Explorar o código

Reflow the 0282 changelog

Nick Mathewson %!s(int64=8) %!d(string=hai) anos
pai
achega
54dab73464
Modificáronse 1 ficheiros con 75 adicións e 75 borrados
  1. 75 75
      ChangeLog

+ 75 - 75
ChangeLog

@@ -1,7 +1,7 @@
 Changes in version 0.2.8.2-alpha - 2016-03-??
 Changes in version 0.2.8.2-alpha - 2016-03-??
   Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
   Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
   bugs in earlier versions of Tor, including some that prevented
   bugs in earlier versions of Tor, including some that prevented
-  authorities  using Tor 0.2.7 from running correctly.  IPv6 and directory
+  authorities using Tor 0.2.7 from running correctly. IPv6 and directory
   support should also be much improved.
   support should also be much improved.
 
 
   o New system requirements:
   o New system requirements:
@@ -25,26 +25,6 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
       bugfix on Tor 0.1.1.11-alpha, which fixed a related bug
       bugfix on Tor 0.1.1.11-alpha, which fixed a related bug
       incompletely. Reported by Guido Vranken.
       incompletely. Reported by Guido Vranken.
 
 
-  o Major bugfixes (voting):
-    - Actually enable Ed25519-based directory collation. Previously, the
-      code had been written, but some debugging code that had
-      accidentally been left in the codebase made it stay turned off.
-      Fixes bug 17702; bugfix on 0.2.7.2-alpha.
-    - When collating votes by Ed25519 identities, authorities now
-      include a "NoEdConsensus" flag if the ed25519 value (or lack
-      thereof) for a server does not reflect the majority consensus.
-      Related to bug 17668; bugfix on 0.2.7.2-alpha.
-    - When generating a vote with keypinning disabled, never include two
-      entries for the same ed25519 identity. This bug was causing
-      authorities to generate votes that they could not parse when a
-      router violated key pinning by changing its RSA identity but
-      keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
-      18318. Bugfix on 0.2.7.2-alpha.
-
-  o Major bugfixes (dns proxy mode, crash):
-    - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
-      bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'.
-
   o Major bugfixes (bridges, pluggable transports):
   o Major bugfixes (bridges, pluggable transports):
     - Modify the check for OR connections to private addresses. Allow
     - Modify the check for OR connections to private addresses. Allow
       bridges on private addresses, including pluggable transports that
       bridges on private addresses, including pluggable transports that
@@ -58,16 +38,20 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
       sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
       sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
 
 
   o Major bugfixes (crash on shutdown):
   o Major bugfixes (crash on shutdown):
-    - Fix a segfault during startup: If Unix domain socket was configured as
-      listener (such as a ControlSocket or a SocksPort "unix:" socket), and
-      tor was started as root but not configured to switch to another
-      user, tor would segfault while trying to string compare a NULL
-      value. Fixes bug 18261; bugfix on 0.2.8.1-alpha. Patch by weasel.
-    - Correctly handle detaching circuits from muxes when
-      shutting down. Fixes bug 18116; bugfix
-      on 0.2.8.1-alpha.
-    - Fix an assert-on-exit bug related to counting memory usage
-      in rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
+    - Fix a segfault during startup: If Unix domain socket was
+      configured as listener (such as a ControlSocket or a SocksPort
+      "unix:" socket), and tor was started as root but not configured to
+      switch to another user, tor would segfault while trying to string
+      compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha.
+      Patch by weasel.
+    - Correctly handle detaching circuits from muxes when shutting down.
+      Fixes bug 18116; bugfix on 0.2.8.1-alpha.
+    - Fix an assert-on-exit bug related to counting memory usage in
+      rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
+
+  o Major bugfixes (dns proxy mode, crash):
+    - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
+      bugfix on 0.2.0.1-alpha. Patch from 'cypherpunks'.
 
 
   o Major bugfixes (relays, bridge clients):
   o Major bugfixes (relays, bridge clients):
     - Ensure relays always allow IPv4 OR and Dir connections. Ensure
     - Ensure relays always allow IPv4 OR and Dir connections. Ensure
@@ -75,26 +59,27 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
       Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
       Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
       patch by teor.
       patch by teor.
 
 
+  o Major bugfixes (voting):
+    - Actually enable Ed25519-based directory collation. Previously, the
+      code had been written, but some debugging code that had
+      accidentally been left in the codebase made it stay turned off.
+      Fixes bug 17702; bugfix on 0.2.7.2-alpha.
+    - When collating votes by Ed25519 identities, authorities now
+      include a "NoEdConsensus" flag if the ed25519 value (or lack
+      thereof) for a server does not reflect the majority consensus.
+      Related to bug 17668; bugfix on 0.2.7.2-alpha.
+    - When generating a vote with keypinning disabled, never include two
+      entries for the same ed25519 identity. This bug was causing
+      authorities to generate votes that they could not parse when a
+      router violated key pinning by changing its RSA identity but
+      keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
+      18318. Bugfix on 0.2.7.2-alpha.
+
   o Minor features (security, win32):
   o Minor features (security, win32):
     - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
     - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
       attack. Fixes bug 18123; bugfix on all tor versions. Patch
       attack. Fixes bug 18123; bugfix on all tor versions. Patch
       by "teor".
       by "teor".
 
