commit 8410f47b6e7e6d87f1082c2328cc3fc209d0b2ae Author: Nick Mathewson nickm@torproject.org Date: Fri May 19 10:00:54 2017 -0400
start changelog for 0.3.1.1-alpha by sorting entries --- ChangeLog | 395 ++++++++++++++++++++++++++++++++++++++++++- changes/17868 | 4 - changes/21662_21663_21664 | 12 -- changes/21873 | 3 - changes/bug16706 | 3 - changes/bug16861 | 16 -- changes/bug17170 | 3 - changes/bug17592 | 13 -- changes/bug17604 | 15 -- changes/bug18100 | 5 - changes/bug19699 | 5 - changes/bug20270 | 6 - changes/bug20341 | 3 - changes/bug20913 | 9 - changes/bug21121 | 3 - changes/bug21155 | 5 - changes/bug21293 | 5 - changes/bug21329 | 3 - changes/bug21406 | 5 - changes/bug21407 | 4 - changes/bug21439 | 7 - changes/bug21496 | 4 - changes/bug21507 | 5 - changes/bug21510 | 4 - changes/bug21540 | 4 - changes/bug21586 | 4 - changes/bug21599 | 4 - changes/bug21641 | 5 - changes/bug21654 | 4 - changes/bug21703 | 4 - changes/bug21715 | 5 - changes/bug21788 | 3 - changes/bug22042 | 7 - changes/bug22060 | 28 --- changes/bug22096 | 6 - changes/bug22244 | 6 - changes/bug22245 | 5 - changes/bug22246 | 6 - changes/bug22252 | 3 - changes/bug22270 | 4 - changes/cleanup22213 | 4 - changes/consdiff_21643 | 5 - changes/data_dir_default_doc | 3 - changes/fast_channel_lookup | 2 - changes/faster-keccak | 4 - changes/feature1922 | 11 -- changes/feature21598 | 4 - changes/feature21622 | 8 - changes/feature22106 | 12 -- changes/new_spooling_backend | 7 - changes/prop140 | 10 -- changes/refactor_reached_eof | 5 - changes/storagedir | 5 - changes/test21470 | 5 - changes/ticket13802 | 7 - changes/ticket21564 | 6 - changes/ticket21646 | 6 - changes/ticket21729 | 7 - changes/ticket21841 | 4 - changes/ticket21842 | 6 - changes/ticket21953 | 6 - changes/ticket4998 | 5 - 62 files changed, 394 insertions(+), 373 deletions(-)
diff --git a/ChangeLog b/ChangeLog index fdf7d0c..4fb6627 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,4 +1,397 @@ -Changes in version 0.3.1.1-alpha - 2017-??-?? +Changes in version 0.3.1.1-alpha - 2017-05-?? + blurb goes here + + o Major features (directory protocol): + - Tor relays and authorities are now able to serve clients an + abbreviated version of the networkstatus consensus document, + containing only the changes since the an older consensus document that + the client holds. Clients now request these documents when + available. When this new protocol is in use by both client and server, + they will use far less bandwidth (up to 94% less) to keep an up-to-date + consensus. Implements proposal 140; closes ticket 13339. Based + on work by by Daniel Martí. + + o Major features (directory system): + - Tor's compression module now includes support for the zstd and lzma2 + compression algorithms, if the libzstd and liblzma libraries are + available when Tor is compiled. Once these features are exposed in the + directory module, they will enable Tor to provide better compression + ratios on directory documents. Part of an implementation for proposal + 278; closes ticket 21662. + + o Major features (internals): + - Add an ed diff/patch backend, optimized for consensus documents. + This backend will be the basis of our consensus diff implementation. + Most of the work here was done + by Daniel Martí. Closes ticket 21643. + + o Major features (security, stability, experimental): + - Tor now has the optional ability to include modules written in + Rust. To turn this on, pass the "--enable-rust" flag to the + configure script. + It's not time to get excited yet: currently, there is no actual + Rust functionality beyond some simple glue code, and a notice at + startup to tell you that Rust is running. Still, we hope that + programmers and packagers will try building with rust + support, so that we can find issues with the build system, + and solve portability issues. Closes ticket 22106. + + o Major features (traffic analysis resistance): + - Relays and clients will now send a padding cell on idle OR + connections every 1.5 to 9.5 seconds (tunable via consensus + parameters). Directory connections and inter-relay connections + are not padded. Padding is negotiated using Tor's link protocol, + so both relays and clients must upgrade for this to take effect. + Clients may still send padding despite the relay's version by + setting ConnectionPadding 1 in torrc, and may disable padding + by setting ConnectionPadding 0 in torrc. Padding may be minimized + for mobile users with the torrc option ReducedConnectionPadding. + Implements Proposal 251 and Section 2 of Proposal 254; closes ticket + 16861. + - Relays will publish 24 hour totals of padding and non-padding cell + counts to their extra-info descriptors, unless PaddingStatistics 0 + is set in torrc. These 24 hour totals are also rounded to multiples + of 10000. + + o Major bugfixes (hidden service directory, security): + - Fix an assertion failure in the hidden service directory code, which + could be used by an attacker to remotely cause a Tor relay process to + exit. Relays running earlier versions of Tor 0.3.0.x should upgrade. + This security issue is tracked as tracked as + TROVE-2017-002. Fixes bug 22246; bugfix on 0.3.0.1-alpha. + + o Major bugfixes (linux TPROXY support): + - Fix a typo that had prevented TPROXY-based transparent proxying from + working under Linux. Fixes bug 18100; bugfix on 0.2.6.3-alpha. + Patch from "d4fq0fQAgoJ". + + o Minor feature (defaults, directory): + - Onion key rotation and expiry intervals are now defined as a network + consensus parameter as per proposal 274. The default lifetime of an + onion key is bumped from 7 to 28 days. Old onion keys will expire after 7 + days by default. Closes ticket 21641. + + o Minor feature (hidden services): + - Add more information to the message logged when a hidden service + descriptor has fewer introduction points than specified in + HiddenServiceNumIntroductionPoints. + Follow up to tickets 21598 and 21599, closes ticket 21622. + - Log a message when a hidden service descriptor has fewer introduction + points than specified in HiddenServiceNumIntroductionPoints. + Closes ticket 21598. + - Log a message when a hidden service reaches its introduction point + circuit limit, and when that limit is reset. + Follow up to ticket 21594, closes ticket 21622. + + o Minor feature (include on config files): + - Adds config-can-saveconf to GETINFO command to tell