[tor-commits] [tor/master] Start on an 0.3.0.1-alpha changelog

nickm at torproject.org nickm at torproject.org
Mon Dec 19 15:30:50 UTC 2016


commit ec68ed5afcdd7be4d19c1000fb26fc60714a603f
Author: Nick Mathewson <nickm at torproject.org>
Date:   Mon Dec 19 10:30:24 2016 -0500

    Start on an 0.3.0.1-alpha changelog
---
 ChangeLog            | 221 ++++++++++++++++++++++++++++++++++++++++++++++++++-
 changes/14881        |   8 --
 changes/17070        |   4 -
 changes/19965        |   3 -
 changes/20273        |   4 -
 changes/20511        |   3 -
 changes/20526        |   5 --
 changes/20853        |   4 -
 changes/bug13827     |   3 -
 changes/bug17779     |   6 --
 changes/bug19043     |   5 --
 changes/bug19563     |   3 -
 changes/bug20027     |   3 -
 changes/bug20048     |   4 -
 changes/bug20269     |   4 -
 changes/bug20389     |   4 -
 changes/bug20435     |   4 -
 changes/bug20459     |   6 --
 changes/bug20530     |   4 -
 changes/bug20559     |   4 -
 changes/bug20593.2   |   4 -
 changes/bug20622     |   8 --
 changes/bug20646     |   5 --
 changes/bug20667     |   5 --
 changes/bug20839     |   5 --
 changes/bug20860     |   4 -
 changes/bug6769      |   5 --
 changes/feature13752 |   4 -
 changes/feature15055 |   6 --
 changes/feature15056 |  28 -------
 changes/feature17238 |   6 --
 changes/feature20552 |   4 -
 changes/ticket18873  |  10 ---
 changes/ticket19858  |   4 -
 changes/ticket20077  |   5 --
 changes/ticket20486  |   3 -
 changes/ticket20717  |   3 -
 changes/ticket20831  |   6 --
 changes/ticket20960  |   5 --
 changes/ticket5500   |   3 -
 40 files changed, 220 insertions(+), 205 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 155f133..5f5a8f6 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,4 +1,223 @@
-Changes in version 0.3.0.1-alpha - 2016-??-??
+Changes in version 0.3.0.1-alpha - 2016-12-??
+  Tor 0.3.0.1-alpha is the first alpha release in the 0.3.0 development
+  series. It strengthens Tor's link and circuit handshakes by
+  identifying relays by their Ed25519 keys, improves the algorithm that
+  clients use to choose and maintain their list of guards, and includes
+  additional backend support for the next-generation hidden service
+  design. It also contains numerous other small features and
+  improvements to security, correctness, and performance.
+
+  Below are the changes since 0.2.9.8.
+
+  o Major features (next-generation hidden services):
+    - Relays can now handle v3 ESTABLISH_INTRO cells as specified by
+      prop224 aka "Next Generation Hidden Services". Service and clients
+      don't yet use this code functionnality. It marks another step
+      towards prop224 deployment. Resolves ticket 19043. Initial code by
+      Alec Heifetz.
+    - Tor relays now support the HSDir version 3 protocol meaning they
+      can store and serve v3 descriptors. This is part of the next
+      generation onion service work detailled in proposal 224. The tor
+      daemon also contains all the necessary code to encode and decode a
+      v3 descriptor but it's currently only used by the directory
+      subsystem. Closes ticket 17238.
+
+  o Major features (protocol, ed25519 identity keys):
+    - Tor relays now use Ed25519 to prove their Ed25519 identities and
+      to one another, and to clients. This algorithm is faster and more
+      secure than the RSA-based handshake we've been doing until now.
+      Implements the second big part of proposal 220; Closes
+      ticket 15055.
+    - Clients now support including Ed25519 identity keys in the EXTEND2
+      cells they generate. By default, this is controlled by a consensus
+      parameter, currently disabled. You can turn this feature on for
+      testing by setting ExtendByEd25519ID in your configuration. This
+      might make your traffic appear different than the traffic
+      generated by other users, however. Implements part of ticket
+      15056; part of proposal 220.
