[tor-commits] [tor/master] oh, here it is

nickm at torproject.org nickm at torproject.org
Mon Jan 23 00:40:33 UTC 2017


commit d78ed9fb7362ed5662a5fee52ec69b977bdbf7ec
Author: Nick Mathewson <nickm at torproject.org>
Date:   Sun Jan 22 19:40:30 2017 -0500

    oh, here it is
---
 ChangeLog | 217 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 217 insertions(+)

diff --git a/ChangeLog b/ChangeLog
index 013dddf..d467c95 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,220 @@
+Changes in version 0.3.0.2-alpha - 2017-01-23
+  Blurb here. Lorax ipsum gruvvulus thneed amet, snergelly once-ler
+  lerkim, sed do barbaloot tempor gluppitus ut labore et truffula magna
+  aliqua. Ut enim ad grickle-grass veniam, quis miff-muffered ga-zumpco
+  laboris nisi ut cruffulus ex ea schloppity consequat. Duis aute
+  snarggle in swomeeswans in voluptate axe-hacker esse rippulus crummii
+  eu moof nulla snuvv.
+
+  o Major features (security):
+    - Change the algorithm used to decide DNS TTLs on client and server
+      side, to better resist DNS-based correlation attacks like the
+      DefecTor attack of Greschbach, Pulls, Roberts, Winter, and
+      Feamster). Now relays only return one of two possible DNS TTL
+      values, and clients are willing to believe DNS TTL values up to 3
+      hours long. Closes ticket 19769.
+
+  o Major bugfixes (client, guard, crash):
+    - In circuit_get_global_origin_list(), return the actual list of
+      origin circuits. The previous version of this code returned the
+      list of all the circuits, and could have caused strange bugs,
+      including possible crashes. Fixes bug 21118; bugfix
+      on 0.3.0.1-alpha.
+
+  o Major bugfixes (DNS):
+    - Fix a bug that prevented exit nodes from caching DNS records for
+      more than 60 seconds. Fixes bug 19025; bugfix on 0.2.4.7-alpha.
+
+  o Minor features (directory authority, security):
+    - The default for AuthDirPinKeys is now 1: directory authorities
+      will reject relays where the RSA identity key matches a previously
+      seen value, but the Ed25519 key has changed. Closes ticket 18319.
+
+  o Minor features (controller):
+    - Add GETINFO sr/current and sr/previous keys, to expose shared-
+      random values to the controller. Closes ticket 19925.
+
+  o Minor features (entry guards):
+    - Add UseEntryGuards to TEST_OPTIONS_DEFAULT_VALUES in order to not
+      break regresson tests.
+    - Require UseEntryGuards when UseBridges is set in order to make
+      sure bridges aren't bypassed. Resolves ticket 20502.
+
+  o Minor features (fallback directories):
+    - Allow 3 fallbacks per operator. (This is safe now we are choosing
+      200 fallbacks.) Closes ticket 20912.
+    - Display the fingerprint when downloading consensuses from
+      fallbacks. Closes ticket 20908.
+    - Exclude relays affected by 20499 from the fallback list. Exclude
+      known affected versions, and any relay that delivers a stale
+      consensus, as long as that consensus expired more than 24 hours
+      ago. Closes ticket 20539.
+    - Make it easier to change the output sort order of fallbacks.
+      Closes ticket 20822.
+    - Provide bandwidth and consensus weight for each candidate fallback
+      in updateFallbackDirs.py. Closes ticket 20878.
+    - Reduce the minimum fallback bandwidth to 1 MByte/s. Part of
+      ticket 18828.
+    - Require fallback directories to have the same address and port for
+      7 dayss. (Due to the number of relays with enough stability.)
+      Relays whose OnionOO stability timer is reset on restart by bug
+      18050 should upgrade to Tor 0.2.8.7 or later, which has a fix for
+      this issue. Closes ticket 20880; maintains short-term fix
+      in 0.2.8.2-alpha.
+    - Require fallbacks to have flags for 90% of the time (weighted
+      decaying average), rather than 95%. This allows at least 73% of
+      clients to bootstrap in the first 5 seconds without contacting an
+      authority. Part of ticket 18828.
+    - Select 200 fallback directories for each release. Closes
+      ticket 20881.
+
+  o Minor features (geoip):
+    - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
+      Country database.
+
+  o Minor features (hidden service directories):
+    - Relays are now willing act as v3 hidden service directories,
+      regardless of the EnableOnionServicvesV3 parameter. Implements
+      ticket 19899.
+
+  o Minor features (linting):
+    - Enhance the changes file linter to warn on Tor versions that are
+      prefixed with 'tor-'. Closes ticket 21096.
+
+  o Minor features (logging):
+    - In several places, describe unset ed25519 keys as "<unset>",
+      rather than "AAAAAAAA...AAA". Closes ticket 21037.
+
+  o Minor bugfix (control protocol):
+    - The reply to a "GETINFO config/names" request via the control
+      protocol now spells the type "Dependent" correctly. This is a
+      breaking change in the control protocol. (It seems to be ignored
+      by the most common known clients.) Fixes bug 18146; bugfix
+      on 0.1.1.4-alpha.
+
+  o Minor bugfixes (bug resilience):
+    - Fix an (unreachable) size_t overflow in base64_decode(). Fixes bug
+      19222; bugfix on 0.2.0.9-alpha. Found by Guido Vranken; fixed by
+      Hans Jerry Illikainen.
+
+  o Minor bugfixes (build):
+    - Replace obsolete Autoconf macros with their modern equivalent and
+      prevent similar issues in the future. Fixes bug 20990; bugfix
+      on 0.1.0.1-rc.
+
+  o Minor bugfixes (circuit, hidden service):
+    - When closing a circuit, the reason for doing so was assigned from
