ChangeLog 1.0 MB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031100321003310034100351003610037100381003910040100411004210043100441004510046100471004810049100501005110052100531005410055100561005710058100591006010061100621006310064100651006610067100681006910070100711007210073100741007510076100771007810079100801008110082100831008410085100861008710088100891009010091100921009310094100951009610097100981009910100101011010210103101041010510106101071010810109101101011110112101131011410115101161011710118101191012010121101221012310124101251012610127101281012910130101311013210133101341013510136101371013810139101401014110142101431014410145101461014710148101491015010151101521015310154101551015610157101581015910160101611016210163101641016510166101671016810169101701017110172101731017410175101761017710178101791018010181101821018310184101851018610187101881018910190101911019210193101941019510196101971019810199102001020110202102031020410205102061020710208102091021010211102121021310214102151021610217102181021910220102211022210223102241022510226102271022810229102301023110232102331023410235102361023710238102391024010241102421024310244102451024610247102481024910250102511025210253102541025510256102571025810259102601026110262102631026410265102661026710268102691027010271102721027310274102751027610277102781027910280102811028210283102841028510286102871028810289102901029110292102931029410295102961029710298102991030010301103021030310304103051030610307103081030910310103111031210313103141031510316103171031810319103201032110322103231032410325103261032710328103291033010331103321033310334103351033610337103381033910340103411034210343103441034510346103471034810349103501035110352103531035410355103561035710358103591036010361103621036310364103651036610367103681036910370103711037210373103741037510376103771037810379103801038110382103831038410385103861038710388103891039010391103921039310394103951039610397103981039910400104011040210403104041040510406104071040810409104101041110412104131041410415104161041710418104191042010421104221042310424104251042610427104281042910430104311043210433104341043510436104371043810439104401044110442104431044410445104461044710448104491045010451104521045310454104551045610457104581045910460104611046210463104641046510466104671046810469104701047110472104731047410475104761047710478104791048010481104821048310484104851048610487104881048910490104911049210493104941049510496104971049810499105001050110502105031050410505105061050710508105091051010511105121051310514105151051610517105181051910520105211052210523105241052510526105271052810529105301053110532105331053410535105361053710538105391054010541105421054310544105451054610547105481054910550105511055210553105541055510556105571055810559105601056110562105631056410565105661056710568105691057010571105721057310574105751057610577105781057910580105811058210583105841058510586105871058810589105901059110592105931059410595105961059710598105991060010601106021060310604106051060610607106081060910610106111061210613106141061510616106171061810619106201062110622106231062410625106261062710628106291063010631106321063310634106351063610637106381063910640106411064210643106441064510646106471064810649106501065110652106531065410655106561065710658106591066010661106621066310664106651066610667106681066910670106711067210673106741067510676106771067810679106801068110682106831068410685106861068710688106891069010691106921069310694106951069610697106981069910700107011070210703107041070510706107071070810709107101071110712107131071410715107161071710718107191072010721107221072310724107251072610727107281072910730107311073210733107341073510736107371073810739107401074110742107431074410745107461074710748107491075010751107521075310754107551075610757107581075910760107611076210763107641076510766107671076810769107701077110772107731077410775107761077710778107791078010781107821078310784107851078610787107881078910790107911079210793107941079510796107971079810799108001080110802108031080410805108061080710808108091081010811108121081310814108151081610817108181081910820108211082210823108241082510826108271082810829108301083110832108331083410835108361083710838108391084010841108421084310844108451084610847108481084910850108511085210853108541085510856108571085810859108601086110862108631086410865108661086710868108691087010871108721087310874108751087610877108781087910880108811088210883108841088510886108871088810889108901089110892108931089410895108961089710898108991090010901109021090310904109051090610907109081090910910109111091210913109141091510916109171091810919109201092110922109231092410925109261092710928109291093010931109321093310934109351093610937109381093910940109411094210943109441094510946109471094810949109501095110952109531095410955109561095710958109591096010961109621096310964109651096610967109681096910970109711097210973109741097510976109771097810979109801098110982109831098410985109861098710988109891099010991109921099310994109951099610997109981099911000110011100211003110041100511006110071100811009110101101111012110131101411015110161101711018110191102011021110221102311024110251102611027110281102911030110311103211033110341103511036110371103811039110401104111042110431104411045110461104711048110491105011051110521105311054110551105611057110581105911060110611106211063110641106511066110671106811069110701107111072110731107411075110761107711078110791108011081110821108311084110851108611087110881108911090110911109211093110941109511096110971109811099111001110111102111031110411105111061110711108111091111011111111121111311114111151111611117111181111911120111211112211123111241112511126111271112811129111301113111132111331113411135111361113711138111391114011141111421114311144111451114611147111481114911150111511115211153111541115511156111571115811159111601116111162111631116411165111661116711168111691117011171111721117311174111751117611177111781117911180111811118211183111841118511186111871118811189111901119111192111931119411195111961119711198111991120011201112021120311204112051120611207112081120911210112111121211213112141121511216112171121811219112201122111222112231122411225112261122711228112291123011231112321123311234112351123611237112381123911240112411124211243112441124511246112471124811249112501125111252112531125411255112561125711258112591126011261112621126311264112651126611267112681126911270112711127211273112741127511276112771127811279112801128111282112831128411285112861128711288112891129011291112921129311294112951129611297112981129911300113011130211303113041130511306113071130811309113101131111312113131131411315113161131711318113191132011321113221132311324113251132611327113281132911330113311133211333113341133511336113371133811339113401134111342113431134411345113461134711348113491135011351113521135311354113551135611357113581135911360113611136211363113641136511366113671136811369113701137111372113731137411375113761137711378113791138011381113821138311384113851138611387113881138911390113911139211393113941139511396113971139811399114001140111402114031140411405114061140711408114091141011411114121141311414114151141611417114181141911420114211142211423114241142511426114271142811429114301143111432114331143411435114361143711438114391144011441114421144311444114451144611447114481144911450114511145211453114541145511456114571145811459114601146111462114631146411465114661146711468114691147011471114721147311474114751147611477114781147911480114811148211483114841148511486114871148811489114901149111492114931149411495114961149711498114991150011501115021150311504115051150611507115081150911510115111151211513115141151511516115171151811519115201152111522115231152411525115261152711528115291153011531115321153311534115351153611537115381153911540115411154211543115441154511546115471154811549115501155111552115531155411555115561155711558115591156011561115621156311564115651156611567115681156911570115711157211573115741157511576115771157811579115801158111582115831158411585115861158711588115891159011591115921159311594115951159611597115981159911600116011160211603116041160511606116071160811609116101161111612116131161411615116161161711618116191162011621116221162311624116251162611627116281162911630116311163211633116341163511636116371163811639116401164111642116431164411645116461164711648116491165011651116521165311654116551165611657116581165911660116611166211663116641166511666116671166811669116701167111672116731167411675116761167711678116791168011681116821168311684116851168611687116881168911690116911169211693116941169511696116971169811699117001170111702117031170411705117061170711708117091171011711117121171311714117151171611717117181171911720117211172211723117241172511726117271172811729117301173111732117331173411735117361173711738117391174011741117421174311744117451174611747117481174911750117511175211753117541175511756117571175811759117601176111762117631176411765117661176711768117691177011771117721177311774117751177611777117781177911780117811178211783117841178511786117871178811789117901179111792117931179411795117961179711798117991180011801118021180311804118051180611807118081180911810118111181211813118141181511816118171181811819118201182111822118231182411825118261182711828118291183011831118321183311834118351183611837118381183911840118411184211843118441184511846118471184811849118501185111852118531185411855118561185711858118591186011861118621186311864118651186611867118681186911870118711187211873118741187511876118771187811879118801188111882118831188411885118861188711888118891189011891118921189311894118951189611897118981189911900119011190211903119041190511906119071190811909119101191111912119131191411915119161191711918119191192011921119221192311924119251192611927119281192911930119311193211933119341193511936119371193811939119401194111942119431194411945119461194711948119491195011951119521195311954119551195611957119581195911960119611196211963119641196511966119671196811969119701197111972119731197411975119761197711978119791198011981119821198311984119851198611987119881198911990119911199211993119941199511996119971199811999120001200112002120031200412005120061200712008120091201012011120121201312014120151201612017120181201912020120211202212023120241202512026120271202812029120301203112032120331203412035120361203712038120391204012041120421204312044120451204612047120481204912050120511205212053120541205512056120571205812059120601206112062120631206412065120661206712068120691207012071120721207312074120751207612077120781207912080120811208212083120841208512086120871208812089120901209112092120931209412095120961209712098120991210012101121021210312104121051210612107121081210912110121111211212113121141211512116121171211812119121201212112122121231212412125121261212712128121291213012131121321213312134121351213612137121381213912140121411214212143121441214512146121471214812149121501215112152121531215412155121561215712158121591216012161121621216312164121651216612167121681216912170121711217212173121741217512176121771217812179121801218112182121831218412185121861218712188121891219012191121921219312194121951219612197121981219912200122011220212203122041220512206122071220812209122101221112212122131221412215122161221712218122191222012221122221222312224122251222612227122281222912230122311223212233122341223512236122371223812239122401224112242122431224412245122461224712248122491225012251122521225312254122551225612257122581225912260122611226212263122641226512266122671226812269122701227112272122731227412275122761227712278122791228012281122821228312284122851228612287122881228912290122911229212293122941229512296122971229812299123001230112302123031230412305123061230712308123091231012311123121231312314123151231612317123181231912320123211232212323123241232512326123271232812329123301233112332123331233412335123361233712338123391234012341123421234312344123451234612347123481234912350123511235212353123541235512356123571235812359123601236112362123631236412365123661236712368123691237012371123721237312374123751237612377123781237912380123811238212383123841238512386123871238812389123901239112392123931239412395123961239712398123991240012401124021240312404124051240612407124081240912410124111241212413124141241512416124171241812419124201242112422124231242412425124261242712428124291243012431124321243312434124351243612437124381243912440124411244212443124441244512446124471244812449124501245112452124531245412455124561245712458124591246012461124621246312464124651246612467124681246912470124711247212473124741247512476124771247812479124801248112482124831248412485124861248712488124891249012491124921249312494124951249612497124981249912500125011250212503125041250512506125071250812509125101251112512125131251412515125161251712518125191252012521125221252312524125251252612527125281252912530125311253212533125341253512536125371253812539125401254112542125431254412545125461254712548125491255012551125521255312554125551255612557125581255912560125611256212563125641256512566125671256812569125701257112572125731257412575125761257712578125791258012581125821258312584125851258612587125881258912590125911259212593125941259512596125971259812599126001260112602126031260412605126061260712608126091261012611126121261312614126151261612617126181261912620126211262212623126241262512626126271262812629126301263112632126331263412635126361263712638126391264012641126421264312644126451264612647126481264912650126511265212653126541265512656126571265812659126601266112662126631266412665126661266712668126691267012671126721267312674126751267612677126781267912680126811268212683126841268512686126871268812689126901269112692126931269412695126961269712698126991270012701127021270312704127051270612707127081270912710127111271212713127141271512716127171271812719127201272112722127231272412725127261272712728127291273012731127321273312734127351273612737127381273912740127411274212743127441274512746127471274812749127501275112752127531275412755127561275712758127591276012761127621276312764127651276612767127681276912770127711277212773127741277512776127771277812779127801278112782127831278412785127861278712788127891279012791127921279312794127951279612797127981279912800128011280212803128041280512806128071280812809128101281112812128131281412815128161281712818128191282012821128221282312824128251282612827128281282912830128311283212833128341283512836128371283812839128401284112842128431284412845128461284712848128491285012851128521285312854128551285612857128581285912860128611286212863128641286512866128671286812869128701287112872128731287412875128761287712878128791288012881128821288312884128851288612887128881288912890128911289212893128941289512896128971289812899129001290112902129031290412905129061290712908129091291012911129121291312914129151291612917129181291912920129211292212923129241292512926129271292812929129301293112932129331293412935129361293712938129391294012941129421294312944129451294612947129481294912950129511295212953129541295512956129571295812959129601296112962129631296412965129661296712968129691297012971129721297312974129751297612977129781297912980129811298212983129841298512986129871298812989129901299112992129931299412995129961299712998129991300013001130021300313004130051300613007130081300913010130111301213013130141301513016130171301813019130201302113022130231302413025130261302713028130291303013031130321303313034130351303613037130381303913040130411304213043130441304513046130471304813049130501305113052130531305413055130561305713058130591306013061130621306313064130651306613067130681306913070130711307213073130741307513076130771307813079130801308113082130831308413085130861308713088130891309013091130921309313094130951309613097130981309913100131011310213103131041310513106131071310813109131101311113112131131311413115131161311713118131191312013121131221312313124131251312613127131281312913130131311313213133131341313513136131371313813139131401314113142131431314413145131461314713148131491315013151131521315313154131551315613157131581315913160131611316213163131641316513166131671316813169131701317113172131731317413175131761317713178131791318013181131821318313184131851318613187131881318913190131911319213193131941319513196131971319813199132001320113202132031320413205132061320713208132091321013211132121321313214132151321613217132181321913220132211322213223132241322513226132271322813229132301323113232132331323413235132361323713238132391324013241132421324313244132451324613247132481324913250132511325213253132541325513256132571325813259132601326113262132631326413265132661326713268132691327013271132721327313274132751327613277132781327913280132811328213283132841328513286132871328813289132901329113292132931329413295132961329713298132991330013301133021330313304133051330613307133081330913310133111331213313133141331513316133171331813319133201332113322133231332413325133261332713328133291333013331133321333313334133351333613337133381333913340133411334213343133441334513346133471334813349133501335113352133531335413355133561335713358133591336013361133621336313364133651336613367133681336913370133711337213373133741337513376133771337813379133801338113382133831338413385133861338713388133891339013391133921339313394133951339613397133981339913400134011340213403134041340513406134071340813409134101341113412134131341413415134161341713418134191342013421134221342313424134251342613427134281342913430134311343213433134341343513436134371343813439134401344113442134431344413445134461344713448134491345013451134521345313454134551345613457134581345913460134611346213463134641346513466134671346813469134701347113472134731347413475134761347713478134791348013481134821348313484134851348613487134881348913490134911349213493134941349513496134971349813499135001350113502135031350413505135061350713508135091351013511135121351313514135151351613517135181351913520135211352213523135241352513526135271352813529135301353113532135331353413535135361353713538135391354013541135421354313544135451354613547135481354913550135511355213553135541355513556135571355813559135601356113562135631356413565135661356713568135691357013571135721357313574135751357613577135781357913580135811358213583135841358513586135871358813589135901359113592135931359413595135961359713598135991360013601136021360313604136051360613607136081360913610136111361213613136141361513616136171361813619136201362113622136231362413625136261362713628136291363013631136321363313634136351363613637136381363913640136411364213643136441364513646136471364813649136501365113652136531365413655136561365713658136591366013661136621366313664136651366613667136681366913670136711367213673136741367513676136771367813679136801368113682136831368413685136861368713688136891369013691136921369313694136951369613697136981369913700137011370213703137041370513706137071370813709137101371113712137131371413715137161371713718137191372013721137221372313724137251372613727137281372913730137311373213733137341373513736137371373813739137401374113742137431374413745137461374713748137491375013751137521375313754137551375613757137581375913760137611376213763137641376513766137671376813769137701377113772137731377413775137761377713778137791378013781137821378313784137851378613787137881378913790137911379213793137941379513796137971379813799138001380113802138031380413805138061380713808138091381013811138121381313814138151381613817138181381913820138211382213823138241382513826138271382813829138301383113832138331383413835138361383713838138391384013841138421384313844138451384613847138481384913850138511385213853138541385513856138571385813859138601386113862138631386413865138661386713868138691387013871138721387313874138751387613877138781387913880138811388213883138841388513886138871388813889138901389113892138931389413895138961389713898138991390013901139021390313904139051390613907139081390913910139111391213913139141391513916139171391813919139201392113922139231392413925139261392713928139291393013931139321393313934139351393613937139381393913940139411394213943139441394513946139471394813949139501395113952139531395413955139561395713958139591396013961139621396313964139651396613967139681396913970139711397213973139741397513976139771397813979139801398113982139831398413985139861398713988139891399013991139921399313994139951399613997139981399914000140011400214003140041400514006140071400814009140101401114012140131401414015140161401714018140191402014021140221402314024140251402614027140281402914030140311403214033140341403514036140371403814039140401404114042140431404414045140461404714048140491405014051140521405314054140551405614057140581405914060140611406214063140641406514066140671406814069140701407114072140731407414075140761407714078140791408014081140821408314084140851408614087140881408914090140911409214093140941409514096140971409814099141001410114102141031410414105141061410714108141091411014111141121411314114141151411614117141181411914120141211412214123141241412514126141271412814129141301413114132141331413414135141361413714138141391414014141141421414314144141451414614147141481414914150141511415214153141541415514156141571415814159141601416114162141631416414165141661416714168141691417014171141721417314174141751417614177141781417914180141811418214183141841418514186141871418814189141901419114192141931419414195141961419714198141991420014201142021420314204142051420614207142081420914210142111421214213142141421514216142171421814219142201422114222142231422414225142261422714228142291423014231142321423314234142351423614237142381423914240142411424214243142441424514246142471424814249142501425114252142531425414255142561425714258142591426014261142621426314264142651426614267142681426914270142711427214273142741427514276142771427814279142801428114282142831428414285142861428714288142891429014291142921429314294142951429614297142981429914300143011430214303143041430514306143071430814309143101431114312143131431414315143161431714318143191432014321143221432314324143251432614327143281432914330143311433214333143341433514336143371433814339143401434114342143431434414345143461434714348143491435014351143521435314354143551435614357143581435914360143611436214363143641436514366143671436814369143701437114372143731437414375143761437714378143791438014381143821438314384143851438614387143881438914390143911439214393143941439514396143971439814399144001440114402144031440414405144061440714408144091441014411144121441314414144151441614417144181441914420144211442214423144241442514426144271442814429144301443114432144331443414435144361443714438144391444014441144421444314444144451444614447144481444914450144511445214453144541445514456144571445814459144601446114462144631446414465144661446714468144691447014471144721447314474144751447614477144781447914480144811448214483144841448514486144871448814489144901449114492144931449414495144961449714498144991450014501145021450314504145051450614507145081450914510145111451214513145141451514516145171451814519145201452114522145231452414525145261452714528145291453014531145321453314534145351453614537145381453914540145411454214543145441454514546145471454814549145501455114552145531455414555145561455714558145591456014561145621456314564145651456614567145681456914570145711457214573145741457514576145771457814579145801458114582145831458414585145861458714588145891459014591145921459314594145951459614597145981459914600146011460214603146041460514606146071460814609146101461114612146131461414615146161461714618146191462014621146221462314624146251462614627146281462914630146311463214633146341463514636146371463814639146401464114642146431464414645146461464714648146491465014651146521465314654146551465614657146581465914660146611466214663146641466514666146671466814669146701467114672146731467414675146761467714678146791468014681146821468314684146851468614687146881468914690146911469214693146941469514696146971469814699147001470114702147031470414705147061470714708147091471014711147121471314714147151471614717147181471914720147211472214723147241472514726147271472814729147301473114732147331473414735147361473714738147391474014741147421474314744147451474614747147481474914750147511475214753147541475514756147571475814759147601476114762147631476414765147661476714768147691477014771147721477314774147751477614777147781477914780147811478214783147841478514786147871478814789147901479114792147931479414795147961479714798147991480014801148021480314804148051480614807148081480914810148111481214813148141481514816148171481814819148201482114822148231482414825148261482714828148291483014831148321483314834148351483614837148381483914840148411484214843148441484514846148471484814849148501485114852148531485414855148561485714858148591486014861148621486314864148651486614867148681486914870148711487214873148741487514876148771487814879148801488114882148831488414885148861488714888148891489014891148921489314894148951489614897148981489914900149011490214903149041490514906149071490814909149101491114912149131491414915149161491714918149191492014921149221492314924149251492614927149281492914930149311493214933149341493514936149371493814939149401494114942149431494414945149461494714948149491495014951149521495314954149551495614957149581495914960149611496214963149641496514966149671496814969149701497114972149731497414975149761497714978149791498014981149821498314984149851498614987149881498914990149911499214993149941499514996149971499814999150001500115002150031500415005150061500715008150091501015011150121501315014150151501615017150181501915020150211502215023150241502515026150271502815029150301503115032150331503415035150361503715038150391504015041150421504315044150451504615047150481504915050150511505215053150541505515056150571505815059150601506115062150631506415065150661506715068150691507015071150721507315074150751507615077150781507915080150811508215083150841508515086150871508815089150901509115092150931509415095150961509715098150991510015101151021510315104151051510615107151081510915110151111511215113151141511515116151171511815119151201512115122151231512415125151261512715128151291513015131151321513315134151351513615137151381513915140151411514215143151441514515146151471514815149151501515115152151531515415155151561515715158151591516015161151621516315164151651516615167151681516915170151711517215173151741517515176151771517815179151801518115182151831518415185151861518715188151891519015191151921519315194151951519615197151981519915200152011520215203152041520515206152071520815209152101521115212152131521415215152161521715218152191522015221152221522315224152251522615227152281522915230152311523215233152341523515236152371523815239152401524115242152431524415245152461524715248152491525015251152521525315254152551525615257152581525915260152611526215263152641526515266152671526815269152701527115272152731527415275152761527715278152791528015281152821528315284152851528615287152881528915290152911529215293152941529515296152