if SAVECONF + will work without the FORCE option, closes ticket 1922. + - Allow the use of %include on configuration files to include settings + from other files or directories. Using %include with a directory will + include all (non-dot) files in that directory in lexically sorted order + (non-recursive), closes ticket 1922. + - Makes SAVECONF command return error when overwriting a torrc + that has includes. Using SAVECONF with the FORCE option will + allow it to overwrite torrc even if includes are used, closes ticket + 1922. + + o Minor features (controller): + - Warn the first time that a controller requests data in the + long-deprecated 'GETINFO network-status' format. Closes ticket 21703. + + o Minor features (defaults, security): + - The default value for UseCreateFast is now 0: clients which haven't yet + received a consensus document will nonetheless use a proper handshake + to talk to their directory servers (when they can). Closes ticket 21407. + + o Minor features (fallback directories): + - Update the fallback directory mirror whitelist and blacklist based on + operator emails. Closes task 21121. + + o Minor features (fallback directory list): + - Replace the 177 fallbacks originally introduced in Tor 0.2.9.8 in + December 2016 (of which ~126 were still functional), with a list of + 151 fallbacks (32 new, 119 existing, 58 removed) generated in + May 2017. + Resolves ticket 21564. + + o Minor features (hidden service, logging): + - Warn user if multiple entries in EntryNodes and at least one + HiddenService are used together. Pinning EntryNodes along with an hidden + service can be possibly harmful for instance see ticket 14917 or 21155. + Closes ticket 21155. + + o Minor features (infrastructure, seccomp2 sandbox): + - We now have a document storage backend compatible with the Linux + seccomp2 sandbox. The long-term plan is to use this backend for + consensus documents and for storing unparseable directory + material. Closes ticket 21645. + + o Minor features (linux seccomp2 sandbox): + - Increase the maximum allowed size passed to mprotect(PROT_WRITE) + from 1MB to 16MB. This was necessary with the glibc allocator in + order to allow worker threads to allocate more memory -- which in + turn is necessary because of our new use of worker threads for + compression. Closes ticket 22096. + + o Minor features (logging): + - Log files are no longer created world-readable by default. + (Previously, most distributors would store the logs in a + non-world-readable location to prevent inappropriate access. This + change is an extra precaution.) Closes ticket 21729; patch from + toralf. + + o Minor features (performance): + - The minimal keccak implementation we include now accesses memory + more efficiently, especially on little-endian systems. + Closes ticket 21737. + + o Minor features (performance, controller): + - Add an O(1) implementation of channel_find_by_global_id(). + + o Minor features (relay, configuration): + - The MyFamily line may now be repeated as many times as desired, for + relays that want to configure large families. Closes ticket 4998; + patch by Daniel Pinto. + + o Minor features (safety): + - Add an explict check to extrainfo_parse_entry_from_string() for NULL + inputs. We don't believe this can actually happen, but it may help + silence a warning from the Clang analyzer. Closes ticket 21496. + + o Minor features (security, windows): + - Enable a couple of pieces of Windows hardening: one + (HeapEnableTerminationOnCorruption) that has been on-by-default since + Windows 8, and unavailable before Windows 7, and one + (PROCESS_DEP_DISABLE_ATL_THUNK_EMULATION) which we believe doesn't + affect us, but shouldn't do any harm. Closes ticket 21953. + + o Minor features (testing): + - Add a "--disable-memory-sentinels" feature to help with fuzzing. + When Tor is compiled with this option, we disable a number of + redundant memory-safety failsafes that are intended to stop + bugs from becoming security issues. This makes it easier to hunt + for bugs that would be security issues without the failsafes + turned on. Closes ticket 21439. + - Add a general event-tracing instrumentation support to Tor. This + subsystem will enable developers and researchers to add fine-grained + instrumentation to their Tor instances, for use when examining Tor + network performance issues. There are no trace events yet, and + event-tracing is off by default unless enabled at compile time. + Implements ticket 13802. + + o Minor features (unit tests): + - Improve version parsing tests: add tests for typical version components, + add tests for invalid versions, including numeric range and non-numeric + prefixes. + Unit tests 21278, 21450, and 21507. Partially implements 21470. + + o Minor bugfix (directory authority): + - Prevent the shared randomness subsystem from asserting when initialized + by a bridge authority with an incomplete configuration file. Fixes bug + 21586; bugfix on 0.2.9.8. + + o Minor bugfixes (bandwidth accounting): + - Roll over monthly accounting at the configured hour and minute, + rather than always at 00:00. + Fixes bug 22245; bugfix on 0.0.9rc1. + Found by Andrey Karpov with PVS-Studio. + + o Minor bugfixes (cell, logging): + - Downgrade a log statement from bug to protocol warning because there is + at least one use case where it can be triggered by a buggy tor + implementation on the Internet for instance. Fixes bug 21293; bugfix on + 0.1.1.14-alpha. + + o Minor bugfixes (code correctness): + - Accurately identify client connections using their lack of peer + authentication. This means that we bail out earlier if asked to extend + to a client. Follow-up to 21407. + Fixes bug 21406; bugfix on 0.2.4.23. + + o Minor bugfixes (configuration): + - Do not crash when starting with LearnCircuitBuildTimeout 0. + Fixes bug 22252; bugfix on 0.2.9.3-alpha. + + o Minor bugfixes (connection lifespan): + - Allow more control over how long TLS connections are kept open: unify + CircuitIdleTimeout and PredictedPortsRelevanceTime into a single option + called CircuitsAvailableTimeout. Also, allow the consensus to control + the default values for both this preference, as well as the lifespan + of relay-to-relay connections. Fixes bug 17592; bugfix on 0.2.5.5-alpha. + - Increase the intial circuit build timeout testing frequency, to help + ensure that ReducedConnectionPadding