tor-commits
Threads by month
- ----- 2025 -----
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
May 2021
- 20 participants
- 1972 discussions
commit ec0b4bdafd16a4303d6f8e4100b169284023f67d
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Fri May 7 09:39:33 2021 -0400
Bump to 0.4.5.8.
---
configure.ac | 4 ++--
contrib/win32build/tor-mingw.nsi.in | 2 +-
src/win32/orconfig.h | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/configure.ac b/configure.ac
index a85d530bed..621fbd1612 100644
--- a/configure.ac
+++ b/configure.ac
@@ -4,7 +4,7 @@ dnl Copyright (c) …
[View More]2007-2019, The Tor Project, Inc.
dnl See LICENSE for licensing information
AC_PREREQ([2.63])
-AC_INIT([tor],[0.4.5.7-dev])
+AC_INIT([tor],[0.4.5.8])
AC_CONFIG_SRCDIR([src/app/main/tor_main.c])
AC_CONFIG_MACRO_DIR([m4])
@@ -16,7 +16,7 @@ configure_flags="$*"
# version number changes. Tor uses it to make sure that it
# only shuts down for missing "required protocols" when those protocols
# are listed as required by a consensus after this date.
-AC_DEFINE(APPROX_RELEASE_DATE, ["2021-03-16"], # for 0.4.5.7-dev
+AC_DEFINE(APPROX_RELEASE_DATE, ["2021-05-07"], # for 0.4.5.8
[Approximate date when this software was released. (Updated when the version changes.)])
# "foreign" means we don't follow GNU package layout standards
diff --git a/contrib/win32build/tor-mingw.nsi.in b/contrib/win32build/tor-mingw.nsi.in
index 569afc57bc..580f189525 100644
--- a/contrib/win32build/tor-mingw.nsi.in
+++ b/contrib/win32build/tor-mingw.nsi.in
@@ -8,7 +8,7 @@
!include "LogicLib.nsh"
!include "FileFunc.nsh"
!insertmacro GetParameters
-!define VERSION "0.4.5.7-dev"
+!define VERSION "0.4.5.8"
!define INSTALLER "tor-${VERSION}-win32.exe"
!define WEBSITE "https://www.torproject.org/"
!define LICENSE "LICENSE"
diff --git a/src/win32/orconfig.h b/src/win32/orconfig.h
index b0ff11395c..06e6ad8ff7 100644
--- a/src/win32/orconfig.h
+++ b/src/win32/orconfig.h
@@ -217,7 +217,7 @@
#define USING_TWOS_COMPLEMENT
/* Version number of package */
-#define VERSION "0.4.5.7-dev"
+#define VERSION "0.4.5.8"
#define HAVE_STRUCT_SOCKADDR_IN6
#define HAVE_STRUCT_IN6_ADDR
[View Less]
1
0

[tor/release-0.4.6] Merge branch 'maint-0.4.5' into release-0.4.5
by dgoulet@torproject.org 07 May '21
by dgoulet@torproject.org 07 May '21
07 May '21
commit 8e493f321ae4036ba32bbd69c9e8270758890e3c
Merge: 14bd196eb8 d24a6b2f75
Author: Alexander Færøy <ahf(a)torproject.org>
Date: Fri Feb 12 15:23:34 2021 +0000
Merge branch 'maint-0.4.5' into release-0.4.5
src/feature/relay/router.c | 10 +++++++---
1 file changed, 7 insertions(+), 3 deletions(-)
1
0

[tor/release-0.4.6] Merge branch 'maint-0.4.5' into release-0.4.5
by dgoulet@torproject.org 07 May '21
by dgoulet@torproject.org 07 May '21
07 May '21
commit 4a7fcc7361aff1ff4cf4d763472742c38edc8124
Merge: 8e493f321a bdca475518
Author: David Goulet <dgoulet(a)torproject.org>
Date: Fri Feb 12 12:57:18 2021 -0500
Merge branch 'maint-0.4.5' into release-0.4.5
changes/ticket40208 | 6 ++++++
src/app/config/resolve_addr.c | 14 +++++++++++++-
src/feature/relay/router.c | 3 +--
src/test/test_config.c | 17 +++++++++++++++++
4 files changed, 37 insertions(+), 3 deletions(-)
1
0
commit fa8d438571477cdb339b52216f494a1b95088489
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Fri Feb 12 13:42:22 2021 -0500
Start an 0456 changelog.
---
ChangeLog | 43 +++++++++++++++++++++++++++++++++++++++++++
changes/bug40281 | 6 ------
changes/ticket40208 | 6 ------
changes/ticket40221_045 | 6 ------
changes/ticket40257 | 3 ---
changes/ticket40279 | 4 ----
changes/ticket40289 | 6 ------
7 files changed, 43 insertions(+)…
[View More], 31 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 0efab6c524..0deec36d53 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,46 @@
+Changes in version 0.4.5.6 - 2021-02-15
+ BLURB
+
+ Below are the changes since 0.4.4.4-rc. For a complete list of changes
+ since 0.4.4.XXXX, see the ReleaseNotes file.
+
+ o Major bugfixes (IPv6, relay):
+ - Fix a bug that prevented a relay from publishing its descriptor if
+ an auto-discovered IPv6 that was found unreachable. Fixes bug
+ 40279; bugfix on 0.4.5.1-alpha.
+
+ o Minor features (protocol versions):
+ - Stop claiming to support the "DirCache=1" subprotocol version.
+ Technically, we stopped supporting this subprotocol back in
+ 0.4.5.1-alpha, but we needed to wait for the authorities to stop
+ listing it as "required" before we could drop it from the list.
+ Closes ticket 40221.
+
+ o Minor bugfixes (logging):
+ - Avoid a spurious log message about missing subprotocol versions,
+ when the consensus that we're reading from is older than the
+ current release. Previously we had made this message nonfatal, but
+ in practice, it is never relevant when the consensus is older than
+ the current release. Fixes bug 40281; bugfix on 0.4.0.1-alpha.
+
+ o Minor bugfixes (metrics port):
+ - Fix a bug warning when a metrics port socket was unexpectedly
+ closed. Fixes bug 40257; bugfix on 0.4.5.1-alpha
+
+ o Minor bugfixes (relay):
+ - Allow relays to have a RFC1918 address if PublishServerDescriptor
+ is set to 0 and AssumeReachable is set to 1. This is to support
+ the use case of a bridge on a local network, exposed via a
+ pluggable transport. Fixes bug 40208; bugfix on 0.4.5.1-alpha.
+
+ o Minor bugfixes (relay, config):
+ - Fix a problem in the removal of duplicate ORPorts from the
+ internal port list when loading the config file. We were removing
+ the wrong ports, breaking valid torrc uses cases for multiple
+ ORPorts of the same address family. Fixes bug 40289; bugfix
+ on 0.4.5.1-alpha.
+
+
Changes in version 0.4.5.5-rc - 2021-02-01
Tor 0.4.5.5-rc is the third release candidate in its series. We're
coming closer and closer to a stable release series. This release
diff --git a/changes/bug40281 b/changes/bug40281
deleted file mode 100644
index 0708039f04..0000000000
--- a/changes/bug40281
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (logging):
- - Avoid a spurious log message about missing subprotocol versions, when
- the consensus that we're reading from is older than the current
- release. . Previously we had made this message nonfatal in this case,
- but in practice, it is never relevant when the consensus is older than
- the current release. Fixes bug 40281; bugfix on 0.4.0.1-alpha.
diff --git a/changes/ticket40208 b/changes/ticket40208
deleted file mode 100644
index 5a3a1aa55e..0000000000
--- a/changes/ticket40208
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (relay):
- - Allow relays to have a RFC1918 address if PublishServerDescriptor is set
- to 0 and AssumeReachable is set to 1. This is to support the use case of a
- bridge on a local network that can be used by restricted users on that
- network to reach the Tor network. Fixes bug 40208; bugfix on
- 0.4.5.1-alpha.
diff --git a/changes/ticket40221_045 b/changes/ticket40221_045
deleted file mode 100644
index 0f3ab894c2..0000000000
--- a/changes/ticket40221_045
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (protocol versions):
- - Stop claiming to support the "DirCache=1" subprotocol version.
- Technically, we stopped supporting this subprotocol back in
- 0.4.5.1-alpha, but we needed to wait for the authorities to stop
- listing it as "required" before we can drop support. Closes ticket
- 40221.
diff --git a/changes/ticket40257 b/changes/ticket40257
deleted file mode 100644
index 4bcebc45a1..0000000000
--- a/changes/ticket40257
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (metrics port):
- - Fix a bug warning when the socket was unexpectedly closed. Fixes bug
- 40257; bugfix on 0.4.5.1-alpha
diff --git a/changes/ticket40279 b/changes/ticket40279
deleted file mode 100644
index 351db40789..0000000000
--- a/changes/ticket40279
+++ /dev/null
@@ -1,4 +0,0 @@
- o Major bugfixes (IPv6, relay):
- - Fix a bug that prevented a relay to publish its descriptor in the case of
- an auto-discovered IPv6 that was found unreachable for which we always
- publish if the IPv4 is correct. Fixes bug 40279; bugfix on 0.4.5.1-alpha.
diff --git a/changes/ticket40289 b/changes/ticket40289
deleted file mode 100644
index cdb36825b0..0000000000
--- a/changes/ticket40289
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (relay, config):
- - Fix a problem in the removal of duplicate ORPort from the internal port
- list when loading config file. We were removing wrong ports breaking valid
- torrc uses cases for multiple ORPorts of the same address family. Fixes
- bug 40289; bugfix on 0.4.5.1-alpha.
-
[View Less]
1
0

[tor/release-0.4.6] 0.4.5.6 releasenotes: remove bugfixes on 0.4.5.x
by dgoulet@torproject.org 07 May '21
by dgoulet@torproject.org 07 May '21
07 May '21
commit 4c743e4fbbc94c72bc801db80dd42ac1ae6ad262
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Fri Feb 12 14:11:29 2021 -0500
0.4.5.6 releasenotes: remove bugfixes on 0.4.5.x
---
ReleaseNotes | 130 +----------------------------------------------------------
1 file changed, 1 insertion(+), 129 deletions(-)
diff --git a/ReleaseNotes b/ReleaseNotes
index 0aea431e33..da49672b2f 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -5,21 +5,9 @@ changes in each development snapshot, …
[View More]see the ChangeLog file.
Changes in version 0.4.5.6 - 2021-02-15
BLURB
- Below are the changes since 0.4.4.XXXX. For a complete list of changes
+ Below are the changes since 0.4.4.XX. For a list only of the changes
since 0.4.5.5-rc, see the ChangeLog file.
- o Major bugfixes (IPv6, relay):
- - Fix a bug that prevented a relay from publishing its descriptor if
- an auto-discovered IPv6 that was found unreachable. Fixes bug
- 40279; bugfix on 0.4.5.1-alpha.
-
- o Minor features (protocol versions):
- - Stop claiming to support the "DirCache=1" subprotocol version.
- Technically, we stopped supporting this subprotocol back in
- 0.4.5.1-alpha, but we needed to wait for the authorities to stop
- listing it as "required" before we could drop it from the list.
- Closes ticket 40221.