971529815299153001530115302153031530415305153061530715308153091531015311153121531315314153151531615317153181531915320153211532215323153241532515326153271532815329153301533115332153331533415335153361533715338153391534015341153421534315344153451534615347153481534915350153511535215353153541535515356153571535815359153601536115362153631536415365153661536715368153691537015371153721537315374153751537615377153781537915380153811538215383153841538515386153871538815389153901539115392153931539415395153961539715398153991540015401154021540315404154051540615407154081540915410154111541215413154141541515416154171541815419154201542115422154231542415425154261542715428154291543015431154321543315434154351543615437154381543915440154411544215443154441544515446154471544815449154501545115452154531545415455154561545715458154591546015461154621546315464154651546615467154681546915470154711547215473154741547515476154771547815479154801548115482154831548415485154861548715488154891549015491154921549315494154951549615497154981549915500155011550215503155041550515506155071550815509155101551115512155131551415515155161551715518155191552015521155221552315524155251552615527155281552915530155311553215533155341553515536155371553815539155401554115542155431554415545155461554715548155491555015551155521555315554155551555615557155581555915560155611556215563155641556515566155671556815569155701557115572155731557415575155761557715578155791558015581155821558315584155851558615587155881558915590155911559215593155941559515596155971559815599156001560115602156031560415605156061560715608156091561015611156121561315614156151561615617156181561915620156211562215623156241562515626156271562815629156301563115632156331563415635156361563715638156391564015641156421564315644156451564615647156481564915650156511565215653156541565515656156571565815659156601566115662156631566415665156661566715668156691567015671156721567315674156751567615677156781567915680156811568215683156841568515686156871568815689156901569115692156931569415695156961569715698156991570015701157021570315704157051570615707157081570915710157111571215713157141571515716157171571815719157201572115722157231572415725157261572715728157291573015731157321573315734157351573615737157381573915740157411574215743157441574515746157471574815749157501575115752157531575415755157561575715758157591576015761157621576315764157651576615767157681576915770157711577215773157741577515776157771577815779157801578115782157831578415785157861578715788157891579015791157921579315794157951579615797157981579915800158011580215803158041580515806158071580815809158101581115812158131581415815158161581715818158191582015821158221582315824158251582615827158281582915830158311583215833158341583515836158371583815839158401584115842158431584415845158461584715848158491585015851158521585315854158551585615857158581585915860158611586215863158641586515866158671586815869158701587115872158731587415875158761587715878158791588015881158821588315884158851588615887158881588915890158911589215893158941589515896158971589815899159001590115902159031590415905159061590715908159091591015911159121591315914159151591615917159181591915920159211592215923159241592515926159271592815929159301593115932159331593415935159361593715938159391594015941159421594315944159451594615947159481594915950159511595215953159541595515956159571595815959159601596115962159631596415965159661596715968159691597015971159721597315974159751597615977159781597915980159811598215983159841598515986159871598815989159901599115992159931599415995159961599715998159991600016001160021600316004160051600616007160081600916010160111601216013160141601516016160171601816019160201602116022160231602416025160261602716028160291603016031160321603316034160351603616037160381603916040160411604216043160441604516046160471604816049160501605116052160531605416055160561605716058160591606016061160621606316064160651606616067160681606916070160711607216073160741607516076160771607816079160801608116082160831608416085160861608716088160891609016091160921609316094160951609616097160981609916100161011610216103161041610516106161071610816109161101611116112161131611416115161161611716118161191612016121161221612316124161251612616127161281612916130161311613216133161341613516136161371613816139161401614116142161431614416145161461614716148161491615016151161521615316154161551615616157161581615916160161611616216163161641616516166161671616816169161701617116172161731617416175161761617716178161791618016181161821618316184161851618616187161881618916190161911619216193161941619516196161971619816199162001620116202162031620416205162061620716208162091621016211162121621316214162151621616217162181621916220162211622216223162241622516226162271622816229162301623116232162331623416235162361623716238162391624016241162421624316244162451624616247162481624916250162511625216253162541625516256162571625816259162601626116262162631626416265162661626716268162691627016271162721627316274162751627616277162781627916280162811628216283162841628516286162871628816289162901629116292162931629416295162961629716298162991630016301163021630316304163051630616307163081630916310163111631216313163141631516316163171631816319163201632116322163231632416325163261632716328163291633016331163321633316334163351633616337163381633916340163411634216343163441634516346163471634816349163501635116352163531635416355163561635716358163591636016361163621636316364163651636616367163681636916370163711637216373163741637516376163771637816379163801638116382163831638416385163861638716388163891639016391163921639316394163951639616397163981639916400164011640216403164041640516406164071640816409164101641116412164131641416415164161641716418164191642016421164221642316424164251642616427164281642916430164311643216433164341643516436164371643816439164401644116442164431644416445164461644716448164491645016451164521645316454164551645616457164581645916460164611646216463164641646516466164671646816469164701647116472164731647416475164761647716478164791648016481164821648316484164851648616487164881648916490164911649216493164941649516496164971649816499165001650116502165031650416505165061650716508165091651016511165121651316514165151651616517165181651916520165211652216523165241652516526165271652816529165301653116532165331653416535165361653716538165391654016541165421654316544165451654616547165481654916550165511655216553165541655516556165571655816559165601656116562165631656416565165661656716568165691657016571165721657316574165751657616577165781657916580165811658216583165841658516586165871658816589165901659116592165931659416595165961659716598165991660016601166021660316604166051660616607166081660916610166111661216613166141661516616166171661816619166201662116622166231662416625166261662716628166291663016631166321663316634166351663616637166381663916640166411664216643166441664516646166471664816649166501665116652166531665416655166561665716658166591666016661166621666316664166651666616667166681666916670166711667216673166741667516676166771667816679166801668116682166831668416685166861668716688166891669016691166921669316694166951669616697166981669916700167011670216703167041670516706167071670816709167101671116712167131671416715167161671716718167191672016721167221672316724167251672616727167281672916730167311673216733167341673516736167371673816739167401674116742167431674416745167461674716748167491675016751167521675316754167551675616757167581675916760167611676216763167641676516766167671676816769167701677116772167731677416775167761677716778167791678016781167821678316784167851678616787167881678916790167911679216793167941679516796167971679816799168001680116802168031680416805168061680716808168091681016811168121681316814168151681616817168181681916820168211682216823168241682516826168271682816829168301683116832168331683416835168361683716838168391684016841168421684316844168451684616847168481684916850168511685216853168541685516856168571685816859168601686116862168631686416865168661686716868168691687016871168721687316874168751687616877168781687916880168811688216883168841688516886168871688816889168901689116892168931689416895168961689716898168991690016901169021690316904169051690616907169081690916910169111691216913169141691516916169171691816919169201692116922169231692416925169261692716928169291693016931169321693316934169351693616937169381693916940169411694216943169441694516946169471694816949169501695116952169531695416955169561695716958169591696016961169621696316964169651696616967169681696916970169711697216973169741697516976169771697816979169801698116982169831698416985169861698716988169891699016991169921699316994169951699616997169981699917000170011700217003170041700517006170071700817009170101701117012170131701417015170161701717018170191702017021170221702317024170251702617027170281702917030170311703217033170341703517036170371703817039170401704117042170431704417045170461704717048170491705017051170521705317054170551705617057170581705917060170611706217063170641706517066170671706817069170701707117072170731707417075170761707717078170791708017081170821708317084170851708617087170881708917090170911709217093170941709517096170971709817099171001710117102171031710417105171061710717108171091711017111171121711317114171151711617117171181711917120171211712217123171241712517126171271712817129171301713117132171331713417135171361713717138171391714017141171421714317144171451714617147171481714917150171511715217153171541715517156171571715817159171601716117162171631716417165171661716717168171691717017171171721717317174171751717617177171781717917180171811718217183171841718517186171871718817189171901719117192171931719417195171961719717198171991720017201172021720317204172051720617207172081720917210172111721217213172141721517216172171721817219172201722117222172231722417225172261722717228172291723017231172321723317234172351723617237172381723917240172411724217243172441724517246172471724817249172501725117252172531725417255172561725717258172591726017261172621726317264172651726617267172681726917270172711727217273172741727517276172771727817279172801728117282172831728417285172861728717288172891729017291172921729317294172951729617297172981729917300173011730217303173041730517306173071730817309173101731117312173131731417315173161731717318173191732017321173221732317324173251732617327173281732917330173311733217333173341733517336173371733817339173401734117342173431734417345173461734717348173491735017351173521735317354173551735617357173581735917360173611736217363173641736517366173671736817369173701737117372173731737417375173761737717378173791738017381173821738317384173851738617387173881738917390173911739217393173941739517396173971739817399174001740117402174031740417405174061740717408174091741017411174121741317414174151741617417174181741917420174211742217423174241742517426174271742817429174301743117432174331743417435174361743717438174391744017441174421744317444174451744617447174481744917450174511745217453174541745517456174571745817459174601746117462174631746417465174661746717468174691747017471174721747317474174751747617477174781747917480174811748217483174841748517486174871748817489174901749117492174931749417495174961749717498174991750017501175021750317504175051750617507175081750917510175111751217513175141751517516175171751817519175201752117522175231752417525175261752717528175291753017531175321753317534175351753617537175381753917540175411754217543175441754517546175471754817549175501755117552175531755417555175561755717558175591756017561175621756317564175651756617567175681756917570175711757217573175741757517576175771757817579175801758117582175831758417585175861758717588175891759017591175921759317594175951759617597175981759917600176011760217603176041760517606176071760817609176101761117612176131761417615176161761717618176191762017621176221762317624176251762617627176281762917630176311763217633176341763517636176371763817639176401764117642176431764417645176461764717648176491765017651176521765317654176551765617657176581765917660176611766217663176641766517666176671766817669176701767117672176731767417675176761767717678176791768017681176821768317684176851768617687176881768917690176911769217693176941769517696176971769817699177001770117702177031770417705177061770717708177091771017711177121771317714177151771617717177181771917720177211772217723177241772517726177271772817729177301773117732177331773417735177361773717738177391774017741177421774317744177451774617747177481774917750177511775217753177541775517756177571775817759177601776117762177631776417765177661776717768177691777017771177721777317774177751777617777177781777917780177811778217783177841778517786177871778817789177901779117792177931779417795177961779717798177991780017801178021780317804178051780617807178081780917810178111781217813178141781517816178171781817819178201782117822178231782417825178261782717828178291783017831178321783317834178351783617837178381783917840178411784217843178441784517846178471784817849178501785117852178531785417855178561785717858178591786017861178621786317864178651786617867178681786917870178711787217873178741787517876178771787817879178801788117882178831788417885178861788717888178891789017891178921789317894178951789617897178981789917900179011790217903179041790517906179071790817909179101791117912179131791417915179161791717918179191792017921179221792317924179251792617927179281792917930179311793217933179341793517936179371793817939179401794117942179431794417945179461794717948179491795017951179521795317954179551795617957179581795917960179611796217963179641796517966179671796817969179701797117972179731797417975179761797717978179791798017981179821798317984179851798617987179881798917990179911799217993179941799517996179971799817999180001800118002180031800418005180061800718008180091801018011180121801318014180151801618017180181801918020180211802218023180241802518026180271802818029180301803118032180331803418035180361803718038180391804018041180421804318044180451804618047180481804918050180511805218053180541805518056180571805818059180601806118062180631806418065180661806718068180691807018071180721807318074180751807618077180781807918080180811808218083180841808518086180871808818089180901809118092180931809418095180961809718098180991810018101181021810318104181051810618107181081810918110181111811218113181141811518116181171811818119181201812118122181231812418125181261812718128181291813018131181321813318134181351813618137181381813918140181411814218143181441814518146181471814818149181501815118152181531815418155181561815718158181591816018161181621816318164181651816618167181681816918170181711817218173181741817518176181771817818179181801818118182181831818418185181861818718188181891819018191181921819318194181951819618197181981819918200182011820218203182041820518206182071820818209182101821118212182131821418215182161821718218182191822018221182221822318224182251822618227182281822918230182311823218233182341823518236182371823818239182401824118242182431824418245182461824718248182491825018251182521825318254182551825618257182581825918260182611826218263182641826518266182671826818269182701827118272182731827418275182761827718278182791828018281182821828318284182851828618287182881828918290182911829218293182941829518296182971829818299183001830118302183031830418305183061830718308183091831018311183121831318314183151831618317183181831918320183211832218323183241832518326183271832818329183301833118332183331833418335183361833718338183391834018341183421834318344183451834618347183481834918350183511835218353183541835518356183571835818359183601836118362183631836418365183661836718368183691837018371183721837318374183751837618377183781837918380183811838218383183841838518386183871838818389183901839118392183931839418395183961839718398183991840018401184021840318404184051840618407184081840918410184111841218413184141841518416184171841818419184201842118422184231842418425184261842718428184291843018431184321843318434184351843618437184381843918440184411844218443184441844518446184471844818449184501845118452184531845418455184561845718458184591846018461184621846318464184651846618467184681846918470184711847218473184741847518476184771847818479184801848118482184831848418485184861848718488184891849018491184921849318494184951849618497184981849918500185011850218503185041850518506185071850818509185101851118512185131851418515185161851718518185191852018521185221852318524185251852618527185281852918530185311853218533185341853518536185371853818539185401854118542185431854418545185461854718548185491855018551185521855318554185551855618557185581855918560185611856218563185641856518566185671856818569185701857118572185731857418575185761857718578185791858018581185821858318584185851858618587185881858918590185911859218593185941859518596185971859818599186001860118602186031860418605186061860718608186091861018611186121861318614186151861618617186181861918620186211862218623186241862518626186271862818629186301863118632186331863418635186361863718638186391864018641186421864318644186451864618647186481864918650186511865218653186541865518656186571865818659186601866118662186631866418665186661866718668186691867018671186721867318674186751867618677186781867918680186811868218683186841868518686186871868818689186901869118692186931869418695186961869718698186991870018701187021870318704187051870618707187081870918710187111871218713187141871518716187171871818719187201872118722187231872418725187261872718728187291873018731187321873318734187351873618737187381873918740187411874218743187441874518746187471874818749187501875118752187531875418755187561875718758187591876018761187621876318764187651876618767187681876918770187711877218773187741877518776187771877818779187801878118782187831878418785187861878718788187891879018791187921879318794187951879618797187981879918800188011880218803188041880518806188071880818809188101881118812188131881418815188161881718818188191882018821188221882318824188251882618827188281882918830188311883218833188341883518836188371883818839188401884118842188431884418845188461884718848188491885018851188521885318854188551885618857188581885918860188611886218863188641886518866188671886818869188701887118872188731887418875188761887718878188791888018881188821888318884188851888618887188881888918890188911889218893188941889518896188971889818899189001890118902189031890418905189061890718908189091891018911189121891318914189151891618917189181891918920189211892218923189241892518926189271892818929189301893118932189331893418935189361893718938189391894018941189421894318944189451894618947189481894918950189511895218953189541895518956189571895818959189601896118962189631896418965189661896718968189691897018971189721897318974189751897618977189781897918980189811898218983189841898518986189871898818989189901899118992189931899418995189961899718998189991900019001190021900319004190051900619007190081900919010190111901219013190141901519016190171901819019190201902119022190231902419025190261902719028190291903019031190321903319034190351903619037190381903919040190411904219043190441904519046190471904819049190501905119052190531905419055190561905719058190591906019061190621906319064190651906619067190681906919070190711907219073190741907519076190771907819079190801908119082190831908419085190861908719088190891909019091190921909319094190951909619097190981909919100191011910219103191041910519106191071910819109191101911119112191131911419115191161911719118191191912019121191221912319124191251912619127191281912919130191311913219133191341913519136191371913819139191401914119142191431914419145191461914719148191491915019151191521915319154191551915619157191581915919160191611916219163191641916519166191671916819169191701917119172191731917419175191761917719178191791918019181191821918319184191851918619187191881918919190191911919219193191941919519196191971919819199192001920119202192031920419205192061920719208192091921019211192121921319214192151921619217192181921919220192211922219223192241922519226192271922819229192301923119232192331923419235192361923719238192391924019241192421924319244192451924619247192481924919250192511925219253192541925519256192571925819259192601926119262192631926419265192661926719268192691927019271192721927319274192751927619277192781927919280192811928219283192841928519286192871928819289192901929119292192931929419295192961929719298192991930019301193021930319304193051930619307193081930919310193111931219313193141931519316193171931819319193201932119322193231932419325193261932719328193291933019331193321933319334193351933619337193381933919340193411934219343193441934519346193471934819349193501935119352193531935419355193561935719358193591936019361193621936319364193651936619367193681936919370193711937219373193741937519376193771937819379193801938119382193831938419385193861938719388193891939019391193921939319394193951939619397193981939919400194011940219403194041940519406194071940819409194101941119412194131941419415194161941719418194191942019421194221942319424194251942619427194281942919430194311943219433194341943519436194371943819439194401944119442194431944419445194461944719448194491945019451194521945319454194551945619457194581945919460194611946219463194641946519466194671946819469194701947119472194731947419475194761947719478194791948019481194821948319484194851948619487194881948919490194911949219493194941949519496194971949819499195001950119502195031950419505195061950719508195091951019511195121951319514195151951619517195181951919520195211952219523195241952519526195271952819529195301953119532195331953419535195361953719538195391954019541195421954319544195451954619547195481954919550195511955219553195541955519556195571955819559195601956119562195631956419565195661956719568195691957019571195721957319574195751957619577195781957919580195811958219583195841958519586195871958819589195901959119592195931959419595195961959719598195991960019601196021960319604196051960619607196081960919610196111961219613196141961519616196171961819619196201962119622196231962419625196261962719628196291963019631196321963319634196351963619637196381963919640196411964219643196441964519646196471964819649196501965119652196531965419655196561965719658196591966019661196621966319664196651966619667196681966919670196711967219673196741967519676196771967819679196801968119682196831968419685196861968719688196891969019691196921969319694196951969619697196981969919700197011970219703197041970519706197071970819709197101971119712197131971419715197161971719718197191972019721197221972319724197251972619727197281972919730197311973219733197341973519736197371973819739197401974119742197431974419745197461974719748197491975019751197521975319754197551975619757197581975919760197611976219763197641976519766197671976819769197701977119772197731977419775197761977719778197791978019781197821978319784197851978619787197881978919790197911979219793197941979519796197971979819799198001980119802198031980419805198061980719808198091981019811198121981319814198151981619817198181981919820198211982219823198241982519826198271982819829198301983119832198331983419835198361983719838198391984019841198421984319844198451984619847198481984919850198511985219853198541985519856198571985819859198601986119862198631986419865198661986719868198691987019871198721987319874198751987619877198781987919880198811988219883198841988519886198871988819889198901989119892198931989419895198961989719898198991990019901199021990319904199051990619907199081990919910199111991219913199141991519916199171991819919199201992119922199231992419925199261992719928199291993019931199321993319934199351993619937199381993919940199411994219943199441994519946199471994819949199501995119952199531995419955199561995719958199591996019961199621996319964199651996619967199681996919970199711997219973199741997519976199771997819979199801998119982199831998419985199861998719988199891999019991199921999319994199951999619997199981999920000200012000220003200042000520006200072000820009200102001120012200132001420015200162001720018200192002020021200222002320024200252002620027200282002920030200312003220033200342003520036200372003820039200402004120042200432004420045200462004720048200492005020051200522005320054200552005620057200582005920060200612006220063200642006520066200672006820069200702007120072200732007420075200762007720078200792008020081200822008320084200852008620087200882008920090200912009220093200942009520096200972009820099201002010120102201032010420105201062010720108201092011020111201122011320114201152011620117201182011920120201212012220123201242012520126201272012820129201302013120132201332013420135201362013720138201392014020141201422014320144201452014620147201482014920150201512015220153201542015520156201572015820159201602016120162201632016420165201662016720168201692017020171201722017320174201752017620177201782017920180201812018220183201842018520186201872018820189201902019120192201932019420195201962019720198201992020020201202022020320204202052020620207202082020920210202112021220213202142021520216202172021820219202202022120222202232022420225202262022720228202292023020231202322023320234202352023620237202382023920240202412024220243202442024520246202472024820249202502025120252202532025420255202562025720258202592026020261202622026320264202652026620267202682026920270202712027220273202742027520276202772027820279202802028120282202832028420285202862028720288202892029020291202922029320294202952029620297202982029920300203012030220303203042030520306203072030820309203102031120312203132031420315203162031720318203192032020321203222032320324203252032620327203282032920330203312033220333203342033520336203372033820339203402034120342203432034420345203462034720348203492035020351203522035320354203552035620357203582035920360203612036220363203642036520366203672036820369203702037120372203732037420375203762037720378203792038020381203822038320384203852038620387203882038920390203912039220393203942039520396203972039820399204002040120402204032040420405204062040720408204092041020411204122041320414204152041620417204182041920420204212042220423204242042520426204272042820429204302043120432204332043420435204362043720438204392044020441204422044320444204452044620447204482044920450204512045220453204542045520456204572045820459204602046120462204632046420465204662046720468204692047020471204722047320474204752047620477204782047920480204812048220483204842048520486204872048820489204902049120492204932049420495204962049720498204992050020501205022050320504205052050620507205082050920510205112051220513205142051520516205172051820519205202052120522205232052420525205262052720528205292053020531205322053320534205352053620537205382053920540205412054220543205442054520546205472054820549205502055120552205532055420555205562055720558205592056020561205622056320564205652056620567205682056920570205712057220573205742057520576