clients finish learning a timeout + before their orconn would expire. The initial testing rate was set back + in the days of TAP and before the Tor Browser updater, when we had to be + much more careful about new clients making lots of circuits. With this + change, a circuit build time is learned in about 15-20 minutes, instead + of ~100-120 minutes. + + o Minor bugfixes (connection usage): + - Relays will now log hourly statistics on the total number of + connections to other relays. If the number of connections per relay + unexpectedly large, this log message is at notice level. Otherwise + it is at info. + - Use NETINFO cells to try to determine if both relays involved in + a connection will agree on the canonical status of that connection. + Prefer the connections where this is the case for extend cells, + and try to close connections where relays disagree on canonical + status early. Also, additionally alter the connection selection + logic to prefer the oldest valid connection for extend cells. + These two changes should reduce the number of long-term connections + that are kept open between relays. Fixes bug 17604; bugfix on + 0.2.5.5-alpha. + + o Minor bugfixes (control, hidden service client): + - Trigger HS descriptor events on the control port when the client is + unable to pick a suitable hidden service directory. This can happen if + they are all in the ExcludeNodes list or they all have been queried + inside the allowed 15 minutes. Fixes bug 22042; bugfix on + 0.2.5.2-alpha. + + o Minor bugfixes (controller): + - GETINFO onions/current and onions/detached no longer 551 on empty lists + Fixes bug 21329; bugfix on 0.2.7.1-alpha. + + o Minor bugfixes (directory authority): + - When rejecting a router descriptor because the relay is running an + obsolete version of Tor without ntor support, warn about the obsolete + tor version, not the missing ntor key. Fixes bug 20270; + bugfix on 0.2.9.3-alpha. + + o Minor bugfixes (documentation): + - Default of NumEntryGuards is 1 if the consensus parameter + guard-n-primary-guards-to-use isn't set. Default of NumDirectoryGuards + is 3 if the consensus parameter guard-n-primary-dir-guards-to-use isn't + set. Fixes bug 21715; bugfix on 0.3.0.1-alpha. + + o Minor bugfixes (exit-side DNS): + - Fix an untriggerable assertion that checked the output of a + libevent DNS error, so that the assertion actually behaves as + expected. Fixes bug 22244; bugfix on 0.2.0.20-rc. Found by Andrey + Karpov using PVS-Studio. + + o Minor bugfixes (fallback directory mirrors): + - Make the usage example in updateFallbackDirs.py actually work. + (And explain what it does.) + Fixes bug 22270; bugfix on 0.3.0.3-alpha. + + o Minor bugfixes (fallbacks): + - Decrease the guard flag average required to be a fallback. This allows + us to keep relays that have their guard flag removed when they restart. + Fixes bug 20913; bugfix on 0.2.8.1-alpha. + - Decrease the minimum number of fallbacks to 100. + Fixes bug 20913; bugfix on 0.2.8.1-alpha. + - Make sure fallback directory mirrors have the same address, port, and + relay identity key for at least 30 days before they are selected. + Fixes bug 20913; bugfix on 0.2.8.1-alpha. + + o Minor bugfixes (hidden service): + - Stop printing cryptic warning when a client tries to connect on an + invalid port of the service. Fixes bug 16706; bugfix on 0.2.6.3-alpha. + + o Minor bugfixes (hidden services): + - Simplify hidden service descriptor creation by using an existing flag + to check if an introduction point is established. + Fixes bug 21599; bugfix on 0.2.7.2-alpha. + + o Minor bugfixes (memory leak): + - Fix a small memory leak at exit from the backtrace handler code. + Fixes bug 21788; bugfix on 0.2.5.2-alpha. Patch from Daniel Pinto. + + o Minor bugfixes (testing): + - Make test-network.sh always call chutney's test-network.sh. + Previously, this only worked on systems which had bash installed, due to + some bash-specific code in the script. + Fixes bug 19699; bugfix on 0.3.0.4-rc. Follow-up to ticket 21581. + - Use unbuffered I/O for utility functions around the process_handle_t + type. This fixes unit test failures reported on OpenBSD and FreeBSD. + Fixes bug 21654; bugfix on 0.2.3.1-alpha. + + o Minor bugfixes (unit tests): + - Make display of captured unit test log messages consistent. + Fixes bug 21510; bugfix on 0.2.9.3-alpha. + + o Minor bugfixes (voting consistency): + - Reject version numbers with non-numeric prefixes (such as +, -, and + whitespace). Disallowing whitespace prevents differential version + parsing between POSIX-based and Windows platforms. + Fixes bug 21507 and part of 21508; bugfix on 0.0.8pre1. + + o Minor bugfixes (windows, relay): + - Resolve "Failure from drain_fd: No error" warnings on Windows + relays. Fixes bug 21540; bugfix on 0.2.6.3-alpha. + + o Code simplification and refactoring: + - Break up the 630-line function connection_dir_client_reached_eof() into + a dozen smaller functions. This change should help maintainability and + readability of the client directory code. + - Isolate our usage of the openssl headers so that they are only + used from our crypto wrapper modules, and from tests that examing those + modules' internals. Closes ticket 21841. + - Our API to launch directory requests has been greatly simplified + to become more extensible and less error-prone. We'll be using + this to improve support for adding extra headers to directory + requests. Closes ticket 21646. + - Our base64 decoding functions no longer overestimate the output + space that they will need when parsing unpadded inputs. + Closes ticket 17868. + - Remove unused "ROUTER_ADDED_NOTIFY_GENERATOR" internal value. + Resolves ticket 22213. + - The logic that directory caches use to spool request to clients, + serving them one part at a time so as not to allocate too much memory, + has been refactored for consistency. Previously there was a separate + spooling implementation per type of spoolable data. Now there + is one common spooling implementation, with extensible data types. + Closes ticket 21651. + - Tor's compression module now supports multiple backends. Part of + an implementation of proposal 278; closes ticket 21663. + + o Documentation: + - Clarify the behavior of the KeepAliveIsolateSOCKSAuth sub-option. + Closes ticket 21873. + - Correct the documentation about the default