[tor-commits] [tor/master] Reflow the 0282 changelog

nickm at torproject.org nickm at torproject.org
Mon Mar 28 13:32:20 UTC 2016


commit 54dab73464cd7fbe7341b3531d36a035508b29dd
Author: Nick Mathewson <nickm at torproject.org>
Date:   Mon Mar 28 09:29:17 2016 -0400

    Reflow the 0282 changelog
---
 ChangeLog | 150 +++++++++++++++++++++++++++++++-------------------------------
 1 file changed, 75 insertions(+), 75 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 48fd79e..d1663db 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,7 +1,7 @@
 Changes in version 0.2.8.2-alpha - 2016-03-??
   Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
   bugs in earlier versions of Tor, including some that prevented
-  authorities  using Tor 0.2.7 from running correctly.  IPv6 and directory
+  authorities using Tor 0.2.7 from running correctly. IPv6 and directory
   support should also be much improved.
 
   o New system requirements:
@@ -25,26 +25,6 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
       bugfix on Tor 0.1.1.11-alpha, which fixed a related bug
       incompletely. Reported by Guido Vranken.
 
-  o Major bugfixes (voting):
-    - Actually enable Ed25519-based directory collation. Previously, the
-      code had been written, but some debugging code that had
-      accidentally been left in the codebase made it stay turned off.
-      Fixes bug 17702; bugfix on 0.2.7.2-alpha.
-    - When collating votes by Ed25519 identities, authorities now
-      include a "NoEdConsensus" flag if the ed25519 value (or lack
-      thereof) for a server does not reflect the majority consensus.
-      Related to bug 17668; bugfix on 0.2.7.2-alpha.
-    - When generating a vote with keypinning disabled, never include two
-      entries for the same ed25519 identity. This bug was causing
-      authorities to generate votes that they could not parse when a
-      router violated key pinning by changing its RSA identity but
-      keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
-      18318. Bugfix on 0.2.7.2-alpha.
-
-  o Major bugfixes (dns proxy mode, crash):
-    - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
-      bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'.
-
   o Major bugfixes (bridges, pluggable transports):
     - Modify the check for OR connections to private addresses. Allow
       bridges on private addresses, including pluggable transports that
@@ -58,16 +38,20 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
       sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
 
   o Major bugfixes (crash on shutdown):
-    - Fix a segfault during startup: If Unix domain socket was configured as
-      listener (such as a ControlSocket or a SocksPort "unix:" socket), and
-      tor was started as root but not configured to switch to another
-      user, tor would segfault while trying to string compare a NULL
-      value. Fixes bug 18261; bugfix on 0.2.8.1-alpha. Patch by weasel.
-    - Correctly handle detaching circuits from muxes when
-      shutting down. Fixes bug 18116; bugfix
-      on 0.2.8.1-alpha.
-    - Fix an assert-on-exit bug related to counting memory usage
-      in rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
+    - Fix a segfault during startup: If Unix domain socket was
+      configured as listener (such as a ControlSocket or a SocksPort
+      "unix:" socket), and tor was started as root but not configured to
+      switch to another user, tor would segfault while trying to string
+      compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha.
+      Patch by weasel.
+    - Correctly handle detaching circuits from muxes when shutting down.
+      Fixes bug 18116; bugfix on 0.2.8.1-alpha.
+    - Fix an assert-on-exit bug related to counting memory usage in
+      rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
+
+  o Major bugfixes (dns proxy mode, crash):
+    - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
+      bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'.
 
   o Major bugfixes (relays, bridge clients):
     - Ensure relays always allow IPv4 OR and Dir connections. Ensure
@@ -75,26 +59,27 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
       Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
       patch by teor.
 
+  o Major bugfixes (voting):
+    - Actually enable Ed25519-based directory collation. Previously, the
+      code had been written, but some debugging code that had
+      accidentally been left in the codebase made it stay turned off.
+      Fixes bug 17702; bugfix on 0.2.7.2-alpha.
+    - When collating votes by Ed25519 identities, authorities now
+      include a "NoEdConsensus" flag if the ed25519 value (or lack
+      thereof) for a server does not reflect the majority consensus.
+      Related to bug 17668; bugfix on 0.2.7.2-alpha.
+    - When generating a vote with keypinning disabled, never include two
+      entries for the same ed25519 identity. This bug was causing
+      authorities to generate votes that they could not parse when a
+      router violated key pinning by changing its RSA identity but
+      keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
+      18318. Bugfix on 0.2.7.2-alpha.
+
   o Minor features (security, win32):
     - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
       attack. Fixes bug 18123; bugfix on all tor versions. Patch
       by "teor".
 
-  o Minor features (hidden service directory):
-    - Streamline relay-side hsdir handling: when relays consider whether
-      to accept an uploaded hidden service descriptor, they no longer
-      check whether they are one of the relays in the network that is
-      "supposed" to handle that descriptor. Implements ticket 18332.
-
-  o Minor features (IPv6):
-    - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
-      to 1, tor prefers IPv6 directory addresses.
-    - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
-      avoids using IPv4 for client OR and directory connections.
-    - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and
-      ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and
-      ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor".
-
   o Minor features (bug-resistance):
     - Make Tor survive errors involving connections without a
       corresponding event object. Previously we'd fail with an
@@ -117,17 +102,33 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
 
   o Minor features (crypto):
     - Validate the hard-coded Diffie-Hellman parameters and ensure that
-      p is a safe prime, and g is a suitable generator. Closes ticket 18221.
+      p is a safe prime, and g is a suitable generator. Closes
+      ticket 18221.
 
   o Minor features (geoip):
     - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
       Country database.
 
