[tor-commits] [tor/master] Bring remaining 0.2.5.5-alpha entries into changelog

nickm at torproject.org nickm at torproject.org
Mon Jun 16 19:01:38 UTC 2014


commit 205084631257751b655c5bf33a1f290e2741bf27
Author: Nick Mathewson <nickm at torproject.org>
Date:   Mon Jun 16 15:00:10 2014 -0400

    Bring remaining 0.2.5.5-alpha entries into changelog
---
 ChangeLog                         |   86 ++++++++++++++++++++++++++++++++++++-
 changes/bug10405                  |    5 ---
 changes/bug10616                  |    4 --
 changes/bug11970                  |    7 ---
 changes/bug12169_simple           |    5 ---
 changes/bug12170                  |   11 -----
 changes/bug12184_diagnostic       |    4 --
 changes/bug12191                  |    7 ---
 changes/bug12195                  |    7 ---
 changes/bug12227                  |    5 ---
 changes/bug6799                   |   20 ---------
 changes/bug8746                   |    4 --
 changes/geoip6-june2014           |    2 -
 changes/more_8387_diagnosis       |    4 --
 changes/move-authdir-options      |    4 --
 changes/not_bug_8093              |    4 --
 scripts/maint/format_changelog.py |   18 ++++++--
 scripts/maint/sortChanges.py      |    9 ++++
 18 files changed, 107 insertions(+), 99 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 3dfb40a..cddd5ad 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,6 +1,24 @@
-Changes in version 0.2.5.5-alpha - 2014-06-??
+Changes in version 0.2.5.5-alpha - 2014-06-1?
   Write a blurb here.
 
+  o Major features (security, traffic analysis resistance):
+    - Increase the base amount of time that a canonical connection (one
+      that we have made to a known OR) is allowed to stay idle from 3
+      minutes to 15 minutes. This leaks less information about when
+      circuits have closed, and avoids unnecessary overhead from
+      renegotiating connections. Part of a fix for ticket 6799.
+    - Instead of closing connections after they have been idle for a
+      fixed interval, randomly add up to 50% to each connection's
+      maximum timeout. This makes it harder to tell when the last
+      circuit closed by looking at when a connection closes. Part of a
+      fix for ticket 6799.
+    - Base connection idleness tests on the actual time elapsed since
+      the connection last had circuits, not on the time when we last
+      added non-padding. This change also makes it harder for an
+      observer to tell when the last circuit closed by looking at when a
+      connection closes. Part of a fix for ticket 6799. Incidentally
+      fixes bug 12023; bugfix on 0.2.5.1-alpha.
+
   o Major bugfixes (security, OOM, new since 0.2.5.4-alpha, also in 0.2.4.22):
     - Fix a memory leak that could occur if a microdescriptor parse
       fails during the tokenizing step. This bug could enable a memory
@@ -13,6 +31,11 @@ Changes in version 0.2.5.5-alpha - 2014-06-??
       directory object. Previously, relays would used tunnel connections
       under a fairly wide variety of circumstances. Fixes bug 11469;
       bugfix on 0.2.4.3-alpha.
+    - When a circuit accidentally has the same circuit ID for its
+      forward and reverse direction, correctly detect the direction of
+      cells using that circuit. Previously, this would have made roughly
+      one circuit in a million non-functional. Fixes bug 12195; this is
+      a bugfix on every version of Tor.
 
   o Major bugfixes (security, directory authorities):
     - Directory authorities now include a digest of each relay's
@@ -30,6 +53,12 @@ Changes in version 0.2.5.5-alpha - 2014-06-??
       attacker from causing a microdescriptor collision, because the
       router's identity is not forgeable.
 
+  o Major bugfixes (client, pluggable transports):
+    - When managing pluggable transports, use OS notification facilities
+      to learn if they have crashed, and do not attempt to kill any
+      process that has already exited. Fix for bug 8746; bugfix
+      on 0.2.3.6-alpha.
+
   o Minor features (diagnostic):
     - When logging a warning because of bug #7164, additionally check
       the hash table for consistency (as proposed on ticket #11737).
@@ -42,8 +71,13 @@ Changes in version 0.2.5.5-alpha - 2014-06-??
       diagnosing bug 11233.
     - Give more specific warnings when we notice at the client side that
       an onion handshake has failed. Fixes ticket 9635.
+    - Add significant new logging code to attempt to diagnose bug 12184,
+      where relays seem to run out of available circuit IDs.
+    - Improve the diagnostic log message for bug #8387 even further to
+      try to improve our odds of figuring out why one-hop directory
+      circuits sometimes do not get closed.
 
