[tor-commits] [tor/main] changelog: ChangeLog for 0.4.7.2-alpha release

dgoulet at torproject.org dgoulet at torproject.org
Mon Oct 25 14:44:16 UTC 2021


commit 78f5c96272bba39a9bd43944e588ced4728266ae
Author: David Goulet <dgoulet at torproject.org>
Date:   Mon Oct 25 10:13:46 2021 -0400

    changelog: ChangeLog for 0.4.7.2-alpha release
    
    Signed-off-by: David Goulet <dgoulet at torproject.org>
---
 ChangeLog              | 153 +++++++++++++++++++++++++++++++++++++++++++++++++
 changes/bug40400       |   6 --
 changes/bug40400_part2 |   5 --
 changes/bug40400_part3 |   7 ---
 changes/bug40465       |   3 -
 changes/bug40471       |   4 --
 changes/bug40486       |   5 --
 changes/bug40488       |   4 --
 changes/issue11477     |   8 ---
 changes/issue16803     |   2 -
 changes/prop335        |  11 ----
 changes/ticket30477    |   4 --
 changes/ticket34083    |   5 --
 changes/ticket40182    |   4 --
 changes/ticket40450    |   3 -
 changes/ticket40469    |   4 --
 changes/ticket40474    |   5 --
 changes/ticket40476    |   7 ---
 changes/ticket40480    |   3 -
 changes/ticket40484    |   5 --
 changes/ticket40485    |   3 -
 changes/ticket40490    |   5 --
 changes/ticket40491    |   7 ---
 changes/ticket40493    |   2 -
 24 files changed, 153 insertions(+), 112 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 2340716696..6d3d8f8700 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,156 @@
+Changes in version 0.4.7.2-alpha - 2021-10-26
+  This version is the second alpha release of the 0.4.7.x series. Two
+  major features were added which are congestion control (prop334) for
+  network performance and the MiddleOnly flag (prop335) voted by the
+  authorities used to pin relays to the middle position for various
+  network health reasons. This version also fixes numerous bugfixes.
+
+  The congestion control feature, detailed in proposal 324, still needs
+  more work before we can enabled it by default. It is currently in its
+  testing and tuning phase which means that you should expect more
+  0.4.7.x alphas as congestion control gets stabilized and tuned for
+  optimal performance. And so, at this release, it can not be used
+  without a custom patch.
+
+  o Major features (congestion control):
+    - Implement support for flow control over congestion controlled
+      circuits. This work comes from proposal 324. Closes ticket 40450.
+
+  o Major features (directory authority):
+    - Add a new consensus method to handle MiddleOnly specially. When
+      enough authorities are using this method, then any relay tagged
+      with the MiddleOnly flag will have its Exit, Guard, HSDir, and
+      V2Dir flags automatically cleared, and will have its BadExit flag
+      automatically set. Implements part of proposal 335.
+    - Authorities can now be configured to label relays as "MiddleOnly".
+      When voting for this flag, authorities automatically vote against
+      Exit, Guard, HSDir, and V2Dir; and in favor of BadExit. Implements
+      part of proposal 335. Based on a patch from Neel Chauhan.
+
+  o Major bugfix (relay, metrics):
+    - On the MetricsPort, the DNS error statistics are not reported by
+      record type ("record=...") anymore due to a libevent bug
+      (https://github.com/libevent/libevent/issues/1219). Fixes bug
+      40490; bugfix on 0.4.7.1-alpha.
+
+  o Major bugfixes (relay, overload state):
+    - Report the general overload state for DNS timeout errors only if
+      X% of all DNS queries over Y seconds are errors. Before that, it
+      only took 1 timeout to report the overload state which was just
+      too low of a threshold. The X and Y values are 1% and 10 minutes
+      respectively but they are also controlled by consensus parameters.
+      Fixes bug 40491; bugfix on 0.4.6.1-alpha.