+    - Relays now understand requests to extend to other relays by their
+      Ed25519 identity keys. When an Ed25519 identity key is included in
+      an EXTEND2 cell, the relay will only extend the circuit if the
+      other relay can prove ownership of that identity. Implements part
+      of ticket 15056; part of proposal 220.
+
+  o Major bugfixes (scheduler):
+    - Fix an issue where the ewma_cmp_cmux() function would never
+      consider circuit policies to be different. This bug caused the
+      channel scheduler to behave more or less randomly, rather than
+      preferring channels with higher-priority circuits. Fixes bug
+      20459; bugfix on 0.2.6.2-alpha.
+
+  o Minor features (controller):
+    - When HSFETCH arguments cannot be parsed, say "Invalid argument"
+      rather than "unrecognized." Closes ticket 20389; patch from
+      Ivan Markin.
+
+  o Minor features (diagnostic, directory client):
+    - Warn if we find an unexpected inconsistency in directory download
+      status objects. Prevents some negative consequences of bug 20593.
+
+  o Minor features (directory authority):
+    - Add a new authority-only AuthDirTestEd25519LinkKeys option (on by
+      default) to control whether authorities should try to probe relays
+      by their Ed25519 link keys. This option will go away in a few
+      releases--unless we encounter major trouble in our ed25519 link
+      protocol rollout, in which case it will serve as a safety option.
+
+  o Minor features (directory cache):
+    - Relays and bridges will now refuse to serve the consensus they
+      have if they know it is too old for a client to use. Closes
+      ticket 20511.
+
+  o Minor features (ed25519 link handshake):
+    - Advertise support for the ed25519 link handshake using the
+      subprotocol-versions mechanism, so that clients can tell which
+      relays can identity themselves by Ed25519 ID. Closes ticket 20552.
+
+  o Minor features (fingerprinting resistence, authentication):
+    - Extend the length of RSA keys used for TLS link authentication to
+      2048 bits. (These weren't used for forward secrecy; for forward
+      secrecy, we used P256.) Closes ticket 13752.
+
+  o Minor features (infrastructure):
+    - Implement smartlist_add_strdup() function. Replaces the use of
+      smartlist_add(sl, tor_strdup(str)). Closes ticket 20048.
+
+  o Minor features (unit tests):
+    - Add tests for networkstatus_compute_bw_weights_v10.
+    - Add unit tests circuit_predict_and_launch_new.
+    - Extract dummy_origin_circuit_new so it can be used by other
+      test functions.
+
+  o Minor bugfix (configuration):
+    - Accept non-space whitespace characters after the severity level in
+      the `Log` option. Fixes bug 19965; bugfix on 0.2.1.1-alpha.
+
+  o Minor bugfix (hidden services):
+    - Change ephemeral service checks in `rendservice.c` to use the new
+      `rend_service_is_ephemeral` helper function. Fixes bug 20853;
+      bugfix on bug 20526; not in any released version of Tor.
+
+  o Minor bugfix (util):
+    - When finishing writing a file to disk, if we were about to replace
+      the file with the temporary file created before and we fail to
+      replace it, remove the temporary file so it doesn't stay on disk.
+      Fixes bug 20646; bugfix on tor-0.2.0.7-alpha. Patch by fk.
+
+  o Minor bugfixes (client):
+    - When clients that use bridges start up with a cached consensus on
+      disk, they were ignoring it and downloading a new one. Now they
+      use the cached one. Fixes bug 20269; bugfix on 0.2.3.12-alpha.
+
+  o Minor bugfixes (configuration):
+    - Support "TByte" and "TBytes" units in options given in bytes.
+      "TB", "terabyte(s)", "TBit(s)" and "terabit(s)" were already
+      supported. Fixes bug 20622; bugfix on 0.2.0.14-alpha.
+
+  o Minor bugfixes (consensus weight):
+    - Add new consensus method that initializes bw weights to 1 instead
+      of 0. This prevents a zero weight from making it all the way to
+      the end (happens in small testing networks) and causing an error.
+      Fixes bug 14881; bugfix on 0.2.2.17-alpha.
+
+  o Minor bugfixes (descriptors):
+    - Correctly recognise downloaded full descriptors as valid, even
+      when using microdescriptors as circuits. This affects clients with
+      FetchUselessDescriptors set, and may affect directory authorities.