-  o Minor features (security, memory management)):
+  o Minor features (security, memory management):
     - Add configure options controlling allocator tricks like mempools
       and freelists, and turn them off by default; on most platforms
       malloc is reasonable enough for this not to be necessary, and a
@@ -61,12 +95,29 @@ Changes in version 0.2.5.5-alpha - 2014-06-??
       support for libseccomp on systems that have it, in case it (or
       Tor's use of it) is broken. Resolves ticket 11628.
 
+  o Minor features (other):
+    - Update geoip and geoip6 to the June 4 2014 Maxmind GeoLite2
+      Country database.
+
   o Minor bugfixes (configuration, security, new since 0.2.5.4-alpha, also in 0.2.4.22):
     - When running a hidden service, do not allow TunneledDirConns 0;
       this will keep the hidden service from running, and also
       make it publish its descriptors directly over HTTP. Fixes bug 10849;
       bugfix on 0.2.1.1-alpha.
 
+  o Minor bugfixes (performance):
+    - Do not recompute whether we have sufficient information to build
+      circuits every time we make a successful connection. Previously,
+      we would forget our cached value for this flag every time we
+      successfully opened a channel (or marked a router as running or
+      not running for any other reason), regardless of whether we had
+      previously believed the router to be running. This forced us to
+      run a fairly expensive update operation with relatively high
+      frequency. Fixes bug 12170; bugfix on 0.1.2.1-alpha.
+    - Avoid using tor_memeq() for checking relay cell integrity. This
+      removes a possible performance bottleneck. Fixes part of bug
+      12169; bugfix on 0.2.1.31.
+
   o Minor bugfixes (compilation):
     - Fix compilation of test_status.c when building with MVSC. Bugfix
       on 0.2.5.4-alpha. Patch from Gisle Vanem.
@@ -140,6 +191,12 @@ Changes in version 0.2.5.5-alpha - 2014-06-??
     - Handle failures in getpwnam()/getpwuid() when running with the
       User option set and the Linux syscall sandbox enabled. Fixes bug
       11946; bugfix on 0.2.5.1-alpha.
+    - Refactor the getaddrinfo workaround that the seccomp sandbox uses
+      to avoid calling getaddrinfo() after installing the sandbox
+      filters. Previously, it preloaded a cache with the IPv4 address
+      for our hostname, and nothing else. Now, it loads the cache with
+      every address that it used to initialize the Tor process. Fixes
+      bug 11970; bugfix on 0.2.5.1-alpha.
 
   o Minor bugfixes (pluggable transports):
     - Enable the ExtORPortCookieAuthFile option, to allow changing the
@@ -152,6 +209,12 @@ Changes in version 0.2.5.5-alpha - 2014-06-??
       descriptors for our bridges. Fixes bug 11965; bugfix
       on 0.2.3.6-alpha.
 
+  o Minor bugfixes (client):
+    - Avoid "Tried to open a socket with DisableNetwork set" warnings
+      when starting a client with bridges configured and DisableNetwork
+      set. (Tor launcher starts Tor with DisableNetwork set the first
+      time.) Fixes bug 10405; bugfix on 0.2.3.9-alpha.
+
   o Minor bugfixes (testing):
     - The Python parts of the test scripts now work on Python 3 as well
       as Python 2, so systems where '/usr/bin/python' is Python 3 will
@@ -188,9 +251,25 @@ Changes in version 0.2.5.5-alpha - 2014-06-??
       error value, even on success. Fixes bug 11805; bugfix
       on 0.2.5.4-alpha.
 
+  o Minor bugfixes (relay, other):
+    - We now drop CREATE cells for already-existent circuit IDs and for
+      zero-valued circuit IDs, regardless of other factors that might
+      otherwise have called for DESTROY cells. Fixes bug 12191; bugfix
+      on 0.0.8pre1.
+    - Avoid an illegal read from stack when initializing the TLS module
+      using a version of OpenSSL without all of the ciphers used by the
+      v2 link handshake. Fixes bug 12227; bugfix on 0.2.4.8-alpha. Found
+      by "starlight".
+    - When rejecting DATA cells for stream_id zero, still count them
+      against the circuit's deliver window so that we don't get fail to
+      send a SENDME. Fix for bug 11246; bugfix on 0.2.4.10-alpha.
+
   o Minor bugfixes (logging):
     - Fix a misformatted log message about delayed directory fetches.
       Fixes bug 11654; bugfix on 0.2.5.3-alpha.
+    - Squelch a spurious LD_BUG message "No origin circuit for
+      successful SOCKS stream" in certain hidden service failure cases;
+      fixes bug #10616.
 