+
+  o Minor feature (authority, relay):
+    - Reject End-Of-Life relays running version 0.4.2.x, 0.4.3.x,
+      0.4.4.x and 0.4.5 alphas/rc. Closes ticket 40480.
+
+  o Minor feature (onion service v2):
+    - Onion service v2 addresses are now not recognized anymore by tor
+      meaning a bad hostname is returned when attempting to pass it on a
+      SOCKS connection. No more deprecation log is emitted client side.
+      Closes ticket 40476.
+    - See https://blog.torproject.org/v2-deprecation-timeline for
+      details on how to transition from v2 to v3.
+
+  o Minor features (bridge):
+    - We now announce the URL to Tor's new bridge status at
+      https://bridges.torproject.org/ when Tor is configured to run as a
+      bridge relay. Closes ticket 30477.
+
+  o Minor features (fallbackdir):
+    - Regenerate fallback directories for October 2021. Close
+      ticket 40493.
+
+  o Minor features (logging, heartbeat):
+    - When a relay receives a cell that isn't encrypted properly for it,
+      but the relay is the last hop on the circuit, the relay now counts
+      how many cells of this kind it receives, on how many circuits, and
+      reports this information in the log. Previously, we'd log each
+      cell at PROTOCOL_WARN level, which is far too verbose to be
+      useful. Fixes part of ticket 40400.
+
+  o Minor features (testing):
+    - We now have separate fuzzers for the inner layers of v3 onion
+      service descriptors, to prevent future bugs like 40392. Closes
+      ticket 40488.
+
+  o Minor bugfixes (compilation):
+    - Fix compilation error when __NR_time is not defined. Fixes bug
+      40465; bugfix on 0.2.5.5-alpha. Patch by Daniel Pinto.
+
+  o Minor bugfixes (dirauth, bandwidth scanner):
+    - Add the AuthDirDontVoteOnDirAuthBandwidth dirauth config parameter
+      to avoid voting on bandwidth scanner weights to v3 directory
+      authorities. Fixes bug 40471; bugfix on 0.2.2.1-alpha. Patch by
+      Neel Chauhan.
+
+  o Minor bugfixes (fragile-hardening, sandbox):
+    - When building with --enable-fragile-hardening, add or relax Linux
+      seccomp rules to allow AddressSanitizer to execute normally if the
+      process terminates with the sandbox active. This has the side
+      effect of disabling the filtering of file- and directory-open
+      requests on most systems and dilutes the effectiveness of the
+      sandbox overall, as a wider range of system calls must be
+      permitted. Fixes bug 11477; bugfix on 0.2.5.4-alpha.
+
+  o Minor bugfixes (logging):
+    - If a channel has never received, transmitted a cell or seen a
+      client, do not calculate time diffs against 1/1/1970 but log
+      another prettier message. Fixes bug 40182; bugfix on 0.2.4.4.
+
+  o Minor bugfixes (onion service):
+    - Fix a warning BUG that would occur often on heavily loaded onion
+      service leading to filling the logs with useless warnings. Fixes
+      bug 34083; bugfix on 0.3.2.1-alpha.
+
+  o Minor bugfixes (onion service, config):
+    - Fix a memory leak for a small config line string that could occur
+      if the service failed to be configured from file properly. Fixes
+      bug 40484; bugfix on 0.3.2.1-alpha.
+
+  o Minor bugfixes (onion service, TROVE-2021-008):
+    - Only log once any v2 access attempts in order to not pollute the
+      logs with warnings and avoid recording the times on disk when v2
+      access was attempted. Important to note that the onion address was
+      _never_ logged. That is a Low security issue. Fixes bug 40474;
+      bugfix on 0.4.5.8.
+    - Note that due to #40476 which removes v2 support entirely, this
+      log line is not emitted anymore. We still mention this in the
+      changelog because it is a low security TROVE.