+      Fixes bug 20839; bugfix on commit 6083276 in 0.2.3.2-alpha.
+
+  o Minor bugfixes (directory downloads):
+    - Download all consensus flavors, descriptors, and authority
+      certificates when FetchUselessDescriptors is set, regardless of
+      whether tor is a directory cache or not. Fixes bug 20667; bugfix
+      on all recent tor versions.
+
+  o Minor bugfixes (directory system):
+    - Bridges and relays now use microdescriptors (like clients do)
+      rather than old-style router descriptors. Now bridges will blend
+      in with clients in terms of the circuits they build. Fixes bug
+      6769; bugfix on 0.2.3.2-alpha.
+
+  o Minor bugfixes (ed25519 certificates):
+    - Correctly interpret ed25519 certificates that would expire some
+      time after 19 Jan 2038. Fixes bug 20027; bugfix on 0.2.7.2-alpha.
+
+  o Minor bugfixes (hidden services):
+    - Stop ignoring duplicate hidden services when validating: this
+      could lead to a crash when those services were created. Fixes bug
+      20860; bugfix on 20559; not in any released version of tor.
+    - Stop ignoring misconfigured hidden services. Instead, refuse to
+      start tor until the misconfigurations have been corrected. Fixes
+      bug 20559; bugfix on multiple commits in 0.2.7.1-alpha
+      and earlier.
+
+  o Minor bugfixes (memory leak at exit):
+    - Fix a small harmless memory leak at exit of the previously unused
+      RSA->Ed identity cross-certificate. Fixes bug 17779; bugfix
+      on 0.2.7.2-alpha.
+
+  o Minor bugfixes (Windows):
+    - Check for getpagesize before using it to mmap files. This fixes
+      compilation in some MinGW environments. Fixes bug 20530; bugfix on
+      0.1.2.1-alpha. Reported by "ice".
+
+  o Code simplification and refactoring:
+    - Abolish all global guard context in entrynodes.c; replace with new
+      guard_selection_t structure as preparation for proposal 271.
+      Closes ticket 19858.
+    - Introduce rend_service_is_ephemeral() that tells if given onion
+      service is ephemeral. Replace unclear NULL-checkings for service
+      directory with this function. Closes ticket 20526.
+    - Extract magic numbers in circuituse.c into defined variables.
+    - Refactor circuit_is_available_for_use to remove unnecessary check.
+    - Refactor circuit_predict_and_launch_new for readability and
+      testability. Closes ticket 18873.
+    - Refactor large if statement in purpose_needs_anonymity to use
+      switch statement instead. Closes part of ticket 20077.
+    - Refactor the hashing API to return negative values for errors, as
+      is done as throughout the codebase. Closes ticket 20717.
+    - Remove data structures that were used to index or_connection
+      objects by their RSA identity digests. These structures are fully
+      redundant with the similar structures used in the
+      channel abstraction.
+    - Remove duplicate code in the channel_write_*cell() functions.
+      Closes ticket 13827; patch from Pingl.
+    - Remove redundant behavior of is_sensitive_dir_purpose, refactor to
+      use only purpose_needs_anonymity. Closes part of ticket 20077.
+    - The code to generate and parse EXTEND and EXTEND2 cells has been
+      replaced with code automatically generated by the
+      "trunnel" utility.
+
+  o Documentation:
+    - Include the "TBits" unit in Tor's man page. Fixes part of bug
+      20622; bugfix on tor-0.2.5.1-alpha.
+    - Change '1' to 'weight_scale' in consensus bw weights calculation
+      comments, as that is reality. Closes ticket 20273. Patch
+      from pastly.
+    - Set the default value from 250 KBytes to 2 MBytes for
+      AuthDirGuardBWGuarantee in the man page which is what the code is
+      using; Fixes bug 20435; bugfix on tor-0.2.5.6-alpha.
+    - Stop the man page from ncorrectly stating that HiddenServiceDir
+      must already exist. This is not true. Fixes 20486.
+    - Clarify that when `ClientRejectInternalAddresses` is enabled
+      (which is the default), multicast DNS hostnames for machines on
+      the local network (of the form *.local) are also rejected. Closes
+      ticket 17070.