-
o Minor bugfixes (logging):
- Avoid a spurious log message about missing subprotocol versions,
when the consensus that we're reading from is older than the
@@ -27,39 +15,12 @@ Changes in version 0.4.5.6 - 2021-02-15
in practice, it is never relevant when the consensus is older than
the current release. Fixes bug 40281; bugfix on 0.4.0.1-alpha.
- o Minor bugfixes (metrics port):
- - Fix a bug warning when a metrics port socket was unexpectedly
- closed. Fixes bug 40257; bugfix on 0.4.5.1-alpha
-
- o Minor bugfixes (relay):
- - Allow relays to have a RFC1918 address if PublishServerDescriptor
- is set to 0 and AssumeReachable is set to 1. This is to support
- the use case of a bridge on a local network, exposed via a
- pluggable transport. Fixes bug 40208; bugfix on 0.4.5.1-alpha.
-
- o Minor bugfixes (relay, config):
- - Fix a problem in the removal of duplicate ORPorts from the
- internal port list when loading the config file. We were removing
- the wrong ports, breaking valid torrc uses cases for multiple
- ORPorts of the same address family. Fixes bug 40289; bugfix
- on 0.4.5.1-alpha.
-
o Major feature (exit):
- Re-entry into the network is now denied at the Exit level to all
relays' ORPorts and authorities' ORPorts and DirPorts. This change
should help mitgate a set of denial-of-service attacks. Closes
ticket 2667.
- o Minor bugfixes (relay, configuration):
- - Don't attempt to discover our address (IPv4 or IPv6) if no ORPort
- for it can be found in the configuration. Fixes bug 40254; bugfix
- on 0.4.5.1-alpha.
-
-
- o Major bugfixes (authority, IPv6):
- - Do not consider multiple relays in the same IPv6 /64 network to be
- sybils. Fixes bug 40243; bugfix on 0.4.5.1-alpha.
-
o Major bugfixes (directory cache, performance, windows):
- Limit the number of items in the consensus diff cache to 64 on
Windows. We hope this will mitigate an issue where Windows relay
@@ -75,35 +36,17 @@ Changes in version 0.4.5.6 - 2021-02-15
- Log more information for directory authority operators during the
consensus voting process, and while processing relay descriptors.
Closes ticket 40245.
- - Reject obsolete router/extrainfo descriptors earlier and more
- quietly, to avoid spamming the logs. Fixes bug 40238; bugfix
- on 0.4.5.1-alpha.
o Minor bugfixes (compilation):
- - Fix another warning about unreachable fallthrough annotations when
- building with "--enable-all-bugs-are-fatal" on some compilers.
- Fixes bug 40241; bugfix on 0.4.5.3-rc.
- Change the linker flag ordering in our library search code so that
it works for compilers that need the libraries to be listed in the
right order. Fixes bug 33624; bugfix on 0.1.1.0-alpha.
- o Minor bugfixes (config, bridge):
- - Don't initiate a connection to a bridge configured to use a
- missing transport. This change reverts an earlier fix that would
- try to avoid such situations during configuration chcecking, but
- which doesn't work with DisableNetwork. Fixes bug 40106; bugfix
- on 0.4.5.1-alpha.
-
o Minor bugfixes (onion services):
- Avoid a non-fatal assertion in certain edge-cases when
establishing a circuit to an onion service. Fixes bug 32666;
bugfix on 0.3.0.3-alpha.
- o Minor bugfixes (relay):
- - If we were unable to build our descriptor, don't mark it as having
- been advertised. Also remove an harmless BUG(). Fixes bug 40231;
- bugfix on 0.4.5.1-alpha.
-
o Major bugfixes (onion service v3):
- Stop requiring a live consensus for v3 clients and services, and
@@ -132,27 +75,6 @@ Changes in version 0.4.5.6 - 2021-02-15
compile option onto the tor binary only. Fixes bug 40111; bugfix
on 0.2.3.1-alpha.
- o Minor bugfixes (config, bridge):
- - Really fix the case where torrc has a missing ClientTransportPlugin
- but is configured with a Bridge line and UseBridges. Previously,
- we didn't look at the managed proxy list and thus would fail for
- the "exec" case. Fixes bug 40106; bugfix on 0.4.5.1-alpha.
-
- o Minor bugfixes (logging, relay):
- - Log our address as reported by the directory authorities, if none
- was configured or detected before. Fixes bug 40201; bugfix
- on 0.4.5.1-alpha.
- - When a launching bandwidth testing circuit, don't incorrectly call
- it a reachability test, or trigger a "CHECKING_REACHABILITY"
- control event. Fixes bug 40205; bugfix on 0.4.5.1-alpha.
-
- o Minor bugfixes (relay, statistics):
- - Report the correct connection statistics in our extrainfo
- documents. Previously there was a problem in the file loading
- function which would wrongly truncate a state file, causing the
- wrong information to be reported. Fixes bug 40226; bugfix
- on 0.4.5.1-alpha.
-
o Minor bugfixes (SOCKS5):
- Handle partial SOCKS5 messages correctly. Previously, our code
would send an incorrect error message if it got a SOCKS5 request
@@ -192,16 +114,6 @@ Changes in version 0.4.5.6 - 2021-02-15
objects, potentially leading to bugs. Fixes bug 32880; bugfix on
0.2.3.6-alpha. Patch by Neel Chauhan.
- o Minor bugfixes (compilation):
- - Use the correct 'ranlib' program when building libtor.a.
- Previously we used the default ranlib, which broke some kinds of
- cross-compilation. Fixes bug 40172; bugfix on 0.4.5.1-alpha.
- - Remove a duplicate typedef in metrics_store.c. Fixes bug 40177;
- bugfix on 0.4.5.1-alpha.
- - When USDT tracing is enabled, and STAP_PROBEV() is missing, don't
- attempt to build. Linux supports that macro but not the BSDs.
- Fixes bug 40174; bugfix on 0.4.5.1-alpha.
-
o Minor bugfixes (configuration):
- Exit Tor on a misconfiguration when the Bridge line is configured
to use a transport but no corresponding ClientTransportPlugin can
@@ -209,13 +121,6 @@ Changes in version 0.4.5.6 - 2021-02-15
bridge directly without using the transport, making it easier for
adversaries to notice the bridge. Fixes bug 25528; bugfix
on 0.2.6.1-alpha.
- - Fix an issue where an ORPort was compared with other kinds of
- ports, when it should have been only checked against other
- ORPorts. This bug would lead to "DirPort auto" getting ignored.
- Fixes bug 40195; bugfix on 0.4.5.1-alpha.
- - Fix a bug where a second non-ORPort with a variant family (ex:
- SocksPort [::1]:9050) would be ignored due to a configuration
- parsing error. Fixes bug 40183; bugfix on 0.4.5.1-alpha.
o Minor bugfixes (crash, relay, signing key):
- Avoid assertion failures when we run Tor from the command line
@@ -230,22 +135,10 @@ Changes in version 0.4.5.6 - 2021-02-15
level message. (This event can happen naturally, and is no reason
for concern). Fixes bug 40142; bugfix on 0.4.1.1-alpha.
- o Minor bugfixes (relay, address discovery):
- - Don't trigger an IP change when no new valid IP can be found.
- Fixes bug 40071; bugfix on 0.4.5.1-alpha.
- - When attempting to discover our IP, use a simple test circuit,
- rather than a descriptor fetch: the same address information is
- present in NETINFO cells, and is better authenticated there. Fixes
- bug 40071; bugfix on 0.4.5.1-alpha.
-
o Minor bugfixes (testing):
- Fix the `config/parse_tcp_proxy_line` test so that it works
correctly on systems where the DNS provider hijacks invalid
queries. Fixes part of bug 40179; bugfix on 0.4.3.1-alpha.
- - Fix unit tests that used newly generated list of routers so that
- they check them with respect to the date when they were generated,
- not with respect to the current time. Fixes bug 40187; bugfix
- on 0.4.5.1-alpha.
- Fix our Python reference-implementation for the v3 onion service
handshake so that it works correctly with the version of hashlib
provided by Python 3.9. Fixes part of bug 40179; bugfix
@@ -257,21 +150,6 @@ Changes in version 0.4.5.6 - 2021-02-15
- Remove the "GETINFO network-status" controller command. It has
been deprecated since 0.3.1.1-alpha. Closes ticket 22473.
-Changes in version 0.4.5.1-alpha - 2020-11-01
- Tor 0.4.5.1-alpha is the first alpha release in the 0.4.5.x series. It
- improves support for IPv6, address discovery and self-testing, code
- metrics and tracing.
-
- This release also fixes TROVE-2020-005, a security issue that could be
- used, under certain cases, by an adversary to observe traffic patterns
- on a limited number of circuits intended for a different relay. To
- mount this attack, the adversary would need to actively extend
- circuits to an incorrect address, as well as compromise a relay's
- legacy RSA-1024 key. We'll be backporting this fix to other release
- series soon, after it has had some testing.
-
- Here are the changes since 0.4.4.5.
-
o Major features (build):
- When building Tor, first link all object files into a single
static library. This may help with embedding Tor in other
@@ -554,12 +432,6 @@ Changes in version 0.4.5.1-alpha - 2020-11-01
- Resolve a compilation warning that could occur in
test_connection.c. Fixes bug 40113; bugfix on 0.2.9.3-alpha.
- o Minor bugfixes (configuration):
- - Fix bug where %including a pattern ending with */ would include
- files and folders (instead of folders only) in versions of glibc <
- 2.19. Fixes bug 40141; bugfix on 0.4.5.0-alpha-dev. Patch by
- Daniel Pinto.
-
o Minor bugfixes (control port):
- Make sure we send the SOCKS request address in relay begin cells
when a stream is attached with the purpose
[View Less]
1
0
commit 799bab410b99f1a569acf8a817c9170ad529a4ed
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Fri Feb 12 14:13:06 2021 -0500
Sort the 0.4.5.6 release notes.
---
ReleaseNotes | 264 ++++++++++++++++++++++++++++-------------------------------
1 file changed, 127 insertions(+), 137 deletions(-)
diff --git a/ReleaseNotes b/ReleaseNotes
index da49672b2f..9accb4b658 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -5,151 +5,15 @@ changes in each development snapshot, see the …
[View More]ChangeLog file.
Changes in version 0.4.5.6 - 2021-02-15
BLURB
- Below are the changes since 0.4.4.XX. For a list only of the changes
+ Below are the changes since 0.4.4.5. For a list only of the changes
since 0.4.5.5-rc, see the ChangeLog file.
- o Minor bugfixes (logging):
- - Avoid a spurious log message about missing subprotocol versions,
- when the consensus that we're reading from is older than the
- current release. Previously we had made this message nonfatal, but
- in practice, it is never relevant when the consensus is older than
- the current release. Fixes bug 40281; bugfix on 0.4.0.1-alpha.
-
o Major feature (exit):
- Re-entry into the network is now denied at the Exit level to all
relays' ORPorts and authorities' ORPorts and DirPorts. This change
should help mitgate a set of denial-of-service attacks. Closes
ticket 2667.
- o Major bugfixes (directory cache, performance, windows):
- - Limit the number of items in the consensus diff cache to 64 on
- Windows. We hope this will mitigate an issue where Windows relay
- operators reported Tor using 100% CPU, while we investigate better
- solutions. Fixes bug 24857; bugfix on 0.3.1.1-alpha.
