mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-23 20:03:31 +01:00
Reflow the 0282 changelog
This commit is contained in:
parent
474b00d9fd
commit
54dab73464
158
ChangeLog
158
ChangeLog
@ -1,7 +1,7 @@
|
||||
Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
|
||||
bugs in earlier versions of Tor, including some that prevented
|
||||
authorities using Tor 0.2.7 from running correctly. IPv6 and directory
|
||||
authorities using Tor 0.2.7 from running correctly. IPv6 and directory
|
||||
support should also be much improved.
|
||||
|
||||
o New system requirements:
|
||||
@ -25,6 +25,40 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
bugfix on Tor 0.1.1.11-alpha, which fixed a related bug
|
||||
incompletely. Reported by Guido Vranken.
|
||||
|
||||
o Major bugfixes (bridges, pluggable transports):
|
||||
- Modify the check for OR connections to private addresses. Allow
|
||||
bridges on private addresses, including pluggable transports that
|
||||
ignore the (potentially private) address in the bridge line. Fixes
|
||||
bug 18517; bugfix on 0.2.8.1-alpha. Reported by "gk", patch
|
||||
by "teor".
|
||||
|
||||
o Major bugfixes (compilation):
|
||||
- Repair hardened builds under the clang compiler. Previously, our
|
||||
use of _FORTIFY_SOURCE would conflict with clang's address
|
||||
sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
|
||||
|
||||
o Major bugfixes (crash on shutdown):
|
||||
- Fix a segfault during startup: If Unix domain socket was
|
||||
configured as listener (such as a ControlSocket or a SocksPort
|
||||
"unix:" socket), and tor was started as root but not configured to
|
||||
switch to another user, tor would segfault while trying to string
|
||||
compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha.
|
||||
Patch by weasel.
|
||||
- Correctly handle detaching circuits from muxes when shutting down.
|
||||
Fixes bug 18116; bugfix on 0.2.8.1-alpha.
|
||||
- Fix an assert-on-exit bug related to counting memory usage in
|
||||
rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
|
||||
|
||||
o Major bugfixes (dns proxy mode, crash):
|
||||
- Avoid crashing when running as a DNS proxy. Fixes bug 16248;
|
||||
bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'.
|
||||
|
||||
o Major bugfixes (relays, bridge clients):
|
||||
- Ensure relays always allow IPv4 OR and Dir connections. Ensure
|
||||
bridge clients use the address configured in the bridge line.
|
||||
Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
|
||||
patch by teor.
|
||||
|
||||
o Major bugfixes (voting):
|
||||
- Actually enable Ed25519-based directory collation. Previously, the
|
||||
code had been written, but some debugging code that had
|
||||
@ -41,60 +75,11 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
|
||||
18318. Bugfix on 0.2.7.2-alpha.
|
||||
|
||||
o Major bugfixes (dns proxy mode, crash):
|
||||
- Avoid crashing when running as a DNS proxy. Fixes bug 16248;
|
||||
bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'.
|
||||
|
||||
o Major bugfixes (bridges, pluggable transports):
|
||||
- Modify the check for OR connections to private addresses. Allow
|
||||
bridges on private addresses, including pluggable transports that
|
||||
ignore the (potentially private) address in the bridge line. Fixes
|
||||
bug 18517; bugfix on 0.2.8.1-alpha. Reported by "gk", patch
|
||||
by "teor".
|
||||
|
||||
o Major bugfixes (compilation):
|
||||
- Repair hardened builds under the clang compiler. Previously, our
|
||||
use of _FORTIFY_SOURCE would conflict with clang's address
|
||||
sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
|
||||
|
||||
o Major bugfixes (crash on shutdown):
|
||||
- Fix a segfault during startup: If Unix domain socket was configured as
|
||||
listener (such as a ControlSocket or a SocksPort "unix:" socket), and
|
||||
tor was started as root but not configured to switch to another
|
||||
user, tor would segfault while trying to string compare a NULL
|
||||
value. Fixes bug 18261; bugfix on 0.2.8.1-alpha. Patch by weasel.
|
||||
- Correctly handle detaching circuits from muxes when
|
||||
shutting down. Fixes bug 18116; bugfix
|
||||
on 0.2.8.1-alpha.
