From 54dab73464cd7fbe7341b3531d36a035508b29dd Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Mon, 28 Mar 2016 09:29:17 -0400 Subject: [PATCH] Reflow the 0282 changelog --- ChangeLog | 158 +++++++++++++++++++++++++++--------------------------- 1 file changed, 79 insertions(+), 79 deletions(-) diff --git a/ChangeLog b/ChangeLog index 48fd79ec86..d1663db6fe 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,7 +1,7 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous bugs in earlier versions of Tor, including some that prevented - authorities using Tor 0.2.7 from running correctly. IPv6 and directory + authorities using Tor 0.2.7 from running correctly. IPv6 and directory support should also be much improved. o New system requirements: @@ -25,6 +25,40 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? bugfix on Tor 0.1.1.11-alpha, which fixed a related bug incompletely. Reported by Guido Vranken. + o Major bugfixes (bridges, pluggable transports): + - Modify the check for OR connections to private addresses. Allow + bridges on private addresses, including pluggable transports that + ignore the (potentially private) address in the bridge line. Fixes + bug 18517; bugfix on 0.2.8.1-alpha. Reported by "gk", patch + by "teor". + + o Major bugfixes (compilation): + - Repair hardened builds under the clang compiler. Previously, our + use of _FORTIFY_SOURCE would conflict with clang's address + sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha. + + o Major bugfixes (crash on shutdown): + - Fix a segfault during startup: If Unix domain socket was + configured as listener (such as a ControlSocket or a SocksPort + "unix:" socket), and tor was started as root but not configured to + switch to another user, tor would segfault while trying to string + compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha. + Patch by weasel. + - Correctly handle detaching circuits from muxes when shutting down. + Fixes bug 18116; bugfix on 0.2.8.1-alpha. + - Fix an assert-on-exit bug related to counting memory usage in + rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha. + + o Major bugfixes (dns proxy mode, crash): + - Avoid crashing when running as a DNS proxy. Fixes bug 16248; + bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'. + + o Major bugfixes (relays, bridge clients): + - Ensure relays always allow IPv4 OR and Dir connections. Ensure + bridge clients use the address configured in the bridge line. + Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb, + patch by teor. + o Major bugfixes (voting): - Actually enable Ed25519-based directory collation. Previously, the code had been written, but some debugging code that had @@ -41,60 +75,11 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug 18318. Bugfix on 0.2.7.2-alpha. - o Major bugfixes (dns proxy mode, crash): - - Avoid crashing when running as a DNS proxy. Fixes bug 16248; - bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'. - - o Major bugfixes (bridges, pluggable transports): - - Modify the check for OR connections to private addresses. Allow - bridges on private addresses, including pluggable transports that - ignore the (potentially private) address in the bridge line. Fixes - bug 18517; bugfix on 0.2.8.1-alpha. Reported by "gk", patch - by "teor". - - o Major bugfixes (compilation): - - Repair hardened builds under the clang compiler. Previously, our - use of _FORTIFY_SOURCE would conflict with clang's address - sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha. - - o Major bugfixes (crash on shutdown): - - Fix a segfault during startup: If Unix domain socket was configured as - listener (such as a ControlSocket or a SocksPort "unix:" socket), and - tor was started as root but not configured to switch to another - user, tor would segfault while trying to string compare a NULL - value. Fixes bug 18261; bugfix on 0.2.8.1-alpha. Patch by weasel. - - Correctly handle detaching circuits from muxes when - shutting down. Fixes bug 18116; bugfix - on 0.2.8.1-alpha. - - Fix an assert-on-exit bug related to counting memory usage - in rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha. - - o Major bugfixes (relays, bridge clients): - - Ensure relays always allow IPv4 OR and Dir connections. Ensure - bridge clients use the address configured in the bridge line. - Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb, - patch by teor. - o Minor features (security, win32): - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing attack. Fixes bug 18123; bugfix on all tor versions. Patch by "teor". - o Minor features (hidden service directory): - - Streamline relay-side hsdir handling: when relays consider whether - to accept an uploaded hidden service descriptor, they no longer - check whether they are one of the relays in the network that is - "supposed" to handle that descriptor. Implements ticket 18332. - - o Minor features (IPv6): - - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set - to 1, tor prefers IPv6 directory addresses. - - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor - avoids using IPv4 for client OR and directory connections. - - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and - ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and - ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor". - o Minor features (bug-resistance): - Make Tor survive errors involving connections without a corresponding event object. Previously we'd fail with an @@ -117,17 +102,33 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? o Minor features (crypto): - Validate the hard-coded Diffie-Hellman parameters and ensure that - p is a safe prime, and g is a suitable generator. Closes ticket 18221. + p is a safe prime, and g is a suitable generator. Closes + ticket 18221. o Minor features (geoip): - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2 Country database. + o Minor features (hidden service directory): + - Streamline relay-side