-
- o Minor feature (build system):
- - New "make lsp" command to generate the compile_commands.json file
- used by the ccls language server. The "bear" program is needed for
- this. Closes ticket 40227.
-
- o Minor features (authority, logging):
- - Log more information for directory authority operators during the
- consensus voting process, and while processing relay descriptors.
- Closes ticket 40245.
-
- o Minor bugfixes (compilation):
- - Change the linker flag ordering in our library search code so that
- it works for compilers that need the libraries to be listed in the
- right order. Fixes bug 33624; bugfix on 0.1.1.0-alpha.
-
- o Minor bugfixes (onion services):
- - Avoid a non-fatal assertion in certain edge-cases when
- establishing a circuit to an onion service. Fixes bug 32666;
- bugfix on 0.3.0.3-alpha.
-
-
- o Major bugfixes (onion service v3):
- - Stop requiring a live consensus for v3 clients and services, and
- allow a "reasonably live" consensus instead. This allows v3 onion
- services to work even if the authorities fail to generate a
- consensus for more than 2 hours in a row. Fixes bug 40237; bugfix
- on 0.3.5.1-alpha.
-
- o Minor features (crypto):
- - Fix undefined behavior on our Keccak library. The bug only
- appeared on platforms with 32-byte CPU cache lines (e.g. armv5tel)
- and would result in wrong digests. Fixes bug 40210; bugfix on
- 0.2.8.1-alpha. Thanks to Bernhard Übelacker, Arnd Bergmann and
- weasel for diagnosing this.
-
- o Minor features (documentation):
- - Mention the "!badexit" directive that can appear in an authority's
- approved-routers file, and update the description of the
- "!invalid" directive. Closes ticket 40188.
-
- o Minor bugfixes (compilation):
- - Fix a compilation warning about unreachable fallthrough
- annotations when building with "--enable-all-bugs-are-fatal" on
- some compilers. Fixes bug 40241; bugfix on 0.3.5.4-alpha.
- - Fix the "--enable-static-tor" switch to properly set the "-static"
- compile option onto the tor binary only. Fixes bug 40111; bugfix
- on 0.2.3.1-alpha.
-
- o Minor bugfixes (SOCKS5):
- - Handle partial SOCKS5 messages correctly. Previously, our code
- would send an incorrect error message if it got a SOCKS5 request
- that wasn't complete. Fixes bug 40190; bugfix on 0.3.5.1-alpha.
-
-
-
- o Major bugfixes (relay, windows):
- - Fix a bug in our implementation of condition variables on Windows.
- Previously, a relay on Windows would use 100% CPU after running
- for some time. Because of this change, Tor now require Windows
- Vista or later to build and run. Fixes bug 30187; bugfix on
- 0.2.6.3-alpha. (This bug became more serious in 0.3.1.1-alpha with
- the introduction of consensus diffs.) Patch by Daniel Pinto.
-
- o Minor features (compilation):
- - Disable deprecation warnings when building with OpenSSL 3.0.0 or
- later. There are a number of APIs newly deprecated in OpenSSL
- 3.0.0 that Tor still requires. (A later version of Tor will try to
- stop depending on these APIs.) Closes ticket 40165.
-
- o Minor features (protocol, proxy support, defense in depth):
- - Respond more deliberately to misbehaving proxies that leave
- leftover data on their connections, so as to make Tor even less
- likely to allow the proxies to pass their data off as having come
- from a relay. Closes ticket 40017.
-
- o Minor features (safety):
- - Log a warning at startup if Tor is built with compile-time options
- that are likely to make it less stable or reliable. Closes
- ticket 18888.
-
- o Minor bugfixes (circuit, handshake):
- - In the v3 handshaking code, use connection_or_change_state() to
- change the state. Previously, we changed the state directly, but
- this did not pass the state change to the pubsub or channel
- objects, potentially leading to bugs. Fixes bug 32880; bugfix on
- 0.2.3.6-alpha. Patch by Neel Chauhan.
-
- o Minor bugfixes (configuration):
- - Exit Tor on a misconfiguration when the Bridge line is configured
- to use a transport but no corresponding ClientTransportPlugin can
- be found. Prior to this fix, Tor would attempt to connect to the
- bridge directly without using the transport, making it easier for
- adversaries to notice the bridge. Fixes bug 25528; bugfix
- on 0.2.6.1-alpha.
-
- o Minor bugfixes (crash, relay, signing key):
- - Avoid assertion failures when we run Tor from the command line
- with `--key-expiration sign`, but an ORPort is not set. Fixes bug
- 40015; bugfix on 0.3.2.1-alpha. Patch by Neel Chauhan.
-
- o Minor bugfixes (logging):
- - Remove trailing whitespace from control event log messages. Fixes
- bug 32178; bugfix on 0.1.1.1-alpha. Based on a patch by
- Amadeusz Pawlik.
- - Turn warning-level log message about SENDME failure into a debug-
- level message. (This event can happen naturally, and is no reason
- for concern). Fixes bug 40142; bugfix on 0.4.1.1-alpha.
-
- o Minor bugfixes (testing):
- - Fix the `config/parse_tcp_proxy_line` test so that it works
- correctly on systems where the DNS provider hijacks invalid
- queries. Fixes part of bug 40179; bugfix on 0.4.3.1-alpha.
- - Fix our Python reference-implementation for the v3 onion service
- handshake so that it works correctly with the version of hashlib
- provided by Python 3.9. Fixes part of bug 40179; bugfix
- on 0.3.1.6-rc.
- - Fix the `tortls/openssl/log_one_error` test to work with OpenSSL
- 3.0.0. Fixes bug 40170; bugfix on 0.2.8.1-alpha.
-
- o Removed features (controller):
- - Remove the "GETINFO network-status" controller command. It has
- been deprecated since 0.3.1.1-alpha. Closes ticket 22473.
-
o Major features (build):
- When building Tor, first link all object files into a single
static library. This may help with embedding Tor in other
@@ -163,6 +27,7 @@ Changes in version 0.4.5.6 - 2021-02-15
the moment, the only supported output format is Prometheus data
model. Closes ticket 40063. See the manual page for more
information and security considerations.
+
o Major features (relay, IPv6):
- The torrc option Address now supports IPv6. This unifies our
address discovery interface to support IPv4, IPv6, and hostnames.
@@ -195,6 +60,27 @@ Changes in version 0.4.5.6 - 2021-02-15
circuits on an existing channel. Fixes bug 40080; bugfix on
0.2.7.2-alpha. Resolves TROVE-2020-005.
+ o Major bugfixes (directory cache, performance, windows):
+ - Limit the number of items in the consensus diff cache to 64 on
+ Windows. We hope this will mitigate an issue where Windows relay
+ operators reported Tor using 100% CPU, while we investigate better
+ solutions. Fixes bug 24857; bugfix on 0.3.1.1-alpha.
+
+ o Major bugfixes (onion service v3):
+ - Stop requiring a live consensus for v3 clients and services, and
+ allow a "reasonably live" consensus instead. This allows v3 onion
+ services to work even if the authorities fail to generate a
+ consensus for more than 2 hours in a row. Fixes bug 40237; bugfix
+ on 0.3.5.1-alpha.
+
+ o Major bugfixes (relay, windows):
+ - Fix a bug in our implementation of condition variables on Windows.
+ Previously, a relay on Windows would use 100% CPU after running
+ for some time. Because of this change, Tor now require Windows
+ Vista or later to build and run. Fixes bug 30187; bugfix on
+ 0.2.6.3-alpha. (This bug became more serious in 0.3.1.1-alpha with
+ the introduction of consensus diffs.) Patch by Daniel Pinto.
+
o Major bugfixes (TLS, buffer):
- When attempting to read N bytes on a TLS connection, really try to
read all N bytes. Previously, Tor would stop reading after the
@@ -202,6 +88,11 @@ Changes in version 0.4.5.6 - 2021-02-15
and not check for more data until the next mainloop event. Fixes
bug 40006; bugfix on 0.1.0.5-rc.
+ o Minor feature (build system):
+ - New "make lsp" command to generate the compile_commands.json file
+ used by the ccls language server. The "bear" program is needed for
+ this. Closes ticket 40227.
+
o Minor features (address discovery):
- If no Address statements are found, relays now prioritize guessing
their address by looking at the local interface instead of the
@@ -214,6 +105,11 @@ Changes in version 0.4.5.6 - 2021-02-15
timestamp format support. Patch by Daniel Pinto. Closes
ticket 30045.
+ o Minor features (authority, logging):
+ - Log more information for directory authority operators during the
+ consensus voting process, and while processing relay descriptors.
+ Closes ticket 40245.
+
o Minor features (bootstrap reporting):
- When reporting bootstrapping status on a relay, do not consider
connections that have never been the target of an origin circuit.
@@ -228,6 +124,12 @@ Changes in version 0.4.5.6 - 2021-02-15
- If the configure script has given any warnings, remind the user
about them at the end of the script. Related to 40138.
+ o Minor features (compilation):
+ - Disable deprecation warnings when building with OpenSSL 3.0.0 or
+ later. There are a number of APIs newly deprecated in OpenSSL
+ 3.0.0 that Tor still requires. (A later version of Tor will try to
+ stop depending on these APIs.) Closes ticket 40165.
+
o Minor features (configuration):
- Allow using wildcards (* and ?) with the %include option on
configuration files. Closes ticket 25140. Patch by Daniel Pinto.
@@ -255,6 +157,13 @@ Changes in version 0.4.5.6 - 2021-02-15
address. We keep "GETINFO address" for backwards-compatibility.
Closes ticket 40039. Patch by Neel Chauhan.
+ o Minor features (crypto):
+ - Fix undefined behavior on our Keccak library. The bug only
+ appeared on platforms with 32-byte CPU cache lines (e.g. armv5tel)
+ and would result in wrong digests. Fixes bug 40210; bugfix on
+ 0.2.8.1-alpha. Thanks to Bernhard Übelacker, Arnd Bergmann and
+ weasel for diagnosing this.
+
o Minor features (directory authorities):
- Authorities now list a different set of protocols as required and
recommended. These lists have been chosen so that only truly
@@ -286,6 +195,11 @@ Changes in version 0.4.5.6 - 2021-02-15
servers list. Authorities previously added only their IPv4
addresses. Closes ticket 32822.
+ o Minor features (documentation):
+ - Mention the "!badexit" directive that can appear in an authority's
+ approved-routers file, and update the description of the
+ "!invalid" directive. Closes ticket 40188.
+
o Minor features (ed25519, relay):
- Save a relay's base64-encoded ed25519 identity key to the data
directory in a file named fingerprint-ed25519. Closes ticket
@@ -324,6 +238,12 @@ Changes in version 0.4.5.6 - 2021-02-15
pluggable transport honors this option, so each pluggable transport
needs to implement support on its own. Closes ticket 5304.
+ o Minor features (protocol, proxy support, defense in depth):
+ - Respond more deliberately to misbehaving proxies that leave
+ leftover data on their connections, so as to make Tor even less
+ likely to allow the proxies to pass their data off as having come
+ from a relay. Closes ticket 40017.
+
o Minor features (relay address tracking):
- We now store relay addresses for OR connections in a more logical
way. Previously we would sometimes overwrite the actual address of
@@ -358,6 +278,11 @@ Changes in version 0.4.5.6 - 2021-02-15
- When launching IPv6 ORPort self-test circuits, make sure that the
second-last hop can initiate an IPv6 extend. Closes ticket 33222.
