commit 6cb1daf062df525224ee7e3f7cd63ee858aacf9f Author: Nick Mathewson nickm@torproject.org Date: Wed Dec 31 13:09:09 2014 -0500
edit the changelog one last time --- ChangeLog | 103 ++++++++++++++++++++++++++++--------------------------------- 1 file changed, 48 insertions(+), 55 deletions(-)
diff --git a/ChangeLog b/ChangeLog index f1d338e..70e42de 100644 --- a/ChangeLog +++ b/ChangeLog @@ -11,9 +11,9 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 should now bootstrap in seconds, rather than minutes.
o Major features (relay, infrastructure): - - Completely revision of the code that relays use to decide which - cell to send next. Formerly, we selected the best circuit to write - on each channel, but we didn't select among channels in any + - Complete revision of the code that relays use to decide which cell + to send next. Formerly, we selected the best circuit to write on + each channel, but we didn't select among channels in any sophisticated way. Now, we choose the best circuits globally from among those whose channels are ready to deliver traffic.
@@ -21,18 +21,17 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 high/low watermark mechanism and a global scheduler loop for transmission prioritization across all channels as well as among circuits on one channel. This schedule is currently tuned to - (tolerantly) avoid making changes in the current network - performance, but it should form the basis for major circuit - performance increases. Code by Andrea; tuning by Rob Jansen; - implements ticket 9262. + (tolerantly) avoid making changes in network performance, but it + should form the basis for major circuit performance increases in + the future. Code by Andrea; tuning by Rob Jansen; implements + ticket 9262.
o Major features (hidden services): - - Make HS port scanning more difficult by sending back REASON_DONE - if the exit policy didn't match. Furthermore, immediately close - the circuit to slow down port scanning attempts. Closes - ticket 13667. + - Make HS port scanning more difficult by immediately closing the + circuit when a user attempts to connect to a nonexistent port. + Closes ticket 13667. - Add a HiddenServiceStatistics option that allows Tor relays to - gather and publish statistics the overall size and volume of + gather and publish statistics about the overall size and volume of hidden service usage. Specifically, when this option is turned on, an HSDir will publish an approximate number of hidden services that have published descriptors to it the past 24 hours. Also, if @@ -44,7 +43,7 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 feature is currently disabled by default. Implements feature 13192.
o Major bugfixes (client, automap): - - Repair automapping with IPv6 addresses; this automapping should + - Repair automapping with IPv6 addresses. This automapping should have worked previously, but one piece of debugging code that we inserted to detect a regression actually caused the regression to manifest itself again. Fixes bug 13811 and bug 12831; bugfix on @@ -58,6 +57,11 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 point would make the other introduction points get marked as having timed out. Fixes bug 13698; bugfix on 0.0.6rc2.
+ o Directory authority changes: + - Remove turtles as a directory authority. + - Add longclaw as a new (v3) directory authority. This implements + ticket 13296. This keeps the directory authority count at 9. + o Major removed features: - Tor clients no longer support connecting to hidden services running on Tor 0.2.2.x and earlier; the Support022HiddenServices @@ -70,7 +74,7 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 Resolves ticket 13315.
o Minor features (controller): - - Add a "SIGNAL HEARTBEAT" Tor controller command that tells Tor to + - Add a "SIGNAL HEARTBEAT" controller command that tells Tor to write an unscheduled heartbeat message to the log. Implements feature 9503.
@@ -83,9 +87,9 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 circuits until we have successfully built a circuit. This makes hidden services come up faster when the network is re-enabled. Patch from "akwizgran". Closes ticket 13447. - - Inform Tor controller about nature of a failure to retrieve hidden - service descriptor by sending reason string with "HS_DESC FAILED" - controller event. Implements feature 13212. + - When we fail to a retrieve hidden service descriptor, send the + controller an "HS_DESC FAILED" controller event. Implements + feature 13212. - New HiddenServiceDirGroupReadable option to cause hidden service directories and hostname files to be created group-readable. Patch from "anon", David Stainton, and "meejah". Closes ticket 11291. @@ -105,16 +109,16 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
o Minor bugfixes (preventative security, C safety): - When reading a hexadecimal, base-32, or base-64 encoded value from - a string, always overwrite the complete output buffer. This - prevents some bugs where we would look at (but fortunately, not - reveal) uninitialized memory on the stack. Fixes bug 14013; bugfix - on all versions of Tor. + a string, always overwrite the whole output buffer. This prevents + some bugs where we would look at (but fortunately, not reveal) + uninitialized memory on the stack. Fixes bug 14013; bugfix on all + versions of Tor. - Clear all memory targetted by tor_addr_{to,from}_sockaddr(), not just the part that's used. This makes it harder for data leak bugs to occur in the event of other programming failures. Resolves ticket 14041.
