Browse Source

reformat 0.2.7.1-alpha changelog

Nick Mathewson 9 years ago
parent
commit
411049d0d4
1 changed files with 121 additions and 126 deletions
  1. 121 126
      ChangeLog

+ 121 - 126
ChangeLog

@@ -1,67 +1,94 @@
 Changes in version 0.2.7.1-alpha - 2015-05-??
 Changes in version 0.2.7.1-alpha - 2015-05-??
   Tor 0.2.7.1-alpha is the first alpha release in its series.
   Tor 0.2.7.1-alpha is the first alpha release in its series.
 
 
+  o New system requirements:
+    - Tor no longer includes workarounds for Libevent versions before
+      1.3e. Libevent 2.0 or later is recommended. Closes ticket 15248.
+
   o Major features (controller):
   o Major features (controller):
     - Add the ADD_ONION and DEL_ONION commands that allows the creation
     - Add the ADD_ONION and DEL_ONION commands that allows the creation
       and management of hidden services via the controller. Closes
       and management of hidden services via the controller. Closes
       ticket 6411.
       ticket 6411.
     - New "GETINFO onions/current" and "GETINFO onions/detached" to get
     - New "GETINFO onions/current" and "GETINFO onions/detached" to get
-      information about hidden services created via the controller.
-      Part of ticket 6411.
-    - New HSFETCH command to launch a request for a hidden service descriptor.
-      Closes ticket 14847.
+      information about hidden services created via the controller. Part
+      of ticket 6411.
+    - New HSFETCH command to launch a request for a hidden service
+      descriptor. Closes ticket 14847.
 
 
   o Major bugfixes (hidden services):
   o Major bugfixes (hidden services):
-    - Revert commit that made directory authority assign the HSDir flag to
-      relay without a DirPort which is bad because relay can't handle
+    - Revert commit that made directory authority assign the HSDir flag
+      to relay without a DirPort which is bad because relay can't handle
       BEGIN_DIR cells. Fixes bug 15850; bugfix on tor-0.2.6.3-alpha.
       BEGIN_DIR cells. Fixes bug 15850; bugfix on tor-0.2.6.3-alpha.
 
 
-  o Minor features (HS popularity countermeasure):
-    - To avoid leaking HS popularity, don't cycle the introduction point
-      when we've handled a fixed number of INTRODUCE2 cells but instead
-      cycle it when a random value of introductions is reached thus making
-      it more difficult for an attacker to find out the amount of clients
-      that has passed through the introduction point for a specific HS.
-      Closes ticket 15745.
+  o Minor features (clock-jump tolerance):
+    - Recover better when our clock jumps back many hours, like might
+      happen for Tails or Whonix users who start with a very wrong
+      hardware clock, use Tor to discover a more accurate time, and then
+      fix their clock. Resolves part of ticket 8766. [I'd call this a
+      major feature if it actually fixed all of the issues.]
 
 
   o Minor features (command-line interface):
   o Minor features (command-line interface):
-    - Make --hash-password imply --hush to prevent unnecessary noise. Closes
-      ticket 15542.
+    - Make --hash-password imply --hush to prevent unnecessary noise.
+      Closes ticket 15542.
+    - Print a warning whenever we find a relative file path being used
+      as torrc option. Resolves issue 14018.
+    - The "--hash-password" option now implies "--hush" to avoid
+      needless noise. Closes ticket 15542. Patch from "cypherpunks".
+
+  o Minor features (controller):
+    - Controllers can now use GETINFO hs/client/desc/id/... to retrieve
+      items from the client's hidden service descriptor cache. Closes
+      ticket 14845.
 