DataDirectory value. + Closes ticket 21151. + - Document key=value pluggable transport arguments for Bridge lines in + torrc. Fixes bug 20341; bugfix on 0.2.5.1-alpha. + - Note that bandwidth-limiting options don't affect TCP headers or DNS. + Closes ticket 17170. + + o Removed features (configuration options, all in ticket 22060): + - AllowInvalidNodes was deprecated in 0.2.9.2-alpha and now has been + removed. It is not possible anymore to use Invalid nodes. + - AllowSingleHopCircuits was deprecated in 0.2.9.2-alpha and now has been + removed. It's not possible anymore to attach streams to single hop exit + circuit. + - AllowSingleHopExits was deprecated in 0.2.9.2-alpha and now has been + removed. Relays no longer advertise that they can be used for single hop + exit proxy. + - CloseHSClientCircuitsImmediatelyOnTimeout was deprecated in + 0.2.9.2-alpha and now has been removed. HS circuits never close on + circuit build timeout, they have a longer timeout period. + - CloseHSServiceRendCircuitsImmediatelyOnTimeout was deprecated in + 0.2.9.2-alpha and now has been removed. HS circuits never close on + circuit build timeout, they have a long timeout period. + - ExcludeSingleHopRelays was deprecated in 0.2.9.2-alpha and now has been + removed. Client will always exclude relays that supports single hop + exits meaning relays that still advertise AllowSingleHopExits. + - FastFirstHopPK was deprecated in 0.2.9.2-alpha and now has been removed. + Decision for this feature will always be decided by the consensus. + - TLSECGroup was deprecated in 0.2.9.2-alpha and now has been removed. + P256 EC group is always used. + - WarnUnsafeSocks was deprecated in 0.2.9.2-alpha and now has been + removed. Tor will now always warn the user if only an IP address is + given instead of an hostname on a SOCKS connection if SafeSocks is 1. + - {Control,DNS,Dir,Socks,Trans,NATD,OR}ListenAddress was deprecated in + 0.2.9.2-alpha and now has been removed. Use the ORPort (and others). + + o Removed features: + - We've removed the tor-checkkey tool from src/tools. Long ago, we + used it to help people detect RSA keys that were generated by + versions of Debian affected by CVE-2008-0166. But those keys + have been out of circulation for ages, and this tool is no + longer required. Closes ticket 21842. +
Changes in version 0.3.0.7 - 2017-05-15 diff --git a/changes/17868 b/changes/17868 deleted file mode 100644 index 77a8ba1..0000000 --- a/changes/17868 +++ /dev/null @@ -1,4 +0,0 @@ - o Code simplification and refactoring: - - Our base64 decoding functions no longer overestimate the output - space that they will need when parsing unpadded inputs. - Closes ticket 17868. diff --git a/changes/21662_21663_21664 b/changes/21662_21663_21664 deleted file mode 100644 index da47c6d..0000000 --- a/changes/21662_21663_21664 +++ /dev/null @@ -1,12 +0,0 @@ - o Major features (directory system): - - Tor's compression module now includes support for the zstd and lzma2 - compression algorithms, if the libzstd and liblzma libraries are - available when Tor is compiled. Once these features are exposed in the - directory module, they will enable Tor to provide better compression - ratios on directory documents. Part of an implementation for proposal - 278; closes ticket 21662. - - o Code simplification and refactoring: - - Tor's compression module now supports multiple backends. Part of - an implementation of proposal 278; closes ticket 21663. - diff --git a/changes/21873 b/changes/21873 deleted file mode 100644 index 24dc824..0000000 --- a/changes/21873 +++ /dev/null @@ -1,3 +0,0 @@ - o Documentation: - - Clarify the behavior of the KeepAliveIsolateSOCKSAuth sub-option. - Closes ticket 21873. diff --git a/changes/bug16706 b/changes/bug16706 deleted file mode 100644 index b0b3351..0000000 --- a/changes/bug16706 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (hidden service): - - Stop printing cryptic warning when a client tries to connect on an - invalid port of the service. Fixes bug 16706; bugfix on 0.2.6.3-alpha. diff --git a/changes/bug16861 b/changes/bug16861 deleted file mode 100644 index f540254..0000000 --- a/changes/bug16861 +++ /dev/null @@ -1,16 +0,0 @@ - o Major features (traffic analysis resistance): - - Relays and clients will now send a padding cell on idle OR - connections every 1.5 to 9.5 seconds (tunable via consensus - parameters). Directory connections and inter-relay connections - are not padded. Padding is negotiated using Tor's link protocol, - so both relays and clients must upgrade for this to take effect. - Clients may still send padding despite the relay's version by - setting ConnectionPadding 1 in torrc, and may disable padding - by setting ConnectionPadding 0 in torrc. Padding may be minimized - for mobile users with the torrc option ReducedConnectionPadding. - Implements Proposal 251 and Section 2 of Proposal 254; closes ticket - 16861. - - Relays will publish 24 hour totals of padding and non-padding cell - counts to their extra-info descriptors, unless PaddingStatistics 0 - is set in torrc. These 24 hour totals are also rounded to multiples - of 10000. diff --git a/changes/bug17170 b/changes/bug17170 deleted file mode 100644 index 24a9b94..0000000 --- a/changes/bug17170 +++ /dev/null @@ -1,3 +0,0 @@ - o Documentation: - - Note that bandwidth-limiting options don't affect TCP headers or DNS. - Closes ticket 17170. diff --git a/changes/bug17592 b/changes/bug17592 deleted file mode 100644 index 131791b..0000000 --- a/changes/bug17592 +++ /dev/null @@ -1,13 +0,0 @@ - o Minor bugfixes (connection lifespan): - - Allow more control over how long TLS connections are kept open: unify - CircuitIdleTimeout and PredictedPortsRelevanceTime into a single option - called CircuitsAvailableTimeout. Also, allow the consensus to control - the default values for both this preference, as well as the lifespan - of relay-to-relay connections. Fixes bug 17592; bugfix on 0.2.5.5-alpha. - - Increase the intial circuit build timeout testing frequency, to help - ensure that ReducedConnectionPadding clients finish learning a timeout - before their orconn would expire. The initial testing rate was set back - in the days of TAP and before the Tor Browser updater, when we had to be - much more careful about new clients making lots of circuits. With this - change, a circuit build time is learned in about 15-20 