+ o Minor features (safety):
+ - Log a warning at startup if Tor is built with compile-time options
+ that are likely to make it less stable or reliable. Closes
+ ticket 18888.
+
o Minor features (specification update):
- Several fields in microdescriptors, router descriptors, and
consensus documents that were formerly optional are now required.
@@ -417,6 +342,13 @@ Changes in version 0.4.5.6 - 2021-02-15
circuit padding again after the machines have already completed.
Fixes bug 32040; bugfix on 0.4.1.1-alpha.
+ o Minor bugfixes (circuit, handshake):
+ - In the v3 handshaking code, use connection_or_change_state() to
+ change the state. Previously, we changed the state directly, but
+ this did not pass the state change to the pubsub or channel
+ objects, potentially leading to bugs. Fixes bug 32880; bugfix on
+ 0.2.3.6-alpha. Patch by Neel Chauhan.
+
o Minor bugfixes (compatibility):
- Strip '\r' characters when reading text files on Unix platforms.
This should resolve an issue where a relay operator migrates a
@@ -426,19 +358,52 @@ Changes in version 0.4.5.6 - 2021-02-15
extra-info document. Fixes bug 33781; bugfix on 0.0.9pre5.
o Minor bugfixes (compilation):
+ - Change the linker flag ordering in our library search code so that
+ it works for compilers that need the libraries to be listed in the
+ right order. Fixes bug 33624; bugfix on 0.1.1.0-alpha.
+ - Fix a compilation warning about unreachable fallthrough
+ annotations when building with "--enable-all-bugs-are-fatal" on
+ some compilers. Fixes bug 40241; bugfix on 0.3.5.4-alpha.
+ - Fix the "--enable-static-tor" switch to properly set the "-static"
+ compile option onto the tor binary only. Fixes bug 40111; bugfix
+ on 0.2.3.1-alpha.
- Fix compiler warnings that would occur when building with
"--enable-all-bugs-are-fatal" and "--disable-module-relay" at the
same time. Fixes bug 40129; bugfix on 0.4.4.1-alpha.
- Resolve a compilation warning that could occur in
test_connection.c. Fixes bug 40113; bugfix on 0.2.9.3-alpha.
+ o Minor bugfixes (configuration):
+ - Exit Tor on a misconfiguration when the Bridge line is configured
+ to use a transport but no corresponding ClientTransportPlugin can
+ be found. Prior to this fix, Tor would attempt to connect to the
+ bridge directly without using the transport, making it easier for
+ adversaries to notice the bridge. Fixes bug 25528; bugfix
+ on 0.2.6.1-alpha.
+
o Minor bugfixes (control port):
- Make sure we send the SOCKS request address in relay begin cells
when a stream is attached with the purpose
CIRCUIT_PURPOSE_CONTROLLER. Fixes bug 33124; bugfix on 0.0.5.
Patch by Neel Chauhan.
+ o Minor bugfixes (crash, relay, signing key):
+ - Avoid assertion failures when we run Tor from the command line
+ with `--key-expiration sign`, but an ORPort is not set. Fixes bug
+ 40015; bugfix on 0.3.2.1-alpha. Patch by Neel Chauhan.
+
o Minor bugfixes (logging):
+ - Avoid a spurious log message about missing subprotocol versions,
+ when the consensus that we're reading from is older than the
+ current release. Previously we had made this message nonfatal, but
+ in practice, it is never relevant when the consensus is older than
+ the current release. Fixes bug 40281; bugfix on 0.4.0.1-alpha.
+ - Remove trailing whitespace from control event log messages. Fixes
+ bug 32178; bugfix on 0.1.1.1-alpha. Based on a patch by
+ Amadeusz Pawlik.
+ - Turn warning-level log message about SENDME failure into a debug-
+ level message. (This event can happen naturally, and is no reason
+ for concern). Fixes bug 40142; bugfix on 0.4.1.1-alpha.
- Remove a debug logging statement that uselessly spammed the logs.
Fixes bug 40135; bugfix on 0.3.5.0-alpha.
- When logging a rate-limited message about how many messages have
@@ -448,6 +413,11 @@ Changes in version 0.4.5.6 - 2021-02-15
messages started to occur. Fixes bug 19431; bugfix
on 0.2.2.16-alpha.
+ o Minor bugfixes (onion services):
+ - Avoid a non-fatal assertion in certain edge-cases when
+ establishing a circuit to an onion service. Fixes bug 32666;
+ bugfix on 0.3.0.3-alpha.
+
o Minor bugfixes (relay configuration, crash):
- Avoid a fatal assert() when failing to create a listener
connection for an address that was in use. Fixes bug 40073; bugfix
@@ -468,6 +438,11 @@ Changes in version 0.4.5.6 - 2021-02-15
evidence that we're reachable on some other address. Fixes bug
20165; bugfix on 0.1.0.1-rc.
+ o Minor bugfixes (SOCKS5):
+ - Handle partial SOCKS5 messages correctly. Previously, our code
+ would send an incorrect error message if it got a SOCKS5 request
+ that wasn't complete. Fixes bug 40190; bugfix on 0.3.5.1-alpha.
+
o Minor bugfixes (spec conformance):
- Use the correct key type when generating signing->link
certificates. Fixes bug 40124; bugfix on 0.2.7.2-alpha.
@@ -481,6 +456,17 @@ Changes in version 0.4.5.6 - 2021-02-15
protocols_known being set. Fixes bug 34232; bugfix on
0.3.3.2-alpha. Patch by Neel Chauhan.
+ o Minor bugfixes (testing):
+ - Fix the `config/parse_tcp_proxy_line` test so that it works
+ correctly on systems where the DNS provider hijacks invalid
+ queries. Fixes part of bug 40179; bugfix on 0.4.3.1-alpha.
+ - Fix our Python reference-implementation for the v3 onion service
+ handshake so that it works correctly with the version of hashlib
+ provided by Python 3.9. Fixes part of bug 40179; bugfix
+ on 0.3.1.6-rc.
+ - Fix the `tortls/openssl/log_one_error` test to work with OpenSSL
+ 3.0.0. Fixes bug 40170; bugfix on 0.2.8.1-alpha.
+
o Minor bugfixes (v2 onion services):
- For HSFETCH commands on v2 onion services addresses, check the
length of bytes decoded, not the base32 length. Fixes bug 34400;
@@ -566,6 +552,10 @@ Changes in version 0.4.5.6 - 2021-02-15
- Document in depth the circuit subsystem trace events in the new
doc/tracing/EventsCircuit.md. Closes ticket 40036.
+ o Removed features (controller):
+ - Remove the "GETINFO network-status" controller command. It has
+ been deprecated since 0.3.1.1-alpha. Closes ticket 22473.
+
Changes in version 0.4.4.6 - 2020-11-12
Tor 0.4.4.6 is the second stable release in the 0.4.4.x series. It
[View Less]
1
0

[tor/release-0.4.6] 0456 ReleaseNotes: remove entries that appeared in 0.4.4.{6, 7}
by dgoulet@torproject.org 07 May '21
by dgoulet@torproject.org 07 May '21
07 May '21
commit 16954b3ec0bbf16660f5967b0866c4d9f269f11b
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Mon Feb 15 09:52:00 2021 -0500
0456 ReleaseNotes: remove entries that appeared in 0.4.4.{6,7}
---
ChangeLog | 2 +-
ReleaseNotes | 107 +----------------------------------------------------------
2 files changed, 2 insertions(+), 107 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 0deec36d53..a234784d85 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -2,7 +2,7 @@ Changes in …
[View More]version 0.4.5.6 - 2021-02-15
BLURB
Below are the changes since 0.4.4.4-rc. For a complete list of changes
- since 0.4.4.XXXX, see the ReleaseNotes file.
+ since 0.4.4.7, see the ReleaseNotes file.
o Major bugfixes (IPv6, relay):
- Fix a bug that prevented a relay from publishing its descriptor if
diff --git a/ReleaseNotes b/ReleaseNotes
index 9accb4b658..ac1dd796d7 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -5,15 +5,9 @@ changes in each development snapshot, see the ChangeLog file.
Changes in version 0.4.5.6 - 2021-02-15
BLURB
- Below are the changes since 0.4.4.5. For a list only of the changes
+ Below are the changes since 0.4.4.7. For a list only of the changes
since 0.4.5.5-rc, see the ChangeLog file.
- o Major feature (exit):
- - Re-entry into the network is now denied at the Exit level to all
- relays' ORPorts and authorities' ORPorts and DirPorts. This change
- should help mitgate a set of denial-of-service attacks. Closes
- ticket 2667.
-
o Major features (build):
- When building Tor, first link all object files into a single
static library. This may help with embedding Tor in other
@@ -52,27 +46,12 @@ Changes in version 0.4.5.6 - 2021-02-15
to be enabled at configure time. See documentation in
doc/HACKING/Tracing.md. Closes ticket 32910.
- o Major bugfixes (security):
- - When completing a channel, relays now check more thoroughly to
- make sure that it matches any pending circuits before attaching
- those circuits. Previously, address correctness and Ed25519
- identities were not checked in this case, but only when extending
- circuits on an existing channel. Fixes bug 40080; bugfix on
- 0.2.7.2-alpha. Resolves TROVE-2020-005.
-
o Major bugfixes (directory cache, performance, windows):
- Limit the number of items in the consensus diff cache to 64 on
Windows. We hope this will mitigate an issue where Windows relay
operators reported Tor using 100% CPU, while we investigate better
solutions. Fixes bug 24857; bugfix on 0.3.1.1-alpha.
- o Major bugfixes (onion service v3):
- - Stop requiring a live consensus for v3 clients and services, and
- allow a "reasonably live" consensus instead. This allows v3 onion
- services to work even if the authorities fail to generate a
- consensus for more than 2 hours in a row. Fixes bug 40237; bugfix
- on 0.3.5.1-alpha.
-
o Major bugfixes (relay, windows):
- Fix a bug in our implementation of condition variables on Windows.
Previously, a relay on Windows would use 100% CPU after running
@@ -88,11 +67,6 @@ Changes in version 0.4.5.6 - 2021-02-15
and not check for more data until the next mainloop event. Fixes
bug 40006; bugfix on 0.1.0.5-rc.
- o Minor feature (build system):
- - New "make lsp" command to generate the compile_commands.json file
- used by the ccls language server. The "bear" program is needed for
- this. Closes ticket 40227.
-
o Minor features (address discovery):
- If no Address statements are found, relays now prioritize guessing
their address by looking at the local interface instead of the
@@ -124,12 +98,6 @@ Changes in version 0.4.5.6 - 2021-02-15
- If the configure script has given any warnings, remind the user
about them at the end of the script. Related to 40138.
- o Minor features (compilation):
- - Disable deprecation warnings when building with OpenSSL 3.0.0 or
- later. There are a number of APIs newly deprecated in OpenSSL
- 3.0.0 that Tor still requires. (A later version of Tor will try to
- stop depending on these APIs.) Closes ticket 40165.
-
o Minor features (configuration):
- Allow using wildcards (* and ?) with the %include option on
configuration files. Closes ticket 25140. Patch by Daniel Pinto.
@@ -157,30 +125,13 @@ Changes in version 0.4.5.6 - 2021-02-15
address. We keep "GETINFO address" for backwards-compatibility.