  1. Changes in version 0.2.9.1-alpha - 2016-??-??
  2. Changes in version 0.2.8.4-rc - 2016-06-15
  3. Tor 0.2.8.4-rc is the first release candidate in the Tor 0.2.8 series.
  4. If we find no new bugs or regressions here, the first stable 0.2.8
  5. release will be identical to it. It has a few small bugfixes against
  6. previous versions.
  7. o Major bugfixes (user interface):
  8. - Correctly give a warning in the cases where a relay is specified
  9. by nickname, and one such relay is found, but it is not officially
  10. Named. Fixes bug 19203; bugfix on 0.2.3.1-alpha.
  11. o Minor features (build):
  12. - Tor now builds once again with the recent OpenSSL 1.1 development
  13. branch (tested against 1.1.0-pre5 and 1.1.0-pre6-dev).
  14. o Minor features (geoip):
  15. - Update geoip and geoip6 to the June 7 2016 Maxmind GeoLite2
  16. Country database.
  17. o Minor bugfixes (compilation):
  18. - Cause the unit tests to compile correctly on mingw64 versions that
  19. lack sscanf. Fixes bug 19213; bugfix on 0.2.7.1-alpha.
  20. o Minor bugfixes (downloading):
  21. - Predict more correctly whether we'll be downloading over HTTP when
  22. we determine the maximum length of a URL. This should avoid a
  23. "BUG" warning about the Squid HTTP proxy and its URL limits. Fixes
  24. bug 19191.
  25. Changes in version 0.2.8.3-alpha - 2016-05-26
  26. Tor 0.2.8.3-alpha resolves several bugs, most of them introduced over
  27. the course of the 0.2.8 development cycle. It improves the behavior of
  28. directory clients, fixes several crash bugs, fixes a gap in compiler
  29. hardening, and allows the full integration test suite to run on
  30. more platforms.
  31. o Major bugfixes (security, client, DNS proxy):
  32. - Stop a crash that could occur when a client running with DNSPort
  33. received a query with multiple address types, and the first
  34. address type was not supported. Found and fixed by Scott Dial.
  35. Fixes bug 18710; bugfix on 0.2.5.4-alpha.
  36. o Major bugfixes (security, compilation):
  37. - Correctly detect compiler flags on systems where _FORTIFY_SOURCE
  38. is predefined. Previously, our use of -D_FORTIFY_SOURCE would
  39. cause a compiler warning, thereby making other checks fail, and
  40. needlessly disabling compiler-hardening support. Fixes one case of
  41. bug 18841; bugfix on 0.2.3.17-beta. Patch from "trudokal".
  42. o Major bugfixes (security, directory authorities):
  43. - Fix a crash and out-of-bounds write during authority voting, when
  44. the list of relays includes duplicate ed25519 identity keys. Fixes
  45. bug 19032; bugfix on 0.2.8.2-alpha.
  46. o Major bugfixes (client, bootstrapping):
  47. - Check if bootstrap consensus downloads are still needed when the
  48. linked connection attaches. This prevents tor making unnecessary
  49. begindir-style connections, which are the only directory
  50. connections tor clients make since the fix for 18483 was merged.
  51. - Fix some edge cases where consensus download connections may not
  52. have been closed, even though they were not needed. Related to fix
  53. for 18809.
  54. - Make relays retry consensus downloads the correct number of times,
  55. rather than the more aggressive client retry count. Fixes part of
  56. ticket 18809.
  57. - Stop downloading consensuses when we have a consensus, even if we
  58. don't have all the certificates for it yet. Fixes bug 18809;
  59. bugfix on 0.2.8.1-alpha. Patches by arma and teor.
  60. o Major bugfixes (directory mirrors):
  61. - Decide whether to advertise begindir support in the the same way
  62. we decide whether to advertise our DirPort. Allowing these
  63. decisions to become out-of-sync led to surprising behavior like
  64. advertising begindir support when hibernation made us not
  65. advertise a DirPort. Resolves bug 18616; bugfix on 0.2.8.1-alpha.
  66. Patch by teor.
  67. o Major bugfixes (IPv6 bridges, client):
  68. - Actually use IPv6 addresses when selecting directory addresses for
  69. IPv6 bridges. Fixes bug 18921; bugfix on 0.2.8.1-alpha. Patch
  70. by "teor".
  71. o Major bugfixes (key management):
  72. - If OpenSSL fails to generate an RSA key, do not retain a dangling
  73. pointer to the previous (uninitialized) key value. The impact here
  74. should be limited to a difficult-to-trigger crash, if OpenSSL is
  75. running an engine that makes key generation failures possible, or
  76. if OpenSSL runs out of memory. Fixes bug 19152; bugfix on
  77. 0.2.1.10-alpha. Found by Yuan Jochen Kang, Suman Jana, and
  78. Baishakhi Ray.
  79. o Major bugfixes (testing):
  80. - Fix a bug that would block 'make test-network-all' on systems where
  81. IPv6 packets were lost. Fixes bug 19008; bugfix on tor-0.2.7.3-rc.
  82. - Avoid "WSANOTINITIALISED" warnings in the unit tests. Fixes bug 18668;
  83. bugfix on 0.2.8.1-alpha.
  84. o Minor features (clients):
  85. - Make clients, onion services, and bridge relays always use an
  86. encrypted begindir connection for directory requests. Resolves
  87. ticket 18483. Patch by "teor".
  88. o Minor features (fallback directory mirrors):
  89. - Give each fallback the same weight for client selection; restrict
  90. fallbacks to one per operator; report fallback directory detail
  91. changes when rebuilding list; add new fallback directory mirrors
  92. to the whitelist; update fallback directories based on the latest
  93. OnionOO data; and any other minor simplifications and fixes.
  94. Closes tasks 17158, 17905, 18749, bug 18689, and fixes part of bug
  95. 18812 on 0.2.8.1-alpha; patch by "teor".
  96. o Minor features (geoip):
  97. - Update geoip and geoip6 to the May 4 2016 Maxmind GeoLite2
  98. Country database.
  99. o Minor bugfixes (assert, portability):
  100. - Fix an assertion failure in memarea.c on systems where "long" is
  101. shorter than the size of a pointer. Fixes bug 18716; bugfix
  102. on 0.2.1.1-alpha.
  103. o Minor bugfixes (bootstrap):
  104. - Consistently use the consensus download schedule for authority
  105. certificates. Fixes bug 18816; bugfix on 0.2.4.13-alpha.
  106. o Minor bugfixes (build):
  107. - Remove a pair of redundant AM_CONDITIONAL declarations from
  108. configure.ac. Fixes one final case of bug 17744; bugfix
  109. on 0.2.8.2-alpha.
  110. - Resolve warnings when building on systems that are concerned with
  111. signed char. Fixes bug 18728; bugfix on 0.2.7.2-alpha
  112. and 0.2.6.1-alpha.
  113. - When libscrypt.h is found, but no libscrypt library can be linked,
  114. treat libscrypt as absent. Fixes bug 19161; bugfix
  115. on 0.2.6.1-alpha.
  116. o Minor bugfixes (client):
  117. - Turn all TestingClientBootstrap* into non-testing torrc options.
  118. This changes simply renames them by removing "Testing" in front of
  119. them and they do not require TestingTorNetwork to be enabled
  120. anymore. Fixes bug 18481; bugfix on 0.2.8.1-alpha.
  121. - Make directory node selection more reliable, mainly for IPv6-only
  122. clients and clients with few reachable addresses. Fixes bug 18929;
  123. bugfix on 0.2.8.1-alpha. Patch by "teor".
  124. o Minor bugfixes (controller, microdescriptors):
  125. - Make GETINFO dir/status-vote/current/consensus conform to the
  126. control specification by returning "551 Could not open cached
  127. consensus..." when not caching consensuses. Fixes bug 18920;
  128. bugfix on 0.2.2.6-alpha.
  129. o Minor bugfixes (crypto, portability):
  130. - The SHA3 and SHAKE routines now produce the correct output on Big
  131. Endian systems. No code calls either algorithm yet, so this is
  132. primarily a build fix. Fixes bug 18943; bugfix on 0.2.8.1-alpha.
  133. - Tor now builds again with the recent OpenSSL 1.1 development
  134. branch (tested against 1.1.0-pre4 and 1.1.0-pre5-dev). Closes
  135. ticket 18286.
  136. o Minor bugfixes (directories):
  137. - When fetching extrainfo documents, compare their SHA256 digests
  138. and Ed25519 signing key certificates with the routerinfo that led
  139. us to fetch them, rather than with the most recent routerinfo.
  140. Otherwise we generate many spurious warnings about mismatches.
  141. Fixes bug 17150; bugfix on 0.2.7.2-alpha.
  142. o Minor bugfixes (logging):
  143. - When we can't generate a signing key because OfflineMasterKey is
  144. set, do not imply that we should have been able to load it. Fixes
  145. bug 18133; bugfix on 0.2.7.2-alpha.
  146. - Stop periodic_event_dispatch() from blasting twelve lines per
  147. second at loglevel debug. Fixes bug 18729; fix on 0.2.8.1-alpha.
  148. - When rejecting a misformed INTRODUCE2 cell, only log at
  149. PROTOCOL_WARN severity. Fixes bug 18761; bugfix on 0.2.8.2-alpha.
  150. o Minor bugfixes (pluggable transports):
  151. - Avoid reporting a spurious error when we decide that we don't need
  152. to terminate a pluggable transport because it has already exited.
  153. Fixes bug 18686; bugfix on 0.2.5.5-alpha.
  154. o Minor bugfixes (pointer arithmetic):
  155. - Fix a bug in memarea_alloc() that could have resulted in remote
  156. heap write access, if Tor had ever passed an unchecked size to
  157. memarea_alloc(). Fortunately, all the sizes we pass to
  158. memarea_alloc() are pre-checked to be less than 128 kilobytes.
  159. Fixes bug 19150; bugfix on 0.2.1.1-alpha. Bug found by
  160. Guido Vranken.
  161. o Minor bugfixes (relays):
  162. - Consider more config options when relays decide whether to
  163. regenerate their descriptor. Fixes more of bug 12538; bugfix
  164. on 0.2.8.1-alpha.
  165. - Resolve some edge cases where we might launch an ORPort
  166. reachability check even when DisableNetwork is set. Noticed while
  167. fixing bug 18616; bugfix on 0.2.3.9-alpha.
  168. o Minor bugfixes (statistics):
  169. - We now include consensus downloads via IPv6 in our directory-
  170. request statistics. Fixes bug 18460; bugfix on 0.2.3.14-alpha.
  171. o Minor bugfixes (testing):
  172. - Allow directories in small networks to bootstrap by skipping
  173. DirPort checks when the consensus has no exits. Fixes bug 19003;
  174. bugfix on 0.2.8.1-alpha. Patch by teor.
  175. - Fix a small memory leak that would occur when the
  176. TestingEnableCellStatsEvent option was turned on. Fixes bug 18673;
  177. bugfix on 0.2.5.2-alpha.
  178. o Minor bugfixes (time handling):
  179. - When correcting a corrupt 'struct tm' value, fill in the tm_wday
  180. field. Otherwise, our unit tests crash on Windows. Fixes bug
  181. 18977; bugfix on 0.2.2.25-alpha.
  182. o Documentation:
  183. - Document the contents of the 'datadir/keys' subdirectory in the
  184. manual page. Closes ticket 17621.
  185. - Stop recommending use of nicknames to identify relays in our
  186. MapAddress documentation. Closes ticket 18312.
  187. Changes in version 0.2.8.2-alpha - 2016-03-28
  188. Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
  189. bugs in earlier versions of Tor, including some that prevented
  190. authorities using Tor 0.2.7.x from running correctly. IPv6 and
  191. directory support should also be much improved.
  192. o New system requirements:
  193. - Tor no longer supports versions of OpenSSL with a broken
  194. implementation of counter mode. (This bug was present in OpenSSL
  195. 1.0.0, and was fixed in OpenSSL 1.0.0a.) Tor still detects, but no
  196. longer runs with, these versions.
  197. - Tor no longer attempts to support platforms where the "time_t"
  198. type is unsigned. (To the best of our knowledge, only OpenVMS does
  199. this, and Tor has never actually built on OpenVMS.) Closes
  200. ticket 18184.
  201. - Tor now uses Autoconf version 2.63 or later, and Automake 1.11 or
  202. later (released in 2008 and 2009 respectively). If you are
  203. building Tor from the git repository instead of from the source
  204. distribution, and your tools are older than this, you will need to
  205. upgrade. Closes ticket 17732.
  206. o Major bugfixes (security, pointers):
  207. - Avoid a difficult-to-trigger heap corruption attack when extending
  208. a smartlist to contain over 16GB of pointers. Fixes bug 18162;
  209. bugfix on 0.1.1.11-alpha, which fixed a related bug incompletely.
  210. Reported by Guido Vranken.
  211. o Major bugfixes (bridges, pluggable transports):
  212. - Modify the check for OR connections to private addresses. Allow
  213. bridges on private addresses, including pluggable transports that
  214. ignore the (potentially private) address in the bridge line. Fixes
  215. bug 18517; bugfix on 0.2.8.1-alpha. Reported by gk, patch by teor.
  216. o Major bugfixes (compilation):
  217. - Repair hardened builds under the clang compiler. Previously, our
  218. use of _FORTIFY_SOURCE would conflict with clang's address
  219. sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
  220. o Major bugfixes (crash on shutdown):
  221. - Correctly handle detaching circuits from muxes when shutting down.
  222. Fixes bug 18116; bugfix on 0.2.8.1-alpha.
  223. - Fix an assert-on-exit bug related to counting memory usage in
  224. rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
  225. o Major bugfixes (crash on startup):
  226. - Fix a segfault during startup: If a Unix domain socket was
  227. configured as listener (such as a ControlSocket or a SocksPort
  228. "unix:" socket), and tor was started as root but not configured to
  229. switch to another user, tor would segfault while trying to string
  230. compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha.