minutes, instead - of ~100-120 minutes. diff --git a/changes/bug17604 b/changes/bug17604 deleted file mode 100644 index 6cd9e2e..0000000 --- a/changes/bug17604 +++ /dev/null @@ -1,15 +0,0 @@ - o Minor bugfixes (connection usage): - - Use NETINFO cells to try to determine if both relays involved in - a connection will agree on the canonical status of that connection. - Prefer the connections where this is the case for extend cells, - and try to close connections where relays disagree on canonical - status early. Also, additionally alter the connection selection - logic to prefer the oldest valid connection for extend cells. - These two changes should reduce the number of long-term connections - that are kept open between relays. Fixes bug 17604; bugfix on - 0.2.5.5-alpha. - - Relays will now log hourly statistics on the total number of - connections to other relays. If the number of connections per relay - unexpectedly large, this log message is at notice level. Otherwise - it is at info. - diff --git a/changes/bug18100 b/changes/bug18100 deleted file mode 100644 index cd3ba2c..0000000 --- a/changes/bug18100 +++ /dev/null @@ -1,5 +0,0 @@ - o Major bugfixes (linux TPROXY support): - - Fix a typo that had prevented TPROXY-based transparent proxying from - working under Linux. Fixes bug 18100; bugfix on 0.2.6.3-alpha. - Patch from "d4fq0fQAgoJ". - diff --git a/changes/bug19699 b/changes/bug19699 deleted file mode 100644 index 10ba57f..0000000 --- a/changes/bug19699 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (testing): - - Make test-network.sh always call chutney's test-network.sh. - Previously, this only worked on systems which had bash installed, due to - some bash-specific code in the script. - Fixes bug 19699; bugfix on 0.3.0.4-rc. Follow-up to ticket 21581. diff --git a/changes/bug20270 b/changes/bug20270 deleted file mode 100644 index d538a35..0000000 --- a/changes/bug20270 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor bugfixes (directory authority): - - When rejecting a router descriptor because the relay is running an - obsolete version of Tor without ntor support, warn about the obsolete - tor version, not the missing ntor key. Fixes bug 20270; - bugfix on 0.2.9.3-alpha. - diff --git a/changes/bug20341 b/changes/bug20341 deleted file mode 100644 index 419240c..0000000 --- a/changes/bug20341 +++ /dev/null @@ -1,3 +0,0 @@ - o Documentation: - - Document key=value pluggable transport arguments for Bridge lines in - torrc. Fixes bug 20341; bugfix on 0.2.5.1-alpha. diff --git a/changes/bug20913 b/changes/bug20913 deleted file mode 100644 index df7f106..0000000 --- a/changes/bug20913 +++ /dev/null @@ -1,9 +0,0 @@ - o Minor bugfixes (fallbacks): - - Make sure fallback directory mirrors have the same address, port, and - relay identity key for at least 30 days before they are selected. - Fixes bug 20913; bugfix on 0.2.8.1-alpha. - - Decrease the guard flag average required to be a fallback. This allows - us to keep relays that have their guard flag removed when they restart. - Fixes bug 20913; bugfix on 0.2.8.1-alpha. - - Decrease the minimum number of fallbacks to 100. - Fixes bug 20913; bugfix on 0.2.8.1-alpha. diff --git a/changes/bug21121 b/changes/bug21121 deleted file mode 100644 index 96b9730..0000000 --- a/changes/bug21121 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor features (fallback directories): - - Update the fallback directory mirror whitelist and blacklist based on - operator emails. Closes task 21121. diff --git a/changes/bug21155 b/changes/bug21155 deleted file mode 100644 index 67e4a64..0000000 --- a/changes/bug21155 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor features (hidden service, logging): - - Warn user if multiple entries in EntryNodes and at least one - HiddenService are used together. Pinning EntryNodes along with an hidden - service can be possibly harmful for instance see ticket 14917 or 21155. - Closes ticket 21155. diff --git a/changes/bug21293 b/changes/bug21293 deleted file mode 100644 index 37e0c8c..0000000 --- a/changes/bug21293 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (cell, logging): - - Downgrade a log statement from bug to protocol warning because there is - at least one use case where it can be triggered by a buggy tor - implementation on the Internet for instance. Fixes bug 21293; bugfix on - 0.1.1.14-alpha. diff --git a/changes/bug21329 b/changes/bug21329 deleted file mode 100644 index c31586e..0000000 --- a/changes/bug21329 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (controller): - - GETINFO onions/current and onions/detached no longer 551 on empty lists - Fixes bug 21329; bugfix on 0.2.7.1-alpha. diff --git a/changes/bug21406 b/changes/bug21406 deleted file mode 100644 index 170e631..0000000 --- a/changes/bug21406 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (code correctness): - - Accurately identify client connections using their lack of peer - authentication. This means that we bail out earlier if asked to extend - to a client. Follow-up to 21407. - Fixes bug 21406; bugfix on 0.2.4.23. diff --git a/changes/bug21407 b/changes/bug21407 deleted file mode 100644 index 8d0d917..0000000 --- a/changes/bug21407 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (defaults, security): - - The default value for UseCreateFast is now 0: clients which haven't yet - received a consensus document will nonetheless use a proper handshake - to talk to their directory servers (when they can). Closes ticket 21407. diff --git a/changes/bug21439 b/changes/bug21439 deleted file mode 100644 index 3acc53b..0000000 --- a/changes/bug21439 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor features (testing): - - Add a "--disable-memory-sentinels" feature to help with fuzzing. - When Tor is compiled with this option, we disable a number of - redundant memory-safety failsafes that are intended to stop - bugs from becoming security issues. This makes it easier to hunt - for bugs that would be security issues without the failsafes - turned on. Closes ticket 21439. diff --git a/changes/bug21496 b/changes/bug21496 deleted file mode 100644 index 24ac85a..0000000 --- a/changes/bug21496 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (safety): - - Add an explict check to extrainfo_parse_entry_from_string() for NULL - inputs. We don't believe this can actually happen, but it may