Closes ticket 40039. Patch by Neel Chauhan.
- o Minor features (crypto):
- - Fix undefined behavior on our Keccak library. The bug only
- appeared on platforms with 32-byte CPU cache lines (e.g. armv5tel)
- and would result in wrong digests. Fixes bug 40210; bugfix on
- 0.2.8.1-alpha. Thanks to Bernhard Übelacker, Arnd Bergmann and
- weasel for diagnosing this.
-
o Minor features (directory authorities):
- - Authorities now list a different set of protocols as required and
- recommended. These lists have been chosen so that only truly
- recommended and/or required protocols are included, and so that
- clients using 0.2.9 or later will continue to work (even though
- they are not supported), whereas only relays running 0.3.5 or
- later will meet the requirements. Closes ticket 40162.
- Add a new consensus method 30 that removes the unnecessary "="
padding from ntor-onion-key. Closes ticket 7869. Patch by
Daniel Pinto.
- Directory authorities now reject descriptors from relays running
Tor versions from the obsolete 0.4.1 series. Resolves ticket
34357. Patch by Neel Chauhan.
- - Make it possible to specify multiple ConsensusParams torrc lines.
- Now directory authority operators can for example put the main
- ConsensusParams config in one torrc file and then add to it from a
- different torrc file. Closes ticket 40164.
- The AssumeReachable option no longer stops directory authorities
from checking whether other relays are running. A new
AuthDirTestReachability option can be used to disable these
@@ -302,10 +253,6 @@ Changes in version 0.4.5.6 - 2021-02-15
if statistics are enabled. Closes ticket 33263.
o Minor features (subprotocol versions):
- - Tor no longer allows subprotocol versions larger than 63.
- Previously version numbers up to UINT32_MAX were allowed, which
- significantly complicated our code. Implements proposal 318;
- closes ticket 40133.
- Use the new limitations on subprotocol versions due to proposal
318 to simplify our implementation. Part of ticket 40133.
@@ -319,14 +266,6 @@ Changes in version 0.4.5.6 - 2021-02-15
- Added unit tests for channel_matches_target_addr_for_extend().
Closes Ticket 33919. Patch by MrSquanchee.
- o Minor features (tests, v2 onion services):
- - Fix a rendezvous cache unit test that was triggering an underflow
- on the global rend cache allocation. Fixes bug 40125; bugfix
- on 0.2.8.1-alpha.
- - Fix another rendezvous cache unit test that was triggering an
- underflow on the global rend cache allocation. Fixes bug 40126;
- bugfix on 0.2.8.1-alpha.
-
o Minor bugfixes (circuit padding):
- When circpad_send_padding_cell_for_callback is called,
`is_padding_timer_scheduled` flag was not reset. Now it is set to
@@ -349,29 +288,13 @@ Changes in version 0.4.5.6 - 2021-02-15
objects, potentially leading to bugs. Fixes bug 32880; bugfix on
0.2.3.6-alpha. Patch by Neel Chauhan.
- o Minor bugfixes (compatibility):
- - Strip '\r' characters when reading text files on Unix platforms.
- This should resolve an issue where a relay operator migrates a
- relay from Windows to Unix, but does not change the line ending of
- Tor's various state files to match the platform, and the CRLF line
- endings from Windows end up leaking into other files such as the
- extra-info document. Fixes bug 33781; bugfix on 0.0.9pre5.
-
o Minor bugfixes (compilation):
- Change the linker flag ordering in our library search code so that
it works for compilers that need the libraries to be listed in the
right order. Fixes bug 33624; bugfix on 0.1.1.0-alpha.
- - Fix a compilation warning about unreachable fallthrough
- annotations when building with "--enable-all-bugs-are-fatal" on
- some compilers. Fixes bug 40241; bugfix on 0.3.5.4-alpha.
- Fix the "--enable-static-tor" switch to properly set the "-static"
compile option onto the tor binary only. Fixes bug 40111; bugfix
on 0.2.3.1-alpha.
- - Fix compiler warnings that would occur when building with
- "--enable-all-bugs-are-fatal" and "--disable-module-relay" at the
- same time. Fixes bug 40129; bugfix on 0.4.4.1-alpha.
- - Resolve a compilation warning that could occur in
- test_connection.c. Fixes bug 40113; bugfix on 0.2.9.3-alpha.
o Minor bugfixes (configuration):
- Exit Tor on a misconfiguration when the Bridge line is configured
@@ -404,8 +327,6 @@ Changes in version 0.4.5.6 - 2021-02-15
- Turn warning-level log message about SENDME failure into a debug-
level message. (This event can happen naturally, and is no reason
for concern). Fixes bug 40142; bugfix on 0.4.1.1-alpha.
- - Remove a debug logging statement that uselessly spammed the logs.
- Fixes bug 40135; bugfix on 0.3.5.0-alpha.
- When logging a rate-limited message about how many messages have
been suppressed in the last N seconds, give an accurate value for
N, rounded up to the nearest minute. Previously we would report
@@ -418,11 +339,6 @@ Changes in version 0.4.5.6 - 2021-02-15
establishing a circuit to an onion service. Fixes bug 32666;
bugfix on 0.3.0.3-alpha.
- o Minor bugfixes (relay configuration, crash):
- - Avoid a fatal assert() when failing to create a listener
- connection for an address that was in use. Fixes bug 40073; bugfix
- on 0.3.5.1-alpha.
-
o Minor bugfixes (rust, protocol versions):
- Declare support for the onion service introduction point denial of
service extensions when building with Rust. Fixes bug 34248;
@@ -438,11 +354,6 @@ Changes in version 0.4.5.6 - 2021-02-15
evidence that we're reachable on some other address. Fixes bug
20165; bugfix on 0.1.0.1-rc.
- o Minor bugfixes (SOCKS5):
- - Handle partial SOCKS5 messages correctly. Previously, our code
- would send an incorrect error message if it got a SOCKS5 request
- that wasn't complete. Fixes bug 40190; bugfix on 0.3.5.1-alpha.
-
o Minor bugfixes (spec conformance):
- Use the correct key type when generating signing->link
certificates. Fixes bug 40124; bugfix on 0.2.7.2-alpha.
@@ -456,22 +367,6 @@ Changes in version 0.4.5.6 - 2021-02-15
protocols_known being set. Fixes bug 34232; bugfix on
0.3.3.2-alpha. Patch by Neel Chauhan.
- o Minor bugfixes (testing):
- - Fix the `config/parse_tcp_proxy_line` test so that it works
- correctly on systems where the DNS provider hijacks invalid
- queries. Fixes part of bug 40179; bugfix on 0.4.3.1-alpha.
- - Fix our Python reference-implementation for the v3 onion service
- handshake so that it works correctly with the version of hashlib
- provided by Python 3.9. Fixes part of bug 40179; bugfix
- on 0.3.1.6-rc.
- - Fix the `tortls/openssl/log_one_error` test to work with OpenSSL
- 3.0.0. Fixes bug 40170; bugfix on 0.2.8.1-alpha.
-
- o Minor bugfixes (v2 onion services):
- - For HSFETCH commands on v2 onion services addresses, check the
- length of bytes decoded, not the base32 length. Fixes bug 34400;
- bugfix on 0.4.1.1-alpha. Patch by Neel Chauhan.
-
o Code simplification and refactoring:
- Add and use a set of functions to perform down-casts on constant
connection and channel pointers. Closes ticket 40046.
[View Less]
1
0

[tor/release-0.4.6] Merge branch 'maint-0.4.5' into release-0.4.5
by dgoulet@torproject.org 07 May '21
by dgoulet@torproject.org 07 May '21
07 May '21
commit 0330eeb3e35d2092f4d488a38bcca98db4632fc5
Merge: ae1466e103 336c45f1a5
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Mon Feb 15 13:00:38 2021 -0500
Merge branch 'maint-0.4.5' into release-0.4.5
configure.ac | 4 ++--
contrib/win32build/tor-mingw.nsi.in | 2 +-
src/win32/orconfig.h | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
1
0

07 May '21
commit 12aba3ee3ee049407f6a62c5ef537a5326b39842
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Mon Feb 15 10:46:35 2021 -0500
Release blurb and dedication for 0.4.5.6
---
ChangeLog | 17 ++++++++++++++++-
ReleaseNotes | 17 ++++++++++++++++-
2 files changed, 32 insertions(+), 2 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index a234784d85..c91d716c98 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,5 +1,20 @@
Changes in version 0.4.5.6 - 2021-02-15
- BLURB
+ The Tor 0.…
[View More]4.5.x release series is dedicated to the memory of Karsten
+ Loesing (1979-2020), Tor developer, cypherpunk, husband, and father.
+ Karsten is best known for creating the Tor metrics portal and leading
+ the metrics team, but he was involved in Tor from the early days. For
+ example, while he was still a student he invented and implemented the
+ v2 onion service directory design, and he also served as an ambassador
+ to the many German researchers working in the anonymity field. We
+ loved him and respected him for his patience, his consistency, and his
+ welcoming approach to growing our community.
+
+ This release series introduces significant improvements in relay IPv6
+ address discovery, a new "MetricsPort" mechanism for relay operators
+ to measure performance, LTTng support, build system improvements to
+ help when using Tor as a static library, and significant bugfixes
+ related to Windows relay performance. It also includes numerous
+ smaller features and bugfixes.
Below are the changes since 0.4.4.4-rc. For a complete list of changes
since 0.4.4.7, see the ReleaseNotes file.
diff --git a/ReleaseNotes b/ReleaseNotes
index ac1dd796d7..e8e00fb8a1 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -3,7 +3,22 @@ release of Tor. If you want to see more detailed descriptions of the
changes in each development snapshot, see the ChangeLog file.
Changes in version 0.4.5.6 - 2021-02-15
- BLURB
+ The Tor 0.4.5.x release series is dedicated to the memory of Karsten
+ Loesing (1979-2020), Tor developer, cypherpunk, husband, and
+ father. Karsten is best known for creating the Tor metrics portal and
+ leading the metrics team, but he was involved in Tor from the early
+ days. For example, while he was still a student he invented and implemented
+ the v2 onion service directory design, and he also served as an ambassador
+ to the many German researchers working in the anonymity field. We loved him
+ and respected him for his patience, his consistency, and his welcoming
+ approach to growing our community.
+
+ This release series introduces significant improvements in relay IPv6
+ address discovery, a new "MetricsPort" mechanism for relay operators to
+ measure performance, LTTng support, build system improvements to help when
+ using Tor as a static library, and significant bugfixes related to
+ Windows relay performance. It also includes numerous smaller features and
+ bugfixes.
Below are the changes since 0.4.4.7. For a list only of the changes
since 0.4.5.5-rc, see the ChangeLog file.
[View Less]
1
0
commit f825184e72286fe5017b5fe4cece2b3fb9d7599f
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Fri Feb 12 14:08:46 2021 -0500
Begin releasenotes for 0456
---
ReleaseNotes | 693 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 693 insertions(+)
diff --git a/ReleaseNotes b/ReleaseNotes
index 2ce9ceaa90..0aea431e33 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -2,6 +2,699 @@ This document summarizes new features and bugfixes in each stable
…
[View More]release of Tor. If you want to see more detailed descriptions of the
changes in each development snapshot, see the ChangeLog file.