+
+  o Removed features:
+    - The AuthDirMaxServersPerAuthAddr option no longer exists: The same
+      limit for relays running on a single IP applies to authority IP
+      addresses as well as to non-authority IP addresses. Closes
+      ticket 20960.
+    - The UseDirectoryGuards torrc options is no longer present: all
+      users that use entry guards will also use directory guards.
+      Related to proposal 271; implements part of ticket 20831.
+
+  o Testing:
+    - New unit tests for tor_htonll(). Closes ticket 19563. Patch
+      from "overcaffeinated".
+    - Perform the coding style checks when running the tests and fail
+      when coding style violations are found. Closes ticket 5500.
 
 
 Changes in version 0.2.8.12 - 2016-12-19
diff --git a/changes/14881 b/changes/14881
deleted file mode 100644
index e959296..0000000
--- a/changes/14881
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Minor bugfixes (consensus weight):
-    - Add new consensus method that initializes bw weights to 1 instead of 0. This
-      prevents a zero weight from making it all the way to the end (happens in
-      small testing networks) and causing an error. Fixes bug 14881; bugfix
-      on 0.2.2.17-alpha.
-
-  o Minor features (unit tests):
-    - Add tests for networkstatus_compute_bw_weights_v10.
diff --git a/changes/17070 b/changes/17070
deleted file mode 100644
index ffe616f..0000000
--- a/changes/17070
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Documentation (SOCKS connections):
-    - Clarify that when `ClientRejectInternalAddresses` is enabled (which is the
-      default), multicast DNS hostnames for machines on the local network (of
-      the form *.local) are also rejected.  Closes ticket 17070.
diff --git a/changes/19965 b/changes/19965
deleted file mode 100644
index 904f5c9..0000000
--- a/changes/19965
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfix (configuration):
-    - Accept non-space whitespace characters after the severity level in the
-      `Log` option.  Fixes bug 19965; bugfix on 0.2.1.1-alpha.
diff --git a/changes/20273 b/changes/20273
deleted file mode 100644
index 714beda..0000000
--- a/changes/20273
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Documentation (comments):
-    - Change '1' to 'weight_scale' in consensus bw weights calculation
-      comments, as that is reality. Closes ticket 20273. Patch from pastly.
-
diff --git a/changes/20511 b/changes/20511
deleted file mode 100644
index e2fcde7..0000000
--- a/changes/20511
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor feature (directory cache):
-    - Relays and bridges will now refuse to serve the consensus they have if
-      they know it is too old for a client to use. Closes ticket 20511.
diff --git a/changes/20526 b/changes/20526
deleted file mode 100644
index bd07d09..0000000
--- a/changes/20526
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Code simplification and refactoring:
-     - Introduce rend_service_is_ephemeral() that tells if given onion
-       service is ephemeral. Replace unclear NULL-checkings for service
-       directory with this function.
-       Closes ticket 20526.
diff --git a/changes/20853 b/changes/20853
deleted file mode 100644
index 84d95c4..0000000
--- a/changes/20853
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfix (hidden services):
-    - Change ephemeral service checks in `rendservice.c` to use the new
-      `rend_service_is_ephemeral` helper function.  Fixes bug 20853; bugfix on
-      bug 20526; not in any released version of Tor.
diff --git a/changes/bug13827 b/changes/bug13827
deleted file mode 100644
index 2235a3f..0000000
--- a/changes/bug13827
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Code simplification and refactoring:
-    - Remove duplicate code in the channel_write_*cell() functions.
-       Closes ticket 13827; patch from Pingl.
diff --git a/changes/bug17779 b/changes/bug17779
deleted file mode 100644
index a81c334..0000000
--- a/changes/bug17779
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (leak at exit):
-    - Fix a small harmless memory leak at exit of the previously unused
-      RSA->Ed identity cross-certificate. Fixes bug 17779; bugfix on
-      0.2.7.2-alpha.