 
-  o Minor features (controller)
-    - Controllers can now use GETINFO hs/client/desc/id/... to
-      retrieve items from the client's hidden service descriptor
-      cache. Closes ticket 14845.
+  o Minor features (controller):
+    - Add DirAuthority lines for default directory authorities to output
+      of the GETINFO config/defaults controller command if not already
+      present. Implements ticket 14840.
+    - Implement a new controller command "status/fresh-relay-descs" to
+      fetch a descriptor/extrainfo pair that was generated on demand
+      just for the controller's use. Implements ticket 14784.
 
 
   o Minor features (DoS-resistance):
   o Minor features (DoS-resistance):
     - Make it harder for attackers to overwhelm hidden services with
     - Make it harder for attackers to overwhelm hidden services with
       introductions, by blocking multiple introduction requests on the
       introductions, by blocking multiple introduction requests on the
       same circuit. Resolves ticket 15515.
       same circuit. Resolves ticket 15515.
 
 
+  o Minor features (geoip):
+    - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
+    - Update geoip6 to the April 8 2015 Maxmind GeoLite2
+      Country database.
+
+  o Minor features (HS popularity countermeasure):
+    - To avoid leaking HS popularity, don't cycle the introduction point
+      when we've handled a fixed number of INTRODUCE2 cells but instead
+      cycle it when a random value of introductions is reached thus
+      making it more difficult for an attacker to find out the amount of
+      clients that has passed through the introduction point for a
+      specific HS. Closes ticket 15745.
+
   o Minor features (logging):
   o Minor features (logging):
     - Include the Tor version in all LD_BUG log messages, since people
     - Include the Tor version in all LD_BUG log messages, since people
       tend to cut and paste those into the bugtracker. Implements
       tend to cut and paste those into the bugtracker. Implements
       ticket 15026.
       ticket 15026.
 
 
   o Minor features (pluggable transports):
   o Minor features (pluggable transports):
-    - When launching managed pluggable transports, setup a valid open stdin
-      in the child process that can be used to detect if tor has terminated.
-      The "TOR_PT_EXIT_ON_STDIN_CLOSE" enviornment variable can be used by
-      implementations to detect this new behavior. Resolves ticket 15435.
+    - When launching managed pluggable transports, setup a valid open
+      stdin in the child process that can be used to detect if tor has
+      terminated. The "TOR_PT_EXIT_ON_STDIN_CLOSE" enviornment variable
+      can be used by implementations to detect this new behavior.
+      Resolves ticket 15435.
     - When launching managed pluggable transports on linux systems,
     - When launching managed pluggable transports on linux systems,
-      attempt to have the kernel deliver a SIGTERM on tor exit if
-      the pluggable transport process is still running. Resolves
+      attempt to have the kernel deliver a SIGTERM on tor exit if the
+      pluggable transport process is still running. Resolves
       ticket 15471.
       ticket 15471.
 
 
-
   o Minor features (testing):
   o Minor features (testing):
-    - Add make rule `check-changes` to verify the format of changes files.
-      Closes ticket 15180.
-    - Add unit tests for control_event_is_interesting().
-      Add a compile-time check that the number of events doesn't exceed
-      the capacity of control_event_t.event_mask.
-      Closes ticket 15431, checks for bugs similar to 13085.
-      Patch by "teor".
+    - Add make rule `check-changes` to verify the format of changes
+      files. Closes ticket 15180.
+    - Add unit tests for control_event_is_interesting(). Add a compile-
+      time check that the number of events doesn't exceed the capacity
+      of control_event_t.event_mask. Closes ticket 15431, checks for
+      bugs similar to 13085. Patch by "teor".
     - Commandline argument tests moved to Stem. Resolves ticket 14806.
     - Commandline argument tests moved to Stem. Resolves ticket 14806.
     - Integrate the ntor, backtrace and zero lengths keys tests into the
     - Integrate the ntor, backtrace and zero lengths keys tests into the
       automake test suite. Closes ticket 15344.
       automake test suite. Closes ticket 15344.
@@ -73,60 +100,35 @@ Changes in version 0.2.7.1-alpha - 2015-05-??
     - Add a test to verify that the compiler does not eliminate our
     - Add a test to verify that the compiler does not eliminate our
       memwipe() implementation. Closes ticket 15377.
       memwipe() implementation. Closes ticket 15377.
 