help - silence a warning from the Clang analyzer. Closes ticket 21496. diff --git a/changes/bug21507 b/changes/bug21507 deleted file mode 100644 index f83e291..0000000 --- a/changes/bug21507 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (voting consistency): - - Reject version numbers with non-numeric prefixes (such as +, -, and - whitespace). Disallowing whitespace prevents differential version - parsing between POSIX-based and Windows platforms. - Fixes bug 21507 and part of 21508; bugfix on 0.0.8pre1. diff --git a/changes/bug21510 b/changes/bug21510 deleted file mode 100644 index 31c3e1a..0000000 --- a/changes/bug21510 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (unit tests): - - Make display of captured unit test log messages consistent. - Fixes bug 21510; bugfix on 0.2.9.3-alpha. - diff --git a/changes/bug21540 b/changes/bug21540 deleted file mode 100644 index 0cf684b..0000000 --- a/changes/bug21540 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (windows, relay): - - Resolve "Failure from drain_fd: No error" warnings on Windows - relays. Fixes bug 21540; bugfix on 0.2.6.3-alpha. - diff --git a/changes/bug21586 b/changes/bug21586 deleted file mode 100644 index 29701d9..0000000 --- a/changes/bug21586 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfix (directory authority): - - Prevent the shared randomness subsystem from asserting when initialized - by a bridge authority with an incomplete configuration file. Fixes bug - 21586; bugfix on 0.2.9.8. diff --git a/changes/bug21599 b/changes/bug21599 deleted file mode 100644 index fe0f21a..0000000 --- a/changes/bug21599 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (hidden services): - - Simplify hidden service descriptor creation by using an existing flag - to check if an introduction point is established. - Fixes bug 21599; bugfix on 0.2.7.2-alpha. diff --git a/changes/bug21641 b/changes/bug21641 deleted file mode 100644 index b04e52c..0000000 --- a/changes/bug21641 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor feature (defaults, directory): - - Onion key rotation and expiry intervals are now defined as a network - consensus parameter as per proposal 274. The default lifetime of an - onion key is bumped from 7 to 28 days. Old onion keys will expire after 7 - days by default. Closes ticket 21641. diff --git a/changes/bug21654 b/changes/bug21654 deleted file mode 100644 index c3badd2..0000000 --- a/changes/bug21654 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (testing): - - Use unbuffered I/O for utility functions around the process_handle_t - type. This fixes unit test failures reported on OpenBSD and FreeBSD. - Fixes bug 21654; bugfix on 0.2.3.1-alpha. diff --git a/changes/bug21703 b/changes/bug21703 deleted file mode 100644 index 3034fc5..0000000 --- a/changes/bug21703 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (controller): - - Warn the first time that a controller requests data in the - long-deprecated 'GETINFO network-status' format. Closes ticket 21703. - diff --git a/changes/bug21715 b/changes/bug21715 deleted file mode 100644 index 54ad1ad..0000000 --- a/changes/bug21715 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (documentation): - - Default of NumEntryGuards is 1 if the consensus parameter - guard-n-primary-guards-to-use isn't set. Default of NumDirectoryGuards - is 3 if the consensus parameter guard-n-primary-dir-guards-to-use isn't - set. Fixes bug 21715; bugfix on 0.3.0.1-alpha. diff --git a/changes/bug21788 b/changes/bug21788 deleted file mode 100644 index ad8365f..0000000 --- a/changes/bug21788 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (memory leak): - - Fix a small memory leak at exit from the backtrace handler code. - Fixes bug 21788; bugfix on 0.2.5.2-alpha. Patch from Daniel Pinto. diff --git a/changes/bug22042 b/changes/bug22042 deleted file mode 100644 index dccf83d..0000000 --- a/changes/bug22042 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor bugfixes (control, hidden service client): - - Trigger HS descriptor events on the control port when the client is - unable to pick a suitable hidden service directory. This can happen if - they are all in the ExcludeNodes list or they all have been queried - inside the allowed 15 minutes. Fixes bug 22042; bugfix on - 0.2.5.2-alpha. - diff --git a/changes/bug22060 b/changes/bug22060 deleted file mode 100644 index db373dd..0000000 --- a/changes/bug22060 +++ /dev/null @@ -1,28 +0,0 @@ - o Removed features (configuration options, all in ticket 22060): - - AllowInvalidNodes was deprecated in 0.2.9.2-alpha and now has been - removed. It is not possible anymore to use Invalid nodes. - - AllowSingleHopCircuits was deprecated in 0.2.9.2-alpha and now has been - removed. It's not possible anymore to attach streams to single hop exit - circuit. - - AllowSingleHopExits was deprecated in 0.2.9.2-alpha and now has been - removed. Relays no longer advertise that they can be used for single hop - exit proxy. - - ExcludeSingleHopRelays was deprecated in 0.2.9.2-alpha and now has been - removed. Client will always exclude relays that supports single hop - exits meaning relays that still advertise AllowSingleHopExits. - - FastFirstHopPK was deprecated in 0.2.9.2-alpha and now has been removed. - Decision for this feature will always be decided by the consensus. - - CloseHSClientCircuitsImmediatelyOnTimeout was deprecated in - 0.2.9.2-alpha and now has been removed. HS circuits never close on - circuit build timeout, they have a longer timeout period. - - CloseHSServiceRendCircuitsImmediatelyOnTimeout was deprecated in - 0.2.9.2-alpha and now has been removed. HS circuits never close on - circuit build timeout, they have a long timeout period. - - WarnUnsafeSocks was deprecated in 0.2.9.2-alpha and now has been - removed. Tor will now always warn the user if only an IP address is - given instead of an hostname on a SOCKS connection if SafeSocks is 1. - - TLSECGroup was deprecated in 0.2.9.2-alpha and now has been removed. - P256 EC group is always used. - - {Control,DNS,Dir,Socks,Trans,NATD,OR}ListenAddress was deprecated in - 0.2.9.2-alpha and now has been removed. Use the ORPort (and others). - diff --git a/changes/bug22096 b/changes/bug22096 deleted file mode 100644 index 83dac9c..0000000 --- a/changes/bug22096 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor features (linux seccomp2 