-
-
diff --git a/changes/bug19043 b/changes/bug19043
deleted file mode 100644
index 70c35df..0000000
--- a/changes/bug19043
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major features (hidden services):
-    - Relays can now handle v3 ESTABLISH_INTRO cells as specified by prop224
-      aka "Next Generation Hidden Services". Service and clients don't yet use
-      this code functionnality. It marks another step towards prop224
-      deployment. Resolves ticket 19043. Initial code by Alec Heifetz.
diff --git a/changes/bug19563 b/changes/bug19563
deleted file mode 100644
index dbf3859..0000000
--- a/changes/bug19563
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Testing:
-    - New unit tests for tor_htonll(). Closes ticket 19563. Patch from
-      "overcaffeinated".
diff --git a/changes/bug20027 b/changes/bug20027
deleted file mode 100644
index 79d1540..0000000
--- a/changes/bug20027
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (ed25519 certificates):
-    - Correctly interpret ed25519 certificates that would expire some
-      time after 19 Jan 2038. Fixes bug 20027; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug20048 b/changes/bug20048
deleted file mode 100644
index 5cc9f45..0000000
--- a/changes/bug20048
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (infrastructure):
-    - Implement smartlist_add_strdup() function. Replaces the use of
-      smartlist_add(sl, tor_strdup(str)). Closes ticket 20048.
-
diff --git a/changes/bug20269 b/changes/bug20269
deleted file mode 100644
index 814eb8f..0000000
--- a/changes/bug20269
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (client):
-    - When clients that use bridges start up with a cached consensus
-      on disk, they were ignoring it and downloading a new one. Now they
-      use the cached one. Fixes bug 20269; bugfix on 0.2.3.12-alpha.
diff --git a/changes/bug20389 b/changes/bug20389
deleted file mode 100644
index 8f1b9f5..0000000
--- a/changes/bug20389
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (controller):
-    - When HSFETCH arguments cannot be parsed, say "Invalid argument"
-      rather than "unrecognized." Closes ticket 20389; patch from
-      Ivan Markin.
diff --git a/changes/bug20435 b/changes/bug20435
deleted file mode 100644
index 00d5ac7..0000000
--- a/changes/bug20435
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Documentation (man page):
-    - Set the default value from 250 KBytes to 2 MBytes for
-      AuthDirGuardBWGuarantee in the man page which is what the code is using;
-      Fixes bug 20435; bugfix on tor-0.2.5.6-alpha.
diff --git a/changes/bug20459 b/changes/bug20459
deleted file mode 100644
index 2571fc0..0000000
--- a/changes/bug20459
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes (scheduler):
-    - Fix an issue where the ewma_cmp_cmux() function would never consider
-      circuit policies to be different.  This bug caused the channel scheduler
-      to behave more or less randomly, rather than preferring channels with
-      higher-priority circuits.
-      Fixes bug 20459; bugfix on 0.2.6.2-alpha.
diff --git a/changes/bug20530 b/changes/bug20530
deleted file mode 100644
index 85d1b01..0000000
--- a/changes/bug20530
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (Windows):
-    - Check for getpagesize before using it to mmap files. This fixes
-      compilation in some MinGW environments. Fixes bug 20530; bugfix on
-      0.1.2.1-alpha. Reported by "ice".
diff --git a/changes/bug20559 b/changes/bug20559
deleted file mode 100644
index f117162..0000000
--- a/changes/bug20559
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (hidden services):
-    - Stop ignoring misconfigured hidden services. Instead, refuse to start
-      tor until the misconfigurations have been corrected.
-      Fixes bug 20559; bugfix on multiple commits in 0.2.7.1-alpha and earlier.
diff --git a/changes/bug20593.2 b/changes/bug20593.2
deleted file mode 100644
index bdaaf00..0000000
--- a/changes/bug20593.2
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (diagnostic, directory client):
-    - Warn if we find an unexpected inconsistency in directory download
-      status objects. Prevents some negative consequences of bug 20593.
-
diff --git a/changes/bug20622 b/changes/bug20622
deleted file mode 100644
index eb7a8fb..0000000
--- a/changes/bug20622
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Minor bugfixes (configuration):
-    - Support "TByte" and "TBytes" units in options given in bytes.
-      "TB", "terabyte(s)", "TBit(s)" and "terabit(s)" were already
-      supported. Fixes bug 20622; bugfix on 0.2.0.14-alpha.