  231. Patch by weasel.
  232. o Major bugfixes (dns proxy mode, crash):
  233. - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
  234. bugfix on 0.2.0.1-alpha. Patch from "cypherpunks".
  235. o Major bugfixes (relays, bridge clients):
  236. - Ensure relays always allow IPv4 OR and Dir connections. Ensure
  237. bridge clients use the address configured in the bridge line.
  238. Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
  239. patch by teor.
  240. o Major bugfixes (voting):
  241. - Actually enable support for authorities to match routers by their
  242. Ed25519 identities. Previously, the code had been written, but
  243. some debugging code that had accidentally been left in the
  244. codebase made it stay turned off. Fixes bug 17702; bugfix
  245. on 0.2.7.2-alpha.
  246. - When collating votes by Ed25519 identities, authorities now
  247. include a "NoEdConsensus" flag if the ed25519 value (or lack
  248. thereof) for a server does not reflect the majority consensus.
  249. Related to bug 17668; bugfix on 0.2.7.2-alpha.
  250. - When generating a vote with keypinning disabled, never include two
  251. entries for the same ed25519 identity. This bug was causing
  252. authorities to generate votes that they could not parse when a
  253. router violated key pinning by changing its RSA identity but
  254. keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
  255. 18318. Bugfix on 0.2.7.2-alpha.
  256. o Minor features (security, win32):
  257. - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
  258. attack. Fixes bug 18123; bugfix on all tor versions. Patch
  259. by teor.
  260. o Minor features (bug-resistance):
  261. - Make Tor survive errors involving connections without a
  262. corresponding event object. Previously we'd fail with an
  263. assertion; now we produce a log message. Related to bug 16248.
  264. o Minor features (build):
  265. - Detect systems with FreeBSD-derived kernels (such as GNU/kFreeBSD)
  266. as having possible IPFW support. Closes ticket 18448. Patch from
  267. Steven Chamberlain.
  268. o Minor features (code hardening):
  269. - Use tor_snprintf() and tor_vsnprintf() even in external and low-
  270. level code, to harden against accidental failures to NUL-
  271. terminate. Part of ticket 17852. Patch from jsturgix. Found
  272. with Flawfinder.
  273. o Minor features (crypto):
  274. - Validate the hard-coded Diffie-Hellman parameters and ensure that
  275. p is a safe prime, and g is a suitable generator. Closes
  276. ticket 18221.
  277. o Minor features (geoip):
  278. - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
  279. Country database.
  280. o Minor features (hidden service directory):
  281. - Streamline relay-side hsdir handling: when relays consider whether
  282. to accept an uploaded hidden service descriptor, they no longer
  283. check whether they are one of the relays in the network that is
  284. "supposed" to handle that descriptor. Implements ticket 18332.
  285. o Minor features (IPv6):
  286. - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
  287. to 1, tor prefers IPv6 directory addresses.
  288. - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
  289. avoids using IPv4 for client OR and directory connections.
  290. - Try harder to obey the IP version restrictions "ClientUseIPv4 0",
  291. "ClientUseIPv6 0", "ClientPreferIPv6ORPort", and
  292. "ClientPreferIPv6DirPort". Closes ticket 17840; patch by teor.
  293. o Minor features (linux seccomp2 sandbox):
  294. - Reject attempts to change our Address with "Sandbox 1" enabled.
  295. Changing Address with Sandbox turned on would never actually work,
  296. but previously it would fail in strange and confusing ways. Found
  297. while fixing 18548.
  298. o Minor features (robustness):
  299. - Exit immediately with an error message if the code attempts to use
  300. Libevent without having initialized it. This should resolve some
  301. frequently-made mistakes in our unit tests. Closes ticket 18241.
  302. o Minor features (unix domain sockets):
  303. - Add a new per-socket option, RelaxDirModeCheck, to allow creating
  304. Unix domain sockets without checking the permissions on the parent
  305. directory. (Tor checks permissions by default because some
  306. operating systems only check permissions on the parent directory.
  307. However, some operating systems do look at permissions on the
  308. socket, and tor's default check is unneeded.) Closes ticket 18458.
  309. Patch by weasel.
  310. o Minor bugfixes (exit policies, security):
  311. - Refresh an exit relay's exit policy when interface addresses
  312. change. Previously, tor only refreshed the exit policy when the
  313. configured external address changed. Fixes bug 18208; bugfix on
  314. 0.2.7.3-rc. Patch by teor.
  315. o Minor bugfixes (security, hidden services):
  316. - Prevent hidden services connecting to client-supplied rendezvous
  317. addresses that are reserved as internal or multicast. Fixes bug
  318. 8976; bugfix on 0.2.3.21-rc. Patch by dgoulet and teor.
  319. o Minor bugfixes (build):
  320. - Do not link the unit tests against both the testing and non-
  321. testing versions of the static libraries. Fixes bug 18490; bugfix
  322. on 0.2.7.1-alpha.
  323. - Avoid spurious failures from configure files related to calling
  324. exit(0) in TOR_SEARCH_LIBRARY. Fixes bug 18625; bugfix on
  325. 0.2.0.1-alpha. Patch from "cypherpunks".
  326. - Silence spurious clang-scan warnings in the ed25519_donna code by
  327. explicitly initializing some objects. Fixes bug 18384; bugfix on
  328. 0.2.7.2-alpha. Patch by teor.
  329. o Minor bugfixes (client, bootstrap):
  330. - Count receipt of new microdescriptors as progress towards
  331. bootstrapping. Previously, with EntryNodes set, Tor might not
  332. successfully repopulate the guard set on bootstrapping. Fixes bug
  333. 16825; bugfix on 0.2.3.1-alpha.
  334. o Minor bugfixes (code correctness):
  335. - Update to the latest version of Trunnel, which tries harder to
  336. avoid generating code that can invoke memcpy(p,NULL,0). Bug found
  337. by clang address sanitizer. Fixes bug 18373; bugfix
  338. on 0.2.7.2-alpha.
  339. o Minor bugfixes (configuration):
  340. - Fix a tiny memory leak when parsing a port configuration ending in
  341. ":auto". Fixes bug 18374; bugfix on 0.2.3.3-alpha.
  342. o Minor bugfixes (containers):
  343. - If we somehow attempt to construct a heap with more than
  344. 1073741822 elements, avoid an integer overflow when maintaining
  345. the heap property. Fixes bug 18296; bugfix on 0.1.2.1-alpha.
  346. o Minor bugfixes (correctness):
  347. - Fix a bad memory handling bug that would occur if we had queued a
  348. cell on a channel's incoming queue. Fortunately, we can't actually
  349. queue a cell like that as our code is constructed today, but it's
  350. best to avoid this kind of error, even if there isn't any code
  351. that triggers it today. Fixes bug 18570; bugfix on 0.2.4.4-alpha.
  352. o Minor bugfixes (directory):
  353. - When generating a URL for a directory server on an IPv6 address,
  354. wrap the IPv6 address in square brackets. Fixes bug 18051; bugfix
  355. on 0.2.3.9-alpha. Patch from Malek.
  356. o Minor bugfixes (fallback directory mirrors):
  357. - When requesting extrainfo descriptors from a trusted directory
  358. server, check whether it is an authority or a fallback directory
  359. which supports extrainfo descriptors. Fixes bug 18489; bugfix on
  360. 0.2.4.7-alpha. Reported by atagar, patch by teor.
  361. o Minor bugfixes (hidden service, client):
  362. - Handle the case where the user makes several fast consecutive
  363. requests to the same .onion address. Previously, the first six
  364. requests would each trigger a descriptor fetch, each picking a
  365. directory (there are 6 overall) and the seventh one would fail
  366. because no directories were left, thereby triggering a close on
  367. all current directory connections asking for the hidden service.
  368. The solution here is to not close the connections if we have
  369. pending directory fetches. Fixes bug 15937; bugfix
  370. on 0.2.7.1-alpha.
  371. o Minor bugfixes (hidden service, control port):
  372. - Add the onion address to the HS_DESC event for the UPLOADED action
  373. both on success or failure. It was previously hardcoded with
  374. UNKNOWN. Fixes bug 16023; bugfix on 0.2.7.2-alpha.
  375. o Minor bugfixes (hidden service, directory):
  376. - Bridges now refuse "rendezvous2" (hidden service descriptor)
  377. publish attempts. Suggested by ticket 18332.
  378. o Minor bugfixes (linux seccomp2 sandbox):
  379. - Allow the setrlimit syscall, and the prlimit and prlimit64
  380. syscalls, which some libc implementations use under the hood.
  381. Fixes bug 15221; bugfix on 0.2.5.1-alpha.
  382. - Avoid a 10-second delay when starting as a client with "Sandbox 1"
  383. enabled and no DNS resolvers configured. This should help TAILS
  384. start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha.
  385. - Fix the sandbox's interoperability with unix domain sockets under
  386. setuid. Fixes bug 18253; bugfix on 0.2.8.1-alpha.
  387. o Minor bugfixes (logging):
  388. - When logging information about an unparsable networkstatus vote or
  389. consensus, do not say "vote" when we mean consensus. Fixes bug
  390. 18368; bugfix on 0.2.0.8-alpha.
  391. - Scrub service name in "unrecognized service ID" log messages.
  392. Fixes bug 18600; bugfix on 0.2.4.11-alpha.
  393. - Downgrade logs and backtraces about IP versions to info-level.
  394. Only log backtraces once each time tor runs. Assists in diagnosing
  395. bug 18351; bugfix on 0.2.8.1-alpha. Reported by sysrqb and
  396. Christian, patch by teor.
  397. o Minor bugfixes (memory safety):
  398. - Avoid freeing an uninitialized pointer when opening a socket fails
  399. in get_interface_addresses_ioctl(). Fixes bug 18454; bugfix on
  400. 0.2.3.11-alpha. Reported by toralf and "cypherpunks", patch
  401. by teor.
  402. - Correctly duplicate addresses in get_interface_address6_list().
  403. Fixes bug 18454; bugfix on 0.2.8.1-alpha. Reported by toralf,
  404. patch by "cypherpunks".
  405. - Fix a memory leak in tor-gencert. Fixes part of bug 18672; bugfix
  406. on 0.2.0.1-alpha.
  407. - Fix a memory leak in "tor --list-fingerprint". Fixes part of bug
  408. 18672; bugfix on 0.2.5.1-alpha.
  409. o Minor bugfixes (private directory):
  410. - Prevent a race condition when creating private directories. Fixes
  411. part of bug 17852; bugfix on 0.0.2pre13. Part of ticket 17852.
  412. Patch from jsturgix. Found with Flawfinder.
  413. o Minor bugfixes (test networks, IPv6):
  414. - Allow internal IPv6 addresses in descriptors in test networks.
  415. Fixes bug 17153; bugfix on 0.2.3.16-alpha. Patch by teor, reported
  416. by karsten.
  417. o Minor bugfixes (testing):
  418. - We no longer disable assertions in the unit tests when coverage is
  419. enabled. Instead, we require you to say --disable-asserts-in-tests
  420. to the configure script if you need assertions disabled in the
  421. unit tests (for example, if you want to perform branch coverage).
  422. Fixes bug 18242; bugfix on 0.2.7.1-alpha.
  423. o Minor bugfixes (time parsing):
  424. - Avoid overflow in tor_timegm when parsing dates in and after 2038
  425. on platforms with 32-bit time_t. Fixes bug 18479; bugfix on
  426. 0.0.2pre14. Patch by teor.
  427. o Minor bugfixes (tor-gencert):
  428. - Correctly handle the case where an authority operator enters a
  429. passphrase but sends an EOF before sending a newline. Fixes bug
  430. 17443; bugfix on 0.2.0.20-rc. Found by junglefowl.
  431. o Code simplification and refactoring:
  432. - Quote all the string interpolations in configure.ac -- even those
  433. which we are pretty sure can't contain spaces. Closes ticket
  434. 17744. Patch from zerosion.
  435. - Remove specialized code for non-inplace AES_CTR. 99% of our AES is
  436. inplace, so there's no need to have a separate implementation for
  437. the non-inplace code. Closes ticket 18258. Patch from Malek.
  438. - Simplify return types for some crypto functions that can't
  439. actually fail. Patch from Hassan Alsibyani. Closes ticket 18259.
  440. o Documentation:
  441. - Change build messages to refer to "Fedora" instead of "Fedora
  442. Core", and "dnf" instead of "yum". Closes tickets 18459 and 18426.
  443. Patches from "icanhasaccount" and "cypherpunks".
  444. o Removed features:
  445. - We no longer maintain an internal freelist in memarea.c.
  446. Allocators should be good enough to make this code unnecessary,
  447. and it's doubtful that it ever had any performance benefit.
  448. o Testing:
  449. - Fix several warnings from clang's address sanitizer produced in
  450. the unit tests.
  451. - Treat backtrace test failures as expected on FreeBSD until we
  452. solve bug 17808. Closes ticket 18204.
  453. Changes in version 0.2.8.1-alpha - 2016-02-04
  454. Tor 0.2.8.1-alpha is the first alpha release in its series. It
  455. includes numerous small features and bugfixes against previous Tor
  456. versions, and numerous small infrastructure improvements. The most
  457. notable features are a set of improvements to the directory subsystem.
  458. o Major features (security, Linux):
  459. - When Tor starts as root on Linux and is told to switch user ID, it
  460. can now retain the capability to bind to low ports. By default,
  461. Tor will do this only when it's switching user ID and some low
  462. ports have been configured. You can change this behavior with the
  463. new option KeepBindCapabilities. Closes ticket 8195.
  464. o Major features (directory system):
  465. - When bootstrapping multiple consensus downloads at a time, use the
  466. first one that starts downloading, and close the rest. This
  467. reduces failures when authorities or fallback directories are slow
  468. or down. Together with the code for feature 15775, this feature
  469. should reduces failures due to fallback churn. Implements ticket
  470. 4483. Patch by "teor". Implements IPv4 portions of proposal 210 by
  471. "mikeperry" and "teor".
  472. - Include a trial list of default fallback directories, based on an
  473. opt-in survey of suitable relays. Doing this should make clients
  474. bootstrap more quickly and reliably, and reduce the load on the
  475. directory authorities. Closes ticket 15775. Patch by "teor".
  476. Candidates identified using an OnionOO script by "weasel", "teor",
  477. "gsathya", and "karsten".
  478. - Previously only relays that explicitly opened a directory port
  479. (DirPort) accepted directory requests from clients. Now all
  480. relays, with and without a DirPort, accept and serve tunneled
  481. directory requests that they receive through their ORPort. You can
  482. disable this behavior using the new DirCache option. Closes
  483. ticket 12538.
  484. o Major key updates:
  485. - Update the V3 identity key for the dannenberg directory authority:
  486. it was changed on 18 November 2015. Closes task 17906. Patch
  487. by "teor".
  488. o Minor features (security, clock):
  489. - Warn when the system clock appears to move back in time (when the
  490. state file was last written in the future). Tor doesn't know that
  491. consensuses have expired if the clock is in the past. Patch by
  492. "teor". Implements ticket 17188.
  493. o Minor features (security, exit policies):
  494. - ExitPolicyRejectPrivate now rejects more private addresses by
  495. default. Specifically, it now rejects the relay's outbound bind
  496. addresses (if configured), and the relay's configured port
  497. addresses (such as ORPort and DirPort). Fixes bug 17027; bugfix on
  498. 0.2.0.11-alpha. Patch by "teor".
  499. o Minor features (security, memory erasure):
  500. - Set the unused entries in a smartlist to NULL. This helped catch
  501. a (harmless) bug, and shouldn't affect performance too much.
  502. Implements ticket 17026.
  503. - Use SecureMemoryWipe() function to securely clean memory on
  504. Windows. Previously we'd use OpenSSL's OPENSSL_cleanse() function.
  505. Implements feature 17986.
  506. - Use explicit_bzero or memset_s when present. Previously, we'd use
  507. OpenSSL's OPENSSL_cleanse() function. Closes ticket 7419; patches
  508. from <logan@hackers.mu> and <selven@hackers.mu>.
  509. - Make memwipe() do nothing when passed a NULL pointer or buffer of
  510. zero size. Check size argument to memwipe() for underflow. Fixes
  511. bug 18089; bugfix on 0.2.3.25 and 0.2.4.6-alpha. Reported by "gk",
  512. patch by "teor".
  513. o Minor features (security, RNG):
  514. - Adjust Tor's use of OpenSSL's RNG APIs so that they absolutely,
  515. positively are not allowed to fail. Previously we depended on
  516. internal details of OpenSSL's behavior. Closes ticket 17686.
  517. - Never use the system entropy output directly for anything besides
  518. seeding the PRNG. When we want to generate important keys, instead
  519. of using system entropy directly, we now hash it with the PRNG
  520. stream. This may help resist certain attacks based on broken OS
  521. entropy implementations. Closes part of ticket 17694.
  522. - Use modern system calls (like getentropy() or getrandom()) to
  523. generate strong entropy on platforms that have them. Closes
  524. ticket 13696.
  525. o Minor features (accounting):
  526. - Added two modes to the AccountingRule option: One for limiting
  527. only the number of bytes sent ("AccountingRule out"), and one for
  528. limiting only the number of bytes received ("AccountingRule in").
  529. Closes ticket 15989; patch from "unixninja92".
  530. o Minor features (build):
  531. - Since our build process now uses "make distcheck", we no longer
  532. force "make dist" to depend on "make check". Closes ticket 17893;
  533. patch from "cypherpunks."
  534. - Tor now builds successfully with the recent OpenSSL 1.1
  535. development branch, and with the latest LibreSSL. Closes tickets
  536. 17549, 17921, and 17984.
  537. o Minor features (controller):
  538. - Adds the FallbackDir entries to 'GETINFO config/defaults'. Closes
  539. tickets 16774 and 17817. Patch by George Tankersley.
  540. - New 'GETINFO hs/service/desc/id/' command to retrieve a hidden
  541. service descriptor from a service's local hidden service
  542. descriptor cache. Closes ticket 14846.
  543. - Add 'GETINFO exit-policy/reject-private/[default,relay]', so
  544. controllers can examine the the reject rules added by
  545. ExitPolicyRejectPrivate. This makes it easier for stem to display
  546. exit policies.
  547. o Minor features (crypto):
  548. - Add SHA512 support to crypto.c. Closes ticket 17663; patch from
  549. George Tankersley.
  550. - Add SHA3 and SHAKE support to crypto.c. Closes ticket 17783.
  551. - When allocating a digest state object, allocate no more space than
  552. we actually need. Previously, we would allocate as much space as
  553. the state for the largest algorithm would need. This change saves
  554. up to 672 bytes per circuit. Closes ticket 17796.
