edit the changelog one last time

This commit is contained in:
Nick Mathewson 2014-12-31 13:09:09 -05:00
parent ecd5868ae8
commit 6cb1daf062

105
ChangeLog
View File

@ -11,9 +11,9 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
should now bootstrap in seconds, rather than minutes. should now bootstrap in seconds, rather than minutes.
o Major features (relay, infrastructure): o Major features (relay, infrastructure):
- Completely revision of the code that relays use to decide which - Complete revision of the code that relays use to decide which cell
cell to send next. Formerly, we selected the best circuit to write to send next. Formerly, we selected the best circuit to write on
on each channel, but we didn't select among channels in any each channel, but we didn't select among channels in any
sophisticated way. Now, we choose the best circuits globally from sophisticated way. Now, we choose the best circuits globally from
among those whose channels are ready to deliver traffic. among those whose channels are ready to deliver traffic.
@ -21,18 +21,17 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
high/low watermark mechanism and a global scheduler loop for high/low watermark mechanism and a global scheduler loop for
transmission prioritization across all channels as well as among transmission prioritization across all channels as well as among
circuits on one channel. This schedule is currently tuned to circuits on one channel. This schedule is currently tuned to
(tolerantly) avoid making changes in the current network (tolerantly) avoid making changes in network performance, but it
performance, but it should form the basis for major circuit should form the basis for major circuit performance increases in
performance increases. Code by Andrea; tuning by Rob Jansen; the future. Code by Andrea; tuning by Rob Jansen; implements
implements ticket 9262. ticket 9262.
o Major features (hidden services): o Major features (hidden services):
- Make HS port scanning more difficult by sending back REASON_DONE - Make HS port scanning more difficult by immediately closing the
if the exit policy didn't match. Furthermore, immediately close circuit when a user attempts to connect to a nonexistent port.
the circuit to slow down port scanning attempts. Closes Closes ticket 13667.
ticket 13667.
- Add a HiddenServiceStatistics option that allows Tor relays to - Add a HiddenServiceStatistics option that allows Tor relays to
gather and publish statistics the overall size and volume of gather and publish statistics about the overall size and volume of
hidden service usage. Specifically, when this option is turned on, hidden service usage. Specifically, when this option is turned on,
an HSDir will publish an approximate number of hidden services an HSDir will publish an approximate number of hidden services
that have published descriptors to it the past 24 hours. Also, if that have published descriptors to it the past 24 hours. Also, if
@ -44,7 +43,7 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
feature is currently disabled by default. Implements feature 13192. feature is currently disabled by default. Implements feature 13192.
o Major bugfixes (client, automap): o Major bugfixes (client, automap):
- Repair automapping with IPv6 addresses; this automapping should - Repair automapping with IPv6 addresses. This automapping should
have worked previously, but one piece of debugging code that we have worked previously, but one piece of debugging code that we
inserted to detect a regression actually caused the regression to inserted to detect a regression actually caused the regression to
manifest itself again. Fixes bug 13811 and bug 12831; bugfix on manifest itself again. Fixes bug 13811 and bug 12831; bugfix on
@ -58,6 +57,11 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
point would make the other introduction points get marked as point would make the other introduction points get marked as
having timed out. Fixes bug 13698; bugfix on 0.0.6rc2. having timed out. Fixes bug 13698; bugfix on 0.0.6rc2.
o Directory authority changes:
- Remove turtles as a directory authority.
- Add longclaw as a new (v3) directory authority. This implements
ticket 13296. This keeps the directory authority count at 9.
o Major removed features: o Major removed features:
- Tor clients no longer support connecting to hidden services - Tor clients no longer support connecting to hidden services
running on Tor 0.2.2.x and earlier; the Support022HiddenServices running on Tor 0.2.2.x and earlier; the Support022HiddenServices
@ -70,7 +74,7 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
Resolves ticket 13315. Resolves ticket 13315.
o Minor features (controller): o Minor features (controller):
- Add a "SIGNAL HEARTBEAT" Tor controller command that tells Tor to - Add a "SIGNAL HEARTBEAT" controller command that tells Tor to
write an unscheduled heartbeat message to the log. Implements write an unscheduled heartbeat message to the log. Implements
feature 9503. feature 9503.