-
-  o Minor bugfixes (documentation):
-    - Include the "TBits" unit in Tor's man page. Fixes part of bug
-      20622; bugfix on tor-0.2.5.1-alpha.
diff --git a/changes/bug20646 b/changes/bug20646
deleted file mode 100644
index 7cff38f..0000000
--- a/changes/bug20646
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfix (util):
-    - When finishing writing a file to disk, if we were about to replace the
-      file with the temporary file created before and we fail to replace it,
-      remove the temporary file so it doesn't stay on disk. Fixes bug 20646;
-      bugfix on tor-0.2.0.7-alpha. Patch by fk.
diff --git a/changes/bug20667 b/changes/bug20667
deleted file mode 100644
index 93b293a..0000000
--- a/changes/bug20667
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (directory downloads):
-    - Download all consensus flavors, descriptors, and authority certificates
-      when FetchUselessDescriptors is set, regardless of whether tor is a
-      directory cache or not.
-      Fixes bug 20667; bugfix on all recent tor versions.
diff --git a/changes/bug20839 b/changes/bug20839
deleted file mode 100644
index c290097..0000000
--- a/changes/bug20839
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (descriptors):
-    - Correctly recognise downloaded full descriptors as valid, even when
-      using microdescriptors as circuits. This affects clients with
-      FetchUselessDescriptors set, and may affect directory authorities.
-      Fixes bug 20839; bugfix on commit 6083276 in 0.2.3.2-alpha.
diff --git a/changes/bug20860 b/changes/bug20860
deleted file mode 100644
index 81b0dd8..0000000
--- a/changes/bug20860
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (hidden services):
-    - Stop ignoring duplicate hidden services when validating: this could
-      lead to a crash when those services were created.
-      Fixes bug 20860; bugfix on 20559; not in any released version of tor.
diff --git a/changes/bug6769 b/changes/bug6769
deleted file mode 100644
index 773850f..0000000
--- a/changes/bug6769
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (directory system):
-    - Bridges and relays now use microdescriptors (like clients do)
-      rather than old-style router descriptors. Now bridges will blend in
-      with clients in terms of the circuits they build. Fixes bug 6769;
-      bugfix on 0.2.3.2-alpha.
diff --git a/changes/feature13752 b/changes/feature13752
deleted file mode 100644
index f318cc2..0000000
--- a/changes/feature13752
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (fingerprinting resistence, authentication):
-    - Extend the length of RSA keys used for TLS link authentication to
-      2048 bits. (These weren't used for forward secrecy; for forward
-      secrecy, we used P256.) Closes ticket 13752.
diff --git a/changes/feature15055 b/changes/feature15055
deleted file mode 100644
index 06cc06a..0000000
--- a/changes/feature15055
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major features (protocol, Ed25519):
-    - Tor relays now use Ed25519 to prove their Ed25519 identities and
-      Ed25519 to one another, and to clients. This algorithm is faster
-      and more secure than the RSA-based handshake we've been doing until
-      now. Implements the second big part of proposal 220; Closes ticket
-      15055.
diff --git a/changes/feature15056 b/changes/feature15056
deleted file mode 100644
index 46226f8..0000000
--- a/changes/feature15056
+++ /dev/null
@@ -1,28 +0,0 @@
-  o Major features (ed25519 identity keys):
-    - Relays now understand requests to extend to other relays
-      by their Ed25519 identity keys. When an Ed25519 identity key
-      is included in an EXTEND2 cell, the relay will only extend
-      the circuit if the other relay can prove ownership of that identity.
-      Implements part of ticket 15056; part of proposal 220.
-    - Clients now support including Ed25519 identity keys in the EXTEND2
-      cells they generate.  By default, this is controlled by a consensus
-      parameter, currently disabled.  You can turn this feature on for
-      testing by setting ExtendByEd25519ID in your configuration. This might
-      make your traffic appear different than the traffic generated by other
-      users, however.
-      Implements part of ticket 15056; part of proposal 220.
-
-  o Code simplification and refactoring:
-    - The code to generate and parse EXTEND and EXTEND2 cells has
-      been replaced with code automatically generated by the "trunnel"
-      utility.
-    - Remove data structures that were used to index or_connection objects by
-      their RSA identity digests. These structures are fully redundant with
-      the similar structures used in the channel abstraction.