sandbox): - - Increase the maximum allowed size passed to mprotect(PROT_WRITE) - from 1MB to 16MB. This was necessary with the glibc allocator in - order to allow worker threads to allocate more memory -- which in - turn is necessary because of our new use of worker threads for - compression. Closes ticket 22096. diff --git a/changes/bug22244 b/changes/bug22244 deleted file mode 100644 index ed5d36b..0000000 --- a/changes/bug22244 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor bugfixes (exit-side DNS): - - Fix an untriggerable assertion that checked the output of a - libevent DNS error, so that the assertion actually behaves as - expected. Fixes bug 22244; bugfix on 0.2.0.20-rc. Found by Andrey - Karpov using PVS-Studio. - diff --git a/changes/bug22245 b/changes/bug22245 deleted file mode 100644 index 6ae1859..0000000 --- a/changes/bug22245 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (bandwidth accounting): - - Roll over monthly accounting at the configured hour and minute, - rather than always at 00:00. - Fixes bug 22245; bugfix on 0.0.9rc1. - Found by Andrey Karpov with PVS-Studio. diff --git a/changes/bug22246 b/changes/bug22246 deleted file mode 100644 index dbdf31a..0000000 --- a/changes/bug22246 +++ /dev/null @@ -1,6 +0,0 @@ - o Major bugfixes (hidden service directory, security): - - Fix an assertion failure in the hidden service directory code, which - could be used by an attacker to remotely cause a Tor relay process to - exit. Relays running earlier versions of Tor 0.3.0.x should upgrade. - This security issue is tracked as tracked as - TROVE-2017-002. Fixes bug 22246; bugfix on 0.3.0.1-alpha. diff --git a/changes/bug22252 b/changes/bug22252 deleted file mode 100644 index 42b9d8e..0000000 --- a/changes/bug22252 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (configuration): - - Do not crash when starting with LearnCircuitBuildTimeout 0. - Fixes bug 22252; bugfix on 0.2.9.3-alpha. diff --git a/changes/bug22270 b/changes/bug22270 deleted file mode 100644 index 6b58446..0000000 --- a/changes/bug22270 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (fallback directory mirrors): - - Make the usage example in updateFallbackDirs.py actually work. - (And explain what it does.) - Fixes bug 22270; bugfix on 0.3.0.3-alpha. diff --git a/changes/cleanup22213 b/changes/cleanup22213 deleted file mode 100644 index d100aee..0000000 --- a/changes/cleanup22213 +++ /dev/null @@ -1,4 +0,0 @@ - o Code simplification and refactoring: - - Remove unused "ROUTER_ADDED_NOTIFY_GENERATOR" internal value. - Resolves ticket 22213. - diff --git a/changes/consdiff_21643 b/changes/consdiff_21643 deleted file mode 100644 index 38d4656..0000000 --- a/changes/consdiff_21643 +++ /dev/null @@ -1,5 +0,0 @@ - o Major features (internals): - - Add an ed diff/patch backend, optimized for consensus documents. - This backend will be the basis of our consensus diff implementation. - Most of the work here was done - by Daniel Martí. Closes ticket 21643. diff --git a/changes/data_dir_default_doc b/changes/data_dir_default_doc deleted file mode 100644 index 6b49bb2..0000000 --- a/changes/data_dir_default_doc +++ /dev/null @@ -1,3 +0,0 @@ - o Documentation: - - Correct the documentation about the default DataDirectory value. - Closes ticket 21151. diff --git a/changes/fast_channel_lookup b/changes/fast_channel_lookup deleted file mode 100644 index de0f351..0000000 --- a/changes/fast_channel_lookup +++ /dev/null @@ -1,2 +0,0 @@ - o Minor features (performance, controller): - - Add an O(1) implementation of channel_find_by_global_id(). diff --git a/changes/faster-keccak b/changes/faster-keccak deleted file mode 100644 index 45fc152..0000000 --- a/changes/faster-keccak +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (performance): - - The minimal keccak implementation we include now accesses memory - more efficiently, especially on little-endian systems. - Closes ticket 21737. diff --git a/changes/feature1922 b/changes/feature1922 deleted file mode 100644 index e3c059d..0000000 --- a/changes/feature1922 +++ /dev/null @@ -1,11 +0,0 @@ - o Minor feature (include on config files): - - Allow the use of %include on configuration files to include settings - from other files or directories. Using %include with a directory will - include all (non-dot) files in that directory in lexically sorted order - (non-recursive), closes ticket 1922. - - Makes SAVECONF command return error when overwriting a torrc - that has includes. Using SAVECONF with the FORCE option will - allow it to overwrite torrc even if includes are used, closes ticket - 1922. - - Adds config-can-saveconf to GETINFO command to tell if SAVECONF - will work without the FORCE option, closes ticket 1922. diff --git a/changes/feature21598 b/changes/feature21598 deleted file mode 100644 index 317ace4..0000000 --- a/changes/feature21598 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor feature (hidden services): - - Log a message when a hidden service descriptor has fewer introduction - points than specified in HiddenServiceNumIntroductionPoints. - Closes ticket 21598. diff --git a/changes/feature21622 b/changes/feature21622 deleted file mode 100644 index 163b90b..0000000 --- a/changes/feature21622 +++ /dev/null @@ -1,8 +0,0 @@ - o Minor feature (hidden services): - - Log a message when a hidden service reaches its introduction point - circuit limit, and when that limit is reset. - Follow up to ticket 21594, closes ticket 21622. - - Add more information to the message logged when a hidden service - descriptor has fewer introduction points than specified in - HiddenServiceNumIntroductionPoints. - Follow up to tickets 21598 and 21599, closes ticket 21622. diff --git a/changes/feature22106 b/changes/feature22106 deleted file mode 100644 index d277007..0000000 --- a/changes/feature22106 +++ /dev/null @@ -1,12 +0,0 @@ - o Major features (security, stability, experimental): - - - Tor now has the optional ability to include modules written in - Rust. To turn this on, pass the "--enable-rust" flag to the - configure script. - - It's not time to get excited yet: currently, there is no actual - Rust functionality beyond some simple glue code, and a notice at - startup to tell you that Rust is running. Still, we hope that - programmers and packagers will try building with rust - support, so that we can find issues with the build