hsdir handling: when relays consider whether + to accept an uploaded hidden service descriptor, they no longer + check whether they are one of the relays in the network that is + "supposed" to handle that descriptor. Implements ticket 18332. + + o Minor features (IPv6): + - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set + to 1, tor prefers IPv6 directory addresses. + - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor + avoids using IPv4 for client OR and directory connections. + - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and + ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and + ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor". + o Minor features (linux seccomp2 sandbox): - - Reject attempts to change our Address with "Sandbox 1" - enabled. Changing Address with Sandbox turned on would never - actually work, but previously it would fail in strange and - confusing ways. Found while fixing 18548. + - Reject attempts to change our Address with "Sandbox 1" enabled. + Changing Address with Sandbox turned on would never actually work, + but previously it would fail in strange and confusing ways. Found + while fixing 18548. o Minor features (robustness): - Exit immediately with an error message if the code attempts to use @@ -137,11 +138,11 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? o Minor features (unix domain sockets): - Add a new per-socket option, RelaxDirModeCheck, to allow creating Unix domain sockets without checking the permissions on the parent - directory. (Tor checks permissions by default because some operating - systems only check permissions on the parent directory. However, some - operating systems do look at permissions on the socket, and tor's default - check is unneeded.) Closes ticket 18458. Patch - by weasel. + directory. (Tor checks permissions by default because some + operating systems only check permissions on the parent directory. + However, some operating systems do look at permissions on the + socket, and tor's default check is unneeded.) Closes ticket 18458. + Patch by weasel. o Minor bugfixes (exit policies, security): - Refresh an exit relay's exit policy when interface addresses @@ -159,10 +160,9 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? - Do not link the unit tests against both the testing and non- testing versions of the static libraries. Fixes bug 18490; bugfix on 0.2.7.1-alpha. - - Avoid spurious failures from configure files related - to calling exit(0) in TOR_SEARCH_LIBRARY. - Fixes bug 18625; bugfix on 0.2.0.1-alpha. - Patch from "cypherpunks". + - Avoid spurious failures from configure files related to calling + exit(0) in TOR_SEARCH_LIBRARY. Fixes bug 18625; bugfix on + 0.2.0.1-alpha. Patch from "cypherpunks". - Silence spurious clang-scan warnings in the ed25519_donna code by explicitly initialising some objects. Fixes bug 18384; bugfix on 0f3eeca9 in 0.2.7.2-alpha. Patch by "teor". @@ -170,9 +170,8 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? o Minor bugfixes (client, bootstrap): - Count receipt of new microdescriptors as progress towards bootstrapping. Previously, with EntryNodes set, Tor might not - successfully repopulate the guard set on bootstrapping. - Fixes bug 16825; bugfix - on 0.2.3.1-alpha. + successfully repopulate the guard set on bootstrapping. Fixes bug + 16825; bugfix on 0.2.3.1-alpha. o Minor bugfixes (code correctness): - Update to the latest version of Trunnel, which tries harder to @@ -208,14 +207,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? 0.2.4.7-alpha. Reported by "atagar", patch by "teor". o Minor bugfixes (hidden service, client): - - Handle the case where the user makes several fast consecutive requests to the same .onion - address. Previously, the first six requests would each trigger a - descriptor fetch, each picking a directory - (there are 6 overall) and the seventh one would fail because no - directories were left, thereby triggering a close on all current directory - connections asking for the hidden service. - The solution here is to not close the directory connections if we have pending directory - fetch. Fixes bug 15937; bugfix on tor-0.2.7.1-alpha. + - Handle the case where the user makes several fast consecutive + requests to the same .onion address. Previously, the first six + requests would each trigger a descriptor fetch, each picking a + directory (there are 6 overall) and the seventh one would fail + because no directories were left, thereby triggering a close on + all current directory connections asking for the hidden service. + The solution here is to not close the directory connections if we + have pending directory fetch. Fixes bug 15937; bugfix + on tor-0.2.7.1-alpha. o Minor bugfixes (hidden service, control port): - Add the onion address to the HS_DESC event for the UPLOADED action @@ -230,15 +230,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-?? - Avoid a 10-second delay when starting as a client with "Sandbox 1" enabled and no DNS resolvers configured. This should help TAILS start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha. - - Fix the sandbox's interoprability with unix domain sockets under setuid. - Fixes bug 18253; bugfix on 0.2.8.1-alpha. + - Fix the sandbox's interoprability with unix domain sockets under + setuid. Fixes bug 18253; bugfix on 0.2.8.1-alpha. - Allow the setrlimit syscall, and the prlimit and prlimit64 syscalls, which some libc implementations use under the hood. Fixes bug 15221; bugfix on 0.2.5.1-alpha. o Minor bugfixes (logging): - - When logging information about an unparsable networkstatus vote - or consensus, do not say "vote" when we mean consensus. Fixes bug + - When logging information about an unparsable networkstatus vote or + consensus, do not say "vote" when we mean consensus. Fixes bug 18368; bugfix on 0.2.0.8-alpha. - Scrub service in from "unrecognized service ID" log messages. Fixes bug 18600; bugfix on 0.2.4.11-alpha.