-
-  o Minor features (directory authority):
-    - Add a new authority-only AuthDirTestEd25519LinkKeys option (on by
-      default) to control whether authorities should try to probe relays by
-      their Ed25519 link keys.  This option will go away in a few
-      releases--unless we encounter major trouble in our ed25519 link
-      protocol rollout, in which case it will serve as a safety option.
diff --git a/changes/feature17238 b/changes/feature17238
deleted file mode 100644
index 88dfee9..0000000
--- a/changes/feature17238
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major features (onion services):
-    - Tor relays now support the HSDir version 3 protocol meaning they can
-      store and serve v3 descriptors. This is part of the next generation
-      onion service work detailled in proposal 224. The tor daemon also
-      contains all the necessary code to encode and decode a v3 descriptor but
-      it's currently only used by the directory subsystem. Closes ticket 17238.
diff --git a/changes/feature20552 b/changes/feature20552
deleted file mode 100644
index 75fbdde..0000000
--- a/changes/feature20552
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (ed25519 link handshake):
-    - Advertise support for the ed25519 link handshake using the
-      subprotocol-versions mechanism, so that clients can tell which
-      relays can identity themselves by Ed25519 ID. Closes ticket 20552.
diff --git a/changes/ticket18873 b/changes/ticket18873
deleted file mode 100644
index 11a867d..0000000
--- a/changes/ticket18873
+++ /dev/null
@@ -1,10 +0,0 @@
-  o Code simplification and refactoring:
-    - Refactor circuit_predict_and_launch_new for readability and
-      testability. Closes ticket 18873.
-    - Extract magic numbers in circuituse.c into defined variables.
-    - Refactor circuit_is_available_for_use to remove unnecessary check.
-
-  o Minor features (unit tests):
-    - Extract dummy_origin_circuit_new so it can be used by other test
-      functions.
-    - Add unit tests circuit_predict_and_launch_new.
diff --git a/changes/ticket19858 b/changes/ticket19858
deleted file mode 100644
index 777b790..0000000
--- a/changes/ticket19858
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Code simplification and refactoring (guards):
-    - Abolish all global guard context in entrynodes.c; replace with new
-      guard_selection_t structure as preparation for proposal 271.  Closes
-      ticket 19858.
diff --git a/changes/ticket20077 b/changes/ticket20077
deleted file mode 100644
index cd8149a..0000000
--- a/changes/ticket20077
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Code simplification and refactoring:
-    - Remove redundant behavior of is_sensitive_dir_purpose, refactor to use
-      only purpose_needs_anonymity.  Closes part of ticket 20077.
-    - Refactor large if statement in purpose_needs_anonymity to use switch
-      statement instead. Closes part of ticket 20077.
diff --git a/changes/ticket20486 b/changes/ticket20486
deleted file mode 100644
index 9c1bb1e..0000000
--- a/changes/ticket20486
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Documentation (Onion Services):
-     - tor's man page incorrectly states that HiddenServiceDir must already
-       exist. This is not true. Fixes 20486.
diff --git a/changes/ticket20717 b/changes/ticket20717
deleted file mode 100644
index 71d3edd..0000000
--- a/changes/ticket20717
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Code simplification and refactoring:
-    - Refactor the hashing API to return negative values for errors, as is done
-      as throughout the codebase. Closes ticket 20717.
diff --git a/changes/ticket20831 b/changes/ticket20831
deleted file mode 100644
index c5be243..0000000
--- a/changes/ticket20831
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Removed features:
-    - The UseDirectoryGuards torrc options is
-      no longer present: all users that use entry guards will also use
-      directory guards. Related to proposal 271; implements part of
-      ticket 20831.
-
diff --git a/changes/ticket20960 b/changes/ticket20960
deleted file mode 100644
index 3c21ae6..0000000
--- a/changes/ticket20960
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Removed features:
-    - The AuthDirMaxServersPerAuthAddr option no longer exists: The same
-      limit for relays running on a single IP applies to authority IP
-      addresses as well as to non-authority IP addresses.  Closes ticket
-      20960.
diff --git a/changes/ticket5500 b/changes/ticket5500
deleted file mode 100644
index 0cdd8e1..0000000
--- a/changes/ticket5500
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Testing:
-    - Perform the coding style checks when running the tests and fail when
-      coding style violations are found. Closes ticket 5500.



More information about the tor-commits mailing list