+  o Minor features (hidden service directory):
+    - Streamline relay-side hsdir handling: when relays consider whether
+      to accept an uploaded hidden service descriptor, they no longer
+      check whether they are one of the relays in the network that is
+      "supposed" to handle that descriptor. Implements ticket 18332.
+
+  o Minor features (IPv6):
+    - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
+      to 1, tor prefers IPv6 directory addresses.
+    - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
+      avoids using IPv4 for client OR and directory connections.
+    - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and
+      ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and
+      ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor".
+
   o Minor features (linux seccomp2 sandbox):
-    - Reject attempts to change our Address with "Sandbox 1"
-      enabled. Changing Address with Sandbox turned on would never
-      actually work, but previously it would fail in strange and
-      confusing ways. Found while fixing 18548.
+    - Reject attempts to change our Address with "Sandbox 1" enabled.
+      Changing Address with Sandbox turned on would never actually work,
+      but previously it would fail in strange and confusing ways. Found
+      while fixing 18548.
 
   o Minor features (robustness):
     - Exit immediately with an error message if the code attempts to use
@@ -137,11 +138,11 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
   o Minor features (unix domain sockets):
     - Add a new per-socket option, RelaxDirModeCheck, to allow creating
       Unix domain sockets without checking the permissions on the parent
-      directory. (Tor checks permissions by default because some operating
-      systems only check permissions on the parent directory. However, some
-      operating systems do look at permissions on the socket, and tor's default
-      check is unneeded.)  Closes ticket 18458. Patch
-      by weasel.
+      directory. (Tor checks permissions by default because some
+      operating systems only check permissions on the parent directory.
+      However, some operating systems do look at permissions on the
+      socket, and tor's default check is unneeded.) Closes ticket 18458.
+      Patch by weasel.
 
   o Minor bugfixes (exit policies, security):
     - Refresh an exit relay's exit policy when interface addresses
@@ -159,10 +160,9 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
     - Do not link the unit tests against both the testing and non-
       testing versions of the static libraries. Fixes bug 18490; bugfix
       on 0.2.7.1-alpha.
-    - Avoid spurious failures from configure files related
-      to calling exit(0) in TOR_SEARCH_LIBRARY.
-      Fixes bug 18625; bugfix on 0.2.0.1-alpha.
-      Patch from "cypherpunks".
+    - Avoid spurious failures from configure files related to calling
+      exit(0) in TOR_SEARCH_LIBRARY. Fixes bug 18625; bugfix on
+      0.2.0.1-alpha. Patch from "cypherpunks".
     - Silence spurious clang-scan warnings in the ed25519_donna code by
       explicitly initialising some objects. Fixes bug 18384; bugfix on
       0f3eeca9 in 0.2.7.2-alpha. Patch by "teor".
@@ -170,9 +170,8 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
   o Minor bugfixes (client, bootstrap):
     - Count receipt of new microdescriptors as progress towards
       bootstrapping. Previously, with EntryNodes set, Tor might not
-      successfully repopulate the guard set on bootstrapping.
-      Fixes bug 16825; bugfix
-      on 0.2.3.1-alpha.
+      successfully repopulate the guard set on bootstrapping. Fixes bug
+      16825; bugfix on 0.2.3.1-alpha.
 
   o Minor bugfixes (code correctness):
     - Update to the latest version of Trunnel, which tries harder to
@@ -208,14 +207,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
       0.2.4.7-alpha. Reported by "atagar", patch by "teor".
 
   o Minor bugfixes (hidden service, client):
-    - Handle the case where the user makes several fast consecutive requests to the same .onion
-      address. Previously, the first six requests would each trigger a
-      descriptor fetch, each picking a directory
-      (there are 6 overall) and the seventh one would fail because no
-      directories were left, thereby triggering a close on all current directory
-      connections asking for the hidden service.
-      The solution here is to not close the directory connections if we have pending directory
-      fetch. Fixes bug 15937; bugfix on tor-0.2.7.1-alpha.
+    - Handle the case where the user makes several fast consecutive
+      requests to the same .onion address. Previously, the first six
+      requests would each trigger a descriptor fetch, each picking a
+      directory (there are 6 overall) and the seventh one would fail
+      because no directories were left, thereby triggering a close on
+      all current directory connections asking for the hidden service.
+      The solution here is to not close the directory connections if we
+      have pending directory fetch. Fixes bug 15937; bugfix
+      on tor-0.2.7.1-alpha.
 
   o Minor bugfixes (hidden service, control port):
     - Add the onion address to the HS_DESC event for the UPLOADED action
@@ -230,15 +230,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
     - Avoid a 10-second delay when starting as a client with "Sandbox 1"
       enabled and no DNS resolvers configured. This should help TAILS
       start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha.
-    - Fix the sandbox's interoprability with unix domain sockets under setuid.
-      Fixes bug 18253; bugfix on 0.2.8.1-alpha.
+    - Fix the sandbox's interoprability with unix domain sockets under
+      setuid. Fixes bug 18253; bugfix on 0.2.8.1-alpha.
     - Allow the setrlimit syscall, and the prlimit and prlimit64
       syscalls, which some libc implementations use under the hood.
       Fixes bug 15221; bugfix on 0.2.5.1-alpha.
 
   o Minor bugfixes (logging):
-    - When logging information about an unparsable networkstatus vote
-      or consensus, do not say "vote" when we mean consensus. Fixes bug
+    - When logging information about an unparsable networkstatus vote or
+      consensus, do not say "vote" when we mean consensus. Fixes bug
       18368; bugfix on 0.2.0.8-alpha.
     - Scrub service in from "unrecognized service ID" log messages.
       Fixes bug 18600; bugfix on 0.2.4.11-alpha.





More information about the tor-commits mailing list