+      an int value to a uint16_t which is quite a problem for negative
+      values that are our internal reasons (ex:
+      END_CIRC_REASON_IP_NOW_REDUNDANT). On the HS side, this was
+      causing introduction points to be flagged as unusable because the
+      reason wasn't the right one due to the bad conversion. Partially
+      fixes bug 21056 and fixes bug 20307; bugfix on 0.2.8.1-alpha.
+
+  o Minor bugfixes (client, guards):
+    - Fix bug where Tor would think that there are circuits waiting for
+      better guards even though those circuits have been freed. Fixes
+      bug 21142; bugfix on 0.3.0.1-alpha.
+
+  o Minor bugfixes (compilation):
+    - Fix Libevent detection on platforms without Libevent 1 headers
+      installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
+
+  o Minor bugfixes (config):
+    - Don't assert when trying to get the options list when
+      LearnCircuitBuildTimeout is set to 0 and we are actually currently
+      parsing the options. Fixes bug 21062; bugfix on 0.2.9.3-alpha.
+
+  o Minor bugfixes (controller):
+    - Make the GETINFO interface for inquiring about entry guards
+      support the new guards backend. Fixes bug 20823; bugfix
+      on 0.3.0.1-alpha.
+
+  o Minor bugfixes (dead code):
+    - Remove a rendundant check for PidFile changes at runtime in
+      options_transition_allowed(): this check is already performed
+      regardless of whether the sandbox is active. Fixes bug 21123;
+      bugfix on commit 2ae47d3 in 0.2.5.4-alpha.
+
+  o Minor bugfixes (documentation):
+    - Update the tor manual page to document every option that can not
+      be changed while tor is running. Fixes bug 21122; bugfix on
+      multiple tor versions.
+
+  o Minor bugfixes (fallback directories):
+    - Avoid checking fallback candidates' DirPorts if they are down in
+      OnionOO. When a relay operator has multiple relays, this
+      prioritises relays that are up over relays that are down. Fixes
+      bug 20926; bugfix on 0.2.8.3-alpha.
+    - Stop failing when OUTPUT_COMMENTS is True in updateFallbackDirs.py.
+      Fixes bug 20877; bugfix on 0.2.8.3-alpha.
+    - Stop failing when a relay has no uptime data in
+      updateFallbackDirs.py. Fixes bug 20945; bugfix on 0.2.8.1-alpha.
+
+  o Minor bugfixes (guards, bootstrapping):
+    - When connecting to a directory guard during bootstrap, do not mark
+      the guard as successful until we receive a good-looking directory
+      response from it. Fixes bug 20974; bugfix on 0.3.0.1-alpha.
+
+  o Minor bugfixes (hidden service):
+    - Fix the config reload pruning of old vs new services so it
+      actually works when both ephemeral and non ephemeral services were
+      configured which lead to a BUG() stacktrace. Fixes bug 21054;
+      bugfix on 0.3.0.1-alpha.
+    - Restrict the number of introduction point from 0 to the maximum
+      allowed instead of the default value to the maximum. That was
+      stopping operators from using less than 3 introduction points.
+      Fixes bug 21033; bugfix on 0.2.7.2-alpha.
+
+  o Minor bugfixes (IPv6):
+    - Make IP6-using clients try harder to find an IPv6 directory server.
+      Fixes bug 20999; bugfix on 77a9de0 from 17840 in 0.2.8.2-alpha.
+    - When IPv6 addresses have not been downloaded, use hard-coded
+      address info for authorities, fallbacks, and configured bridges.
+      (When IPv6-only clients receive a microdesc consensus, it has no
+      IPv6 addresses, so they can't use it until microdescs are
+      downloaded.) This allows IPv6-only clients to use microdescriptors.
+      Fixes bug 20996; bugfix on b167e82 from 19608 in 0.2.8.5-alpha.
+
+  o Minor bugfixes (memory leaks):
+    - Fix a memory leak when configuring hidden services. Fixes bug
+      20987; bugfix on 0.3.0.1-alpha.
+
+  o Minor bugfixes (portability):
+    - Avoid crashing when Tor is built using headers that contain
+      CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
+      without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix
+      on 0.2.9.1-alpha.
+
+  o Minor bugfixes (relay):
+    - Honor DataDirectoryGroupReadable when tor is a relay. Previously,
+      the initialization of the keys would reset the DataDirectory to
+      0700 instead of 0750 if DataeDirectoryGroupReadable was set to 1.
+      Fixes bug 19953; bugfix on 0.0.2pre16. Patch by "redfish".
+
+  o Minor bugfixes (testing):
+    - Remove undefined behavior from the backtrace generator by removing
+      its signal handler. Fixes bug 21026; bugfix on 0.2.5.2-alpha.
+
+  o Minor bugfixes (unit tests):
+    - Allow the unit tests to pass even when DNS lookups of bogus
+      addresses do not fail as expected. Fixes bug 20862 and 20863;
+      bugfix on unit tests introduced in 0.2.8.1-alpha
+      through 0.2.9.4-alpha.
+
+  o Code simplification and refactoring:
+    - Refactor code to manipulate global_origin_circuit_list into
+      separate functions. Closes ticket 20921.
+
+  o Documentation (formatting):
+    - Clean up formatting of tor.1 man page and HTML doc, where <pre>
+      blocks were incorrectly appearing. Closes ticket 20885.
+
+  o Documentation (man page):
+    - Clarify a number of options in tor.1 and add some min/max values
+      for HiddenService options. Closes ticket 21058.
+
+
 Changes in version 0.3.0.1-alpha - 2016-12-19
   Tor 0.3.0.1-alpha is the first alpha release in the 0.3.0 development
   series. It strengthens Tor's link and circuit handshakes by



More information about the tor-commits mailing list