   o Distribution:
     - Include a tor.service file in contrib/dist for use with systemd.
@@ -204,6 +283,9 @@ Changes in version 0.2.5.5-alpha - 2014-06-??
       directory authority options, remove the documentation for a
       V2-directory fetching option that no longer exists. Resolves
       ticket 11634.
+    - In the manpage, move more authority-only options into the
+      directory authority section so that operators of regular directory
+      caches don't get confused.
 
   o Package cleanup:
     - The contrib directory has been sorted and tidy. Before, it was an
diff --git a/changes/bug10405 b/changes/bug10405
deleted file mode 100644
index d1110e4..0000000
--- a/changes/bug10405
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Avoid "Tried to open a socket with DisableNetwork set" warnings
-      when starting a client with bridges configured and DisableNetwork
-      set. (Tor launcher starts Tor with DisableNetwork set the first
-      time.) Fixes bug 10405; bugfix on 0.2.3.9-alpha.
diff --git a/changes/bug10616 b/changes/bug10616
deleted file mode 100644
index 26f0bda..0000000
--- a/changes/bug10616
+++ /dev/null
@@ -1,4 +0,0 @@
- o Bugfixes:
-   - Squelch a spurious LD_BUG message "No origin circuit for successful
-     SOCKS stream" in certain hidden service failure cases; fixes bug
-     #10616.
diff --git a/changes/bug11970 b/changes/bug11970
deleted file mode 100644
index 896f0cf..0000000
--- a/changes/bug11970
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes (linux seccomp sandbox):
-    - Refactor the getaddrinfo workaround that the seccomp sandbox
-      uses to avoid calling getaddrinfo() after installing the sandbox
-      filters. Previously, it preloaded a cache with the IPv4 address
-      for our hostname, and nothing else. Now, it loads the cache with
-      every address that it used to initialize the Tor process. Fixes
-      bug 11970; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug12169_simple b/changes/bug12169_simple
deleted file mode 100644
index f9a3007..0000000
--- a/changes/bug12169_simple
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (performance):
-    - Avoid using tor_memeq() for checking relay cell integrity.
-      This removes a possible performance bottleneck. Fixes part of bug
-      12169; bugfix on 0.2.1.31.
-
diff --git a/changes/bug12170 b/changes/bug12170
deleted file mode 100644
index e462e4f..0000000
--- a/changes/bug12170
+++ /dev/null
@@ -1,11 +0,0 @@
-  o Major bugfixes (performance):
-    - Do not recompute whether we have sufficient information to build
-      circuits every time we make a successful connection. Previously,
-      we would forget our cached value for this flag every time we
-      successfully opened a channel (or marked a router as running or not
-      running for any
-      other reason), regardless of whether we had
-      previously believed the router to be running. This forced us to
-      run a fairly expensive update operation with relatively
-      high frequency.
-      Fixes bug 12170; bugfix on 0.1.2.1-alpha.
diff --git a/changes/bug12184_diagnostic b/changes/bug12184_diagnostic
deleted file mode 100644
index 3c783b1..0000000
--- a/changes/bug12184_diagnostic
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (diagnostic):
-    - Add significant new logging code to attempt to diagnose bug 12184,
-      where relays seem to run out of available circuit IDs.
-
diff --git a/changes/bug12191 b/changes/bug12191
deleted file mode 100644
index 77589ab..0000000
--- a/changes/bug12191
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes:
-
-    - We now drop CREATE cells for already-existent circuit IDs and
-      for zero-valued circuit IDs, regardless of other factors that
-      might otherwise have called for DESTROY cells.  Fixes bug 12191;
-      bugfix on 0.0.8pre1.
-
diff --git a/changes/bug12195 b/changes/bug12195
deleted file mode 100644
index f798129..0000000
--- a/changes/bug12195
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Major bugfixes:
-    - When a circuit accidentally has the same circuit ID for its
-      forward and reverse direction, correctly detect the direction of
-      cells using that circuit. Previously, this would have made
-      roughly one circuit in a million non-functional. Fixes bug
-      12195; this is a bugfix on every version of Tor.
-
diff --git a/changes/bug12227 b/changes/bug12227
deleted file mode 100644
index d8b5d08..0000000
--- a/changes/bug12227
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Avoid an illegal read from stack when initializing the TLS
-      module using a version of OpenSSL without all of the ciphers
-      used by the v2 link handshake. Fixes bug 12227; bugfix on
-      0.2.4.8-alpha.  Found by "starlight".
diff --git a/changes/bug6799 b/changes/bug6799
deleted file mode 100644
index 72b6519..0000000
--- a/changes/bug6799
+++ /dev/null
@@ -1,20 +0,0 @@
-  o Major features:
-
-    - Increase the base amount of time that a canonical connection
-      (one that we have made to a known OR) is allowed to stay idle
-      from 3 minutes to 15 minutes.  This leaks less information
-      about when circuits have closed, and avoids unnecessary overhead
-      from renegotiating connections. Part of a fix for ticket 6799.
-
-    - Instead of closing connections after they have been idle for a
-      fixed interval, randomly add up to 50% to each connection's
-      maximum timeout. This makes it harder to tell when the last
-      circuit closed by looking at when a connection closes. Part of a
-      fix for ticket 6799.
-
-    - Base connection idleness tests on the actual time elapsed since
-      the connection last had circuits, not on the time when we last
-      added non-padding. This change also makes it harder for an
-      observer to tell when the last circuit closed by looking at when
-      a connection closes. Part of a fix for ticket 6799.
-      Incidentally fixes bug 12023; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug8746 b/changes/bug8746
deleted file mode 100644
index b6e52ca..0000000
--- a/changes/bug8746
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Major bugfixes:
-    - When managing pluggable transports, use OS notification facilities to
-      learn if they have crashed, and do not attempt to kill any process
-      that has already exited. Fix for bug 8746; bugfix on 0.2.3.6-alpha.
diff --git a/changes/geoip6-june2014 b/changes/geoip6-june2014
deleted file mode 100644
index 1a33e6f..0000000
--- a/changes/geoip6-june2014
+++ /dev/null
@@ -1,2 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the June 4 2014 Maxmind GeoLite2 Country database.
diff --git a/changes/more_8387_diagnosis b/changes/more_8387_diagnosis
deleted file mode 100644
index 68a36a1..0000000
--- a/changes/more_8387_diagnosis
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (diagnostic):
-    - Improve the diagnostic log message for bug #8387 even further to
-      try to improve our odds of figuring out why one-hop directory
-      circuits sometimes do not get closed.
diff --git a/changes/move-authdir-options b/changes/move-authdir-options
deleted file mode 100644
index 05669b8..0000000
--- a/changes/move-authdir-options
+++ /dev/null
@@ -1,4 +0,0 @@
-   o Documentation:
-     - In the manpage, move more authority-only options into the
-       directory authority section so that operators of regular
-       directory caches don't get confused.
diff --git a/changes/not_bug_8093 b/changes/not_bug_8093
deleted file mode 100644
index 98b4219..0000000
--- a/changes/not_bug_8093
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - When rejecting DATA cells for stream_id zero, still count them against
-      the circuit's deliver window so that we don't get fail to send a
-      SENDME.  Fix for bug 11246; bugfix on 0.2.4.10-alpha.
diff --git a/scripts/maint/format_changelog.py b/scripts/maint/format_changelog.py
index 86f5c50..f67e89b 100755
--- a/scripts/maint/format_changelog.py
+++ b/scripts/maint/format_changelog.py
@@ -270,7 +270,16 @@ class ChangeLog(object):
 CL = ChangeLog()
 parser = head_parser
 