 
-  o Minor features (controller):
-    - Add DirAuthority lines for default directory authorities to output
-      of the GETINFO config/defaults controller command if not already
-      present.  Implements ticket 14840.
-    - Implement a new controller command "status/fresh-relay-descs" to
-      fetch a descriptor/extrainfo pair that was generated on demand
-      just for the controller's use. Implements ticket 14784.
-
-  o Minor features (command-line interface):
-    - Print a warning whenever we find a relative
-      file path being used as torrc option. Resolves issue 14018.
-    - The "--hash-password" option now implies "--hush" to avoid needless
-      noise. Closes ticket 15542. Patch from "cypherpunks".
-
-  o Minor features (clock-jump tolerance):
-    - Recover better when our clock jumps back many hours, like might
-      happen for Tails or Whonix users who start with a very wrong
-      hardware clock, use Tor to discover a more accurate time, and then
-      fix their clock. Resolves part of ticket 8766.
-      [I'd call this a major feature if it actually fixed all of the issues.]
-
-  o Minor features (geoip):
-    - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
-    - Update geoip6 to the April 8 2015 Maxmind GeoLite2 Country database.
-
-  o Minor bugfixes (statistics):
-    - Disregard the ConnDirectionStatistics torrc options when Tor is
-      not a relay since in that mode of operation no sensible data is
-      being collected and because Tor might run into measurement hiccups
-      when running as a client for some time, then becoming a relay. Fixes
-      bug 15604; bugfix on 0.2.2.35.
-
   o Minor bugfixes (build):
   o Minor bugfixes (build):
-    - Improve out-of-tree builds by making non-standard rules work and clean up
-      additional files and directories. Fixes bug 15053; bugfix on
-      0.2.7.0-alpha.
+    - Improve out-of-tree builds by making non-standard rules work and
+      clean up additional files and directories. Fixes bug 15053; bugfix
+      on 0.2.7.0-alpha.
 
 
   o Minor bugfixes (command-line interface):
   o Minor bugfixes (command-line interface):
     - When "--quiet" is provided along with "--validate-config", do not
     - When "--quiet" is provided along with "--validate-config", do not
-      write anything to stdout on success. Fixes bug 14994; bugfix on
-      0.2.3.3-alpha.
+      write anything to stdout on success. Fixes bug 14994; bugfix
+      on 0.2.3.3-alpha.
     - When complaining about bad arguments to "--dump-config", use
     - When complaining about bad arguments to "--dump-config", use
       stderr, not stdout.
       stderr, not stdout.
 
 
   o Minor bugfixes (configuration, unit tests):
   o Minor bugfixes (configuration, unit tests):
     - Only add the default fallback directories when the DirAuthorities,
     - Only add the default fallback directories when the DirAuthorities,
       AlternateDirAuthority, and FallbackDir directory config options
       AlternateDirAuthority, and FallbackDir directory config options
-      are set to their defaults.
-      The default fallback directory list is currently empty, this fix
-      will only change tor's behaviour when it has default fallback
-      directories.
-      Includes unit tests for consider_adding_dir_servers().
-      Fixes bug 15642; bugfix on 90f6071d8dc0 in 0.2.4.7-alpha.
-      Patch by "teor".
+      are set to their defaults. The default fallback directory list is
+      currently empty, this fix will only change tor's behaviour when it
+      has default fallback directories. Includes unit tests for
+      consider_adding_dir_servers(). Fixes bug 15642; bugfix on
+      90f6071d8dc0 in 0.2.4.7-alpha. Patch by "teor".
+
+  o Minor bugfixes (correctness):
+    - Remove side-effects from tor_assert() calls. This was harmless,
+      because we never disable assertions, but it is bad style and
+      unnecessary. Fixes bug 15211; bugfix on 0.2.5.5, 0.2.2.36,
+      and 0.2.0.10.
+    - For correctness, avoid modifying a constant string in
+      handle_control_postdescriptor. Fixes bug 15546; bugfix
+      on 0.1.1.16-rc.
 