- o Minor bugfixes (client, micordescriptors): + o Minor bugfixes (client, microdescriptors): - Use a full 256 bits of the SHA256 digest of a microdescriptor when computing which microdescriptors to download. This keeps us from erroneous download behavior if two microdescriptor digests ever @@ -159,12 +163,11 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
o Minor bugfixes (logging): - Downgrade warnings about RSA signature failures to info log level. - Emit a warning when extra info document is found incompatible with - a corresponding router descriptor. Fixes bug 9812; bugfix + Emit a warning when an extra info document is found incompatible + with a corresponding router descriptor. Fixes bug 9812; bugfix on 0.0.6rc3. - - Log the circuit ID correctly in - connection_ap_handshake_attach_circuit(). Fixes bug 13701; bugfix - on 0.0.6. + - Make connection_ap_handshake_attach_circuit() log the circuit ID + correctly. Fixes bug 13701; bugfix on 0.0.6.
o Minor bugfixes (misc): - Stop allowing invalid address patterns like "*/24" that contain @@ -203,24 +206,20 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 available. If the consensus does not contain Exits, Tor will only build internal circuits. In this case, relevant statuses will contain the word "internal" as indicated in the Tor control- - spec.txt. When bootstrap completes, Tor will be ready to handle an - application requesting an internal circuit to hidden services at - ".onion" addresses. If a future consensus contains Exits, exit + spec.txt. When bootstrap completes, Tor will be ready to build + internal circuits. If a future consensus contains Exits, exit circuits may become available. Fixes part of bug 13718; bugfix on 0.2.4.10-alpha. Patch by "teor". - Decrease minimum consensus interval to 10 seconds when TestingTorNetwork is set, or 5 seconds for the first consensus. - Fix assumptions throughout the code that assume larger interval - values. This assists in quickly bootstrapping a testing Tor - network. Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha. - Patch by "teor". + Fix assumptions throughout the code that assume larger intervals. + Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha. Patch + by "teor". - Avoid excluding guards from path building in minimal test - networks, when we're in a test network, and excluding guards would + networks, when we're in a test network and excluding guards would exclude all relays. This typically occurs in incredibly small tor - networks, and those using TestingAuthVoteGuard * This fix only - applies to minimal, testing tor networks, so it's no less secure. - Fixes part of bug 13718; bugfix on 0.1.1.11-alpha. Patch - by "teor". + networks, and those using "TestingAuthVoteGuard *". Fixes part of + bug 13718; bugfix on 0.1.1.11-alpha. Patch by "teor".
o Code simplification and refactoring: - Stop using can_complete_circuits as a global variable; access it @@ -230,11 +229,10 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 Closes ticket 13172. - Combine the functions used to parse ClientTransportPlugin and ServerTransportPlugin into a single function. Closes ticket 6456. - - Add inline functions and convenience macros for quick lookup of - state component of channel_t structure. Refactor various parts of - codebase to use convenience macros instead of checking state - member of channel_t directly. Fixes issue 7356. - - Document all members of was_router_added_t enum and rename + - Add inline functions and convenience macros for inspecting channel + state. Refactor the code to use convenience macros instead of + checking channel state directly. Fixes issue 7356. + - Document all members of was_router_added_t and rename ROUTER_WAS_NOT_NEW to ROUTER_IS_ALREADY_KNOWN to make it less confusable with ROUTER_WAS_TOO_OLD. Fixes issue 13644. - In connection_exit_begin_conn(), use END_CIRC_REASON_TORPROTOCOL @@ -243,11 +241,6 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 implementation, so that we can add a new digest256map type trivially.
- o Directory authority changes: - - Remove turtles as a directory authority. - - Add longclaw as a new (v3) directory authority. This implements - ticket 13296. This keeps the directory authority count at 9. - o Documentation: - Document the bridge-authority-only 'networkstatus-bridges' file. Closes ticket 13713; patch from "tom". @@ -255,12 +248,12 @@ Changes in version 0.2.6.2-alpha - 2014-12-31 manpage. Resolves issue 13707. - Stop suggesting that users specify relays by nickname: it isn't a good idea. Also, properly cross-reference how to specify relays in - all parts of the manual for options that take a list of relays. - Closes ticket 13381. - - Clarify HiddenServiceDir option description in manpage to make it - clear that relative paths are taken with respect to the current - working directory of Tor instance. Also clarify that this behavior - is not guaranteed to remain indefinitely. Fixes issue 13913. + all parts of manual documenting options that take a list of + relays. Closes ticket 13381. + - Clarify the HiddenServiceDir option description in manpage to make + it clear that relative paths are taken with respect to the current + working directory. Also clarify that this behavior is not + guaranteed to remain indefinitely. Fixes issue 13913.
o Testing: - New tests for many parts of channel, relay, and circuitmux