 
-  o Minor features (hidden service directory):
-    - Streamline relay-side hsdir handling: when relays consider whether
-      to accept an uploaded hidden service descriptor, they no longer
-      check whether they are one of the relays in the network that is
-      "supposed" to handle that descriptor. Implements ticket 18332.
-
-  o Minor features (IPv6):
-    - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
-      to 1, tor prefers IPv6 directory addresses.
-    - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
-      avoids using IPv4 for client OR and directory connections.
-    - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and
-      ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and
-      ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor".
-
   o Minor features (bug-resistance):
   o Minor features (bug-resistance):
     - Make Tor survive errors involving connections without a
     - Make Tor survive errors involving connections without a
       corresponding event object. Previously we'd fail with an
       corresponding event object. Previously we'd fail with an
@@ -117,17 +102,33 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
 
 
   o Minor features (crypto):
   o Minor features (crypto):
     - Validate the hard-coded Diffie-Hellman parameters and ensure that
     - Validate the hard-coded Diffie-Hellman parameters and ensure that
-      p is a safe prime, and g is a suitable generator. Closes ticket 18221.
+      p is a safe prime, and g is a suitable generator. Closes
+      ticket 18221.
 
 
   o Minor features (geoip):
   o Minor features (geoip):
     - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
     - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
       Country database.
       Country database.
 
 
+  o Minor features (hidden service directory):
+    - Streamline relay-side hsdir handling: when relays consider whether
+      to accept an uploaded hidden service descriptor, they no longer
+      check whether they are one of the relays in the network that is
+      "supposed" to handle that descriptor. Implements ticket 18332.
+
+  o Minor features (IPv6):
+    - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
+      to 1, tor prefers IPv6 directory addresses.
+    - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
+      avoids using IPv4 for client OR and directory connections.
+    - Try harder to fulfil IP version restrictions ClientUseIPv4 0 and
+      ClientUseIPv6 0; and the preferences ClientPreferIPv6ORPort and
+      ClientPreferIPv6DirPort. Closes ticket 17840; patch by "teor".
+
   o Minor features (linux seccomp2 sandbox):
   o Minor features (linux seccomp2 sandbox):
-    - Reject attempts to change our Address with "Sandbox 1"
-      enabled. Changing Address with Sandbox turned on would never
-      actually work, but previously it would fail in strange and
-      confusing ways. Found while fixing 18548.
+    - Reject attempts to change our Address with "Sandbox 1" enabled.
+      Changing Address with Sandbox turned on would never actually work,
+      but previously it would fail in strange and confusing ways. Found
+      while fixing 18548.
 
 
   o Minor features (robustness):
   o Minor features (robustness):
     - Exit immediately with an error message if the code attempts to use
     - Exit immediately with an error message if the code attempts to use
@@ -137,11 +138,11 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
   o Minor features (unix domain sockets):
   o Minor features (unix domain sockets):
     - Add a new per-socket option, RelaxDirModeCheck, to allow creating
     - Add a new per-socket option, RelaxDirModeCheck, to allow creating
       Unix domain sockets without checking the permissions on the parent
       Unix domain sockets without checking the permissions on the parent
-      directory. (Tor checks permissions by default because some operating
-      systems only check permissions on the parent directory. However, some
-      operating systems do look at permissions on the socket, and tor's default
-      check is unneeded.)  Closes ticket 18458. Patch
-      by weasel.
+      directory. (Tor checks permissions by default because some
+      operating systems only check permissions on the parent directory.
+      However, some operating systems do look at permissions on the
+      socket, and tor's default check is unneeded.) Closes ticket 18458.
+      Patch by weasel.
 