-sys.stdin = open('ChangeLog', 'r')
+if len(sys.argv) == 1:
+    fname = 'ChangeLog'
+else:
+    fname = sys.argv[1]
+
+fname_new = fname+".new"
+
+sys.stdin = open(fname, 'r')
+
+nextline = None
 
 for line in sys.stdin:
     line = line.rstrip()
@@ -286,13 +295,14 @@ for line in sys.stdin:
 
 CL.lint()
 
-sys.stdout = open('ChangeLog.new', 'w')
+sys.stdout = open(fname_new, 'w')
 
 CL.dump()
 
-print nextline
+if nextline is not None:
+    print nextline
 
 for line in sys.stdin:
     sys.stdout.write(line)
 
-os.rename('ChangeLog.new', 'ChangeLog')
+os.rename(fname_new, fname)
diff --git a/scripts/maint/sortChanges.py b/scripts/maint/sortChanges.py
index f70490b..726a723 100755
--- a/scripts/maint/sortChanges.py
+++ b/scripts/maint/sortChanges.py
@@ -1,4 +1,13 @@
 #!/usr/bin/python
+# Copyright (c) 2014, The Tor Project, Inc.
+# See LICENSE for licensing information
+
+"""This script sorts a bunch of changes files listed on its command
+   line into roughly the order in which they should appear in the
+   changelog.
+
+   TODO: collation support.
+"""
 
 import re
 import sys



More information about the tor-commits mailing list