[tor-commits] [tor/master] fold in changes files

arma at torproject.org arma at torproject.org
Tue Nov 13 04:53:41 UTC 2012


commit 713b5eb31ccc1169db9fac9cbd20434ec242d56f
Author: Roger Dingledine <arma at torproject.org>
Date:   Mon Nov 12 23:51:47 2012 -0500

    fold in changes files
---
 ChangeLog                         |   61 +++++++++++++++++++++++++++++++++++++
 changes/5053                      |    4 --
 changes/5055                      |    9 -----
 changes/bsd_queue                 |    7 ----
 changes/bug7195                   |    4 --
 changes/bug7212                   |    6 ----
 changes/bug7235                   |    3 --
 changes/bug7285                   |    4 --
 changes/bug7350                   |    5 ---
 changes/bug7352                   |   12 -------
 changes/bug7422                   |    3 --
 changes/bug7464                   |    4 --
 changes/check_for_orconn_on_close |    4 --
 changes/ewma_policy_c99           |    3 --
 14 files changed, 61 insertions(+), 68 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 0541c44..0d6221b 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,64 @@
+Changes in version 0.2.4.6-alpha - 2012-11-13
+  Tor 0.2.4.6-alpha fixes an assert bug that has been plaguing relays,
+  makes our defense-in-depth memory wiping more reliable, and begins to
+  count IPv6 addresses in bridge statistics,
+
+  o Major bugfixes:
+    - Fix an assertion failure that could occur when closing a connection
+      with a spliced rendezvous circuit. Fix for bug 7212; bugfix on
+      Tor 0.2.4.4-alpha.
+    - Tor tries to wipe potentially sensitive data after using it, so
+      that if some subsequent security failure exposes Tor's memory,
+      the damage will be limited. But we had a bug where the compiler
+      was eliminating these wipe operations when it decided that the
+      memory was no longer visible to a (correctly running) program,
+      hence defeating our attempt at defense in depth. We fix that
+      by using OpenSSL's OPENSSL_cleanse() operation, which a compiler
+      is unlikely to optimize away. Future versions of Tor may use
+      a less ridiculously heavy approach for this. Fixes bug 7352.
+      Reported in an article by Andrey Karpov.
+
+  o Minor features:
+    - Add GeoIP database for IPv6 addresses. The new config option
+      is GeoIPv6File.
+    - Bridge statistics now count bridge clients connecting over IPv6:
+      bridge statistics files now list "bridge-ip-versions" and
+      extra-info documents list "geoip6-db-digest". The control protocol
+      "CLIENTS_SEEN" and "ip-to-country" queries now support IPv6. Initial
+      implementation by "shkoo", addressing ticket 5055.
+
+  o Minor bugfixes:
+    - Warn when we are binding low ports when hibernation is enabled;
+      previously we had warned when we were _advertising_ low ports with
+      hibernation enabled. Fixes bug 7285; bugfix on 0.2.3.9-alpha.
+    - Fix a harmless bug when opting against publishing a relay descriptor
+      because DisableNetwork is set. Fixes bug 7464; bugfix on
+      0.2.3.9-alpha.
+    - Add warning message when a managed proxy dies during configuration.
+      Fixes bug 7195; bugfix on 0.2.4.2-alpha.
+    - Fix a linking error when building tor-fw-helper without miniupnp.
+      Fixes bug 7235; bugfix on 0.2.4.2-alpha. Fix by Anthony G. Basile.
+    - Check for closing an or_connection_t without going through correct
+      channel functions; emit a warning and then call
+      connection_or_close_for_error() so we don't assert as in bugs 7212
+      and 7267.
+    - Compile correctly on compilers without C99 designated initializer
+      support. Fixes bug 7286; bugfix on 0.2.4.4-alpha.
+    - Avoid a possible assert that can occur when channel_send_destroy() is
+      called on a channel in CHANNEL_STATE_CLOSING, CHANNEL_STATE_CLOSED,
+      or CHANNEL_STATE_ERROR when the Tor process is resumed after being
+      blocked for a long interval. Fixes bug 7350; bugfix on 0.2.4.4-alpha.
+    - Fix a memory leak on failing cases of channel_tls_process_certs_cell.
+      Fixes bug 7422; bugfix on 0.2.4.4-alpha.
+
+  o Code simplification and refactoring:
+    - Start using OpenBSD's implementation of queue.h, so that we don't
+      need to hand-roll our own pointer and list structures whenever we
+      need them. (We can't rely on a sys/queue.h, since some operating
+      systems don't have them, and the ones that do have them don't all
+      present the same extensions.)
+
+
 Changes in version 0.2.4.5-alpha - 2012-10-25
   Tor 0.2.4.5-alpha comes hard at the heels of 0.2.4.4-alpha, to fix
   two important security vulnerabilities that could lead to remotely
diff --git a/changes/5053 b/changes/5053
deleted file mode 100644
index c695f3c..0000000
--- a/changes/5053
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (IPv6):
-    - Bridge clients connecting over IPv6 are now counted in bridge
-      statistics. Implementation by shkoo, addressing ticket 5053.
-      Included in 0.2.3.14-alpha.
diff --git a/changes/5055 b/changes/5055
deleted file mode 100644
index d51fef4..0000000
--- a/changes/5055
