mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 22:03:31 +01:00
remove duplicate changes from 0.3.3.5-rc to 0.3.3.9
This commit is contained in:
parent
cf6318f685
commit
669426f3d4
102
ReleaseNotes
102
ReleaseNotes
@ -4,9 +4,9 @@ changes in each development snapshot, see the ChangeLog file.
|
||||
|
||||
Changes in version 0.3.4.8 - 2018-09-10
|
||||
Tor 0.3.4.8 is the first stable release in its series; it includes
|
||||
several compilation and portability fixes.
|
||||
compilation and portability fixes.
|
||||
|
||||
The Tor 0.3.4 series includes several improvements for running Tor in
|
||||
The Tor 0.3.4 series includes improvements for running Tor in
|
||||
low-power and embedded environments, which should help performance in
|
||||
general. We've begun work on better modularity, and included preliminary
|
||||
changes on the directory authority side to accommodate a new bandwidth
|
||||
@ -15,15 +15,8 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
Tor's testing infrastructure. Finally, we've continued to refine
|
||||
our anti-denial-of-service code.
|
||||
|
||||
Below are the changes since 0.3.3.5-rc. For a list of only the changes
|
||||
since 0.3.4.7-rc, see the ChangeLog
|
||||
|
||||
o Directory authority changes:
|
||||
- The "Bifroest" bridge authority has been retired; the new bridge
|
||||
authority is "Serge", and it is operated by George from the
|
||||
TorBSD project. Closes ticket 26771.
|
||||
- Add an IPv6 address for the "dannenberg" directory authority.
|
||||
Closes ticket 26343.
|
||||
Below are the changes since 0.3.3.9. For a list of only the changes
|
||||
since 0.3.4.7-rc, see the ChangeLog file.
|
||||
|
||||
o New system requirements:
|
||||
- Tor no longer tries to support old operating systems without
|
||||
@ -75,21 +68,12 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
uninitialised buffer. They now log a warning about the empty file
|
||||
instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha.
|
||||
|
||||
o Major bugfixes (security, directory authority, denial-of-service, also in 0.3.3.6):
|
||||
- Fix a bug that could have allowed an attacker to force a directory
|
||||
authority to use up all its RAM by passing it a maliciously
|
||||
crafted protocol versions string. Fixes bug 25517; bugfix on
|
||||
0.2.9.4-alpha. This issue is also tracked as TROVE-2018-005.
|
||||
|
||||
o Major bugfixes (crash):
|
||||
- Avoid a rare assertion failure in the circuit build timeout code
|
||||
if we fail to allow any circuits to actually complete. Fixes bug
|
||||
25733; bugfix on 0.2.2.2-alpha.
|
||||
|
||||
o Major bugfixes (directory authority):
|
||||
- Stop leaking memory on directory authorities when planning to
|
||||
vote. This bug was crashing authorities by exhausting their
|
||||
memory. Fixes bug 26435; bugfix on 0.3.3.6.
|
||||
- Avoid a crash when testing router reachability on a router that
|
||||
could have an ed25519 ID, but which does not. Fixes bug 25415;
|
||||
bugfix on 0.3.3.2-alpha.
|
||||
@ -118,11 +102,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
controlled by a consensus parameter. Fixes bug 25226; bugfix
|
||||
on 0.2.4.14-alpha.
|
||||
|
||||
o Major bugfixes (rust, testing):
|
||||
- Make sure that failing tests in Rust will actually cause the build
|
||||
to fail: previously, they were ignored. Fixes bug 26258; bugfix
|
||||
on 0.3.3.4-alpha.
|
||||
|
||||
o Minor features (accounting):
|
||||
- When Tor becomes dormant, it now uses a scheduled event to wake up
|
||||
at the right time. Previously, we would use the per-second timer
|
||||
@ -150,9 +129,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
Closes ticket 26006.
|
||||
|
||||
o Minor features (compilation):
|
||||
- When building Tor, prefer to use Python 3 over Python 2, and more
|
||||
recent (contemplated) versions over older ones. Closes
|
||||
ticket 26372.
|
||||
- When compiling with --enable-openbsd-malloc or --enable-tcmalloc,
|
||||
tell the compiler not to include the system malloc implementation.
|
||||
Fixes bug 20424; bugfix on 0.2.0.20-rc.
|
||||
@ -257,11 +233,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
- Avoid a needless malloc()/free() pair every time we handle an ntor
|
||||
handshake. Closes ticket 25150.
|
||||
|
||||
o Minor features (relay, diagnostic):
|
||||
- Add several checks to detect whether Tor relays are uploading
|
||||
their descriptors without specifying why they regenerated them.