+
+  o Minor bugfixes (usability):
+    - Do not log "RENDEZVOUS1 cell with unrecognized rendezvous cookie"
+      at LOG_PROTOCOL_WARN; instead log it at DEBUG. This warning can
+      happen naturally if a client gives up on a rendezvous circuit
+      after sending INTRODUCE1. Fixes part of bug 40400; bugfix
+      on 0.1.1.13-alpha.
+    - Do not log "circuit_receive_relay_cell failed" at
+      LOG_PROTOCOL_WARN; instead log it at DEBUG. In every case where we
+      would want to log this as a protocol warning, we are already
+      logging another warning from inside circuit_receive_relay_cell.
+      Fixes part of bug 40400; bugfix on 0.1.1.9-alpha.
+
+  o Code simplification and refactoring:
+    - Lower the official maximum for "guard-extreme-restriction-percent"
+      to 100. This has no effect on when the guard code will generate a
+      warning, but it makes the intent of the option clearer. Fixes bug
+      40486; bugfix on 0.3.0.1-alpha.
+
+  o Testing:
+    - Add unit tests for the Linux seccomp sandbox. Resolves
+      issue 16803.
+
+  o Code simplification and refactoring (rust):
+    - Remove Rust support and its associated code. It is unsupported and
+      Rust focus should be shifted to arti. Closes 40469.
+
+  o Testing (CI, chutney):
+    - Bump the data size that chutney transmit to 5MB in order to
+      trigger flow control and congestion window code. Closes
+      ticket 40485.
+
+
 Changes in version 0.4.7.1-alpha - 2021-09-17
   This version is the first alpha release of the 0.4.7.x series. One
   major feature is Vanguards Lite, from proposal 333, to help mitigate
diff --git a/changes/bug40400 b/changes/bug40400
deleted file mode 100644
index 47bb1e6a1e..0000000000
--- a/changes/bug40400
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (usability):
-    - Do not log "circuit_receive_relay_cell failed" at LOG_PROTOCOL_WARN;
-      instead log it at DEBUG. In every case where we would want to log
-      this as a protocol warning, we are already logging another warning
-      from inside circuit_receive_relay_cell. Fixes part of bug 40400;
-      bugfix on 0.1.1.9-alpha.
diff --git a/changes/bug40400_part2 b/changes/bug40400_part2
deleted file mode 100644
index 9b834d5ea1..0000000000
--- a/changes/bug40400_part2
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (usability):
-    - Do not log "RENDEZVOUS1 cell with unrecognized rendezvous cookie"
-      at LOG_PROTOCOL_WARN; instead log it at DEBUG. This warning can happen
-      naturally if a client gives up on a rendezvous circuit after sending
-      INTRODUCE1. Fixes part of bug 40400; bugfix on 0.1.1.13-alpha.
diff --git a/changes/bug40400_part3 b/changes/bug40400_part3
deleted file mode 100644
index b78e800229..0000000000
--- a/changes/bug40400_part3
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor features (logging, heartbeat):
-    - When a relay receives a cell that isn't encrypted properly for
-      it, but the relay is the last hop on the circuit, the relay
-      now counts how many cells of this kind it receives, on how
-      many circuits, and reports this information in the log.
-      Previously, we'd log each cell at PROTOCOL_WARN level, which
-      is far too verbose to be useful. Fixes part of ticket 40400.
diff --git a/changes/bug40465 b/changes/bug40465
deleted file mode 100644
index d4d225c62e..0000000000
--- a/changes/bug40465
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Fix compilation error when __NR_time is not defined. Fixes bug
-      40465; bugfix on 0.2.5.5-alpha. Patch by Daniel Pinto.
diff --git a/changes/bug40471 b/changes/bug40471
deleted file mode 100644
index 323e049599..0000000000
--- a/changes/bug40471
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (dirauth, bandwidth scanner):
-    - Add the AuthDirDontVoteOnDirAuthBandwidth dirauth config parameter to
-      avoid voting on bandwidth scanner weights to v3 directory authorities.