+Changes in version 0.4.5.6 - 2021-02-15
+ BLURB
+
+ Below are the changes since 0.4.4.XXXX. For a complete list of changes
+ since 0.4.5.5-rc, see the ChangeLog file.
+
+ o Major bugfixes (IPv6, relay):
+ - Fix a bug that prevented a relay from publishing its descriptor if
+ an auto-discovered IPv6 that was found unreachable. Fixes bug
+ 40279; bugfix on 0.4.5.1-alpha.
+
+ o Minor features (protocol versions):
+ - Stop claiming to support the "DirCache=1" subprotocol version.
+ Technically, we stopped supporting this subprotocol back in
+ 0.4.5.1-alpha, but we needed to wait for the authorities to stop
+ listing it as "required" before we could drop it from the list.
+ Closes ticket 40221.
+
+ o Minor bugfixes (logging):
+ - Avoid a spurious log message about missing subprotocol versions,
+ when the consensus that we're reading from is older than the
+ current release. Previously we had made this message nonfatal, but
+ in practice, it is never relevant when the consensus is older than
+ the current release. Fixes bug 40281; bugfix on 0.4.0.1-alpha.
+
+ o Minor bugfixes (metrics port):
+ - Fix a bug warning when a metrics port socket was unexpectedly
+ closed. Fixes bug 40257; bugfix on 0.4.5.1-alpha
+
+ o Minor bugfixes (relay):
+ - Allow relays to have a RFC1918 address if PublishServerDescriptor
+ is set to 0 and AssumeReachable is set to 1. This is to support
+ the use case of a bridge on a local network, exposed via a
+ pluggable transport. Fixes bug 40208; bugfix on 0.4.5.1-alpha.
+
+ o Minor bugfixes (relay, config):
+ - Fix a problem in the removal of duplicate ORPorts from the
+ internal port list when loading the config file. We were removing
+ the wrong ports, breaking valid torrc uses cases for multiple
+ ORPorts of the same address family. Fixes bug 40289; bugfix
+ on 0.4.5.1-alpha.
+
+ o Major feature (exit):
+ - Re-entry into the network is now denied at the Exit level to all
+ relays' ORPorts and authorities' ORPorts and DirPorts. This change
+ should help mitgate a set of denial-of-service attacks. Closes
+ ticket 2667.
+
+ o Minor bugfixes (relay, configuration):
+ - Don't attempt to discover our address (IPv4 or IPv6) if no ORPort
+ for it can be found in the configuration. Fixes bug 40254; bugfix
+ on 0.4.5.1-alpha.
+
+
+ o Major bugfixes (authority, IPv6):
+ - Do not consider multiple relays in the same IPv6 /64 network to be
+ sybils. Fixes bug 40243; bugfix on 0.4.5.1-alpha.
+
+ o Major bugfixes (directory cache, performance, windows):
+ - Limit the number of items in the consensus diff cache to 64 on
+ Windows. We hope this will mitigate an issue where Windows relay
+ operators reported Tor using 100% CPU, while we investigate better
+ solutions. Fixes bug 24857; bugfix on 0.3.1.1-alpha.
+
+ o Minor feature (build system):
+ - New "make lsp" command to generate the compile_commands.json file
+ used by the ccls language server. The "bear" program is needed for
+ this. Closes ticket 40227.
+
+ o Minor features (authority, logging):
+ - Log more information for directory authority operators during the
+ consensus voting process, and while processing relay descriptors.
+ Closes ticket 40245.
+ - Reject obsolete router/extrainfo descriptors earlier and more
+ quietly, to avoid spamming the logs. Fixes bug 40238; bugfix
+ on 0.4.5.1-alpha.
+
+ o Minor bugfixes (compilation):
+ - Fix another warning about unreachable fallthrough annotations when
+ building with "--enable-all-bugs-are-fatal" on some compilers.
+ Fixes bug 40241; bugfix on 0.4.5.3-rc.
+ - Change the linker flag ordering in our library search code so that
+ it works for compilers that need the libraries to be listed in the
+ right order. Fixes bug 33624; bugfix on 0.1.1.0-alpha.
+
+ o Minor bugfixes (config, bridge):
+ - Don't initiate a connection to a bridge configured to use a
+ missing transport. This change reverts an earlier fix that would
+ try to avoid such situations during configuration chcecking, but
+ which doesn't work with DisableNetwork. Fixes bug 40106; bugfix
+ on 0.4.5.1-alpha.
+
+ o Minor bugfixes (onion services):
+ - Avoid a non-fatal assertion in certain edge-cases when
+ establishing a circuit to an onion service. Fixes bug 32666;
+ bugfix on 0.3.0.3-alpha.
+
+ o Minor bugfixes (relay):
+ - If we were unable to build our descriptor, don't mark it as having
+ been advertised. Also remove an harmless BUG(). Fixes bug 40231;
+ bugfix on 0.4.5.1-alpha.
+
+
+ o Major bugfixes (onion service v3):
+ - Stop requiring a live consensus for v3 clients and services, and
+ allow a "reasonably live" consensus instead. This allows v3 onion
+ services to work even if the authorities fail to generate a
+ consensus for more than 2 hours in a row. Fixes bug 40237; bugfix
+ on 0.3.5.1-alpha.
+
+ o Minor features (crypto):
+ - Fix undefined behavior on our Keccak library. The bug only
+ appeared on platforms with 32-byte CPU cache lines (e.g. armv5tel)
+ and would result in wrong digests. Fixes bug 40210; bugfix on
+ 0.2.8.1-alpha. Thanks to Bernhard Übelacker, Arnd Bergmann and
+ weasel for diagnosing this.
+
+ o Minor features (documentation):
+ - Mention the "!badexit" directive that can appear in an authority's
+ approved-routers file, and update the description of the
+ "!invalid" directive. Closes ticket 40188.
+
+ o Minor bugfixes (compilation):
+ - Fix a compilation warning about unreachable fallthrough
+ annotations when building with "--enable-all-bugs-are-fatal" on
+ some compilers. Fixes bug 40241; bugfix on 0.3.5.4-alpha.
+ - Fix the "--enable-static-tor" switch to properly set the "-static"
+ compile option onto the tor binary only. Fixes bug 40111; bugfix
+ on 0.2.3.1-alpha.
+
+ o Minor bugfixes (config, bridge):
+ - Really fix the case where torrc has a missing ClientTransportPlugin
+ but is configured with a Bridge line and UseBridges. Previously,
+ we didn't look at the managed proxy list and thus would fail for
+ the "exec" case. Fixes bug 40106; bugfix on 0.4.5.1-alpha.
+
+ o Minor bugfixes (logging, relay):
+ - Log our address as reported by the directory authorities, if none
+ was configured or detected before. Fixes bug 40201; bugfix
+ on 0.4.5.1-alpha.
+ - When a launching bandwidth testing circuit, don't incorrectly call
+ it a reachability test, or trigger a "CHECKING_REACHABILITY"
+ control event. Fixes bug 40205; bugfix on 0.4.5.1-alpha.
+
+ o Minor bugfixes (relay, statistics):
+ - Report the correct connection statistics in our extrainfo
+ documents. Previously there was a problem in the file loading
+ function which would wrongly truncate a state file, causing the
+ wrong information to be reported. Fixes bug 40226; bugfix
+ on 0.4.5.1-alpha.
+
+ o Minor bugfixes (SOCKS5):
+ - Handle partial SOCKS5 messages correctly. Previously, our code
+ would send an incorrect error message if it got a SOCKS5 request
+ that wasn't complete. Fixes bug 40190; bugfix on 0.3.5.1-alpha.
+
+
+
+ o Major bugfixes (relay, windows):
+ - Fix a bug in our implementation of condition variables on Windows.
+ Previously, a relay on Windows would use 100% CPU after running
+ for some time. Because of this change, Tor now require Windows
+ Vista or later to build and run. Fixes bug 30187; bugfix on
+ 0.2.6.3-alpha. (This bug became more serious in 0.3.1.1-alpha with
+ the introduction of consensus diffs.) Patch by Daniel Pinto.
+
+ o Minor features (compilation):
+ - Disable deprecation warnings when building with OpenSSL 3.0.0 or
+ later. There are a number of APIs newly deprecated in OpenSSL
+ 3.0.0 that Tor still requires. (A later version of Tor will try to
+ stop depending on these APIs.) Closes ticket 40165.
+
+ o Minor features (protocol, proxy support, defense in depth):
+ - Respond more deliberately to misbehaving proxies that leave
+ leftover data on their connections, so as to make Tor even less
+ likely to allow the proxies to pass their data off as having come
+ from a relay. Closes ticket 40017.
+
+ o Minor features (safety):
+ - Log a warning at startup if Tor is built with compile-time options
+ that are likely to make it less stable or reliable. Closes
+ ticket 18888.
+
+ o Minor bugfixes (circuit, handshake):
+ - In the v3 handshaking code, use connection_or_change_state() to
+ change the state. Previously, we changed the state directly, but
+ this did not pass the state change to the pubsub or channel
+ objects, potentially leading to bugs. Fixes bug 32880; bugfix on
+ 0.2.3.6-alpha. Patch by Neel Chauhan.
+
+ o Minor bugfixes (compilation):
+ - Use the correct 'ranlib' program when building libtor.a.
+ Previously we used the default ranlib, which broke some kinds of
+ cross-compilation. Fixes bug 40172; bugfix on 0.4.5.1-alpha.
+ - Remove a duplicate typedef in metrics_store.c. Fixes bug 40177;
+ bugfix on 0.4.5.1-alpha.
+ - When USDT tracing is enabled, and STAP_PROBEV() is missing, don't
+ attempt to build. Linux supports that macro but not the BSDs.
+ Fixes bug 40174; bugfix on 0.4.5.1-alpha.
+
+ o Minor bugfixes (configuration):
+ - Exit Tor on a misconfiguration when the Bridge line is configured
+ to use a transport but no corresponding ClientTransportPlugin can
+ be found. Prior to this fix, Tor would attempt to connect to the
+ bridge directly without using the transport, making it easier for
+ adversaries to notice the bridge. Fixes bug 25528; bugfix
+ on 0.2.6.1-alpha.
+ - Fix an issue where an ORPort was compared with other kinds of
+ ports, when it should have been only checked against other
+ ORPorts. This bug would lead to "DirPort auto" getting ignored.
+ Fixes bug 40195; bugfix on 0.4.5.1-alpha.
+ - Fix a bug where a second non-ORPort with a variant family (ex:
+ SocksPort [::1]:9050) would be ignored due to a configuration
+ parsing error. Fixes bug 40183; bugfix on 0.4.5.1-alpha.
+
+ o Minor bugfixes (crash, relay, signing key):
+ - Avoid assertion failures when we run Tor from the command line
+ with `--key-expiration sign`, but an ORPort is not set. Fixes bug
+ 40015; bugfix on 0.3.2.1-alpha. Patch by Neel Chauhan.
+
+ o Minor bugfixes (logging):
+ - Remove trailing whitespace from control event log messages. Fixes
+ bug 32178; bugfix on 0.1.1.1-alpha. Based on a patch by
+ Amadeusz Pawlik.
+ - Turn warning-level log message about SENDME failure into a debug-
+ level message. (This event can happen naturally, and is no reason
+ for concern). Fixes bug 40142; bugfix on 0.4.1.1-alpha.