system, - and solve portability issues. Closes ticket 22106. diff --git a/changes/new_spooling_backend b/changes/new_spooling_backend deleted file mode 100644 index a100688..0000000 --- a/changes/new_spooling_backend +++ /dev/null @@ -1,7 +0,0 @@ - o Code simplification and refactoring: - - The logic that directory caches use to spool request to clients, - serving them one part at a time so as not to allocate too much memory, - has been refactored for consistency. Previously there was a separate - spooling implementation per type of spoolable data. Now there - is one common spooling implementation, with extensible data types. - Closes ticket 21651. diff --git a/changes/prop140 b/changes/prop140 deleted file mode 100644 index 661028c..0000000 --- a/changes/prop140 +++ /dev/null @@ -1,10 +0,0 @@ - o Major features (directory protocol): - - Tor relays and authorities are now able to serve clients an - abbreviated version of the networkstatus consensus document, - containing only the changes since the an older consensus document that - the client holds. Clients now request these documents when - available. When this new protocol is in use by both client and server, - they will use far less bandwidth (up to 94% less) to keep an up-to-date - consensus. Implements proposal 140; closes ticket 13339. Based - on work by by Daniel Martí. - diff --git a/changes/refactor_reached_eof b/changes/refactor_reached_eof deleted file mode 100644 index 33ab931..0000000 --- a/changes/refactor_reached_eof +++ /dev/null @@ -1,5 +0,0 @@ - o Code simplification and refactoring: - - - Break up the 630-line function connection_dir_client_reached_eof() into - a dozen smaller functions. This change should help maintainability and - readability of the client directory code. diff --git a/changes/storagedir b/changes/storagedir deleted file mode 100644 index afaaab3..0000000 --- a/changes/storagedir +++ /dev/null @@ -1,5 +0,0 @@ - o Minor features (infrastructure, seccomp2 sandbox): - - We now have a document storage backend compatible with the Linux - seccomp2 sandbox. The long-term plan is to use this backend for - consensus documents and for storing unparseable directory - material. Closes ticket 21645. diff --git a/changes/test21470 b/changes/test21470 deleted file mode 100644 index f3ce484..0000000 --- a/changes/test21470 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor features (unit tests): - - Improve version parsing tests: add tests for typical version components, - add tests for invalid versions, including numeric range and non-numeric - prefixes. - Unit tests 21278, 21450, and 21507. Partially implements 21470. diff --git a/changes/ticket13802 b/changes/ticket13802 deleted file mode 100644 index 35cd2b5..0000000 --- a/changes/ticket13802 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor features (testing): - - Add a general event-tracing instrumentation support to Tor. This - subsystem will enable developers and researchers to add fine-grained - instrumentation to their Tor instances, for use when examining Tor - network performance issues. There are no trace events yet, and - event-tracing is off by default unless enabled at compile time. - Implements ticket 13802. diff --git a/changes/ticket21564 b/changes/ticket21564 deleted file mode 100644 index 7e01f41..0000000 --- a/changes/ticket21564 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor features (fallback directory list): - - Replace the 177 fallbacks originally introduced in Tor 0.2.9.8 in - December 2016 (of which ~126 were still functional), with a list of - 151 fallbacks (32 new, 119 existing, 58 removed) generated in - May 2017. - Resolves ticket 21564. diff --git a/changes/ticket21646 b/changes/ticket21646 deleted file mode 100644 index a0e4fb6..0000000 --- a/changes/ticket21646 +++ /dev/null @@ -1,6 +0,0 @@ - o Code simplification and refactoring: - - Our API to launch directory requests has been greatly simplified - to become more extensible and less error-prone. We'll be using - this to improve support for adding extra headers to directory - requests. Closes ticket 21646. - diff --git a/changes/ticket21729 b/changes/ticket21729 deleted file mode 100644 index 51d1173..0000000 --- a/changes/ticket21729 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor features (logging): - - Log files are no longer created world-readable by default. - (Previously, most distributors would store the logs in a - non-world-readable location to prevent inappropriate access. This - change is an extra precaution.) Closes ticket 21729; patch from - toralf. - diff --git a/changes/ticket21841 b/changes/ticket21841 deleted file mode 100644 index 08c7406..0000000 --- a/changes/ticket21841 +++ /dev/null @@ -1,4 +0,0 @@ - o Code simplification and refactoring: - - Isolate our usage of the openssl headers so that they are only - used from our crypto wrapper modules, and from tests that examing those - modules' internals. Closes ticket 21841. diff --git a/changes/ticket21842 b/changes/ticket21842 deleted file mode 100644 index 4b039c6..0000000 --- a/changes/ticket21842 +++ /dev/null @@ -1,6 +0,0 @@ - o Removed features: - - We've removed the tor-checkkey tool from src/tools. Long ago, we - used it to help people detect RSA keys that were generated by - versions of Debian affected by CVE-2008-0166. But those keys - have been out of circulation for ages, and this tool is no - longer required. Closes ticket 21842. diff --git a/changes/ticket21953 b/changes/ticket21953 deleted file mode 100644 index 46e1642..0000000 --- a/changes/ticket21953 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor features (security, windows): - - Enable a couple of pieces of Windows hardening: one - (HeapEnableTerminationOnCorruption) that has been on-by-default since - Windows 8, and unavailable before Windows 7, and one - (PROCESS_DEP_DISABLE_ATL_THUNK_EMULATION) which we believe doesn't - affect us, but shouldn't do any harm. Closes ticket 21953. diff --git a/changes/ticket4998 b/changes/ticket4998 deleted file mode 100644 index b7b5d62..0000000 --- a/changes/ticket4998 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor features (relay, configuration): - - The MyFamily line may now be repeated as many times as desired, for - relays that want to configure large families. Closes ticket 4998; - patch by Daniel Pinto. -
tor-commits@lists.torproject.org