-      Fixes bug 40471; bugfix on 0.2.2.1-alpha. Patch by Neel Chauhan.
diff --git a/changes/bug40486 b/changes/bug40486
deleted file mode 100644
index 83315bfb2b..0000000000
--- a/changes/bug40486
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Code simplification and refactoring:
-    - Lower the official maximum for "guard-extreme-restriction-percent" to
-      100. This has no effect on when the guard code will generate a warning,
-      but it makes the intent of the option clearer.  Fixes bug 40486; bugfix
-      on 0.3.0.1-alpha.
diff --git a/changes/bug40488 b/changes/bug40488
deleted file mode 100644
index 6fc265cc20..0000000000
--- a/changes/bug40488
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (testing):
-    - We now have separate fuzzers for the inner layers of v3 onion
-      service descriptors, to prevent future bugs like 40392.
-      Closes ticket 40488.
diff --git a/changes/issue11477 b/changes/issue11477
deleted file mode 100644
index bb5d9e4099..0000000000
--- a/changes/issue11477
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Minor bugfixes (fragile-hardening, sandbox):
-    - When building with --enable-fragile-hardening, add or relax Linux
-      seccomp rules to allow AddressSanitizer to execute normally if the
-      process terminates with the sandbox active. This has the side
-      effect of disabling the filtering of file- and directory-open
-      requests on most systems and dilutes the effectiveness of the
-      sandbox overall, as a wider range of system calls must be
-      permitted. Fixes bug 11477; bugfix on 0.2.5.4-alpha.
diff --git a/changes/issue16803 b/changes/issue16803
deleted file mode 100644
index 7d0dd833e2..0000000000
--- a/changes/issue16803
+++ /dev/null
@@ -1,2 +0,0 @@
-  o Testing:
-    - Add unit tests for the Linux seccomp sandbox. Resolves issue 16803.
diff --git a/changes/prop335 b/changes/prop335
deleted file mode 100644
index 4fa61ca2e9..0000000000
--- a/changes/prop335
+++ /dev/null
@@ -1,11 +0,0 @@
-  o Major features (directory authority):
-    - Authorities can now be configured to label relays as "MiddleOnly".
-      When voting for this flag, authorities automatically vote against
-      Exit, Guard, HSDir, and V2Dir; and in favor of BadExit.
-      Implements part of proposal 335. Based on a patch from Neel
-      Chauhan.
-    - Add a new consensus method to handle MiddleOnly specially. When
-      enough authorities are using this method, then any relay
-      tagged with the MiddleOnly flag will have its Exit, Guard, HSDir,
-      and V2Dir flags automatically cleared, and will have its BadExit flag
-      automatically set. Implements part of proposal 335.
diff --git a/changes/ticket30477 b/changes/ticket30477
deleted file mode 100644
index 379fc4e7eb..0000000000
--- a/changes/ticket30477
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (bridge):
-    - We now announce the URL to Tor's new bridge status at
-      https://bridges.torproject.org/ when Tor is configured to run as a bridge
-      relay. Closes ticket 30477.
diff --git a/changes/ticket34083 b/changes/ticket34083
deleted file mode 100644
index 417d01c5a5..0000000000
--- a/changes/ticket34083
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (onion service):
-    - Fix a warning BUG that would occur often on heavily loaded onion service
-      leading to filling the logs with useless warnings. Fixes bug 34083; bugfix
-      on 0.3.2.1-alpha.
-
diff --git a/changes/ticket40182 b/changes/ticket40182
deleted file mode 100644
index ad75c38534..0000000000
--- a/changes/ticket40182
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (logging):
-   - If a channel has never received, transmitted a cell or seen a client, do
-     not calculate time diffs against 1/1/1970 but log another prettier
-     message. Fixes bug 40182; bugfix on 0.2.4.4.
diff --git a/changes/ticket40450 b/changes/ticket40450
deleted file mode 100644
index 6753bd04f5..0000000000
--- a/changes/ticket40450
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Major features (congestion control):
-    - Implement support for flow control over congestion controlled circuits.