@ -83,9 +87,9 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
circuits until we have successfully built a circuit. This makes circuits until we have successfully built a circuit. This makes
hidden services come up faster when the network is re-enabled. hidden services come up faster when the network is re-enabled.
Patch from "akwizgran". Closes ticket 13447. Patch from "akwizgran". Closes ticket 13447.
- Inform Tor controller about nature of a failure to retrieve hidden - When we fail to a retrieve hidden service descriptor, send the
service descriptor by sending reason string with "HS_DESC FAILED" controller an "HS_DESC FAILED" controller event. Implements
controller event. Implements feature 13212. feature 13212.
- New HiddenServiceDirGroupReadable option to cause hidden service - New HiddenServiceDirGroupReadable option to cause hidden service
directories and hostname files to be created group-readable. Patch directories and hostname files to be created group-readable. Patch
from "anon", David Stainton, and "meejah". Closes ticket 11291. from "anon", David Stainton, and "meejah". Closes ticket 11291.
@ -105,16 +109,16 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
o Minor bugfixes (preventative security, C safety): o Minor bugfixes (preventative security, C safety):
- When reading a hexadecimal, base-32, or base-64 encoded value from - When reading a hexadecimal, base-32, or base-64 encoded value from
a string, always overwrite the complete output buffer. This a string, always overwrite the whole output buffer. This prevents
prevents some bugs where we would look at (but fortunately, not some bugs where we would look at (but fortunately, not reveal)
reveal) uninitialized memory on the stack. Fixes bug 14013; bugfix uninitialized memory on the stack. Fixes bug 14013; bugfix on all
on all versions of Tor. versions of Tor.
- Clear all memory targetted by tor_addr_{to,from}_sockaddr(), not - Clear all memory targetted by tor_addr_{to,from}_sockaddr(), not
just the part that's used. This makes it harder for data leak bugs just the part that's used. This makes it harder for data leak bugs
to occur in the event of other programming failures. Resolves to occur in the event of other programming failures. Resolves
ticket 14041. ticket 14041.
o Minor bugfixes (client, micordescriptors): o Minor bugfixes (client, microdescriptors):
- Use a full 256 bits of the SHA256 digest of a microdescriptor when - Use a full 256 bits of the SHA256 digest of a microdescriptor when
computing which microdescriptors to download. This keeps us from computing which microdescriptors to download. This keeps us from
erroneous download behavior if two microdescriptor digests ever erroneous download behavior if two microdescriptor digests ever
@ -159,12 +163,11 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
o Minor bugfixes (logging): o Minor bugfixes (logging):
- Downgrade warnings about RSA signature failures to info log level. - Downgrade warnings about RSA signature failures to info log level.
Emit a warning when extra info document is found incompatible with Emit a warning when an extra info document is found incompatible
a corresponding router descriptor. Fixes bug 9812; bugfix with a corresponding router descriptor. Fixes bug 9812; bugfix
on 0.0.6rc3. on 0.0.6rc3.
- Log the circuit ID correctly in - Make connection_ap_handshake_attach_circuit() log the circuit ID
connection_ap_handshake_attach_circuit(). Fixes bug 13701; bugfix correctly. Fixes bug 13701; bugfix on 0.0.6.
on 0.0.6.
o Minor bugfixes (misc): o Minor bugfixes (misc):
- Stop allowing invalid address patterns like "*/24" that contain - Stop allowing invalid address patterns like "*/24" that contain
@ -203,24 +206,20 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
available. If the consensus does not contain Exits, Tor will only available. If the consensus does not contain Exits, Tor will only
build internal circuits. In this case, relevant statuses will build internal circuits. In this case, relevant statuses will
contain the word "internal" as indicated in the Tor control- contain the word "internal" as indicated in the Tor control-
spec.txt. When bootstrap completes, Tor will be ready to handle an spec.txt. When bootstrap completes, Tor will be ready to build
application requesting an internal circuit to hidden services at internal circuits. If a future consensus contains Exits, exit
".onion" addresses. If a future consensus contains Exits, exit
circuits may become available. Fixes part of bug 13718; bugfix on circuits may become available. Fixes part of bug 13718; bugfix on
0.2.4.10-alpha. Patch by "teor". 0.2.4.10-alpha. Patch by "teor".