 
   o Minor bugfixes (exit policies, security):
   o Minor bugfixes (exit policies, security):
     - Refresh an exit relay's exit policy when interface addresses
     - Refresh an exit relay's exit policy when interface addresses
@@ -159,10 +160,9 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
     - Do not link the unit tests against both the testing and non-
     - Do not link the unit tests against both the testing and non-
       testing versions of the static libraries. Fixes bug 18490; bugfix
       testing versions of the static libraries. Fixes bug 18490; bugfix
       on 0.2.7.1-alpha.
       on 0.2.7.1-alpha.
-    - Avoid spurious failures from configure files related
-      to calling exit(0) in TOR_SEARCH_LIBRARY.
-      Fixes bug 18625; bugfix on 0.2.0.1-alpha.
-      Patch from "cypherpunks".
+    - Avoid spurious failures from configure files related to calling
+      exit(0) in TOR_SEARCH_LIBRARY. Fixes bug 18625; bugfix on
+      0.2.0.1-alpha. Patch from "cypherpunks".
     - Silence spurious clang-scan warnings in the ed25519_donna code by
     - Silence spurious clang-scan warnings in the ed25519_donna code by
       explicitly initialising some objects. Fixes bug 18384; bugfix on
       explicitly initialising some objects. Fixes bug 18384; bugfix on
       0f3eeca9 in 0.2.7.2-alpha. Patch by "teor".
       0f3eeca9 in 0.2.7.2-alpha. Patch by "teor".
@@ -170,9 +170,8 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
   o Minor bugfixes (client, bootstrap):
   o Minor bugfixes (client, bootstrap):
     - Count receipt of new microdescriptors as progress towards
     - Count receipt of new microdescriptors as progress towards
       bootstrapping. Previously, with EntryNodes set, Tor might not
       bootstrapping. Previously, with EntryNodes set, Tor might not
-      successfully repopulate the guard set on bootstrapping.
-      Fixes bug 16825; bugfix
-      on 0.2.3.1-alpha.
+      successfully repopulate the guard set on bootstrapping. Fixes bug
+      16825; bugfix on 0.2.3.1-alpha.
 
 
   o Minor bugfixes (code correctness):
   o Minor bugfixes (code correctness):
     - Update to the latest version of Trunnel, which tries harder to
     - Update to the latest version of Trunnel, which tries harder to
@@ -208,14 +207,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
       0.2.4.7-alpha. Reported by "atagar", patch by "teor".
       0.2.4.7-alpha. Reported by "atagar", patch by "teor".
 
 
   o Minor bugfixes (hidden service, client):
   o Minor bugfixes (hidden service, client):
-    - Handle the case where the user makes several fast consecutive requests to the same .onion
-      address. Previously, the first six requests would each trigger a
-      descriptor fetch, each picking a directory
-      (there are 6 overall) and the seventh one would fail because no
-      directories were left, thereby triggering a close on all current directory
-      connections asking for the hidden service.
-      The solution here is to not close the directory connections if we have pending directory
-      fetch. Fixes bug 15937; bugfix on tor-0.2.7.1-alpha.
+    - Handle the case where the user makes several fast consecutive
+      requests to the same .onion address. Previously, the first six
+      requests would each trigger a descriptor fetch, each picking a
+      directory (there are 6 overall) and the seventh one would fail
+      because no directories were left, thereby triggering a close on
+      all current directory connections asking for the hidden service.
+      The solution here is to not close the directory connections if we
+      have pending directory fetch. Fixes bug 15937; bugfix
+      on tor-0.2.7.1-alpha.
 
 
   o Minor bugfixes (hidden service, control port):
   o Minor bugfixes (hidden service, control port):
     - Add the onion address to the HS_DESC event for the UPLOADED action
     - Add the onion address to the HS_DESC event for the UPLOADED action
@@ -230,15 +230,15 @@ Changes in version 0.2.8.2-alpha - 2016-03-??
     - Avoid a 10-second delay when starting as a client with "Sandbox 1"
     - Avoid a 10-second delay when starting as a client with "Sandbox 1"
       enabled and no DNS resolvers configured. This should help TAILS
       enabled and no DNS resolvers configured. This should help TAILS
       start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha.
       start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha.
-    - Fix the sandbox's interoprability with unix domain sockets under setuid.
-      Fixes bug 18253; bugfix on 0.2.8.1-alpha.
+    - Fix the sandbox's interoprability with unix domain sockets under
+      setuid. Fixes bug 18253; bugfix on 0.2.8.1-alpha.
     - Allow the setrlimit syscall, and the prlimit and prlimit64
     - Allow the setrlimit syscall, and the prlimit and prlimit64
       syscalls, which some libc implementations use under the hood.
       syscalls, which some libc implementations use under the hood.
       Fixes bug 15221; bugfix on 0.2.5.1-alpha.
       Fixes bug 15221; bugfix on 0.2.5.1-alpha.
 
 
   o Minor bugfixes (logging):
   o Minor bugfixes (logging):
-    - When logging information about an unparsable networkstatus vote
-      or consensus, do not say "vote" when we mean consensus. Fixes bug
+    - When logging information about an unparsable networkstatus vote or
+      consensus, do not say "vote" when we mean consensus. Fixes bug
       18368; bugfix on 0.2.0.8-alpha.
       18368; bugfix on 0.2.0.8-alpha.
     - Scrub service in from "unrecognized service ID" log messages.
     - Scrub service in from "unrecognized service ID" log messages.
       Fixes bug 18600; bugfix on 0.2.4.11-alpha.
       Fixes bug 18600; bugfix on 0.2.4.11-alpha.