|
@@ -1,9 +1,15 @@
|
|
Changes in version 0.2.1.9-alpha - 2008-12-25
|
|
Changes in version 0.2.1.9-alpha - 2008-12-25
|
|
|
|
+ o New directory authorities:
|
|
|
|
+ - gabelmoo (the authority run by Karsten Loesing) now has a new
|
|
|
|
+ IP address.
|
|
|
|
+
|
|
o Security fixes:
|
|
o Security fixes:
|
|
- Never use a connection with a mismatched address to extend a
|
|
- Never use a connection with a mismatched address to extend a
|
|
circuit, unless that connection is canonical. A canonical
|
|
circuit, unless that connection is canonical. A canonical
|
|
connection is one whose address is authenticated by the router's
|
|
connection is one whose address is authenticated by the router's
|
|
identity key, either in a NETINFO cell or in a router descriptor.
|
|
identity key, either in a NETINFO cell or in a router descriptor.
|
|
|
|
+ - Avoid a possible memory corruption bug when receiving hidden service
|
|
|
|
+ descriptors. Bugfix on 0.2.1.6-alpha.
|
|
|
|
|
|
o Major bugfixes:
|
|
o Major bugfixes:
|
|
- Fix a logic error that would automatically reject all but the first
|
|
- Fix a logic error that would automatically reject all but the first
|
|
@@ -13,10 +19,12 @@ Changes in version 0.2.1.9-alpha - 2008-12-25
|
|
"connecting" and it receives an "end" relay cell, the exit relay
|
|
"connecting" and it receives an "end" relay cell, the exit relay
|
|
would silently ignore the end cell and not close the stream. If
|
|
would silently ignore the end cell and not close the stream. If
|
|
the client never closes the circuit, then the exit relay never
|
|
the client never closes the circuit, then the exit relay never
|
|
- closes the TCP connection. Bug introduced in Tor 0.1.2.1-alpha;
|
|
|
|
|
|
+ closes the TCP connection. Bug introduced in 0.1.2.1-alpha;
|
|
reported by "wood".
|
|
reported by "wood".
|
|
- - Avoid a possible memory corruption bug when receiving hidden service
|
|
|
|
- descriptors. Bugfix on 0.2.1.6-alpha.
|
|
|
|
|
|
+ - When we can't initialize DNS because the network is down, do not
|
|
|
|
+ automatically stop Tor from starting. Instead, retry failed
|
|
|
|
+ dns_inits() every 10 minutes, and change the exit policy to reject
|
|
|
|
+ *:* until one succeeds. Fixes bug 691.
|
|
|
|
|
|
o Minor features:
|
|
o Minor features:
|
|
- Give a better error message when an overzealous init script says
|
|
- Give a better error message when an overzealous init script says
|
|
@@ -25,16 +33,12 @@ Changes in version 0.2.1.9-alpha - 2008-12-25
|
|
- When a directory authority gives us a new guess for our IP address,
|
|
- When a directory authority gives us a new guess for our IP address,
|
|
log which authority we used. Hopefully this will help us debug
|
|
log which authority we used. Hopefully this will help us debug
|
|
the recent complaints about bad IP address guesses.
|
|
the recent complaints about bad IP address guesses.
|
|
- - When we can't initialize DNS because the network is down, do not
|
|
|
|
- automatically stop Tor from starting. Instead, we retry failed
|
|
|
|
- dns_inits() every 10 minutes, and change the exit policy to reject
|
|
|
|
- *:* until one succeeds. Fixes bug 691.
|
|
|
|
- Detect svn revision properly when we're using git-svn.
|
|
- Detect svn revision properly when we're using git-svn.
|
|
- Try not to open more than one descriptor-downloading connection
|
|
- Try not to open more than one descriptor-downloading connection
|
|
to an authority at once. This should reduce load on directory
|
|
to an authority at once. This should reduce load on directory
|
|
authorities. Fixes bug 366.
|
|
authorities. Fixes bug 366.
|
|
- Add cross-certification to newly generated certificates, so that
|
|
- Add cross-certification to newly generated certificates, so that
|
|
- a signing key is enough information to use to look up a certificate.
|
|
|
|
|
|
+ a signing key is enough information to look up a certificate.
|
|
Partial implementation of proposal 157.
|
|
Partial implementation of proposal 157.