- Decrease minimum consensus interval to 10 seconds when - Decrease minimum consensus interval to 10 seconds when
TestingTorNetwork is set, or 5 seconds for the first consensus. TestingTorNetwork is set, or 5 seconds for the first consensus.
Fix assumptions throughout the code that assume larger interval Fix assumptions throughout the code that assume larger intervals.
values. This assists in quickly bootstrapping a testing Tor Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha. Patch
network. Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha.
Patch by "teor".
- Avoid excluding guards from path building in minimal test
networks, when we're in a test network, and excluding guards would
exclude all relays. This typically occurs in incredibly small tor
networks, and those using TestingAuthVoteGuard * This fix only
applies to minimal, testing tor networks, so it's no less secure.
Fixes part of bug 13718; bugfix on 0.1.1.11-alpha. Patch
by "teor". by "teor".
- Avoid excluding guards from path building in minimal test
networks, when we're in a test network and excluding guards would
exclude all relays. This typically occurs in incredibly small tor
networks, and those using "TestingAuthVoteGuard *". Fixes part of
bug 13718; bugfix on 0.1.1.11-alpha. Patch by "teor".
o Code simplification and refactoring: o Code simplification and refactoring:
- Stop using can_complete_circuits as a global variable; access it - Stop using can_complete_circuits as a global variable; access it
@ -230,11 +229,10 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
Closes ticket 13172. Closes ticket 13172.
- Combine the functions used to parse ClientTransportPlugin and - Combine the functions used to parse ClientTransportPlugin and
ServerTransportPlugin into a single function. Closes ticket 6456. ServerTransportPlugin into a single function. Closes ticket 6456.
- Add inline functions and convenience macros for quick lookup of - Add inline functions and convenience macros for inspecting channel
state component of channel_t structure. Refactor various parts of state. Refactor the code to use convenience macros instead of
codebase to use convenience macros instead of checking state checking channel state directly. Fixes issue 7356.
member of channel_t directly. Fixes issue 7356. - Document all members of was_router_added_t and rename
- Document all members of was_router_added_t enum and rename
ROUTER_WAS_NOT_NEW to ROUTER_IS_ALREADY_KNOWN to make it less ROUTER_WAS_NOT_NEW to ROUTER_IS_ALREADY_KNOWN to make it less
confusable with ROUTER_WAS_TOO_OLD. Fixes issue 13644. confusable with ROUTER_WAS_TOO_OLD. Fixes issue 13644.
- In connection_exit_begin_conn(), use END_CIRC_REASON_TORPROTOCOL - In connection_exit_begin_conn(), use END_CIRC_REASON_TORPROTOCOL
@ -243,11 +241,6 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
implementation, so that we can add a new digest256map implementation, so that we can add a new digest256map
type trivially. type trivially.
o Directory authority changes:
- Remove turtles as a directory authority.
- Add longclaw as a new (v3) directory authority. This implements
ticket 13296. This keeps the directory authority count at 9.
o Documentation: o Documentation:
- Document the bridge-authority-only 'networkstatus-bridges' file. - Document the bridge-authority-only 'networkstatus-bridges' file.
Closes ticket 13713; patch from "tom". Closes ticket 13713; patch from "tom".
@ -255,12 +248,12 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
manpage. Resolves issue 13707. manpage. Resolves issue 13707.
- Stop suggesting that users specify relays by nickname: it isn't a - Stop suggesting that users specify relays by nickname: it isn't a
good idea. Also, properly cross-reference how to specify relays in good idea. Also, properly cross-reference how to specify relays in
all parts of the manual for options that take a list of relays. all parts of manual documenting options that take a list of
Closes ticket 13381. relays. Closes ticket 13381.
- Clarify HiddenServiceDir option description in manpage to make it - Clarify the HiddenServiceDir option description in manpage to make
clear that relative paths are taken with respect to the current it clear that relative paths are taken with respect to the current
working directory of Tor instance. Also clarify that this behavior working directory. Also clarify that this behavior is not
is not guaranteed to remain indefinitely. Fixes issue 13913. guaranteed to remain indefinitely. Fixes issue 13913.
o Testing: o Testing:
- New tests for many parts of channel, relay, and circuitmux - New tests for many parts of channel, relay, and circuitmux