|
||||
- Fix an assert-on-exit bug related to counting memory usage
|
||||
in rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
|
||||
|
||||
o Major bugfixes (relays, bridge clients):
|
||||
- Ensure relays always allow IPv4 OR and Dir connections. Ensure
|
||||
bridge clients use the address configured in the bridge line.
|
||||
Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
|
||||
patch by teor.
|
||||
|
||||
o Minor features (security, win32):
|
||||
- Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
|
||||
attack. Fixes bug 18123; bugfix on all tor versions. Patch
|
||||
by "teor".
|
||||
|
||||
o Minor features (hidden service directory):
|
||||
- Streamline relay-side hsdir handling: when relays consider whether
|
||||
to accept an uploaded hidden service descriptor, they no longer
|
||||
check whether they are one of the relays in the network that is
|
||||
"supposed" to handle that descriptor. Implements ticket 18332.
|
||||
|
||||
o Minor features (IPv6):
|
||||
- Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
|
||||
to 1, tor prefers IPv6 directory addresses.
|
||||
- Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
|
||||
avoids using IPv4 for client OR and directory connections.
|
||||
- Try harder to fulfil IP version restrictions ClientUseIPv4 0 and
|
||||
ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and
|
||||
ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor".
|
||||
|
||||
o Minor features (bug-resistance):
|
||||
- Make Tor survive errors involving connections without a
|
||||
corresponding event object. Previously we'd fail with an
|
||||
@ -117,17 +102,33 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
|
||||
o Minor features (crypto):
|
||||
- Validate the hard-coded Diffie-Hellman parameters and ensure that
|
||||
p is a safe prime, and g is a suitable generator. Closes ticket 18221.
|
||||
p is a safe prime, and g is a suitable generator. Closes
|
||||
ticket 18221.
|
||||
|
||||
o Minor features (geoip):
|
||||
- Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
|
||||
Country database.
|
||||
|
||||
o Minor features (hidden service directory):
|
||||
- Streamline relay-side hsdir handling: when relays consider whether
|
||||
to accept an uploaded hidden service descriptor, they no longer
|
||||
check whether they are one of the relays in the network that is
|
||||
"supposed" to handle that descriptor. Implements ticket 18332.
|
||||
|
||||
o Minor features (IPv6):
|
||||
- Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
|
||||
to 1, tor prefers IPv6 directory addresses.
|
||||
- Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
|
||||
avoids using IPv4 for client OR and directory connections.
|
||||
- Try harder to fulfil IP version restrictions ClientUseIPv4 0 and
|
||||
ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and
|
||||
ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor".
|
||||
|
||||
o Minor features (linux seccomp2 sandbox):
|
||||
- Reject attempts to change our Address with "Sandbox 1"
|
||||
enabled. Changing Address with Sandbox turned on would never
|
||||
actually work, but previously it would fail in strange and
|
||||
confusing ways. Found while fixing 18548.
|
||||
- Reject attempts to change our Address with "Sandbox 1" enabled.
|
||||
Changing Address with Sandbox turned on would never actually work,
|
||||
but previously it would fail in strange and confusing ways. Found
|
||||
while fixing 18548.
|
||||
|
||||
o Minor features (robustness):
|
||||
- Exit immediately with an error message if the code attempts to use
|
||||
@ -137,11 +138,11 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
o Minor features (unix domain sockets):
|
||||
- Add a new per-socket option, RelaxDirModeCheck, to allow creating
|
||||
Unix domain sockets without checking the permissions on the parent
|
||||
directory. (Tor checks permissions by default because some operating
|
||||
systems only check permissions on the parent directory. However, some
|
||||
operating systems do look at permissions on the socket, and tor's default
|
||||
check is unneeded.) Closes ticket 18458. Patch
|
||||
by weasel.
|
||||
directory. (Tor checks permissions by default because some
|
||||
operating systems only check permissions on the parent directory.
|
||||
However, some operating systems do look at permissions on the
|
||||
socket, and tor's default check is unneeded.) Closes ticket 18458.
|
||||
Patch by weasel.
|
||||
|
||||
o Minor bugfixes (exit policies, security):
|
||||
- Refresh an exit relay's exit policy when interface addresses
|
||||
@ -159,10 +160,9 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
- Do not link the unit tests against both the testing and non-
|
||||
testing versions of the static libraries. Fixes bug 18490; bugfix
|
||||
on 0.2.7.1-alpha.
