Browse Source

Add a blurb, edit the changelog

Nick Mathewson 7 years ago
parent
commit
7878668cab
1 changed files with 50 additions and 39 deletions
  1. 50 39
      ChangeLog

+ 50 - 39
ChangeLog

@@ -1,5 +1,14 @@
 Changes in version 0.3.0.3-alpha - 2017-02-03
 Changes in version 0.3.0.3-alpha - 2017-02-03
-  BLURB BLURB BLURB.
+  Tor 0.3.0.3-alpha fixes a few significant bugs introduced over the
+  0.3.0.x development series, including some that could cause
+  authorities to behave badly. There is also a fix for a longstanding
+  bug that could prevent IPv6 exits from working. Tor 0.3.0.3-alpha also
+  includes some smaller features and bugfixes.
+
+  The Tor 0.3.0.x release series is now in patch-freeze: no additional
+  features will be considered for inclusion in 0.3.0.x. We suspect that
+  some bugs will probably remain, however, and we encourage people to
+  test this release.
 
 
   o Major bugfixes (directory authority):
   o Major bugfixes (directory authority):
     - During voting, when marking a node as a probable sybil, do not
     - During voting, when marking a node as a probable sybil, do not
@@ -14,20 +23,20 @@ Changes in version 0.3.0.3-alpha - 2017-02-03
 
 
   o Major bugfixes (entry guards):
   o Major bugfixes (entry guards):
     - Stop trying to build circuits through entry guards for which we
     - Stop trying to build circuits through entry guards for which we
-      have no descriptor yet. Also, stop crashing if we *do*
+      have no descriptor. Also, stop crashing in the case that we *do*
       accidentally try to build a circuit in such a state. Fixes bug
       accidentally try to build a circuit in such a state. Fixes bug
       21242; bugfix on 0.3.0.1-alpha.
       21242; bugfix on 0.3.0.1-alpha.
 
 
   o Major bugfixes (IPv6 Exits):
   o Major bugfixes (IPv6 Exits):
     - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects
     - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects
-      IPv6 addresses. Instead, only reject a port over IPv6 if the exit
-      policy rejects that port on more than an IPv6 /16 of addresses.
-      This bug was made worse by 17027 in 0.2.8.1-alpha, which rejects a
-      relay's own IPv6 address by default. Fixes bug 21357; bugfix on
-      commit 004f3f4e53 in 0.2.4.7-alpha.
+      any IPv6 addresses. Instead, only reject a port over IPv6 if the
+      exit policy rejects that port on more than an IPv6 /16 of
+      addresses. This bug was made worse by 17027 in 0.2.8.1-alpha,
+      which rejected a relay's own IPv6 address by default. Fixes bug
+      21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha.
 
 
   o Minor feature (client):
   o Minor feature (client):
-    - Enable IPv6 traffic by default on the SocksPort. To disable this,
+    - Enable IPv6 traffic on the SocksPort by default. To disable this,
       a user will have to specify "NoIPv6Traffic". Closes ticket 21269.
       a user will have to specify "NoIPv6Traffic". Closes ticket 21269.
 
 
   o Minor feature (fallback scripts):
   o Minor feature (fallback scripts):
@@ -36,10 +45,10 @@ Changes in version 0.3.0.3-alpha - 2017-02-03
       20174. Patch by haxxpop.
       20174. Patch by haxxpop.
 
 
   o Minor features (ciphersuite selection):
   o Minor features (ciphersuite selection):
+    - Clients now advertise a list of ciphersuites closer to the ones
+      preferred by Firefox. Closes part of ticket 15426.
     - Allow servers to accept a wider range of ciphersuites, including
     - Allow servers to accept a wider range of ciphersuites, including
       chacha20-poly1305 and AES-CCM. Closes the other part of 15426.
       chacha20-poly1305 and AES-CCM. Closes the other part of 15426.
-    - Clients now advertise a list of ciphersuites closer to the ones
-      preferred by Firefox. Closes ticket 15426.
 
 
   o Minor features (controller, configuration):
   o Minor features (controller, configuration):
     - Each of the *Port options, such as SocksPort, ORPort, ControlPort,
     - Each of the *Port options, such as SocksPort, ORPort, ControlPort,
@@ -53,23 +62,24 @@ Changes in version 0.3.0.3-alpha - 2017-02-03
       in feature 20956. Implements ticket 21300.
       in feature 20956. Implements ticket 21300.
 
 
   o Minor features (portability, compilation):
   o Minor features (portability, compilation):
-    - Autoconf now check to determine if OpenSSL structures are opaque,
+    - Autoconf now checks to determine if OpenSSL structures are opaque,
       instead of explicitly checking for OpenSSL version numbers. Part
       instead of explicitly checking for OpenSSL version numbers. Part
       of ticket 21359.
       of ticket 21359.
     - Support building with recent LibreSSL code that uses opaque
     - Support building with recent LibreSSL code that uses opaque
       structures. Closes ticket 21359.
       structures. Closes ticket 21359.
 
 
   o Minor features (relay):
   o Minor features (relay):
-    - Allow separation of exit and relay traffic to different source IP
-      addresses. Closes ticket 17975. Written by Michael Sonntag.
+    - We now allow separation of exit and relay traffic to different
+      source IP addresses, using the OutboundBindAddressExit and
+      OutboundBindAddressOR options respectively. Closes ticket 17975.
+      Written by Michael Sonntag.
 