  555. - Improve performance when hashing non-multiple of 8 sized buffers,
  556. based on Andrew Moon's public domain SipHash-2-4 implementation.
  557. Fixes bug 17544; bugfix on 0.2.5.3-alpha.
  558. o Minor features (directory downloads):
  559. - Wait for busy authorities and fallback directories to become non-
  560. busy when bootstrapping. (A similar change was made in 6c443e987d
  561. for directory caches chosen from the consensus.) Closes ticket
  562. 17864; patch by "teor".
  563. - Add UseDefaultFallbackDirs, which enables any hard-coded fallback
  564. directory mirrors. The default is 1; set it to 0 to disable
  565. fallbacks. Implements ticket 17576. Patch by "teor".
  566. o Minor features (geoip):
  567. - Update geoip and geoip6 to the January 5 2016 Maxmind GeoLite2
  568. Country database.
  569. o Minor features (IPv6):
  570. - Add an argument 'ipv6=address:orport' to the DirAuthority and
  571. FallbackDir torrc options, to specify an IPv6 address for an
  572. authority or fallback directory. Add hard-coded ipv6 addresses for
  573. directory authorities that have them. Closes ticket 17327; patch
  574. from Nick Mathewson and "teor".
  575. - Add address policy assume_action support for IPv6 addresses.
  576. - Limit IPv6 mask bits to 128.
  577. - Warn when comparing against an AF_UNSPEC address in a policy, it's
  578. almost always a bug. Closes ticket 17863; patch by "teor".
  579. - Allow users to configure directory authorities and fallback
  580. directory servers with IPv6 addresses and ORPorts. Resolves
  581. ticket 6027.
  582. - routerset_parse now accepts IPv6 literal addresses. Fixes bug
  583. 17060; bugfix on 0.2.1.3-alpha. Patch by "teor".
  584. - Make tor_ersatz_socketpair work on IPv6-only systems. Fixes bug
  585. 17638; bugfix on 0.0.2pre8. Patch by "teor".
  586. o Minor features (logging):
  587. - When logging to syslog, allow a tag to be added to the syslog
  588. identity (the string prepended to every log message). The tag can
  589. be configured with SyslogIdentityTag and defaults to none. Setting
  590. it to "foo" will cause logs to be tagged as "Tor-foo". Closes
  591. ticket 17194.
  592. o Minor features (portability):
  593. - Use timingsafe_memcmp() where available. Closes ticket 17944;
  594. patch from <logan@hackers.mu>.
  595. o Minor features (relay, address discovery):
  596. - Add a family argument to get_interface_addresses_raw() and
  597. subfunctions to make network interface address interogation more
  598. efficient. Now Tor can specifically ask for IPv4, IPv6 or both
  599. types of interfaces from the operating system. Resolves
  600. ticket 17950.
  601. - When get_interface_address6_list(.,AF_UNSPEC,.) is called and
  602. fails to enumerate interface addresses using the platform-specific
  603. API, have it rely on the UDP socket fallback technique to try and
  604. find out what IP addresses (both IPv4 and IPv6) our machine has.
  605. Resolves ticket 17951.
  606. o Minor features (replay cache):
  607. - The replay cache now uses SHA256 instead of SHA1. Implements
  608. feature 8961. Patch by "teor", issue reported by "rransom".
  609. o Minor features (unix file permissions):
  610. - Defer creation of Unix sockets until after setuid. This avoids
  611. needing CAP_CHOWN and CAP_FOWNER when using systemd's
  612. CapabilityBoundingSet, or chown and fowner when using SELinux.
  613. Implements part of ticket 17562. Patch from Jamie Nguyen.
  614. - If any directory created by Tor is marked as group readable, the
  615. filesystem group is allowed to be either the default GID or the
  616. root user. Allowing root to read the DataDirectory prevents the
  617. need for CAP_READ_SEARCH when using systemd's
  618. CapabilityBoundingSet, or dac_read_search when using SELinux.
  619. Implements part of ticket 17562. Patch from Jamie Nguyen.
  620. - Introduce a new DataDirectoryGroupReadable option. If it is set to
  621. 1, the DataDirectory will be made readable by the default GID.
  622. Implements part of ticket 17562. Patch from Jamie Nguyen.
  623. o Minor bugfixes (accounting):
  624. - The max bandwidth when using 'AccountRule sum' is now correctly
  625. logged. Fixes bug 18024; bugfix on 0.2.6.1-alpha. Patch
  626. from "unixninja92".
  627. o Minor bugfixes (code correctness):
  628. - When closing an entry connection, generate a warning if we should
  629. have sent an end cell for it but we haven't. Fixes bug 17876;
  630. bugfix on 0.2.3.2-alpha.
  631. - Assert that allocated memory held by the reputation code is freed
  632. according to its internal counters. Fixes bug 17753; bugfix
  633. on 0.1.1.1-alpha.
  634. - Assert when the TLS contexts fail to initialize. Fixes bug 17683;
  635. bugfix on 0.0.6.
  636. o Minor bugfixes (compilation):
  637. - Mark all object files that include micro-revision.i as depending
  638. on it, so as to make parallel builds more reliable. Fixes bug
  639. 17826; bugfix on 0.2.5.1-alpha.
  640. - Don't try to use the pthread_condattr_setclock() function unless
  641. it actually exists. Fixes compilation on NetBSD-6.x. Fixes bug
  642. 17819; bugfix on 0.2.6.3-alpha.
  643. - Fix backtrace compilation on FreeBSD. Fixes bug 17827; bugfix
  644. on 0.2.5.2-alpha.
  645. - Fix compilation of sandbox.c with musl-libc. Fixes bug 17347;
  646. bugfix on 0.2.5.1-alpha. Patch from 'jamestk'.
  647. - Fix search for libevent libraries on OpenBSD (and other systems
  648. that install libevent 1 and libevent 2 in parallel). Fixes bug
  649. 16651; bugfix on 0.1.0.7-rc. Patch from "rubiate".
  650. - Isolate environment variables meant for tests from the rest of the
  651. build system. Fixes bug 17818; bugfix on 0.2.7.3-rc.
  652. - Replace usage of 'INLINE' with 'inline'. Fixes bug 17804; bugfix
  653. on 0.0.2pre8.
  654. - Remove config.log only from make distclean, not from make clean.
  655. Fixes bug 17924; bugfix on 0.2.4.1-alpha.
  656. o Minor bugfixes (crypto):
  657. - Check the return value of HMAC() and assert on failure. Fixes bug
  658. 17658; bugfix on 0.2.3.6-alpha. Patch by "teor".
  659. o Minor bugfixes (fallback directories):
  660. - Mark fallbacks as "too busy" when they return a 503 response,
  661. rather than just marking authorities. Fixes bug 17572; bugfix on
  662. 0.2.4.7-alpha. Patch by "teor".
  663. o Minor bugfixes (IPv6):
  664. - Update the limits in max_dl_per_request for IPv6 address length.
  665. Fixes bug 17573; bugfix on 0.2.1.5-alpha.
  666. o Minor bugfixes (linux seccomp2 sandbox):
  667. - Fix a crash when using offline master ed25519 keys with the Linux
  668. seccomp2 sandbox enabled. Fixes bug 17675; bugfix on 0.2.7.3-rc.
  669. o Minor bugfixes (logging):
  670. - In log messages that include a function name, use __FUNCTION__
  671. instead of __PRETTY_FUNCTION__. In GCC, these are synonymous, but
  672. with clang __PRETTY_FUNCTION__ has extra information we don't
  673. need. Fixes bug 16563; bugfix on 0.0.2pre8. Fix by Tom van
  674. der Woerdt.
  675. - Remove needless quotes from a log message about unparseable
  676. addresses. Fixes bug 17843; bugfix on 0.2.3.3-alpha.
  677. o Minor bugfixes (portability):
  678. - Remove an #endif from configure.ac so that we correctly detect the
  679. presence of in6_addr.s6_addr32. Fixes bug 17923; bugfix
  680. on 0.2.0.13-alpha.
  681. o Minor bugfixes (relays):
  682. - Check that both the ORPort and DirPort (if present) are reachable
  683. before publishing a relay descriptor. Otherwise, relays publish a
  684. descriptor with DirPort 0 when the DirPort reachability test takes
  685. longer than the ORPort reachability test. Fixes bug 18050; bugfix
  686. on 0.1.0.1-rc. Reported by "starlight", patch by "teor".
  687. o Minor bugfixes (relays, hidden services):
  688. - Refuse connection requests to private OR addresses unless
  689. ExtendAllowPrivateAddresses is set. Previously, tor would connect,
  690. then refuse to send any cells to a private address. Fixes bugs
  691. 17674 and 8976; bugfix on 0.2.3.21-rc. Patch by "teor".
  692. o Minor bugfixes (safe logging):
  693. - When logging a malformed hostname received through socks4, scrub
  694. it if SafeLogging says we should. Fixes bug 17419; bugfix
  695. on 0.1.1.16-rc.
  696. o Minor bugfixes (statistics code):
  697. - Consistently check for overflow in round_*_to_next_multiple_of
  698. functions, and add unit tests with additional and maximal values.
  699. Fixes part of bug 13192; bugfix on 0.2.2.1-alpha.
  700. - Handle edge cases in the laplace functions: avoid division by
  701. zero, avoid taking the log of zero, and silence clang type
  702. conversion warnings using round and trunc. Add unit tests for edge
  703. cases with maximal values. Fixes part of bug 13192; bugfix
  704. on 0.2.6.2-alpha.
  705. o Minor bugfixes (testing):
  706. - The test for log_heartbeat was incorrectly failing in timezones
  707. with non-integer offsets. Instead of comparing the end of the time
  708. string against a constant, compare it to the output of
  709. format_local_iso_time when given the correct input. Fixes bug
  710. 18039; bugfix on 0.2.5.4-alpha.
  711. - Make unit tests pass on IPv6-only systems, and systems without
  712. localhost addresses (like some FreeBSD jails). Fixes bug 17632;
  713. bugfix on 0.2.7.3-rc. Patch by "teor".
  714. - Fix a memory leak in the ntor test. Fixes bug 17778; bugfix
  715. on 0.2.4.8-alpha.
  716. - Check the full results of SHA256 and SHA512 digests in the unit
  717. tests. Bugfix on 0.2.2.4-alpha. Patch by "teor".
  718. o Code simplification and refactoring:
  719. - Move logging of redundant policy entries in
  720. policies_parse_exit_policy_internal into its own function. Closes
  721. ticket 17608; patch from "juce".
  722. - Extract the more complicated parts of circuit_mark_for_close()
  723. into a new function that we run periodically before circuits are
  724. freed. This change removes more than half of the functions
  725. currently in the "blob". Closes ticket 17218.
  726. - Clean up a little duplicated code in
  727. crypto_expand_key_material_TAP(). Closes ticket 17587; patch
  728. from "pfrankw".
  729. - Decouple the list of streams waiting to be attached to circuits
  730. from the overall connection list. This change makes it possible to
  731. attach streams quickly while simplifying Tor's callgraph and
  732. avoiding O(N) scans of the entire connection list. Closes
  733. ticket 17590.
  734. - When a direct directory request fails immediately on launch,
  735. instead of relaunching that request from inside the code that
  736. launches it, instead mark the connection for teardown. This change
  737. simplifies Tor's callback and prevents the directory-request
  738. launching code from invoking itself recursively. Closes
  739. ticket 17589
  740. - Remove code for configuring OpenSSL dynamic locks; OpenSSL doesn't
  741. use them. Closes ticket 17926.
  742. o Documentation:
  743. - Add a description of the correct use of the '--keygen' command-
  744. line option. Closes ticket 17583; based on text by 's7r'.
  745. - Document the minimum HeartbeatPeriod value. Closes ticket 15638.
  746. - Explain actual minima for BandwidthRate. Closes ticket 16382.
  747. - Fix a minor formatting typo in the manpage. Closes ticket 17791.
  748. - Mention torspec URL in the manpage and point the reader to it
  749. whenever we mention a document that belongs in torspce. Fixes
  750. issue 17392.
  751. o Removed features:
  752. - Remove client-side support for connecting to Tor relays running
  753. versions of Tor before 0.2.3.6-alpha. These relays didn't support
  754. the v3 TLS handshake protocol, and are no longer allowed on the
  755. Tor network. Implements the client side of ticket 11150. Based on
  756. patches by Tom van der Woerdt.
  757. o Testing:
  758. - Add unit tests to check for common RNG failure modes, such as
  759. returning all zeroes, identical values, or incrementing values
  760. (OpenSSL's rand_predictable feature). Patch by "teor".
  761. - Log more information when the backtrace tests fail. Closes ticket
  762. 17892. Patch from "cypherpunks."
  763. - Always test both ed25519 backends, so that we can be sure that our
  764. batch-open replacement code works. Part of ticket 16794.
  765. - Cover dns_resolve_impl() in dns.c with unit tests. Implements a
  766. portion of ticket 16831.
  767. - More unit tests for compat_libevent.c, procmon.c, tortls.c,
  768. util_format.c, directory.c, and options_validate.c. Closes tickets
  769. 17075, 17082, 17084, 17003, and 17076 respectively. Patches from
  770. Ola Bini.
  771. - Unit tests for directory_handle_command_get. Closes ticket 17004.
  772. Patch from Reinaldo de Souza Jr.
  773. Changes in version 0.2.7.6 - 2015-12-10
  774. Tor version 0.2.7.6 fixes a major bug in entry guard selection, as
  775. well as a minor bug in hidden service reliability.
  776. o Major bugfixes (guard selection):
  777. - Actually look at the Guard flag when selecting a new directory
  778. guard. When we implemented the directory guard design, we
  779. accidentally started treating all relays as if they have the Guard
  780. flag during guard selection, leading to weaker anonymity and worse
  781. performance. Fixes bug 17772; bugfix on 0.2.4.8-alpha. Discovered
  782. by Mohsen Imani.
  783. o Minor features (geoip):
  784. - Update geoip and geoip6 to the December 1 2015 Maxmind GeoLite2
  785. Country database.
  786. o Minor bugfixes (compilation):
  787. - When checking for net/pfvar.h, include netinet/in.h if possible.
  788. This fixes transparent proxy detection on OpenBSD. Fixes bug
  789. 17551; bugfix on 0.1.2.1-alpha. Patch from "rubiate".
  790. - Fix a compilation warning with Clang 3.6: Do not check the
  791. presence of an address which can never be NULL. Fixes bug 17781.
  792. o Minor bugfixes (correctness):
  793. - When displaying an IPv6 exit policy, include the mask bits
  794. correctly even when the number is greater than 31. Fixes bug
  795. 16056; bugfix on 0.2.4.7-alpha. Patch from "gturner".
  796. - The wrong list was used when looking up expired intro points in a
  797. rend service object, causing what we think could be reachability
  798. issues for hidden services, and triggering a BUG log. Fixes bug
  799. 16702; bugfix on 0.2.7.2-alpha.
  800. - Fix undefined behavior in the tor_cert_checksig function. Fixes
  801. bug 17722; bugfix on 0.2.7.2-alpha.
  802. Changes in version 0.2.7.5 - 2015-11-20
  803. The Tor 0.2.7 release series is dedicated to the memory of Tor user
  804. and privacy advocate Caspar Bowden (1961-2015). Caspar worked
  805. tirelessly to advocate human rights regardless of national borders,
  806. and oppose the encroachments of mass surveillance. He opposed national
  807. exceptionalism, he brought clarity to legal and policy debates, he
  808. understood and predicted the impact of mass surveillance on the world,
  809. and he laid the groundwork for resisting it. While serving on the Tor
  810. Project's board of directors, he brought us his uncompromising focus
  811. on technical excellence in the service of humankind. Caspar was an
  812. inimitable force for good and a wonderful friend. He was kind,
  813. humorous, generous, gallant, and believed we should protect one
  814. another without exception. We honor him here for his ideals, his
  815. efforts, and his accomplishments. Please honor his memory with works
  816. that would make him proud.
  817. Tor 0.2.7.5 is the first stable release in the Tor 0.2.7 series.
  818. The 0.2.7 series adds a more secure identity key type for relays,
  819. improves cryptography performance, resolves several longstanding
  820. hidden-service performance issues, improves controller support for
  821. hidden services, and includes small bugfixes and performance
  822. improvements throughout the program. This release series also includes
  823. more tests than before, and significant simplifications to which parts
  824. of Tor invoke which others.
  825. (This release contains no code changes since 0.2.7.4-rc.)
  826. Changes in version 0.2.7.4-rc - 2015-10-21
  827. Tor 0.2.7.4-rc is the second release candidate in the 0.2.7 series. It
  828. fixes some important memory leaks, and a scary-looking (but mostly
  829. harmless in practice) invalid-read bug. It also has a few small
  830. bugfixes, notably fixes for compilation and portability on different
  831. platforms. If no further significant bounds are found, the next
  832. release will the the official stable release.
  833. o Major bugfixes (security, correctness):
  834. - Fix an error that could cause us to read 4 bytes before the
  835. beginning of an openssl string. This bug could be used to cause
  836. Tor to crash on systems with unusual malloc implementations, or
  837. systems with unusual hardening installed. Fixes bug 17404; bugfix
  838. on 0.2.3.6-alpha.
  839. o Major bugfixes (correctness):
  840. - Fix a use-after-free bug in validate_intro_point_failure(). Fixes
  841. bug 17401; bugfix on 0.2.7.3-rc.
  842. o Major bugfixes (memory leaks):
  843. - Fix a memory leak in ed25519 batch signature checking. Fixes bug
  844. 17398; bugfix on 0.2.6.1-alpha.
  845. - Fix a memory leak in rend_cache_failure_entry_free(). Fixes bug
  846. 17402; bugfix on 0.2.7.3-rc.
  847. - Fix a memory leak when reading an expired signing key from disk.
  848. Fixes bug 17403; bugfix on 0.2.7.2-rc.
  849. o Minor features (geoIP):
  850. - Update geoip and geoip6 to the October 9 2015 Maxmind GeoLite2
  851. Country database.
  852. o Minor bugfixes (compilation):
  853. - Repair compilation with the most recent (unreleased, alpha)
  854. vesions of OpenSSL 1.1. Fixes part of ticket 17237.
  855. - Fix an integer overflow warning in test_crypto_slow.c. Fixes bug
  856. 17251; bugfix on 0.2.7.2-alpha.
  857. - Fix compilation of sandbox.c with musl-libc. Fixes bug 17347;
  858. bugfix on 0.2.5.1-alpha. Patch from 'jamestk'.
  859. o Minor bugfixes (portability):
  860. - Use libexecinfo on FreeBSD to enable backtrace support. Fixes
  861. part of bug 17151; bugfix on 0.2.5.2-alpha. Patch from
  862. Marcin Cieślak.
  863. o Minor bugfixes (sandbox):
  864. - Add the "hidserv-stats" filename to our sandbox filter for the
  865. HiddenServiceStatistics option to work properly. Fixes bug 17354;
  866. bugfix on 0.2.6.2-alpha. Patch from David Goulet.