+
+ o Minor bugfixes (relay, address discovery):
+ - Don't trigger an IP change when no new valid IP can be found.
+ Fixes bug 40071; bugfix on 0.4.5.1-alpha.
+ - When attempting to discover our IP, use a simple test circuit,
+ rather than a descriptor fetch: the same address information is
+ present in NETINFO cells, and is better authenticated there. Fixes
+ bug 40071; bugfix on 0.4.5.1-alpha.
+
+ o Minor bugfixes (testing):
+ - Fix the `config/parse_tcp_proxy_line` test so that it works
+ correctly on systems where the DNS provider hijacks invalid
+ queries. Fixes part of bug 40179; bugfix on 0.4.3.1-alpha.
+ - Fix unit tests that used newly generated list of routers so that
+ they check them with respect to the date when they were generated,
+ not with respect to the current time. Fixes bug 40187; bugfix
+ on 0.4.5.1-alpha.
+ - Fix our Python reference-implementation for the v3 onion service
+ handshake so that it works correctly with the version of hashlib
+ provided by Python 3.9. Fixes part of bug 40179; bugfix
+ on 0.3.1.6-rc.
+ - Fix the `tortls/openssl/log_one_error` test to work with OpenSSL
+ 3.0.0. Fixes bug 40170; bugfix on 0.2.8.1-alpha.
+
+ o Removed features (controller):
+ - Remove the "GETINFO network-status" controller command. It has
+ been deprecated since 0.3.1.1-alpha. Closes ticket 22473.
+
+Changes in version 0.4.5.1-alpha - 2020-11-01
+ Tor 0.4.5.1-alpha is the first alpha release in the 0.4.5.x series. It
+ improves support for IPv6, address discovery and self-testing, code
+ metrics and tracing.
+
+ This release also fixes TROVE-2020-005, a security issue that could be
+ used, under certain cases, by an adversary to observe traffic patterns
+ on a limited number of circuits intended for a different relay. To
+ mount this attack, the adversary would need to actively extend
+ circuits to an incorrect address, as well as compromise a relay's
+ legacy RSA-1024 key. We'll be backporting this fix to other release
+ series soon, after it has had some testing.
+
+ Here are the changes since 0.4.4.5.
+
+ o Major features (build):
+ - When building Tor, first link all object files into a single
+ static library. This may help with embedding Tor in other
+ programs. Note that most Tor functions do not constitute a part of
+ a stable or supported API: only those functions in tor_api.h
+ should be used if embedding Tor. Closes ticket 40127.
+
+ o Major features (metrics):
+ - Introduce a new MetricsPort which exposes, through an HTTP
+ interface, a series of metrics that tor collects at runtime. At
+ the moment, the only supported output format is Prometheus data
+ model. Closes ticket 40063. See the manual page for more
+ information and security considerations.
+ o Major features (relay, IPv6):
+ - The torrc option Address now supports IPv6. This unifies our
+ address discovery interface to support IPv4, IPv6, and hostnames.
+ Closes ticket 33233.
+ - Launch IPv4 and IPv6 ORPort self-test circuits on relays and
+ bridges. Closes ticket 33222.
+ - Relays now automatically bind on IPv6 for their ORPort, unless
+ specified otherwise with the IPv4Only flag. Closes ticket 33246.
+ - When a relay with IPv6 support is told to open a connection to
+ another relay, and the extend cell lists both IPv4 and IPv6
+ addresses, the first relay now picks randomly which address to
+ use. Closes ticket 33220.
+ - Relays now track their IPv6 ORPort reachability separately from
+ the reachability of their IPv4 ORPort. They will not publish a
+ descriptor unless _both_ ports appear to be externally reachable.
+ Closes ticket 34067.
+
+ o Major features (tracing):
+ - Add event-tracing library support for USDT and LTTng-UST, and a
+ few tracepoints in the circuit subsystem. More will come
+ incrementally. This feature is compiled out by default: it needs
+ to be enabled at configure time. See documentation in
+ doc/HACKING/Tracing.md. Closes ticket 32910.
+
+ o Major bugfixes (security):
+ - When completing a channel, relays now check more thoroughly to
+ make sure that it matches any pending circuits before attaching
+ those circuits. Previously, address correctness and Ed25519
+ identities were not checked in this case, but only when extending
+ circuits on an existing channel. Fixes bug 40080; bugfix on
+ 0.2.7.2-alpha. Resolves TROVE-2020-005.
+
+ o Major bugfixes (TLS, buffer):
+ - When attempting to read N bytes on a TLS connection, really try to
+ read all N bytes. Previously, Tor would stop reading after the
+ first TLS record, which can be smaller than the N bytes requested,
+ and not check for more data until the next mainloop event. Fixes
+ bug 40006; bugfix on 0.1.0.5-rc.
+
+ o Minor features (address discovery):
+ - If no Address statements are found, relays now prioritize guessing
+ their address by looking at the local interface instead of the
+ local hostname. If the interface address can't be found, the local
+ hostname is used. Closes ticket 33238.
+
+ o Minor features (admin tools):
+ - Add a new --format argument to -key-expiration option to allow
+ specifying the time format of the expiration date. Adds Unix
+ timestamp format support. Patch by Daniel Pinto. Closes
+ ticket 30045.
+
+ o Minor features (bootstrap reporting):
+ - When reporting bootstrapping status on a relay, do not consider
+ connections that have never been the target of an origin circuit.
+ Previously, all connection failures were treated as potential
+ bootstrapping failures, including connections that had been opened
+ because of client requests. Closes ticket 25061.
+
+ o Minor features (build):
+ - When running the configure script, try to detect version
+ mismatches between the OpenSSL headers and libraries, and suggest
+ that the user should try "--with-openssl-dir". Closes 40138.
+ - If the configure script has given any warnings, remind the user
+ about them at the end of the script. Related to 40138.
+
+ o Minor features (configuration):
+ - Allow using wildcards (* and ?) with the %include option on
+ configuration files. Closes ticket 25140. Patch by Daniel Pinto.
+ - Allow the configuration options EntryNodes, ExcludeNodes,
+ ExcludeExitNodes, ExitNodes, MiddleNodes, HSLayer2Nodes and
+ HSLayer3Nodes to be specified multiple times. Closes ticket 28361.
+ Patch by Daniel Pinto.
+
+ o Minor features (control port):
+ - Add a DROPTIMEOUTS command to drop circuit build timeout history
+ and reset the current timeout. Closes ticket 40002.
+ - When a stream enters the AP_CONN_STATE_CONTROLLER_WAIT status,
+ send a control port event. Closes ticket 32190. Patch by
+ Neel Chauhan.
+ - Introduce GETINFO "stats/ntor/{assigned/requested}" and
+ "stats/tap/{assigned/requested}" to get the NTor and TAP circuit
+ onion handshake counts respectively. Closes ticket 28279. Patch by
+ Neel Chauhan.
+
+ o Minor features (control port, IPv6):
+ - Tor relays now try to report to the controller when they are
+ launching an IPv6 self-test. Closes ticket 34068.
+ - Introduce "GETINFO address/v4" and "GETINFO address/v6" in the
+ control port to fetch the Tor host's respective IPv4 or IPv6
+ address. We keep "GETINFO address" for backwards-compatibility.
+ Closes ticket 40039. Patch by Neel Chauhan.
+
+ o Minor features (directory authorities):
+ - Authorities now list a different set of protocols as required and
+ recommended. These lists have been chosen so that only truly
+ recommended and/or required protocols are included, and so that
+ clients using 0.2.9 or later will continue to work (even though
+ they are not supported), whereas only relays running 0.3.5 or
+ later will meet the requirements. Closes ticket 40162.
+ - Add a new consensus method 30 that removes the unnecessary "="
+ padding from ntor-onion-key. Closes ticket 7869. Patch by
+ Daniel Pinto.
+ - Directory authorities now reject descriptors from relays running
+ Tor versions from the obsolete 0.4.1 series. Resolves ticket
+ 34357. Patch by Neel Chauhan.
+ - Make it possible to specify multiple ConsensusParams torrc lines.
+ Now directory authority operators can for example put the main
+ ConsensusParams config in one torrc file and then add to it from a
+ different torrc file. Closes ticket 40164.
+ - The AssumeReachable option no longer stops directory authorities
+ from checking whether other relays are running. A new
+ AuthDirTestReachability option can be used to disable these
+ checks. Closes ticket 34445.
+ - When looking for possible Sybil attacks, also consider IPv6
+ addresses. Two routers are considered to have "the same" address
+ by this metric if they are in the same /64 network. Patch from
+ Maurice Pibouin. Closes ticket 7193.
+
+ o Minor features (directory authorities, IPv6):
+ - Make authorities add their IPv6 ORPort (if any) to the trusted
+ servers list. Authorities previously added only their IPv4
+ addresses. Closes ticket 32822.
+
+ o Minor features (ed25519, relay):
+ - Save a relay's base64-encoded ed25519 identity key to the data
+ directory in a file named fingerprint-ed25519. Closes ticket
+ 30642. Patch by Neel Chauhan.
+
+ o Minor features (heartbeat):
+ - Include the total number of inbound and outbound IPv4 and IPv6
+ connections in the heartbeat message. Closes ticket 29113.
+
+ o Minor features (IPv6, ExcludeNodes):
+ - Handle IPv6 addresses in ExcludeNodes; previously they were
+ ignored. Closes ticket 34065. Patch by Neel Chauhan.
+
+ o Minor features (logging):
+ - Add the running glibc version to the log, and the compiled glibc
+ version to the library list returned when using --library-versions.
+ Patch from Daniel Pinto. Closes ticket 40047.
+ - Consider an HTTP 301 response to be an error (like a 404) when
+ processing a directory response. Closes ticket 40053.
+ - Log directory fetch statistics as a single line. Closes
+ ticket 40159.
+ - Provide more complete descriptions of our connections when logging
+ about them. Closes ticket 40041.
+ - When describing a relay in the logs, we now include its ed25519
+ identity. Closes ticket 22668.
+
+ o Minor features (onion services):
+ - Only overwrite an onion service's existing hostname file if its
+ contents are wrong. This enables read-only onion-service
+ directories. Resolves ticket 40062. Patch by Neel Chauhan.
+
+ o Minor features (pluggable transports):
+ - Add an OutboundBindAddressPT option to allow users to specify
+ which IPv4 and IPv6 address pluggable transports should use for
+ outgoing IP packets. Tor does not have a way to enforce that the
+ pluggable transport honors this option, so each pluggable transport
+ needs to implement support on its own. Closes ticket 5304.
+
+ o Minor features (relay address tracking):
+ - We now store relay addresses for OR connections in a more logical
+ way. Previously we would sometimes overwrite the actual address of
+ a connection with a "canonical address", and then store the "real
+ address" elsewhere to remember it. We now track the "canonical
+ address" elsewhere for the cases where we need it, and leave the
+ connection's address alone. Closes ticket 33898.
+
+ o Minor features (relay):
+ - If a relay is unable to discover its address, attempt to learn it
+ from the NETINFO cell. Closes ticket 40022.
+ - Log immediately when launching a relay self-check. Previously we
+ would try to log before launching checks, or approximately when we
+ intended to launch checks, but this tended to be error-prone.
+ Closes ticket 34137.
+
+ o Minor features (relay, address discovery):
+ - If Address option is not found in torrc, attempt to learn our
+ address with the configured ORPort address if any. Closes
+ ticket 33236.