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Minor features (IPv6):
-    - Add GeoIP database for IPv6 addresses and use it. The new config
-      option is GeoIPv6File.
-      Bridge clients connecting over IPv6 are now counted in bridge
-      statistics. Bridge statistics files now list "bridge-ip-versions"
-      and extra-info documents list "geoip6-db-digest".
-      The control protocol has been extended to support more IPv6
-      ("CLIENTS_SEEN" and "ip-to-country").
-      Initial implementation by shkoo, addressing ticket 5055.
diff --git a/changes/bsd_queue b/changes/bsd_queue
deleted file mode 100644
index 024ca6f..0000000
--- a/changes/bsd_queue
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Code simplification and refactoring:
-    - Start using OpenBSD's implementation of queue.h, so that we don't
-      need to hand-roll our own pointer and list structures whenever we
-      need them. (We can't rely on a sys/queue.h, since some operating
-      systems don't have them, and the ones that do have them don't all
-      present the same extensions.)
-
diff --git a/changes/bug7195 b/changes/bug7195
deleted file mode 100644
index 86ddeca..0000000
--- a/changes/bug7195
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Add warning message when a managed proxy dies during
-      configuration. Fixes bug 7195; bugfix on 0.2.4.2-alpha.
-
diff --git a/changes/bug7212 b/changes/bug7212
deleted file mode 100644
index be68f50..0000000
--- a/changes/bug7212
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes (relay):
-    - Fix an assertion failure that could occur when closing a connection
-      with a spliced rendezvous circuit. Fix for bug 7212; bugfix on
-      Tor 0.2.4.4-alpha.
-
-      
diff --git a/changes/bug7235 b/changes/bug7235
deleted file mode 100644
index 15d6100..0000000
--- a/changes/bug7235
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (build):
-    - Fix a linking error when building tor-fw-helper without miniupnp.
-      Fixes bug 7235; bugfix on 0.2.4.2-alpha. Fix by Anthony G. Basile.
diff --git a/changes/bug7285 b/changes/bug7285
deleted file mode 100644
index 3c00205..0000000
--- a/changes/bug7285
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Warn when we are binding low ports when hibernation is enabled;
-      previously we had warned when we were _advertising_ low ports with
-      hibernation enabled. Fixes bug 7285; bugfix on 0.2.3.9-alpha.
diff --git a/changes/bug7350 b/changes/bug7350
deleted file mode 100644
index 9c2f20d..0000000
--- a/changes/bug7350
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Avoid a possible assert that can occur when channel_send_destroy() is
-      called on a channel in CHANNEL_STATE_CLOSING, CHANNEL_STATE_CLOSED
-      or CHANNEL_STATE_ERROR when the Tor process is resumed after being
-      blocked for a long interval.  Fixes bug 7350.
diff --git a/changes/bug7352 b/changes/bug7352
deleted file mode 100644
index 74a878d..0000000
--- a/changes/bug7352
+++ /dev/null
@@ -1,12 +0,0 @@
-  o Major bugfixes:
-    - Tor tries to wipe potentially sensitive data after using it, so
-      that if some subsequent security failure exposes Tor's memory,
-      the damage will be limited. But we had a bug where the compiler
-      was eliminating these wipe operations when it decided that the
-      memory was no longer visible to a (correctly running) program,
-      hence defeating our attempt at defense in depth. We fix that
-      by using OpenSSL's OPENSSL_cleanse() operation, which a compiler
-      is unlikely to optimize away. Future versions of Tor may use
-      a less ridiculously heavy approach for this. Fixes bug 7352.
-      Reported in an article by Andrey Karpov.
-
diff --git a/changes/bug7422 b/changes/bug7422
deleted file mode 100644
index 652f1a2..0000000
--- a/changes/bug7422
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes:
-    - Fix a memory leak on failing cases of channel_tls_process_certs_cell.
-      Fixes bug 7422; bugfix on 0.2.4.4-alpha.
diff --git a/changes/bug7464 b/changes/bug7464
deleted file mode 100644
index 9259cc7..0000000
--- a/changes/bug7464
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Fix a harmless bug when opting against publishing a relay descriptor
-      because DisableNetwork is set. Fixes bug 7464; bugfix on
-      0.2.3.9-alpha.
diff --git a/changes/check_for_orconn_on_close b/changes/check_for_orconn_on_close
deleted file mode 100644
index 4d76d5e..0000000
--- a/changes/check_for_orconn_on_close
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Check for closing an or_connection_t without going through correct
-      channel functions; emit a warning and then call
-      connection_or_close_for_error() so we don't assert as in 7212 and 7267.
diff --git a/changes/ewma_policy_c99 b/changes/ewma_policy_c99
deleted file mode 100644
index 49177b3..0000000
--- a/changes/ewma_policy_c99
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes:
-    - Compile correctly on compilers without C99 designated initializer
-      support. Fixes bug 7286; bugfix on 0.2.4.4-alpha.



More information about the tor-commits mailing list