|
||||
Diagnostic for ticket 25686.
|
||||
|
||||
o Minor features (Rust, portability):
|
||||
- Rust cross-compilation is now supported. Closes ticket 25895.
|
||||
|
||||
@ -300,13 +271,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
subsystem. Fixes bug 25675; bugfix on 0.2.7.3-rc. Found by
|
||||
Coverity; this is CID 1433643.
|
||||
|
||||
o Minor bugfixes (circuit path selection):
|
||||
- Don't count path selection failures as circuit build failures.
|
||||
This change should eliminate cases where Tor blames its guard or
|
||||
the network for situations like insufficient microdescriptors
|
||||
and/or overly restrictive torrc settings. Fixes bug 25705; bugfix
|
||||
on 0.3.3.1-alpha.
|
||||
|
||||
o Minor bugfixes (client):
|
||||
- Don't consider Tor running as a client if the ControlPort is open,
|
||||
but no actual client ports are open. Fixes bug 26062; bugfix
|
||||
@ -318,13 +282,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
- Remove the unused variable n_possible from the function
|
||||
channel_get_for_extend(). Fixes bug 25645; bugfix on 0.2.4.4-alpha
|
||||
|
||||
o Minor bugfixes (compatibility, openssl):
|
||||
- Work around a change in OpenSSL 1.1.1 where return values that
|
||||
would previously indicate "no password" now indicate an empty
|
||||
password. Without this workaround, Tor instances running with
|
||||
OpenSSL 1.1.1 would accept descriptors that other Tor instances
|
||||
would reject. Fixes bug 26116; bugfix on 0.2.5.16.
|
||||
|
||||
o Minor bugfixes (compilation):
|
||||
- Silence a spurious compiler warning on the GetAdaptersAddresses
|
||||
function pointer cast. This issue is already fixed by 26481 in
|
||||
@ -338,17 +295,11 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
code that calls routerinfo_get_my_routerinfo() twice, assuming
|
||||
that the second call will succeed if the first one did. Fixes bug
|
||||
26269; bugfix on 0.2.8.2-alpha.
|
||||
- Fix a compilation warning on some versions of GCC when building
|
||||
code that calls routerinfo_get_my_routerinfo() twice, assuming
|
||||
that the second call will succeed if the first one did. Fixes bug
|
||||
26269; bugfix on 0.2.8.2-alpha.
|
||||
- Refrain from compiling unit testing related object files when
|
||||
--disable-unittests is set to configure script. Fixes bug 24891;
|
||||
bugfix on 0.2.5.1-alpha.
|
||||
- The --enable-fatal-warnings flag now affects Rust code as well.
|
||||
Closes ticket 26245.
|
||||
- Silence unused-const-variable warnings in zstd.h with some GCC
|
||||
versions. Fixes bug 26272; bugfix on 0.3.1.1-alpha.
|
||||
- Avoid a compiler warning when casting the return value of
|
||||
smartlist_len() to double with DEBUG_SMARTLIST enabled. Fixes bug
|
||||
26283; bugfix on 0.2.4.10-alpha.
|
||||
@ -369,16 +320,9 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
policy/* requests. Also, let controller know if an error is
|
||||
transient (response code 551) or not (response code 552). Fixes
|
||||
bug 25852; bugfix on 0.2.8.1-alpha.
|
||||
- Handle the HSADDRESS= argument to the HSPOST command properly.
|
||||
(Previously, this argument was misparsed and thus ignored.) Fixes
|
||||
bug 26523; bugfix on 0.3.3.1-alpha. Patch by "akwizgran".
|
||||
- Parse the "HSADDRESS=" parameter in HSPOST commands properly.
|
||||
Previously, it was misparsed and ignored. Fixes bug 26523; bugfix
|
||||
on 0.3.3.1-alpha. Patch by "akwizgran".
|
||||
- Improve accuracy of the BUILDTIMEOUT_SET control port event's
|
||||
TIMEOUT_RATE and CLOSE_RATE fields. (We were previously
|
||||
miscounting the total number of circuits for these field values.)
|
||||
Fixes bug 26121; bugfix on 0.3.3.1-alpha.
|
||||
- Make CIRC_BW event reflect the total of all data sent on a
|
||||
circuit, including padding and dropped cells. Also fix a mis-
|
||||
counting bug when STREAM_BW events were enabled. Fixes bug 25400;
|
||||
@ -423,17 +367,10 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
directory authorities have to be ahead of the client before this
|
||||
warning will occur. Fixes bug 25756; bugfix on 0.2.2.25-alpha.
|
||||
|
||||
o Minor bugfixes (hardening):
|
||||
- Prevent a possible out-of-bounds smartlist read in
|
||||
protover_compute_vote(). Fixes bug 26196; bugfix on 0.2.9.4-alpha.