 
   o Minor bugfix (logging):
   o Minor bugfix (logging):
-    - Don't recommend the use of Tor2web in non anonymous mode. In that
-      mode, we disable client functionalities and recommending Tor2web
-      as a solution is a bad idea because in that case client loses all
-      anonymity. Tor2web should really only be used in very specific
-      cases and with users *knowing* what they do. Fixes bug 21294;
-      bugfix on 0.2.9.3-alpha.
+    - Don't recommend the use of Tor2web in non-anonymous mode.
+      Recommending Tor2web is a bad idea because the client loses all
+      anonymity. Tor2web shouldy only be used in specific cases by users
+      who *know* and understand the issues. Fixes bug 21294; bugfix
+      on 0.2.9.3-alpha.
 
 
   o Minor bugfixes (client):
   o Minor bugfixes (client):
     - Always recover from failures in extend_info_from_node(), in an
     - Always recover from failures in extend_info_from_node(), in an
@@ -90,38 +100,39 @@ Changes in version 0.3.0.3-alpha - 2017-02-03
 
 
   o Minor bugfixes (configure, autoconf):
   o Minor bugfixes (configure, autoconf):
     - Rename the configure option --enable-expensive-hardening to
     - Rename the configure option --enable-expensive-hardening to
-      --enable-fragile-hardening. TROVE-2017-001 was triggerable only
-      through the expensive hardening which is making the tor daemon
-      abort when the issue is detected. Thus, it makes tor more at risk
-      of remote crashes but safer against RCE or heartbleed bug
-      category. Fixes bug 21290; bugfix on 0.2.5.4-alpha.
+      --enable-fragile-hardening. Expensive hardening makes the tor
+      daemon abort when some kinds of issues are detected. Thus, it
+      makes tor more at risk of remote crashes but safer against RCE or
+      heartbleed bug category. We now try to explain this issue in a
+      message from the configure script. Fixes bug 21290; bugfix
+      on 0.2.5.4-alpha.
 
 
   o Minor bugfixes (controller):
   o Minor bugfixes (controller):
     - Restore the (deprecated) DROPGUARDS controller command. Fixes bug
     - Restore the (deprecated) DROPGUARDS controller command. Fixes bug
       20824; bugfix on 0.3.0.1-alpha.
       20824; bugfix on 0.3.0.1-alpha.
 
 
   o Minor bugfixes (hidden service):
   o Minor bugfixes (hidden service):
-    - Cleanup expiring intro point nodes if no circuit is associated to
-      it anymore. It was causing, rarely, the service to not open enough
-      introduction points circuit in the case we had dead expiring
-      nodes.; bugfix on 0.2.7.2-alpha.
-    - Stop modifying the value of our torrc option
-      HiddenServiceStatistics just because we're not a bridge or relay.
-      Use an internal value for what tor should use and keep the torrc
-      option intact. Fixes bug 21150; bugfix on 0.2.6.2-alpha.
+    - Clean up the code for expiring intro points with no associated
+      circuits. It was causing, rarely, a service with some expiring
+      nodes to not open enough introduction points. Fixes part of bug
+      21302; bugfix on 0.2.7.2-alpha.
+    - Stop setting the torrc option HiddenServiceStatistics to "0" just
+      because we're not a bridge or relay. Instead, we preserve whatever
+      value the user set (or didn't set). Fixes bug 21150; bugfix
+      on 0.2.6.2-alpha.
     - Two possible underflow which would ultimately lead to creating a
     - Two possible underflow which would ultimately lead to creating a
       lot of introduction points circuits and closing them in a non stop
       lot of introduction points circuits and closing them in a non stop
       loop. Fixes bug 21302; bugfix on 0.2.7.2-alpha.
       loop. Fixes bug 21302; bugfix on 0.2.7.2-alpha.
 
 
   o Minor bugfixes (portability):
   o Minor bugfixes (portability):
-    - Use "OpenBSD" pre-defined compiler macro instead of "OPENBSD" or
-      "__OpenBSD__". It is supported by OpenBSD itself and also most
-      OpenBSD variants like Bitrig. Fixes bug 20980; bugfix
+    - Use "OpenBSD" compiler macro instead of "OPENBSD" or "__OpenBSD__".
+      It is supported by OpenBSD itself, and also by most OpenBSD
+      variants (such as Bitrig). Fixes bug 20980; bugfix
       on 0.1.2.1-alpha.
       on 0.1.2.1-alpha.
-    - Do not silently truncate content of files if they are larger than
-      SIZE_MAX bytes. This issue could occur on 32 bit systems with
-      large file support and files which are larger than 4 GB. Fixes bug
-      21134; bugfix on 0.3.0.1-alpha.
+    - When mapping a file of length greater than SIZE_MAX, do not
+      silently its contents. This issue could occur on 32 bit systems
+      with large file support and files which are larger than 4 GB.
+      Fixes bug 21134; bugfix on 0.3.0.1-alpha.
 
 
   o Minor bugfixes (tor-resolve):
   o Minor bugfixes (tor-resolve):
     - The tor-resolve command line tool now rejects hostnames over 255
     - The tor-resolve command line tool now rejects hostnames over 255