 
   o Minor bugfixes (hidden service):
   o Minor bugfixes (hidden service):
     - Remove an extraneous newline character from the end of hidden
     - Remove an extraneous newline character from the end of hidden
@@ -135,61 +137,55 @@ Changes in version 0.2.7.1-alpha - 2015-05-??
   o Minor bugfixes (interface):
   o Minor bugfixes (interface):
     - Print usage information for --dump-config when it is used without
     - Print usage information for --dump-config when it is used without
       an argument. Also, fix the error message to use different wording
       an argument. Also, fix the error message to use different wording
-      and add newline at the end. Fixes bug 15541; bugfix on 0.2.5.1-alpha.
+      and add newline at the end. Fixes bug 15541; bugfix
+      on 0.2.5.1-alpha.
 
 
   o Minor bugfixes (logs):
   o Minor bugfixes (logs):
     - When building Tor under Clang, do not include an extra set of
     - When building Tor under Clang, do not include an extra set of
-      parentheses in log messages that include function names.
-      Fixes bug 15269; bugfix on every released version of Tor when
-      compiled with recent enough Clang.
-
-  o Minor bugfixes (test networks)
-    - When self-testing reachability, use ExtendAllowPrivateAddresses
-      to determine if local/private addresses imply reachability.
-      The previous fix used TestingTorNetwork, which implies
+      parentheses in log messages that include function names. Fixes bug
+      15269; bugfix on every released version of Tor when compiled with
+      recent enough Clang.
+
+  o Minor bugfixes (network):
+    - When attempting to use fallback technique for network interface
+      lookup, disregard loopback and multicast addresses since they are
+      unsuitable for public communications.
+
+  o Minor bugfixes (statistics):
+    - Disregard the ConnDirectionStatistics torrc options when Tor is
+      not a relay since in that mode of operation no sensible data is
+      being collected and because Tor might run into measurement hiccups
+      when running as a client for some time, then becoming a relay.
+      Fixes bug 15604; bugfix on 0.2.2.35.
+
+  o Minor bugfixes (test networks):
+    - When self-testing reachability, use ExtendAllowPrivateAddresses to
+      determine if local/private addresses imply reachability. The
+      previous fix used TestingTorNetwork, which implies
       ExtendAllowPrivateAddresses, but this excluded rare configs where
       ExtendAllowPrivateAddresses, but this excluded rare configs where
       ExtendAllowPrivateAddresses is set but TestingTorNetwork is not.
       ExtendAllowPrivateAddresses is set but TestingTorNetwork is not.
-      Fixes bug 15771; bugfix on 0.2.6.1-alpha.
-      Patch by "teor", issue discovered by CJ Ess.
+      Fixes bug 15771; bugfix on 0.2.6.1-alpha. Patch by "teor", issue
+      discovered by CJ Ess.
 
 
   o Minor bugfixes (testing):
   o Minor bugfixes (testing):
-    - Set the severity correctly when testing get_interface_addresses_ifaddrs()
-      and get_interface_addresses_win32(), so that the tests fail gracefully
+    - Set the severity correctly when testing
+      get_interface_addresses_ifaddrs() and
+      get_interface_addresses_win32(), so that the tests fail gracefully
       instead of triggering an assertion. Fixes bug 15759; bugfix on
       instead of triggering an assertion. Fixes bug 15759; bugfix on
       0.2.6.3-alpha. Reported by Nicolas Derive.
       0.2.6.3-alpha. Reported by Nicolas Derive.
-    - Check for matching value in server response in ntor_ref.py.
-      Fixes bug 15591; bugfix on 0.2.4.8-alpha. Reported and fixed
+    - Check for matching value in server response in ntor_ref.py. Fixes
+      bug 15591; bugfix on 0.2.4.8-alpha. Reported and fixed
       by "joelanders".
       by "joelanders".
 