  867. o Minor bugfixes (testing):
  868. - Add unit tests for get_interface_address* failure cases. Fixes bug
  869. 17173; bugfix on 0.2.7.3-rc. Patch by fk/teor.
  870. - Fix breakage when running 'make check' with BSD make. Fixes bug
  871. 17154; bugfix on 0.2.7.3-rc. Patch by Marcin Cieślak.
  872. - Make the get_ifaddrs_* unit tests more tolerant of different
  873. network configurations. (Don't assume every test box has an IPv4
  874. address, and don't assume every test box has a non-localhost
  875. address.) Fixes bug 17255; bugfix on 0.2.7.3-rc. Patch by "teor".
  876. - Skip backtrace tests when backtrace support is not compiled in.
  877. Fixes part of bug 17151; bugfix on 0.2.7.1-alpha. Patch from
  878. Marcin Cieślak.
  879. o Documentation:
  880. - Fix capitalization of SOCKS in sample torrc. Closes ticket 15609.
  881. - Note that HiddenServicePorts can take a unix domain socket. Closes
  882. ticket 17364.
  883. Changes in version 0.2.7.3-rc - 2015-09-25
  884. Tor 0.2.7.3-rc is the first release candidate in the 0.2.7 series. It
  885. contains numerous usability fixes for Ed25519 keys, safeguards against
  886. several misconfiguration problems, significant simplifications to
  887. Tor's callgraph, and numerous bugfixes and small features.
  888. This is the most tested release of Tor to date. The unit tests cover
  889. 39.40% of the code, and the integration tests (accessible with "make
  890. test-full-online", requiring stem and chutney and a network
  891. connection) raise the coverage to 64.49%.
  892. o Major features (security, hidden services):
  893. - Hidden services, if using the EntryNodes option, are required to
  894. use more than one EntryNode, in order to avoid a guard discovery
  895. attack. (This would only affect people who had configured hidden
  896. services and manually specified the EntryNodes option with a
  897. single entry-node. The impact was that it would be easy to
  898. remotely identify the guard node used by such a hidden service.
  899. See ticket for more information.) Fixes ticket 14917.
  900. o Major features (Ed25519 keys, keypinning):
  901. - The key-pinning option on directory authorities is now advisory-
  902. only by default. In a future version, or when the AuthDirPinKeys
  903. option is set, pins are enforced again. Disabling key-pinning
  904. seemed like a good idea so that we can survive the fallout of any
  905. usability problems associated with Ed25519 keys. Closes
  906. ticket 17135.
  907. o Major features (Ed25519 performance):
  908. - Improve the speed of Ed25519 operations and Curve25519 keypair
  909. generation when built targeting 32 bit x86 platforms with SSE2
  910. available. Implements ticket 16535.
  911. - Improve the runtime speed of Ed25519 signature verification by
  912. using Ed25519-donna's batch verification support. Implements
  913. ticket 16533.
  914. o Major features (performance testing):
  915. - The test-network.sh script now supports performance testing.
  916. Requires corresponding chutney performance testing changes. Patch
  917. by "teor". Closes ticket 14175.
  918. o Major features (relay, Ed25519):
  919. - Significant usability improvements for Ed25519 key management. Log
  920. messages are better, and the code can recover from far more
  921. failure conditions. Thanks to "s7r" for reporting and diagnosing
  922. so many of these!
  923. - Add a new OfflineMasterKey option to tell Tor never to try loading
  924. or generating a secret Ed25519 identity key. You can use this in
  925. combination with tor --keygen to manage offline and/or encrypted
  926. Ed25519 keys. Implements ticket 16944.
  927. - Add a --newpass option to allow changing or removing the
  928. passphrase of an encrypted key with tor --keygen. Implements part
  929. of ticket 16769.
  930. - On receiving a HUP signal, check to see whether the Ed25519
  931. signing key has changed, and reload it if so. Closes ticket 16790.
  932. o Major bugfixes (relay, Ed25519):
  933. - Avoid crashing on 'tor --keygen'. Fixes bug 16679; bugfix on
  934. 0.2.7.2-alpha. Reported by "s7r".
  935. - Improve handling of expired signing keys with offline master keys.
  936. Fixes bug 16685; bugfix on 0.2.7.2-alpha. Reported by "s7r".
  937. o Minor features (client-side privacy):
  938. - New KeepAliveIsolateSOCKSAuth option to indefinitely extend circuit
  939. lifespan when IsolateSOCKSAuth and streams with SOCKS
  940. authentication are attached to the circuit. This allows
  941. applications like TorBrowser to manage circuit lifetime on their
  942. own. Implements feature 15482.
  943. - When logging malformed hostnames from SOCKS5 requests, respect
  944. SafeLogging configuration. Fixes bug 16891; bugfix on 0.1.1.16-rc.
  945. o Minor features (compilation):
  946. - Give a warning as early as possible when trying to build with an
  947. unsupported OpenSSL version. Closes ticket 16901.
  948. - Fail during configure if we're trying to build against an OpenSSL
  949. built without ECC support. Fixes bug 17109, bugfix on 0.2.7.1-alpha
  950. which started requiring ECC.
  951. o Minor features (geoip):
  952. - Update geoip and geoip6 to the September 3 2015 Maxmind GeoLite2
  953. Country database.
  954. o Minor features (hidden services):
  955. - Relays need to have the Fast flag to get the HSDir flag. As this
  956. is being written, we'll go from 2745 HSDirs down to 2342, a ~14%
  957. drop. This change should make some attacks against the hidden
  958. service directory system harder. Fixes ticket 15963.
  959. - Turn on hidden service statistics collection by setting the torrc
  960. option HiddenServiceStatistics to "1" by default. (This keeps
  961. track only of the fraction of traffic used by hidden services, and
  962. the total number of hidden services in existence.) Closes
  963. ticket 15254.
  964. - Client now uses an introduction point failure cache to know when
  965. to fetch or keep a descriptor in their cache. Previously, failures
  966. were recorded implicitly, but not explicitly remembered. Closes
  967. ticket 16389.
  968. o Minor features (testing, authorities, documentation):
  969. - New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags to
  970. explicitly manage consensus flags in testing networks. Patch by
  971. "robgjansen", modified by "teor". Implements part of ticket 14882.
  972. o Minor bugfixes (security, exit policies):
  973. - ExitPolicyRejectPrivate now also rejects the relay's published
  974. IPv6 address (if any), and any publicly routable IPv4 or IPv6
  975. addresses on any local interfaces. ticket 17027. Patch by "teor".
  976. Fixes bug 17027; bugfix on 0.2.0.11-alpha.
  977. o Minor bug fixes (torrc exit policies):
  978. - In torrc, "accept6 *" and "reject6 *" ExitPolicy lines now only
  979. produce IPv6 wildcard addresses. Previously they would produce
  980. both IPv4 and IPv6 wildcard addresses. Patch by "teor". Fixes part
  981. of bug 16069; bugfix on 0.2.4.7-alpha.
  982. - When parsing torrc ExitPolicies, we now warn for a number of cases
  983. where the user's intent is likely to differ from Tor's actual
  984. behavior. These include: using an IPv4 address with an accept6 or
  985. reject6 line; using "private" on an accept6 or reject6 line; and
  986. including any ExitPolicy lines after accept *:* or reject *:*.
  987. Related to ticket 16069.
  988. - When parsing torrc ExitPolicies, we now issue an info-level
  989. message when expanding an "accept/reject *" line to include both
  990. IPv4 and IPv6 wildcard addresses. Related to ticket 16069.
  991. - In each instance above, usage advice is provided to avoid the
  992. message. Resolves ticket 16069. Patch by "teor". Fixes part of bug
  993. 16069; bugfix on 0.2.4.7-alpha.
  994. o Minor bugfixes (authority):
  995. - Don't assign "HSDir" to a router if it isn't Valid and Running.
  996. Fixes bug 16524; bugfix on 0.2.7.2-alpha.
  997. - Downgrade log messages about Ed25519 key issues if they are in old
  998. cached router descriptors. Fixes part of bug 16286; bugfix
  999. on 0.2.7.2-alpha.
  1000. - When we find an Ed25519 key issue in a cached descriptor, stop
  1001. saying the descriptor was just "uploaded". Fixes another part of
  1002. bug 16286; bugfix on 0.2.7.2-alpha.
  1003. o Minor bugfixes (control port):
  1004. - Repair a warning and a spurious result when getting the maximum
  1005. number of file descriptors from the controller. Fixes bug 16697;
  1006. bugfix on 0.2.7.2-alpha.
  1007. o Minor bugfixes (correctness):
  1008. - When calling channel_free_list(), avoid calling smartlist_remove()
  1009. while inside a FOREACH loop. This partially reverts commit
  1010. 17356fe7fd96af where the correct SMARTLIST_DEL_CURRENT was
  1011. incorrectly removed. Fixes bug 16924; bugfix on 0.2.4.4-alpha.
  1012. o Minor bugfixes (documentation):
  1013. - Advise users on how to configure separate IPv4 and IPv6 exit
  1014. policies in the manpage and sample torrcs. Related to ticket 16069.
  1015. - Fix the usage message of tor-resolve(1) so that it no longer lists
  1016. the removed -F option. Fixes bug 16913; bugfix on 0.2.2.28-beta.
  1017. - Fix an error in the manual page and comments for
  1018. TestingDirAuthVoteHSDir[IsStrict], which suggested that a HSDir
  1019. required "ORPort connectivity". While this is true, it is in no
  1020. way unique to the HSDir flag. Of all the flags, only HSDirs need a
  1021. DirPort configured in order for the authorities to assign that
  1022. particular flag. Patch by "teor". Fixed as part of 14882; bugfix
  1023. on 0.2.6.3-alpha.
  1024. o Minor bugfixes (Ed25519):
  1025. - Fix a memory leak when reading router descriptors with expired
  1026. Ed25519 certificates. Fixes bug 16539; bugfix on 0.2.7.2-alpha.
  1027. o Minor bugfixes (linux seccomp2 sandbox):
  1028. - Allow bridge authorities to run correctly under the seccomp2
  1029. sandbox. Fixes bug 16964; bugfix on 0.2.5.1-alpha.
  1030. - Allow routers with ed25519 keys to run correctly under the
  1031. seccomp2 sandbox. Fixes bug 16965; bugfix on 0.2.7.2-alpha.
  1032. o Minor bugfixes (open file limit):
  1033. - Fix set_max_file_descriptors() to set by default the max open file
  1034. limit to the current limit when setrlimit() fails. Fixes bug
  1035. 16274; bugfix on 0.2.0.10-alpha. Patch by dgoulet.
  1036. o Minor bugfixes (portability):
  1037. - Try harder to normalize the exit status of the Tor process to the
  1038. standard-provided range. Fixes bug 16975; bugfix on every version
  1039. of Tor ever.
  1040. - Check correctly for Windows socket errors in the workqueue
  1041. backend. Fixes bug 16741; bugfix on 0.2.6.3-alpha.
  1042. - Fix the behavior of crypto_rand_time_range() when told to consider
  1043. times before 1970. (These times were possible when running in a
  1044. simulated network environment where time()'s output starts at
  1045. zero.) Fixes bug 16980; bugfix on 0.2.7.1-alpha.
  1046. - Restore correct operation of TLS client-cipher detection on
  1047. OpenSSL 1.1. Fixes bug 14047; bugfix on 0.2.7.2-alpha.
  1048. o Minor bugfixes (relay):
  1049. - Ensure that worker threads actually exit when a fatal error or
  1050. shutdown is indicated. This fix doesn't currently affect the
  1051. behavior of Tor, because Tor workers never indicates fatal error
  1052. or shutdown except in the unit tests. Fixes bug 16868; bugfix
  1053. on 0.2.6.3-alpha.
  1054. - Unblock threads before releasing the work queue mutex to ensure
  1055. predictable scheduling behavior. Fixes bug 16644; bugfix
  1056. on 0.2.6.3-alpha.
  1057. o Code simplification and refactoring:
  1058. - Change the function that's called when we need to retry all
  1059. downloads so that it only reschedules the downloads to happen
  1060. immediately, rather than launching them all at once itself. This
  1061. further simplifies Tor's callgraph.
  1062. - Move some format-parsing functions out of crypto.c and
  1063. crypto_curve25519.c into crypto_format.c and/or util_format.c.
  1064. - Move the client-only parts of init_keys() into a separate
  1065. function. Closes ticket 16763.
  1066. - Simplify the microdesc_free() implementation so that it no longer
  1067. appears (to code analysis tools) to potentially invoke a huge
  1068. suite of other microdesc functions.
  1069. - Simply the control graph further by deferring the inner body of
  1070. directory_all_unreachable() into a callback. Closes ticket 16762.
  1071. - Treat the loss of an owning controller as equivalent to a SIGTERM
  1072. signal. This removes a tiny amount of duplicated code, and
  1073. simplifies our callgraph. Closes ticket 16788.
  1074. - When generating an event to send to the controller, we no longer
  1075. put the event over the network immediately. Instead, we queue
  1076. these events, and use a Libevent callback to deliver them. This
  1077. change simplifies Tor's callgraph by reducing the number of
  1078. functions from which all other Tor functions are reachable. Closes
  1079. ticket 16695.
  1080. - Wrap Windows-only C files inside '#ifdef _WIN32' so that tools
  1081. that try to scan or compile every file on Unix won't decide that
  1082. they are broken.
  1083. - Remove the unused "nulterminate" argument from buf_pullup().
  1084. o Documentation:
  1085. - Recommend a 40 GB example AccountingMax in torrc.sample rather
  1086. than a 4 GB max. Closes ticket 16742.
  1087. - Include the TUNING document in our source tarball. It is referred
  1088. to in the ChangeLog and an error message. Fixes bug 16929; bugfix
  1089. on 0.2.6.1-alpha.
  1090. o Removed code:
  1091. - The internal pure-C tor-fw-helper tool is now removed from the Tor
  1092. distribution, in favor of the pure-Go clone available from
  1093. https://gitweb.torproject.org/tor-fw-helper.git/ . The libraries
  1094. used by the C tor-fw-helper are not, in our opinion, very
  1095. confidence- inspiring in their secure-programming techniques.
  1096. Closes ticket 13338.
  1097. - Remove the code that would try to aggressively flush controller
  1098. connections while writing to them. This code was introduced in
  1099. 0.1.2.7-alpha, in order to keep output buffers from exceeding
  1100. their limits. But there is no longer a maximum output buffer size,
  1101. and flushing data in this way caused some undesirable recursions
  1102. in our call graph. Closes ticket 16480.
  1103. o Testing:
  1104. - Make "bridges+hs" the default test network. This tests almost all
  1105. tor functionality during make test-network, while allowing tests
  1106. to succeed on non-IPv6 systems. Requires chutney commit 396da92 in
  1107. test-network-bridges-hs. Closes tickets 16945 (tor) and 16946
  1108. (chutney). Patches by "teor".
  1109. - Autodetect CHUTNEY_PATH if the chutney and Tor sources are side-
  1110. by-side in the same parent directory. Closes ticket 16903. Patch
  1111. by "teor".
  1112. - Use environment variables rather than autoconf substitutions to
  1113. send variables from the build system to the test scripts. This
  1114. change should be easier to maintain, and cause 'make distcheck' to
  1115. work better than before. Fixes bug 17148.
  1116. - Add a new set of callgraph analysis scripts that use clang to
  1117. produce a list of which Tor functions are reachable from which
  1118. other Tor functions. We're planning to use these to help simplify
  1119. our code structure by identifying illogical dependencies.
  1120. - Add new 'test-full' and 'test-full-online' targets to run all
  1121. tests, including integration tests with stem and chutney.
  1122. - Make the test-workqueue test work on Windows by initializing the
  1123. network before we begin.
  1124. - New make target (make test-network-all) to run multiple applicable
  1125. chutney test cases. Patch from Teor; closes 16953.
  1126. - Unit test dns_resolve(), dns_clip_ttl() and dns_get_expiry_ttl()
  1127. functions in dns.c. Implements a portion of ticket 16831.
  1128. - When building Tor with testing coverage enabled, run Chutney tests
  1129. (if any) using the 'tor-cov' coverage binary.
  1130. - When running test-network or test-stem, check for the absence of
  1131. stem/chutney before doing any build operations.
  1132. Changes in version 0.2.7.2-alpha - 2015-07-27
  1133. This, the second alpha in the Tor 0.2.7 series, has a number of new
  1134. features, including a way to manually pick the number of introduction
  1135. points for hidden services, and the much stronger Ed25519 signing key
  1136. algorithm for regular Tor relays (including support for encrypted
  1137. offline identity keys in the new algorithm).
  1138. Support for Ed25519 on relays is currently limited to signing router
  1139. descriptors; later alphas in this series will extend Ed25519 key
  1140. support to more parts of the Tor protocol.
  1141. o Major features (Ed25519 identity keys, Proposal 220):
  1142. - All relays now maintain a stronger identity key, using the Ed25519
  1143. elliptic curve signature format. This master key is designed so
  1144. that it can be kept offline. Relays also generate an online
  1145. signing key, and a set of other Ed25519 keys and certificates.
  1146. These are all automatically regenerated and rotated as needed.
  1147. Implements part of ticket 12498.
  1148. - Directory authorities now vote on Ed25519 identity keys along with
  1149. RSA1024 keys. Implements part of ticket 12498.
  1150. - Directory authorities track which Ed25519 identity keys have been
  1151. used with which RSA1024 identity keys, and do not allow them to
  1152. vary freely. Implements part of ticket 12498.
  1153. - Microdescriptors now include Ed25519 identity keys. Implements
  1154. part of ticket 12498.
  1155. - Add support for offline encrypted Ed25519 master keys. To use this
  1156. feature on your tor relay, run "tor --keygen" to make a new master
  1157. key (or to make a new signing key if you already have a master
  1158. key). Closes ticket 13642.
  1159. o Major features (Hidden services):
  1160. - Add the torrc option HiddenServiceNumIntroductionPoints, to
  1161. specify a fixed number of introduction points. Its maximum value
  1162. is 10 and default is 3. Using this option can increase a hidden
  1163. service's reliability under load, at the cost of making it more
  1164. visible that the hidden service is facing extra load. Closes
  1165. ticket 4862.
  1166. - Remove the adaptive algorithm for choosing the number of
  1167. introduction points, which used to change the number of
  1168. introduction points (poorly) depending on the number of
  1169. connections the HS sees. Closes ticket 4862.
  1170. o Major features (onion key cross-certification):
  1171. - Relay descriptors now include signatures of their own identity
  1172. keys, made using the TAP and ntor onion keys. These signatures
  1173. allow relays to prove ownership of their own onion keys. Because
  1174. of this change, microdescriptors will no longer need to include
  1175. RSA identity keys. Implements proposal 228; closes ticket 12499.
  1176. o Major features (performance):
  1177. - Improve the runtime speed of Ed25519 operations by using the
  1178. public-domain Ed25519-donna by Andrew M. ("floodyberry").