|
||||
- Avoid spurious failures from configure files related
|
||||
to calling exit(0) in TOR_SEARCH_LIBRARY.
|
||||
Fixes bug 18625; bugfix on 0.2.0.1-alpha.
|
||||
Patch from "cypherpunks".
|
||||
- Avoid spurious failures from configure files related to calling
|
||||
exit(0) in TOR_SEARCH_LIBRARY. Fixes bug 18625; bugfix on
|
||||
0.2.0.1-alpha. Patch from "cypherpunks".
|
||||
- Silence spurious clang-scan warnings in the ed25519_donna code by
|
||||
explicitly initialising some objects. Fixes bug 18384; bugfix on
|
||||
0f3eeca9 in 0.2.7.2-alpha. Patch by "teor".
|
||||
@ -170,9 +170,8 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
o Minor bugfixes (client, bootstrap):
|
||||
- Count receipt of new microdescriptors as progress towards
|
||||
bootstrapping. Previously, with EntryNodes set, Tor might not
|
||||
successfully repopulate the guard set on bootstrapping.
|
||||
Fixes bug 16825; bugfix
|
||||
on 0.2.3.1-alpha.
|
||||
successfully repopulate the guard set on bootstrapping. Fixes bug
|
||||
16825; bugfix on 0.2.3.1-alpha.
|
||||
|
||||
o Minor bugfixes (code correctness):
|
||||
- Update to the latest version of Trunnel, which tries harder to
|
||||
@ -208,14 +207,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
0.2.4.7-alpha. Reported by "atagar", patch by "teor".
|
||||
|
||||
o Minor bugfixes (hidden service, client):
|
||||
- Handle the case where the user makes several fast consecutive requests to the same .onion
|
||||
address. Previously, the first six requests would each trigger a
|
||||
descriptor fetch, each picking a directory
|
||||
(there are 6 overall) and the seventh one would fail because no
|
||||
directories were left, thereby triggering a close on all current directory
|
||||
connections asking for the hidden service.
|
||||
The solution here is to not close the directory connections if we have pending directory
|
||||
fetch. Fixes bug 15937; bugfix on tor-0.2.7.1-alpha.
|
||||
- Handle the case where the user makes several fast consecutive
|
||||
requests to the same .onion address. Previously, the first six
|
||||
requests would each trigger a descriptor fetch, each picking a
|
||||
directory (there are 6 overall) and the seventh one would fail
|
||||
because no directories were left, thereby triggering a close on
|
||||
all current directory connections asking for the hidden service.
|
||||
The solution here is to not close the directory connections if we
|
||||
have pending directory fetch. Fixes bug 15937; bugfix
|
||||
on tor-0.2.7.1-alpha.
|
||||
|
||||
o Minor bugfixes (hidden service, control port):
|
||||
- Add the onion address to the HS_DESC event for the UPLOADED action
|
||||
@ -230,15 +230,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
|
||||
- Avoid a 10-second delay when starting as a client with "Sandbox 1"
|
||||
enabled and no DNS resolvers configured. This should help TAILS
|
||||
start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha.
|
||||
- Fix the sandbox's interoprability with unix domain sockets under setuid.
|
||||
Fixes bug 18253; bugfix on 0.2.8.1-alpha.
|
||||
- Fix the sandbox's interoprability with unix domain sockets under
|
||||
setuid. Fixes bug 18253; bugfix on 0.2.8.1-alpha.
|
||||
- Allow the setrlimit syscall, and the prlimit and prlimit64
|
||||
syscalls, which some libc implementations use under the hood.
|
||||
Fixes bug 15221; bugfix on 0.2.5.1-alpha.
|
||||
|
||||
o Minor bugfixes (logging):
|
||||
- When logging information about an unparsable networkstatus vote
|
||||
or consensus, do not say "vote" when we mean consensus. Fixes bug
|
||||
- When logging information about an unparsable networkstatus vote or
|
||||
consensus, do not say "vote" when we mean consensus. Fixes bug
|
||||
18368; bugfix on 0.2.0.8-alpha.
|
||||
- Scrub service in from "unrecognized service ID" log messages.
|
||||
Fixes bug 18600; bugfix on 0.2.4.11-alpha.
|
||||
|
Loading…
Reference in New Issue
Block a user