 
-  o Minor bugfixes (correctness):
-    - Remove side-effects from tor_assert() calls. This was harmless,
-      because we never disable assertions, but it is bad style and
-      unnecessary. Fixes bug 15211; bugfix on 0.2.5.5, 0.2.2.36, and
-      0.2.0.10.
-    - For correctness, avoid modifying a constant string in
-      handle_control_postdescriptor. Fixes bug 15546; bugfix on
-      0.1.1.16-rc.
-
-  o Minor bugfixes (network):
-    - When attempting to use fallback technique for network interface
-      lookup, disregard loopback and multicast addresses since they are
-      unsuitable for public communications.
-
   o Code simplification and refactoring:
   o Code simplification and refactoring:
-    - Move the hacky fallback code out of get_interface_address6()
-      into separate function and get it covered with unit-tests. Resolves
+    - Move the hacky fallback code out of get_interface_address6() into
+      separate function and get it covered with unit-tests. Resolves
       ticket 14710.
       ticket 14710.
     - Refactor hidden service client-side cache lookup to intelligently
     - Refactor hidden service client-side cache lookup to intelligently
       report its various failure cases, and disentangle failure cases
       report its various failure cases, and disentangle failure cases
       involving a lack of introduction points. Closes ticket 14391.
       involving a lack of introduction points. Closes ticket 14391.
-    - Use our own Base64 encoder instead of OpenSSL's, to allow more control
-      over the output. Part of ticket 15652.
-
-  o Removed code:
-    - Remove `USE_OPENSSL_BASE64` and the corresponding fallback code and
-      always use the internal Base64 decoder. The internal decoder has been
-      part of tor since tor-0.2.0.10-alpha, and no one should be using the
-      OpenSSL one. Part of ticket 15652.
+    - Use our own Base64 encoder instead of OpenSSL's, to allow more
+      control over the output. Part of ticket 15652.
 
 
   o Documentation:
   o Documentation:
     - Improve the descriptions of statistics-related torrc options in
     - Improve the descriptions of statistics-related torrc options in
@@ -201,22 +197,21 @@ Changes in version 0.2.7.1-alpha - 2015-05-??
       Previously, we had used "router descriptor", "server descriptor",
       Previously, we had used "router descriptor", "server descriptor",
       and "relay descriptor" interchangeably. Part of ticket 14987.
       and "relay descriptor" interchangeably. Part of ticket 14987.
 
 
-  o New system requirements:
-    - Tor no longer includes workarounds for Libevent versions before 1.3e.
-      Libevent 2.0 or later is recommended. Closes ticket 15248.
-
   o Removed code:
   o Removed code:
+    - Remove `USE_OPENSSL_BASE64` and the corresponding fallback code
+      and always use the internal Base64 decoder. The internal decoder
+      has been part of tor since tor-0.2.0.10-alpha, and no one should
+      be using the OpenSSL one. Part of ticket 15652.
     - Remove the 'tor_strclear()' function; use memwipe() instead.
     - Remove the 'tor_strclear()' function; use memwipe() instead.
       Closes ticket 14922.
       Closes ticket 14922.
 
 
   o Removed features:
   o Removed features:
-    - Remove the (seldom-used) DynamicDHGroups feature. For
-      anti-fingerprinting we now recommend pluggable transports; for
-      forward-secrecy in TLS, we now use the P-256 group.
-      Closes ticket 13736.
+    - Remove the (seldom-used) DynamicDHGroups feature. For anti-
+      fingerprinting we now recommend pluggable transports; for forward-
+      secrecy in TLS, we now use the P-256 group. Closes ticket 13736.
     - Remove the undocumented "--digests" command-line option. It
     - Remove the undocumented "--digests" command-line option. It
-      complicated our build process, caused subtle build issues
-      on multiple platforms, and is now redundant since we started
+      complicated our build process, caused subtle build issues on
+      multiple platforms, and is now redundant since we started
       including git version identifiers. Closes ticket 14742.
       including git version identifiers. Closes ticket 14742.
     - Tor no longer contains workarounds for stat files generated by
     - Tor no longer contains workarounds for stat files generated by
       super-old versions of Tor that didn't choose guards sensibly.
       super-old versions of Tor that didn't choose guards sensibly.