest));
/* 0.1.1.17-rc was the first version that claimed to be stable, doesn't /* Tor 0.1.2.x is pretty old, but there are a lot of them running still,
* crash and drop circuits all the time, and is even vaguely compatible with * and there aren't any critical relay-side vulnerabilities. Once more
* the current network */ * of them die off, we should raise this minimum to 0.2.0.x. */
if (platform && !tor_version_as_new_as(platform,"0.1.1.17-rc")) { if (platform && !tor_version_as_new_as(platform,"0.1.2.14")) {
if (msg) if (msg)
*msg = "Tor version is far too old to work."; *msg = "Tor version is far too old to work.";
return FP_REJECT; return FP_REJECT;