-      This work comes from proposal 324. Closes ticket 40450.
diff --git a/changes/ticket40469 b/changes/ticket40469
deleted file mode 100644
index 1cb792b4ba..0000000000
--- a/changes/ticket40469
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Code simplification and refactoring (rust):
-    - Remove Rust support and its associated code. It is unsupported and Rust
-      focus should be shifted to arti. Closes 40469.
-
diff --git a/changes/ticket40474 b/changes/ticket40474
deleted file mode 100644
index d2a7231106..0000000000
--- a/changes/ticket40474
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (onion service, TROVE-2021-008):
-    - Only log once any v2 access attempts in order to not pollute the logs
-      with warnings and avoid recording the times on disk when v2 access was
-      attempted. Important to note that the onion address was _never_ logged.
-      That is a Low security issue. Fixes bug 40474; bugfix on 0.4.5.8.
diff --git a/changes/ticket40476 b/changes/ticket40476
deleted file mode 100644
index 7179d8b1c6..0000000000
--- a/changes/ticket40476
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor feature (onion service v2):
-    - Onion service v2 address are now not recognized anymore by tor meaning a
-      bad hostname is returned when attempting to pass it on a SOCKS
-      connection. No more deprecation log is emitted client side. Closes
-      ticket 40476.
-    - See https://blog.torproject.org/v2-deprecation-timeline for details on
-      how to transition from v2 to v3.
diff --git a/changes/ticket40480 b/changes/ticket40480
deleted file mode 100644
index 525e848a1f..0000000000
--- a/changes/ticket40480
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor feature (authority, relay):
-    - Reject End-Of-Life relays running version 0.4.2.x, 0.4.3.x, 0.4.4.x and
-      0.4.5 alphas and rc. Closes ticket 40480.
diff --git a/changes/ticket40484 b/changes/ticket40484
deleted file mode 100644
index 9a9ffdf448..0000000000
--- a/changes/ticket40484
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (onion service, config):
-    - Fix a memory leak for a small config line string that could occur if the
-      service failed to be configured from file properly. Fixes bug 40484;
-      bugfix on 0.3.2.1-alpha.
-
diff --git a/changes/ticket40485 b/changes/ticket40485
deleted file mode 100644
index 849ee0719f..0000000000
--- a/changes/ticket40485
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Testing (CI, chutney):
-    - Bump the data size that chutney transmit to 5MB in order to trigger flow
-      control and congestion window code. Closes ticket 40485.
diff --git a/changes/ticket40490 b/changes/ticket40490
deleted file mode 100644
index 6e9ef50b42..0000000000
--- a/changes/ticket40490
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfix (relay, metrics):
-    - On the MetricsPort, the DNS error statistics are not reported by record
-      type ("record=...") anymore due to a libevent bug
-      (https://github.com/libevent/libevent/issues/1219). Fixes bug 40490;
-      bugfix on 0.4.7.1-alpha.
diff --git a/changes/ticket40491 b/changes/ticket40491
deleted file mode 100644
index 01c6c7d748..0000000000
--- a/changes/ticket40491
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Major bugfixes (relay, overload state):
-    - Report the general overload state for DNS timeout errors only if X% of all
-      DNS queries over Y seconds are errors. Before that, it only took 1 timeout
-      to report the overload state which was just too low of a threshold. The X
-      and Y values are 1% and 10 minutes respectively but they are also
-      controlled by consensus parameters. Fixes bug 40491; bugfix on
-      0.4.6.1-alpha.
diff --git a/changes/ticket40493 b/changes/ticket40493
deleted file mode 100644
index eb9baf916b..0000000000
--- a/changes/ticket40493
+++ /dev/null
@@ -1,2 +0,0 @@
-  o Minor features (fallbackdir):
-    - Regenerate fallback directories for October 2021. Close ticket 40493.



More information about the tor-commits mailing list