+
+ o Minor features (relay, IPv6):
+ - Add an AssumeReachableIPv6 option to disable self-checking IPv6
+ reachability. Closes part of ticket 33224.
+ - Add new "assume-reachable" and "assume-reachable-ipv6" consensus
+ parameters to be used in an emergency to tell relays that they
+ should publish even if they cannot complete their ORPort self-
+ checks. Closes ticket 34064 and part of 33224.
+ - Allow relays to send IPv6-only extend cells. Closes ticket 33222.
+ - Declare support for the Relay=3 subprotocol version. Closes
+ ticket 33226.
+ - When launching IPv6 ORPort self-test circuits, make sure that the
+ second-last hop can initiate an IPv6 extend. Closes ticket 33222.
+
+ o Minor features (specification update):
+ - Several fields in microdescriptors, router descriptors, and
+ consensus documents that were formerly optional are now required.
+ Implements proposal 315; closes ticket 40132.
+
+ o Minor features (state management):
+ - When loading the state file, remove entries from the statefile
+ that have been obsolete for a long time. Ordinarily Tor preserves
+ unrecognized entries in order to keep forward-compatibility, but
+ these entries have not actually been used in any release since
+ before 0.3.5.x. Closes ticket 40137.
+
+ o Minor features (statistics, ipv6):
+ - Relays now publish IPv6-specific counts of single-direction versus
+ bidirectional relay connections. Closes ticket 33264.
+ - Relays now publish their IPv6 read and write statistics over time,
+ if statistics are enabled. Closes ticket 33263.
+
+ o Minor features (subprotocol versions):
+ - Tor no longer allows subprotocol versions larger than 63.
+ Previously version numbers up to UINT32_MAX were allowed, which
+ significantly complicated our code. Implements proposal 318;
+ closes ticket 40133.
+ - Use the new limitations on subprotocol versions due to proposal
+ 318 to simplify our implementation. Part of ticket 40133.
+
+ o Minor features (testing configuration):
+ - The TestingTorNetwork option no longer implicitly sets
+ AssumeReachable to 1. This change allows us to test relays' self-
+ testing mechanisms, and to test authorities' relay-testing
+ functionality. Closes ticket 34446.
+
+ o Minor features (testing):
+ - Added unit tests for channel_matches_target_addr_for_extend().
+ Closes Ticket 33919. Patch by MrSquanchee.
+
+ o Minor features (tests, v2 onion services):
+ - Fix a rendezvous cache unit test that was triggering an underflow
+ on the global rend cache allocation. Fixes bug 40125; bugfix
+ on 0.2.8.1-alpha.
+ - Fix another rendezvous cache unit test that was triggering an
+ underflow on the global rend cache allocation. Fixes bug 40126;
+ bugfix on 0.2.8.1-alpha.
+
+ o Minor bugfixes (circuit padding):
+ - When circpad_send_padding_cell_for_callback is called,
+ `is_padding_timer_scheduled` flag was not reset. Now it is set to
+ 0 at the top of that function. Fixes bug 32671; bugfix
+ on 0.4.0.1-alpha.
+ - Add a per-circuit padding machine instance counter, so we can
+ differentiate between shutdown requests for old machines on a
+ circuit. Fixes bug 30992; bugfix on 0.4.1.1-alpha.
+ - Add the ability to keep circuit padding machines if they match a
+ set of circuit states or purposes. This allows us to have machines
+ that start up under some conditions but don't shut down under
+ others. We now use this mask to avoid starting up introduction
+ circuit padding again after the machines have already completed.
+ Fixes bug 32040; bugfix on 0.4.1.1-alpha.
+
+ o Minor bugfixes (compatibility):
+ - Strip '\r' characters when reading text files on Unix platforms.
+ This should resolve an issue where a relay operator migrates a
+ relay from Windows to Unix, but does not change the line ending of
+ Tor's various state files to match the platform, and the CRLF line
+ endings from Windows end up leaking into other files such as the
+ extra-info document. Fixes bug 33781; bugfix on 0.0.9pre5.
+
+ o Minor bugfixes (compilation):
+ - Fix compiler warnings that would occur when building with
+ "--enable-all-bugs-are-fatal" and "--disable-module-relay" at the
+ same time. Fixes bug 40129; bugfix on 0.4.4.1-alpha.
+ - Resolve a compilation warning that could occur in
+ test_connection.c. Fixes bug 40113; bugfix on 0.2.9.3-alpha.
+
+ o Minor bugfixes (configuration):
+ - Fix bug where %including a pattern ending with */ would include
+ files and folders (instead of folders only) in versions of glibc <
+ 2.19. Fixes bug 40141; bugfix on 0.4.5.0-alpha-dev. Patch by
+ Daniel Pinto.
+
+ o Minor bugfixes (control port):
+ - Make sure we send the SOCKS request address in relay begin cells
+ when a stream is attached with the purpose
+ CIRCUIT_PURPOSE_CONTROLLER. Fixes bug 33124; bugfix on 0.0.5.
+ Patch by Neel Chauhan.
+
+ o Minor bugfixes (logging):
+ - Remove a debug logging statement that uselessly spammed the logs.
+ Fixes bug 40135; bugfix on 0.3.5.0-alpha.
+ - When logging a rate-limited message about how many messages have
+ been suppressed in the last N seconds, give an accurate value for
+ N, rounded up to the nearest minute. Previously we would report
+ the size of the rate-limiting interval, regardless of when the
+ messages started to occur. Fixes bug 19431; bugfix
+ on 0.2.2.16-alpha.
+
+ o Minor bugfixes (relay configuration, crash):
+ - Avoid a fatal assert() when failing to create a listener
+ connection for an address that was in use. Fixes bug 40073; bugfix
+ on 0.3.5.1-alpha.
+
+ o Minor bugfixes (rust, protocol versions):
+ - Declare support for the onion service introduction point denial of
+ service extensions when building with Rust. Fixes bug 34248;
+ bugfix on 0.4.2.1-alpha.
+ - Make Rust protocol version support checks consistent with the
+ undocumented error behavior of the corresponding C code. Fixes bug
+ 34251; bugfix on 0.3.3.5-rc.
+
+ o Minor bugfixes (self-testing):
+ - When receiving an incoming circuit, only accept it as evidence
+ that we are reachable if the declared address of its channel is
+ the same address we think that we have. Otherwise, it could be
+ evidence that we're reachable on some other address. Fixes bug
+ 20165; bugfix on 0.1.0.1-rc.
+
+ o Minor bugfixes (spec conformance):
+ - Use the correct key type when generating signing->link
+ certificates. Fixes bug 40124; bugfix on 0.2.7.2-alpha.
+
+ o Minor bugfixes (subprotocol versions):
+ - Consistently reject extra commas, instead of only rejecting
+ leading commas. Fixes bug 27194; bugfix on 0.2.9.4-alpha.
+ - In summarize_protover_flags(), treat empty strings the same as
+ NULL. This prevents protocols_known from being set. Previously, we
+ treated empty strings as normal strings, which led to
+ protocols_known being set. Fixes bug 34232; bugfix on
+ 0.3.3.2-alpha. Patch by Neel Chauhan.
+
+ o Minor bugfixes (v2 onion services):
+ - For HSFETCH commands on v2 onion services addresses, check the
+ length of bytes decoded, not the base32 length. Fixes bug 34400;
+ bugfix on 0.4.1.1-alpha. Patch by Neel Chauhan.
+
+ o Code simplification and refactoring:
+ - Add and use a set of functions to perform down-casts on constant
+ connection and channel pointers. Closes ticket 40046.
+ - Refactor our code that logs descriptions of connections, channels,
+ and the peers on them, to use a single call path. This change
+ enables us to refactor the data types that they use, and eliminates
+ many confusing usages of those types. Closes ticket 40041.
+ - Refactor some common node selection code into a single function.
+ Closes ticket 34200.
+ - Remove the now-redundant 'outbuf_flushlen' field from our
+ connection type. It was previously used for an older version of
+ our rate-limiting logic. Closes ticket 33097.
+ - Rename "fascist_firewall_*" identifiers to "reachable_addr_*"
+ instead, for consistency with other code. Closes ticket 18106.
+ - Rename functions about "advertised" ports which are not in fact
+ guaranteed to return the ports that have been advertised. Closes
+ ticket 40055.
+ - Split implementation of several command line options from
+ options_init_from_torrc into smaller isolated functions. Patch by
+ Daniel Pinto. Closes ticket 40102.
+ - When an extend cell is missing an IPv4 or IPv6 address, fill in
+ the address from the extend info. This is similar to what was done
+ in ticket 33633 for ed25519 keys. Closes ticket 33816. Patch by
+ Neel Chauhan.
+
+ o Deprecated features:
+ - The "non-builtin" argument to the "--dump-config" command is now
+ deprecated. When it works, it behaves the same as "short", which
+ you should use instead. Closes ticket 33398.
+
+ o Documentation:
+ - Replace URLs from our old bugtracker so that they refer to the new
+ bugtracker and wiki. Closes ticket 40101.
+
+ o Removed features:
+ - We no longer ship or build a "tor.service" file for use with
+ systemd. No distribution included this script unmodified, and we
+ don't have the expertise ourselves to maintain this in a way that
+ all the various systemd-based distributions can use. Closes
+ ticket 30797.
+ - We no longer ship support for the Android logging API. Modern
+ versions of Android can use the syslog API instead. Closes
+ ticket 32181.
+ - The "optimistic data" feature is now always on; there is no longer
+ an option to disable it from the torrc file or from the consensus
+ directory. Closes part of 40139.
+ - The "usecreatefast" network parameter is now removed; there is no
+ longer an option for authorities to turn it off. Closes part
+ of 40139.
+
+ o Testing:
+ - Add unit tests for bandwidth statistics manipulation functions.
+ Closes ticket 33812. Patch by MrSquanchee.
+
+ o Code simplification and refactoring (autoconf):
+ - Remove autoconf checks for unused funcs and headers. Closes ticket
+ 31699; Patch by @bduszel
+
+ o Code simplification and refactoring (maintainer scripts):
+ - Disable by default the pre-commit hook. Use the environment
+ variable TOR_EXTRA_PRE_COMMIT_CHECKS in order to run it.
+ Furthermore, stop running practracker in the pre-commit hook and
+ make check-local. Closes ticket 40019.
+
+ o Code simplification and refactoring (relay address):
+ - Most of IPv4 representation was using "uint32_t". It has now been
+ moved to use the internal "tor_addr_t" interface instead. This is
+ so we can properly integrate IPv6 along IPv4 with common
+ interfaces. Closes ticket 40043.
+
+ o Documentation (manual page):
+ - Move them from doc/ to doc/man/. Closes ticket 40044.
+ - Describe the status of the "Sandbox" option more accurately. It is
+ no longer "experimental", but it _is_ dependent on kernel and libc
+ versions. Closes ticket 23378.
+
+ o Documentation (tracing):
+ - Document in depth the circuit subsystem trace events in the new
+ doc/tracing/EventsCircuit.md. Closes ticket 40036.
+
+
Changes in version 0.4.4.6 - 2020-11-12
Tor 0.4.4.6 is the second stable release in the 0.4.4.x series. It
backports fixes from later releases, including a fix for TROVE-2020-
[View Less]
1
0