  1179. Implements ticket 16467.
  1180. - Improve the runtime speed of the ntor handshake by using an
  1181. optimized curve25519 basepoint scalarmult implementation from the
  1182. public-domain Ed25519-donna by Andrew M. ("floodyberry"), based on
  1183. ideas by Adam Langley. Implements ticket 9663.
  1184. o Major bugfixes (client-side privacy, also in 0.2.6.9):
  1185. - Properly separate out each SOCKSPort when applying stream
  1186. isolation. The error occurred because each port's session group
  1187. was being overwritten by a default value when the listener
  1188. connection was initialized. Fixes bug 16247; bugfix on
  1189. 0.2.6.3-alpha. Patch by "jojelino".
  1190. o Major bugfixes (hidden service clients, stability, also in 0.2.6.10):
  1191. - Stop refusing to store updated hidden service descriptors on a
  1192. client. This reverts commit 9407040c59218 (which indeed fixed bug
  1193. 14219, but introduced a major hidden service reachability
  1194. regression detailed in bug 16381). This is a temporary fix since
  1195. we can live with the minor issue in bug 14219 (it just results in
  1196. some load on the network) but the regression of 16381 is too much
  1197. of a setback. First-round fix for bug 16381; bugfix
  1198. on 0.2.6.3-alpha.
  1199. o Major bugfixes (hidden services):
  1200. - When cannibalizing a circuit for an introduction point, always
  1201. extend to the chosen exit node (creating a 4 hop circuit).
  1202. Previously Tor would use the current circuit exit node, which
  1203. changed the original choice of introduction point, and could cause
  1204. the hidden service to skip excluded introduction points or
  1205. reconnect to a skipped introduction point. Fixes bug 16260; bugfix
  1206. on 0.1.0.1-rc.
  1207. o Major bugfixes (open file limit):
  1208. - The open file limit wasn't checked before calling
  1209. tor_accept_socket_nonblocking(), which would make Tor exceed the
  1210. limit. Now, before opening a new socket, Tor validates the open
  1211. file limit just before, and if the max has been reached, return an
  1212. error. Fixes bug 16288; bugfix on 0.1.1.1-alpha.
  1213. o Major bugfixes (stability, also in 0.2.6.10):
  1214. - Stop crashing with an assertion failure when parsing certain kinds
  1215. of malformed or truncated microdescriptors. Fixes bug 16400;
  1216. bugfix on 0.2.6.1-alpha. Found by "torkeln"; fix based on a patch
  1217. by "cypherpunks_backup".
  1218. - Stop random client-side assertion failures that could occur when
  1219. connecting to a busy hidden service, or connecting to a hidden
  1220. service while a NEWNYM is in progress. Fixes bug 16013; bugfix
  1221. on 0.1.0.1-rc.
  1222. o Minor features (directory authorities, security, also in 0.2.6.9):
  1223. - The HSDir flag given by authorities now requires the Stable flag.
  1224. For the current network, this results in going from 2887 to 2806
  1225. HSDirs. Also, it makes it harder for an attacker to launch a sybil
  1226. attack by raising the effort for a relay to become Stable to
  1227. require at the very least 7 days, while maintaining the 96 hours
  1228. uptime requirement for HSDir. Implements ticket 8243.
  1229. o Minor features (client):
  1230. - Relax the validation of hostnames in SOCKS5 requests, allowing the
  1231. character '_' to appear, in order to cope with domains observed in
  1232. the wild that are serving non-RFC compliant records. Resolves
  1233. ticket 16430.
  1234. - Relax the validation done to hostnames in SOCKS5 requests, and
  1235. allow a single trailing '.' to cope with clients that pass FQDNs
  1236. using that syntax to explicitly indicate that the domain name is
  1237. fully-qualified. Fixes bug 16674; bugfix on 0.2.6.2-alpha.
  1238. - Add GroupWritable and WorldWritable options to unix-socket based
  1239. SocksPort and ControlPort options. These options apply to a single
  1240. socket, and override {Control,Socks}SocketsGroupWritable. Closes
  1241. ticket 15220.
  1242. o Minor features (control protocol):
  1243. - Support network-liveness GETINFO key and NETWORK_LIVENESS event in
  1244. the control protocol. Resolves ticket 15358.
  1245. o Minor features (directory authorities):
  1246. - Directory authorities no longer vote against the "Fast", "Stable",
  1247. and "HSDir" flags just because they were going to vote against
  1248. "Running": if the consensus turns out to be that the router was
  1249. running, then the authority's vote should count. Patch from Peter
  1250. Retzlaff; closes issue 8712.
  1251. o Minor features (geoip, also in 0.2.6.10):
  1252. - Update geoip to the June 3 2015 Maxmind GeoLite2 Country database.
  1253. - Update geoip6 to the June 3 2015 Maxmind GeoLite2 Country database.
  1254. o Minor features (hidden services):
  1255. - Add the new options "HiddenServiceMaxStreams" and
  1256. "HiddenServiceMaxStreamsCloseCircuit" to allow hidden services to
  1257. limit the maximum number of simultaneous streams per circuit, and
  1258. optionally tear down the circuit when the limit is exceeded. Part
  1259. of ticket 16052.
  1260. o Minor features (portability):
  1261. - Use C99 variadic macros when the compiler is not GCC. This avoids
  1262. failing compilations on MSVC, and fixes a log-file-based race
  1263. condition in our old workarounds. Original patch from Gisle Vanem.
  1264. o Minor bugfixes (compilation, also in 0.2.6.9):
  1265. - Build with --enable-systemd correctly when libsystemd is
  1266. installed, but systemd is not. Fixes bug 16164; bugfix on
  1267. 0.2.6.3-alpha. Patch from Peter Palfrader.
  1268. o Minor bugfixes (controller):
  1269. - Add the descriptor ID in each HS_DESC control event. It was
  1270. missing, but specified in control-spec.txt. Fixes bug 15881;
  1271. bugfix on 0.2.5.2-alpha.
  1272. o Minor bugfixes (crypto error-handling, also in 0.2.6.10):
  1273. - Check for failures from crypto_early_init, and refuse to continue.
  1274. A previous typo meant that we could keep going with an
  1275. uninitialized crypto library, and would have OpenSSL initialize
  1276. its own PRNG. Fixes bug 16360; bugfix on 0.2.5.2-alpha, introduced
  1277. when implementing ticket 4900. Patch by "teor".
  1278. o Minor bugfixes (hidden services):
  1279. - Fix a crash when reloading configuration while at least one
  1280. configured and one ephemeral hidden service exists. Fixes bug
  1281. 16060; bugfix on 0.2.7.1-alpha.
  1282. - Avoid crashing with a double-free bug when we create an ephemeral
  1283. hidden service but adding it fails for some reason. Fixes bug
  1284. 16228; bugfix on 0.2.7.1-alpha.
  1285. o Minor bugfixes (Linux seccomp2 sandbox):
  1286. - Use the sandbox in tor_open_cloexec whether or not O_CLOEXEC is
  1287. defined. Patch by "teor". Fixes bug 16515; bugfix on 0.2.3.1-alpha.
  1288. o Minor bugfixes (Linux seccomp2 sandbox, also in 0.2.6.10):
  1289. - Allow pipe() and pipe2() syscalls in the seccomp2 sandbox: we need
  1290. these when eventfd2() support is missing. Fixes bug 16363; bugfix
  1291. on 0.2.6.3-alpha. Patch from "teor".
  1292. o Minor bugfixes (Linux seccomp2 sandbox, also in 0.2.6.9):
  1293. - Fix sandboxing to work when running as a relay, by allowing the
  1294. renaming of secret_id_key, and allowing the eventfd2 and futex
  1295. syscalls. Fixes bug 16244; bugfix on 0.2.6.1-alpha. Patch by
  1296. Peter Palfrader.
  1297. - Allow systemd connections to work with the Linux seccomp2 sandbox
  1298. code. Fixes bug 16212; bugfix on 0.2.6.2-alpha. Patch by
  1299. Peter Palfrader.
  1300. o Minor bugfixes (relay):
  1301. - Fix a rarely-encountered memory leak when failing to initialize
  1302. the thread pool. Fixes bug 16631; bugfix on 0.2.6.3-alpha. Patch
  1303. from "cypherpunks".
  1304. o Minor bugfixes (systemd):
  1305. - Fix an accidental formatting error that broke the systemd
  1306. configuration file. Fixes bug 16152; bugfix on 0.2.7.1-alpha.
  1307. - Tor's systemd unit file no longer contains extraneous spaces.
  1308. These spaces would sometimes confuse tools like deb-systemd-
  1309. helper. Fixes bug 16162; bugfix on 0.2.5.5-alpha.
  1310. o Minor bugfixes (tests):
  1311. - Use the configured Python executable when running test-stem-full.
  1312. Fixes bug 16470; bugfix on 0.2.7.1-alpha.
  1313. o Minor bugfixes (tests, also in 0.2.6.9):
  1314. - Fix a crash in the unit tests when built with MSVC2013. Fixes bug
  1315. 16030; bugfix on 0.2.6.2-alpha. Patch from "NewEraCracker".
  1316. o Minor bugfixes (threads, comments):
  1317. - Always initialize return value in compute_desc_id in rendcommon.c
  1318. Patch by "teor". Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1319. - Check for NULL values in getinfo_helper_onions(). Patch by "teor".
  1320. Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1321. - Remove undefined directive-in-macro in test_util_writepid clang
  1322. 3.7 complains that using a preprocessor directive inside a macro
  1323. invocation in test_util_writepid in test_util.c is undefined.
  1324. Patch by "teor". Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1325. o Code simplification and refactoring:
  1326. - Define WINVER and _WIN32_WINNT centrally, in orconfig.h, in order
  1327. to ensure they remain consistent and visible everywhere.
  1328. - Remove some vestigial workarounds for the MSVC6 compiler. We
  1329. haven't supported that in ages.
  1330. - The link authentication code has been refactored for better
  1331. testability and reliability. It now uses code generated with the
  1332. "trunnel" binary encoding generator, to reduce the risk of bugs
  1333. due to programmer error. Done as part of ticket 12498.
  1334. o Documentation:
  1335. - Include a specific and (hopefully) accurate documentation of the
  1336. torrc file's meta-format in doc/torrc_format.txt. This is mainly
  1337. of interest to people writing programs to parse or generate torrc
  1338. files. This document is not a commitment to long-term
  1339. compatibility; some aspects of the current format are a bit
  1340. ridiculous. Closes ticket 2325.
  1341. o Removed features:
  1342. - Tor no longer supports copies of OpenSSL that are missing support
  1343. for Elliptic Curve Cryptography. (We began using ECC when
  1344. available in 0.2.4.8-alpha, for more safe and efficient key
  1345. negotiation.) In particular, support for at least one of P256 or
  1346. P224 is now required, with manual configuration needed if only
  1347. P224 is available. Resolves ticket 16140.
  1348. - Tor no longer supports versions of OpenSSL before 1.0. (If you are
  1349. on an operating system that has not upgraded to OpenSSL 1.0 or
  1350. later, and you compile Tor from source, you will need to install a
  1351. more recent OpenSSL to link Tor against.) These versions of
  1352. OpenSSL are still supported by the OpenSSL, but the numerous
  1353. cryptographic improvements in later OpenSSL releases makes them a
  1354. clear choice. Resolves ticket 16034.
  1355. - Remove the HidServDirectoryV2 option. Now all relays offer to
  1356. store hidden service descriptors. Related to 16543.
  1357. - Remove the VoteOnHidServDirectoriesV2 option, since all
  1358. authorities have long set it to 1. Closes ticket 16543.
  1359. o Testing:
  1360. - Document use of coverity, clang static analyzer, and clang dynamic
  1361. undefined behavior and address sanitizers in doc/HACKING. Include
  1362. detailed usage instructions in the blacklist. Patch by "teor".
  1363. Closes ticket 15817.
  1364. - The link authentication protocol code now has extensive tests.
  1365. - The relay descriptor signature testing code now has
  1366. extensive tests.
  1367. - The test_workqueue program now runs faster, and is enabled by
  1368. default as a part of "make check".
  1369. - Now that OpenSSL has its own scrypt implementation, add an unit
  1370. test that checks for interoperability between libscrypt_scrypt()
  1371. and OpenSSL's EVP_PBE_scrypt() so that we could not use libscrypt
  1372. and rely on EVP_PBE_scrypt() whenever possible. Resolves
  1373. ticket 16189.
  1374. Changes in version 0.2.6.10 - 2015-07-12
  1375. Tor version 0.2.6.10 fixes some significant stability and hidden
  1376. service client bugs, bulletproofs the cryptography init process, and
  1377. fixes a bug when using the sandbox code with some older versions of
  1378. Linux. Everyone running an older version, especially an older version
  1379. of 0.2.6, should upgrade.
  1380. o Major bugfixes (hidden service clients, stability):
  1381. - Stop refusing to store updated hidden service descriptors on a
  1382. client. This reverts commit 9407040c59218 (which indeed fixed bug
  1383. 14219, but introduced a major hidden service reachability
  1384. regression detailed in bug 16381). This is a temporary fix since
  1385. we can live with the minor issue in bug 14219 (it just results in
  1386. some load on the network) but the regression of 16381 is too much
  1387. of a setback. First-round fix for bug 16381; bugfix
  1388. on 0.2.6.3-alpha.
  1389. o Major bugfixes (stability):
  1390. - Stop crashing with an assertion failure when parsing certain kinds
  1391. of malformed or truncated microdescriptors. Fixes bug 16400;
  1392. bugfix on 0.2.6.1-alpha. Found by "torkeln"; fix based on a patch
  1393. by "cypherpunks_backup".
  1394. - Stop random client-side assertion failures that could occur when
  1395. connecting to a busy hidden service, or connecting to a hidden
  1396. service while a NEWNYM is in progress. Fixes bug 16013; bugfix
  1397. on 0.1.0.1-rc.
  1398. o Minor features (geoip):
  1399. - Update geoip to the June 3 2015 Maxmind GeoLite2 Country database.
  1400. - Update geoip6 to the June 3 2015 Maxmind GeoLite2 Country database.
  1401. o Minor bugfixes (crypto error-handling):
  1402. - Check for failures from crypto_early_init, and refuse to continue.
  1403. A previous typo meant that we could keep going with an
  1404. uninitialized crypto library, and would have OpenSSL initialize
  1405. its own PRNG. Fixes bug 16360; bugfix on 0.2.5.2-alpha, introduced
  1406. when implementing ticket 4900. Patch by "teor".
  1407. o Minor bugfixes (Linux seccomp2 sandbox):
  1408. - Allow pipe() and pipe2() syscalls in the seccomp2 sandbox: we need
  1409. these when eventfd2() support is missing. Fixes bug 16363; bugfix
  1410. on 0.2.6.3-alpha. Patch from "teor".
  1411. Changes in version 0.2.6.9 - 2015-06-11
  1412. Tor 0.2.6.9 fixes a regression in the circuit isolation code, increases the
  1413. requirements for receiving an HSDir flag, and addresses some other small
  1414. bugs in the systemd and sandbox code. Clients using circuit isolation
  1415. should upgrade; all directory authorities should upgrade.
  1416. o Major bugfixes (client-side privacy):
  1417. - Properly separate out each SOCKSPort when applying stream
  1418. isolation. The error occurred because each port's session group was
  1419. being overwritten by a default value when the listener connection
  1420. was initialized. Fixes bug 16247; bugfix on 0.2.6.3-alpha. Patch
  1421. by "jojelino".
  1422. o Minor feature (directory authorities, security):
  1423. - The HSDir flag given by authorities now requires the Stable flag.
  1424. For the current network, this results in going from 2887 to 2806
  1425. HSDirs. Also, it makes it harder for an attacker to launch a sybil
  1426. attack by raising the effort for a relay to become Stable which
  1427. takes at the very least 7 days to do so and by keeping the 96
  1428. hours uptime requirement for HSDir. Implements ticket 8243.
  1429. o Minor bugfixes (compilation):
  1430. - Build with --enable-systemd correctly when libsystemd is
  1431. installed, but systemd is not. Fixes bug 16164; bugfix on
  1432. 0.2.6.3-alpha. Patch from Peter Palfrader.
  1433. o Minor bugfixes (Linux seccomp2 sandbox):
  1434. - Fix sandboxing to work when running as a relaymby renaming of
  1435. secret_id_key, and allowing the eventfd2 and futex syscalls. Fixes
  1436. bug 16244; bugfix on 0.2.6.1-alpha. Patch by Peter Palfrader.
  1437. - Allow systemd connections to work with the Linux seccomp2 sandbox
  1438. code. Fixes bug 16212; bugfix on 0.2.6.2-alpha. Patch by
  1439. Peter Palfrader.
  1440. o Minor bugfixes (tests):
  1441. - Fix a crash in the unit tests when built with MSVC2013. Fixes bug
  1442. 16030; bugfix on 0.2.6.2-alpha. Patch from "NewEraCracker".
  1443. Changes in version 0.2.6.8 - 2015-05-21
  1444. Tor 0.2.6.8 fixes a bit of dodgy code in parsing INTRODUCE2 cells, and
  1445. fixes an authority-side bug in assigning the HSDir flag. All directory
  1446. authorities should upgrade.
  1447. o Major bugfixes (hidden services, backport from 0.2.7.1-alpha):
  1448. - Revert commit that made directory authorities assign the HSDir
  1449. flag to relay without a DirPort; this was bad because such relays
  1450. can't handle BEGIN_DIR cells. Fixes bug 15850; bugfix
  1451. on 0.2.6.3-alpha.
  1452. o Minor bugfixes (hidden service, backport from 0.2.7.1-alpha):
  1453. - Fix an out-of-bounds read when parsing invalid INTRODUCE2 cells on
  1454. a client authorized hidden service. Fixes bug 15823; bugfix
  1455. on 0.2.1.6-alpha.
  1456. o Minor features (geoip):
  1457. - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
  1458. - Update geoip6 to the April 8 2015 Maxmind GeoLite2
  1459. Country database.
  1460. Changes in version 0.2.7.1-alpha - 2015-05-12
  1461. Tor 0.2.7.1-alpha is the first alpha release in its series. It
  1462. includes numerous small features and bugfixes against previous Tor
  1463. versions, and numerous small infrastructure improvements. The most
  1464. notable features are several new ways for controllers to interact with
  1465. the hidden services subsystem.
  1466. o New system requirements:
  1467. - Tor no longer includes workarounds to support Libevent versions
  1468. before 1.3e. Libevent 2.0 or later is recommended. Closes
  1469. ticket 15248.
  1470. o Major features (controller):
  1471. - Add the ADD_ONION and DEL_ONION commands that allow the creation
  1472. and management of hidden services via the controller. Closes
  1473. ticket 6411.
