tighten and tidy the changelog; pick a date

This commit is contained in:
Nick Mathewson 2015-07-27 09:40:40 -04:00
parent 58758e713f
commit d6fc50a28d

View File

@ -1,9 +1,9 @@
Changes in version 0.2.7.2-alpha - 2015-07-2? Changes in version 0.2.7.2-alpha - 2015-07-27
This, the second alpha in the Tor 0.2.7 series, has a number of new This, the second alpha in the Tor 0.2.7 series, has a number of new
features, including a way to manually pick the number of introduction features, including a way to manually pick the number of introduction
points for hidden services, and the much stronger Ed25519 points for hidden services, and the much stronger Ed25519 signing key
signing key algorithm for regular Tor relays (including support for algorithm for regular Tor relays (including support for encrypted
encrypted offline identity keys in the new algorithm). offline identity keys in the new algorithm).
Support for Ed25519 on relays is currently limited to signing router Support for Ed25519 on relays is currently limited to signing router
descriptors; later alphas in this series will extend Ed25519 key descriptors; later alphas in this series will extend Ed25519 key
@ -31,11 +31,14 @@ Changes in version 0.2.7.2-alpha - 2015-07-2?
o Major features (Hidden services): o Major features (Hidden services):
- Add the torrc option HiddenServiceNumIntroductionPoints, to - Add the torrc option HiddenServiceNumIntroductionPoints, to
specify a fixed number of introduction points. Its maximum value specify a fixed number of introduction points. Its maximum value
is 10 and default is 3. Closes ticket 4862. is 10 and default is 3. Using this option can increase a hidden
service's reliability under load, at the cost of making it more
visible that the hidden service is facing extra load. Closes
ticket 4862.
- Remove the adaptive algorithm for choosing the number of - Remove the adaptive algorithm for choosing the number of
introduction points, which tended to leak popularity information introduction points, which used to change the number of
by changing the number of introduction points depending on the introduction points (poorly) depending on the number of
number of clients the HS sees. Closes ticket 4862. connections the HS sees. Closes ticket 4862.
o Major features (onion key cross-certification): o Major features (onion key cross-certification):
- Relay descriptors now include signatures of their own identity - Relay descriptors now include signatures of their own identity
@ -67,7 +70,8 @@ Changes in version 0.2.7.2-alpha - 2015-07-2?
regression detailed in bug 16381). This is a temporary fix since regression detailed in bug 16381). This is a temporary fix since
we can live with the minor issue in bug 14219 (it just results in we can live with the minor issue in bug 14219 (it just results in
some load on the network) but the regression of 16381 is too much some load on the network) but the regression of 16381 is too much
of a setback. First-round fix for bug 16381; bugfix on 0.2.6.3-alpha. of a setback. First-round fix for bug 16381; bugfix
on 0.2.6.3-alpha.
o Major bugfixes (hidden services): o Major bugfixes (hidden services):
- When cannibalizing a circuit for an introduction point, always - When cannibalizing a circuit for an introduction point, always
@ -99,9 +103,9 @@ Changes in version 0.2.7.2-alpha - 2015-07-2?
- The HSDir flag given by authorities now requires the Stable flag. - The HSDir flag given by authorities now requires the Stable flag.
For the current network, this results in going from 2887 to 2806 For the current network, this results in going from 2887 to 2806
HSDirs. Also, it makes it harder for an attacker to launch a sybil HSDirs. Also, it makes it harder for an attacker to launch a sybil
attack by raising the effort for a relay to become Stable to require attack by raising the effort for a relay to become Stable to
at the very least 7 days, while maintaining the 96 require at the very least 7 days, while maintaining the 96 hours
hours uptime requirement for HSDir. Implements ticket 8243. uptime requirement for HSDir. Implements ticket 8243.
o Minor features (client): o Minor features (client):
- Relax the validation of hostnames in SOCKS5 requests, allowing the - Relax the validation of hostnames in SOCKS5 requests, allowing the
@ -217,14 +221,18 @@ Changes in version 0.2.7.2-alpha - 2015-07-2?
o Removed features: o Removed features:
- Tor no longer supports copies of OpenSSL that are missing support - Tor no longer supports copies of OpenSSL that are missing support
for Elliptic Curve Cryptography. In particular support for at for Elliptic Curve Cryptography. (We began using ECC when
least one of P256 or P224 is now required, with manual available in 0.2.4.8-alpha, for more safe and efficient key
configuration needed if only P224 is available. Resolves negotiation.) In particular, support for at least one of P256 or
ticket 16140. P224 is now required, with manual configuration needed if only
P224 is available. Resolves ticket 16140.
- Tor no longer supports versions of OpenSSL before 1.0. (If you are - Tor no longer supports versions of OpenSSL before 1.0. (If you are
on an operating system that has not upgraded to OpenSSL 1.0 or on an operating system that has not upgraded to OpenSSL 1.0 or
later, and you compile Tor from source, you will need to install a later, and you compile Tor from source, you will need to install a
more recent OpenSSL to link Tor against.) Resolves ticket 16034. more recent OpenSSL to link Tor against.) These versions of
OpenSSL are still supported by the OpenSSL, but the numerous
cryptographic improvements in later OpenSSL releases makes them a
clear choice. Resolves ticket 16034.
- Remove the HidServDirectoryV2 option. Now all relays offer to - Remove the HidServDirectoryV2 option. Now all relays offer to
store hidden service descriptors. Related to 16543. store hidden service descriptors. Related to 16543.
- Remove the VoteOnHidServDirectoriesV2 option, since all - Remove the VoteOnHidServDirectoriesV2 option, since all
@ -232,11 +240,9 @@ Changes in version 0.2.7.2-alpha - 2015-07-2?
o Testing: o Testing:
- Document use of coverity, clang static analyzer, and clang dynamic - Document use of coverity, clang static analyzer, and clang dynamic
undefined behavior and address sanitizers in doc/HACKING. Add undefined behavior and address sanitizers in doc/HACKING. Include
clang dynamic sanitizer blacklist in detailed usage instructions in the blacklist. Patch by "teor".
contrib/clang/sanitizer_blacklist.txt to exempt known undefined Closes ticket 15817.
behavior. Include detailed usage instructions in the blacklist.
Patch by "teor". Closes ticket 15817.
- The link authentication protocol code now has extensive tests. - The link authentication protocol code now has extensive tests.
- The relay descriptor signature testing code now has - The relay descriptor signature testing code now has
extensive tests. extensive tests.