|
|
- Start serving certificates by <identity digest, signing key digest>
|
|
- Start serving certificates by <identity digest, signing key digest>
|
|
pairs. Partial implementation of proposal 157.
|
|
pairs. Partial implementation of proposal 157.
|
|
@@ -44,8 +48,8 @@ Changes in version 0.2.1.9-alpha - 2008-12-25
|
|
messages to that length ourselves, rather than relying on the
|
|
messages to that length ourselves, rather than relying on the
|
|
system to do it for us.
|
|
system to do it for us.
|
|
- Optimize out calls to time(NULL) that occur for every IO operation,
|
|
- Optimize out calls to time(NULL) that occur for every IO operation,
|
|
- or for every cell. On systems where time() is a slow syscalls,
|
|
|
|
- this will be slightly helpful.
|
|
|
|
|
|
+ or for every cell. On systems where time() is a slow syscall,
|
|
|
|
+ this fix will be slightly helpful.
|
|
- Exit servers can now answer resolve requests for ip6.arpa addresses.
|
|
- Exit servers can now answer resolve requests for ip6.arpa addresses.
|
|
- When we download a descriptor that we then immediately (as
|
|
- When we download a descriptor that we then immediately (as
|
|
a directory authority) reject, do not retry downloading it right
|
|
a directory authority) reject, do not retry downloading it right
|
|
@@ -60,8 +64,8 @@ Changes in version 0.2.1.9-alpha - 2008-12-25
|
|
- New CONSENSUS_ARRIVED event to note when a new consensus has
|
|
- New CONSENSUS_ARRIVED event to note when a new consensus has
|
|
been fetched and validated.
|
|
been fetched and validated.
|
|
- When we realize that another process has modified our cached
|
|
- When we realize that another process has modified our cached
|
|
- descriptors, print out a more useful error message rather than
|
|
|
|
- triggering an assertion. Fixes bug 885. Patch from Karsten.
|
|
|
|
|
|
+ descriptors file, print out a more useful error message rather
|
|
|
|
+ than triggering an assertion. Fixes bug 885. Patch from Karsten.
|
|
- Add an internal-use-only __ReloadTorrcOnSIGHUP option for
|
|
- Add an internal-use-only __ReloadTorrcOnSIGHUP option for
|
|
controllers to prevent SIGHUP from reloading the
|
|
controllers to prevent SIGHUP from reloading the
|
|
configuration. Fixes bug 856.
|
|
configuration. Fixes bug 856.
|
|
@@ -80,13 +84,13 @@ Changes in version 0.2.1.9-alpha - 2008-12-25
|
|
user if lower values are given in the configuration. Bugfix on
|
|
user if lower values are given in the configuration. Bugfix on
|
|
0.1.1.17-rc. Patch by Sebastian.
|
|
0.1.1.17-rc. Patch by Sebastian.
|
|
- Fix a race condition when freeing keys shared between main thread
|
|
- Fix a race condition when freeing keys shared between main thread
|
|
- and CPU workers that could result in a memory leak. Bugfix on
|
|
|
|
- 0.1.0.1-rc. Fixes bug 889.
|
|
|
|
|
|
+ and CPU workers that could result in a memory leak. Bugfix on
|
|
|
|
+ 0.1.0.1-rc. Fixes bug 889.
|
|
|
|
|
|
o Minor bugfixes (hidden services):
|
|
o Minor bugfixes (hidden services):
|
|
- - Do not throw away existing introduction points on SIGHUP; bugfix on
|
|
|
|
- 0.0.6pre1; also, do not stall hidden services because of
|
|
|
|
- introduction points thrown away; bugfix on 0.2.1.7-alpha. Spotted
|
|
|
|
|
|
+ - Do not throw away existing introduction points on SIGHUP (bugfix on
|
|
|
|
+ 0.0.6pre1); also, do not stall hidden services because we're
|
|
|
|
+ throwing away introduction points; bugfix on 0.2.1.7-alpha. Spotted
|
|
by John Brooks. Patch by Karsten. Fixes bug 874.
|
|
by John Brooks. Patch by Karsten. Fixes bug 874.
|
|
- Fix a memory leak when we decline to add a v2 rendezvous
|
|
- Fix a memory leak when we decline to add a v2 rendezvous
|
|
descriptor to the cache because we already had a v0 descriptor
|
|
descriptor to the cache because we already had a v0 descriptor
|