|
||||
|
||||
o Minor bugfixes (in-process restart):
|
||||
- Always call tor_free_all() when leaving tor_run_main(). When we
|
||||
did not, restarting tor in-process would cause an assertion
|
||||
failure. Fixes bug 26948; bugfix on 0.3.3.1-alpha.
|
||||
- When shutting down, Tor now clears all the flags in the control.c
|
||||
module. This should prevent a bug where authentication cookies are
|
||||
not generated on restart. Fixes bug 25512; bugfix on 0.3.3.1-alpha.
|
||||
|
||||
o Minor bugfixes (Linux seccomp2 sandbox):
|
||||
- Allow the nanosleep() system call, which glibc uses to implement
|
||||
@ -448,10 +385,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
authenticate direct connections to relays. Fixes bug 26927; bugfix
|
||||
on 0.3.0.1-alpha.
|
||||
|
||||
o Minor bugfixes (memory, correctness):
|
||||
- Fix a number of small memory leaks identified by coverity. Fixes
|
||||
bug 26467; bugfix on numerous Tor versions.
|
||||
|
||||
o Minor bugfixes (onion service):
|
||||
- Fix a memory leak when a v3 onion service is configured and gets a
|
||||
SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha.
|
||||
@ -473,13 +406,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
miscalculating the index for next-generation onion services. Fixes
|
||||
bug 24977; bugfix on 0.3.2.1-alpha.
|
||||
|
||||
o Minor bugfixes (path selection):
|
||||
- Only select relays when they have the descriptors we prefer to use
|
||||
for them. This change fixes a bug where we could select a relay
|
||||
because it had _some_ descriptor, but reject it later with a
|
||||
nonfatal assertion error because it didn't have the exact one we
|
||||
wanted. Fixes bugs 25691 and 25692; bugfix on 0.3.3.4-alpha.
|
||||
|
||||
o Minor bugfixes (portability):
|
||||
- Fix compilation of the unit tests on GNU/Hurd, which does not
|
||||
define PATH_MAX. Fixes bug 26873; bugfix on 0.3.3.1-alpha. Patch
|
||||
@ -505,10 +431,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
here.) Fixes bug 24910; bugfix on 0.2.4.17-rc.
|
||||
|
||||
o Minor bugfixes (relay):
|
||||
- Relays now correctly block attempts to re-extend to the previous
|
||||
relay by Ed25519 identity. Previously they would warn in this
|
||||
case, but not actually reject the attempt. Fixes bug 26158; bugfix
|
||||
on 0.3.0.1-alpha.
|
||||
- Avoid a crash when running with DirPort set but ORPort turned off.
|
||||
Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha.
|
||||
|
||||
@ -583,21 +505,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
result files, to avoid spurious failures. Fixes bug 27295; bugfix
|
||||
on 0.2.7.3-rc.
|
||||
|
||||
o Minor bugfixes (testing, compatibility):
|
||||
- When running the ntor_ref.py and hs_ntor_ref.py tests, make sure
|
||||
only to pass strings (rather than "bytes" objects) to the Python
|
||||
subprocess module. Python 3 on Windows seems to require this.
|
||||
Fixes bug 26535; bugfix on 0.2.5.5-alpha (for ntor_ref.py) and
|
||||
0.3.1.1-alpha (for hs_ntor_ref.py).
|
||||
- When running the hs_ntor_ref.py test, make sure only to pass
|
||||
strings (rather than "bytes" objects) to the Python subprocess
|
||||
module. Python 3 on Windows seems to require this. Fixes bug
|
||||
26535; bugfix on 0.3.1.1-alpha.
|
||||
- When running the ntor_ref.py test, make sure only to pass strings
|
||||
(rather than "bytes" objects) to the Python subprocess module.
|
||||
Python 3 on Windows seems to require this. Fixes bug 26535; bugfix
|
||||
on 0.2.5.5-alpha.
|
||||
|
||||
o Minor bugfixes (testing, openssl compatibility):
|
||||
- Our "tortls/cert_matches_key" unit test no longer relies on
|
||||
OpenSSL internals. Previously, it relied on unsupported OpenSSL
|
||||
@ -733,7 +640,6 @@ Changes in version 0.3.4.8 - 2018-09-10
|
||||
Closes ticket 25268.
|
||||
|
||||
|
||||
|
||||
Changes in version 0.3.3.9 - 2018-07-13
|
||||
Tor 0.3.3.9 moves to a new bridge authority, meaning people running
|
||||
bridge relays should upgrade.
|
||||
|
Loading…
Reference in New Issue
Block a user