  1474. - New "GETINFO onions/current" and "GETINFO onions/detached"
  1475. commands to get information about hidden services created via the
  1476. controller. Part of ticket 6411.
  1477. - New HSFETCH command to launch a request for a hidden service
  1478. descriptor. Closes ticket 14847.
  1479. - New HSPOST command to upload a hidden service descriptor. Closes
  1480. ticket 3523. Patch by "DonnchaC".
  1481. o Major bugfixes (hidden services):
  1482. - Revert commit that made directory authorities assign the HSDir
  1483. flag to relay without a DirPort; this was bad because such relays
  1484. can't handle BEGIN_DIR cells. Fixes bug 15850; bugfix
  1485. on 0.2.6.3-alpha.
  1486. o Minor features (clock-jump tolerance):
  1487. - Recover better when our clock jumps back many hours, like might
  1488. happen for Tails or Whonix users who start with a very wrong
  1489. hardware clock, use Tor to discover a more accurate time, and then
  1490. fix their clock. Resolves part of ticket 8766.
  1491. o Minor features (command-line interface):
  1492. - Make --hash-password imply --hush to prevent unnecessary noise.
  1493. Closes ticket 15542. Patch from "cypherpunks".
  1494. - Print a warning whenever we find a relative file path being used
  1495. as torrc option. Resolves issue 14018.
  1496. o Minor features (controller):
  1497. - Add DirAuthority lines for default directory authorities to the
  1498. output of the "GETINFO config/defaults" command if not already
  1499. present. Implements ticket 14840.
  1500. - Controllers can now use "GETINFO hs/client/desc/id/..." to
  1501. retrieve items from the client's hidden service descriptor cache.
  1502. Closes ticket 14845.
  1503. - Implement a new controller command "GETINFO status/fresh-relay-
  1504. descs" to fetch a descriptor/extrainfo pair that was generated on
  1505. demand just for the controller's use. Implements ticket 14784.
  1506. o Minor features (DoS-resistance):
  1507. - Make it harder for attackers to overload hidden services with
  1508. introductions, by blocking multiple introduction requests on the
  1509. same circuit. Resolves ticket 15515.
  1510. o Minor features (geoip):
  1511. - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
  1512. - Update geoip6 to the April 8 2015 Maxmind GeoLite2
  1513. Country database.
  1514. o Minor features (HS popularity countermeasure):
  1515. - To avoid leaking HS popularity, don't cycle the introduction point
  1516. when we've handled a fixed number of INTRODUCE2 cells but instead
  1517. cycle it when a random number of introductions is reached, thus
  1518. making it more difficult for an attacker to find out the amount of
  1519. clients that have used the introduction point for a specific HS.
  1520. Closes ticket 15745.
  1521. o Minor features (logging):
  1522. - Include the Tor version in all LD_BUG log messages, since people
  1523. tend to cut and paste those into the bugtracker. Implements
  1524. ticket 15026.
  1525. o Minor features (pluggable transports):
  1526. - When launching managed pluggable transports on Linux systems,
  1527. attempt to have the kernel deliver a SIGTERM on tor exit if the
  1528. pluggable transport process is still running. Resolves
  1529. ticket 15471.
  1530. - When launching managed pluggable transports, setup a valid open
  1531. stdin in the child process that can be used to detect if tor has
  1532. terminated. The "TOR_PT_EXIT_ON_STDIN_CLOSE" environment variable
  1533. can be used by implementations to detect this new behavior.
  1534. Resolves ticket 15435.
  1535. o Minor features (testing):
  1536. - Add a test to verify that the compiler does not eliminate our
  1537. memwipe() implementation. Closes ticket 15377.
  1538. - Add make rule `check-changes` to verify the format of changes
  1539. files. Closes ticket 15180.
  1540. - Add unit tests for control_event_is_interesting(). Add a compile-
  1541. time check that the number of events doesn't exceed the capacity
  1542. of control_event_t.event_mask. Closes ticket 15431, checks for
  1543. bugs similar to 13085. Patch by "teor".
  1544. - Command-line argument tests moved to Stem. Resolves ticket 14806.
  1545. - Integrate the ntor, backtrace, and zero-length keys tests into the
  1546. automake test suite. Closes ticket 15344.
  1547. - Remove assertions during builds to determine Tor's test coverage.
  1548. We don't want to trigger these even in assertions, so including
  1549. them artificially makes our branch coverage look worse than it is.
  1550. This patch provides the new test-stem-full and coverage-html-full
  1551. configure options. Implements ticket 15400.
  1552. o Minor bugfixes (build):
  1553. - Improve out-of-tree builds by making non-standard rules work and
  1554. clean up additional files and directories. Fixes bug 15053; bugfix
  1555. on 0.2.7.0-alpha.
  1556. o Minor bugfixes (command-line interface):
  1557. - When "--quiet" is provided along with "--validate-config", do not
  1558. write anything to stdout on success. Fixes bug 14994; bugfix
  1559. on 0.2.3.3-alpha.
  1560. - When complaining about bad arguments to "--dump-config", use
  1561. stderr, not stdout.
  1562. o Minor bugfixes (configuration, unit tests):
  1563. - Only add the default fallback directories when the DirAuthorities,
  1564. AlternateDirAuthority, and FallbackDir directory config options
  1565. are set to their defaults. The default fallback directory list is
  1566. currently empty, this fix will only change tor's behavior when it
  1567. has default fallback directories. Includes unit tests for
  1568. consider_adding_dir_servers(). Fixes bug 15642; bugfix on
  1569. 90f6071d8dc0 in 0.2.4.7-alpha. Patch by "teor".
  1570. o Minor bugfixes (correctness):
  1571. - For correctness, avoid modifying a constant string in
  1572. handle_control_postdescriptor. Fixes bug 15546; bugfix
  1573. on 0.1.1.16-rc.
  1574. - Remove side-effects from tor_assert() calls. This was harmless,
  1575. because we never disable assertions, but it is bad style and
  1576. unnecessary. Fixes bug 15211; bugfix on 0.2.5.5, 0.2.2.36,
  1577. and 0.2.0.10.
  1578. o Minor bugfixes (hidden service):
  1579. - Fix an out-of-bounds read when parsing invalid INTRODUCE2 cells on
  1580. a client authorized hidden service. Fixes bug 15823; bugfix
  1581. on 0.2.1.6-alpha.
  1582. - Remove an extraneous newline character from the end of hidden
  1583. service descriptors. Fixes bug 15296; bugfix on 0.2.0.10-alpha.
  1584. o Minor bugfixes (interface):
  1585. - Print usage information for --dump-config when it is used without
  1586. an argument. Also, fix the error message to use different wording
  1587. and add newline at the end. Fixes bug 15541; bugfix
  1588. on 0.2.5.1-alpha.
  1589. o Minor bugfixes (logs):
  1590. - When building Tor under Clang, do not include an extra set of
  1591. parentheses in log messages that include function names. Fixes bug
  1592. 15269; bugfix on every released version of Tor when compiled with
  1593. recent enough Clang.
  1594. o Minor bugfixes (network):
  1595. - When attempting to use fallback technique for network interface
  1596. lookup, disregard loopback and multicast addresses since they are
  1597. unsuitable for public communications.
  1598. o Minor bugfixes (statistics):
  1599. - Disregard the ConnDirectionStatistics torrc options when Tor is
  1600. not a relay since in that mode of operation no sensible data is
  1601. being collected and because Tor might run into measurement hiccups
  1602. when running as a client for some time, then becoming a relay.
  1603. Fixes bug 15604; bugfix on 0.2.2.35.
  1604. o Minor bugfixes (test networks):
  1605. - When self-testing reachability, use ExtendAllowPrivateAddresses to
  1606. determine if local/private addresses imply reachability. The
  1607. previous fix used TestingTorNetwork, which implies
  1608. ExtendAllowPrivateAddresses, but this excluded rare configurations
  1609. where ExtendAllowPrivateAddresses is set but TestingTorNetwork is
  1610. not. Fixes bug 15771; bugfix on 0.2.6.1-alpha. Patch by "teor",
  1611. issue discovered by CJ Ess.
  1612. o Minor bugfixes (testing):
  1613. - Check for matching value in server response in ntor_ref.py. Fixes
  1614. bug 15591; bugfix on 0.2.4.8-alpha. Reported and fixed
  1615. by "joelanders".
  1616. - Set the severity correctly when testing
  1617. get_interface_addresses_ifaddrs() and
  1618. get_interface_addresses_win32(), so that the tests fail gracefully
  1619. instead of triggering an assertion. Fixes bug 15759; bugfix on
  1620. 0.2.6.3-alpha. Reported by Nicolas Derive.
  1621. o Code simplification and refactoring:
  1622. - Move the hacky fallback code out of get_interface_address6() into
  1623. separate function and get it covered with unit-tests. Resolves
  1624. ticket 14710.
  1625. - Refactor hidden service client-side cache lookup to intelligently
  1626. report its various failure cases, and disentangle failure cases
  1627. involving a lack of introduction points. Closes ticket 14391.
  1628. - Use our own Base64 encoder instead of OpenSSL's, to allow more
  1629. control over the output. Part of ticket 15652.
  1630. o Documentation:
  1631. - Improve the descriptions of statistics-related torrc options in
  1632. the manpage to describe rationale and possible uses cases. Fixes
  1633. issue 15550.
  1634. - Improve the layout and formatting of ./configure --help messages.
  1635. Closes ticket 15024. Patch from "cypherpunks".
  1636. - Standardize on the term "server descriptor" in the manual page.
  1637. Previously, we had used "router descriptor", "server descriptor",
  1638. and "relay descriptor" interchangeably. Part of ticket 14987.
  1639. o Removed code:
  1640. - Remove `USE_OPENSSL_BASE64` and the corresponding fallback code
  1641. and always use the internal Base64 decoder. The internal decoder
  1642. has been part of tor since 0.2.0.10-alpha, and no one should
  1643. be using the OpenSSL one. Part of ticket 15652.
  1644. - Remove the 'tor_strclear()' function; use memwipe() instead.
  1645. Closes ticket 14922.
  1646. o Removed features:
  1647. - Remove the (seldom-used) DynamicDHGroups feature. For anti-
  1648. fingerprinting we now recommend pluggable transports; for forward-
  1649. secrecy in TLS, we now use the P-256 group. Closes ticket 13736.
  1650. - Remove the undocumented "--digests" command-line option. It
  1651. complicated our build process, caused subtle build issues on
  1652. multiple platforms, and is now redundant since we started
  1653. including git version identifiers. Closes ticket 14742.
  1654. - Tor no longer contains checks for ancient directory cache versions
  1655. that didn't know about microdescriptors.
  1656. - Tor no longer contains workarounds for stat files generated by
  1657. super-old versions of Tor that didn't choose guards sensibly.
  1658. Changes in version 0.2.4.27 - 2015-04-06
  1659. Tor 0.2.4.27 backports two fixes from 0.2.6.7 for security issues that
  1660. could be used by an attacker to crash hidden services, or crash clients
  1661. visiting hidden services. Hidden services should upgrade as soon as
  1662. possible; clients should upgrade whenever packages become available.
  1663. This release also backports a simple improvement to make hidden
  1664. services a bit less vulnerable to denial-of-service attacks.
  1665. o Major bugfixes (security, hidden service):
  1666. - Fix an issue that would allow a malicious client to trigger an
  1667. assertion failure and halt a hidden service. Fixes bug 15600;
  1668. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1669. - Fix a bug that could cause a client to crash with an assertion
  1670. failure when parsing a malformed hidden service descriptor. Fixes
  1671. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1672. o Minor features (DoS-resistance, hidden service):
  1673. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1674. arrive on the same circuit. This should make it more expensive for
  1675. attackers to overwhelm hidden services with introductions.
  1676. Resolves ticket 15515.
  1677. Changes in version 0.2.5.12 - 2015-04-06
  1678. Tor 0.2.5.12 backports two fixes from 0.2.6.7 for security issues that
  1679. could be used by an attacker to crash hidden services, or crash clients
  1680. visiting hidden services. Hidden services should upgrade as soon as
  1681. possible; clients should upgrade whenever packages become available.
  1682. This release also backports a simple improvement to make hidden
  1683. services a bit less vulnerable to denial-of-service attacks.
  1684. o Major bugfixes (security, hidden service):
  1685. - Fix an issue that would allow a malicious client to trigger an
  1686. assertion failure and halt a hidden service. Fixes bug 15600;
  1687. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1688. - Fix a bug that could cause a client to crash with an assertion
  1689. failure when parsing a malformed hidden service descriptor. Fixes
  1690. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1691. o Minor features (DoS-resistance, hidden service):
  1692. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1693. arrive on the same circuit. This should make it more expensive for
  1694. attackers to overwhelm hidden services with introductions.
  1695. Resolves ticket 15515.
  1696. Changes in version 0.2.6.7 - 2015-04-06
  1697. Tor 0.2.6.7 fixes two security issues that could be used by an
  1698. attacker to crash hidden services, or crash clients visiting hidden
  1699. services. Hidden services should upgrade as soon as possible; clients
  1700. should upgrade whenever packages become available.
  1701. This release also contains two simple improvements to make hidden
  1702. services a bit less vulnerable to denial-of-service attacks.
  1703. o Major bugfixes (security, hidden service):
  1704. - Fix an issue that would allow a malicious client to trigger an
  1705. assertion failure and halt a hidden service. Fixes bug 15600;
  1706. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1707. - Fix a bug that could cause a client to crash with an assertion
  1708. failure when parsing a malformed hidden service descriptor. Fixes
  1709. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1710. o Minor features (DoS-resistance, hidden service):
  1711. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1712. arrive on the same circuit. This should make it more expensive for
  1713. attackers to overwhelm hidden services with introductions.
  1714. Resolves ticket 15515.
  1715. - Decrease the amount of reattempts that a hidden service performs
  1716. when its rendezvous circuits fail. This reduces the computational
  1717. cost for running a hidden service under heavy load. Resolves
  1718. ticket 11447.
  1719. Changes in version 0.2.6.6 - 2015-03-24
  1720. Tor 0.2.6.6 is the first stable release in the 0.2.6 series.
  1721. It adds numerous safety, security, correctness, and performance
  1722. improvements. Client programs can be configured to use more kinds of
  1723. sockets, AutomapHosts works better, the multithreading backend is
  1724. improved, cell transmission is refactored, test coverage is much
  1725. higher, more denial-of-service attacks are handled, guard selection is
  1726. improved to handle long-term guards better, pluggable transports
  1727. should work a bit better, and some annoying hidden service performance
  1728. bugs should be addressed.
  1729. o Minor bugfixes (portability):
  1730. - Use the correct datatype in the SipHash-2-4 function to prevent
  1731. compilers from assuming any sort of alignment. Fixes bug 15436;
  1732. bugfix on 0.2.5.3-alpha.
  1733. Changes in version 0.2.6.5-rc - 2015-03-18
  1734. Tor 0.2.6.5-rc is the second and (hopefully) last release candidate in
  1735. the 0.2.6. It fixes a small number of bugs found in 0.2.6.4-rc.
  1736. o Major bugfixes (client):
  1737. - Avoid crashing when making certain configuration option changes on
  1738. clients. Fixes bug 15245; bugfix on 0.2.6.3-alpha. Reported
  1739. by "anonym".
  1740. o Major bugfixes (pluggable transports):
  1741. - Initialize the extended OR Port authentication cookie before
  1742. launching pluggable transports. This prevents a race condition
  1743. that occured when server-side pluggable transports would cache the
  1744. authentication cookie before it has been (re)generated. Fixes bug
  1745. 15240; bugfix on 0.2.5.1-alpha.
  1746. o Major bugfixes (portability):
  1747. - Do not crash on startup when running on Solaris. Fixes a bug
  1748. related to our fix for 9495; bugfix on 0.2.6.1-alpha. Reported
  1749. by "ruebezahl".
  1750. o Minor features (heartbeat):
  1751. - On relays, report how many connections we negotiated using each
  1752. version of the Tor link protocols. This information will let us
  1753. know if removing support for very old versions of the Tor
  1754. protocols is harming the network. Closes ticket 15212.
  1755. o Code simplification and refactoring:
  1756. - Refactor main loop to extract the 'loop' part. This makes it
  1757. easier to run Tor under Shadow. Closes ticket 15176.
  1758. Changes in version 0.2.5.11 - 2015-03-17
  1759. Tor 0.2.5.11 is the second stable release in the 0.2.5 series.
  1760. It backports several bugfixes from the 0.2.6 branch, including a
  1761. couple of medium-level security fixes for relays and exit nodes.
  1762. It also updates the list of directory authorities.
  1763. o Directory authority changes:
  1764. - Remove turtles as a directory authority.
  1765. - Add longclaw as a new (v3) directory authority. This implements
  1766. ticket 13296. This keeps the directory authority count at 9.
  1767. - The directory authority Faravahar has a new IP address. This
  1768. closes ticket 14487.
  1769. o Major bugfixes (crash, OSX, security):
  1770. - Fix a remote denial-of-service opportunity caused by a bug in
  1771. OSX's _strlcat_chk() function. Fixes bug 15205; bug first appeared
  1772. in OSX 10.9.
  1773. o Major bugfixes (relay, stability, possible security):
  1774. - Fix a bug that could lead to a relay crashing with an assertion
  1775. failure if a buffer of exactly the wrong layout was passed to
  1776. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1777. 0.2.0.10-alpha. Patch from 'cypherpunks'.
  1778. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1779. very end of the buffer; log a BUG message instead. Only assert if
  1780. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1781. o Major bugfixes (exit node stability):
  1782. - Fix an assertion failure that could occur under high DNS load.
  1783. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1784. diagnosed and fixed by "cypherpunks".
  1785. o Major bugfixes (Linux seccomp2 sandbox):
  1786. - Upon receiving sighup with the seccomp2 sandbox enabled, do not
  1787. crash during attempts to call wait4. Fixes bug 15088; bugfix on
  1788. 0.2.5.1-alpha. Patch from "sanic".
  1789. o Minor features (controller):
  1790. - New "GETINFO bw-event-cache" to get information about recent
  1791. bandwidth events. Closes ticket 14128. Useful for controllers to
  1792. get recent bandwidth history after the fix for ticket 13988.
  1793. o Minor features (geoip):
  1794. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1795. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1796. Country database.
  1797. o Minor bugfixes (client, automapping):
  1798. - Avoid crashing on torrc lines for VirtualAddrNetworkIPv[4|6] when
  1799. no value follows the option. Fixes bug 14142; bugfix on
  1800. 0.2.4.7-alpha. Patch by "teor".
  1801. - Fix a memory leak when using AutomapHostsOnResolve. Fixes bug
  1802. 14195; bugfix on 0.1.0.1-rc.
  1803. o Minor bugfixes (compilation):
  1804. - Build without warnings with the stock OpenSSL srtp.h header, which
  1805. has a duplicate declaration of SSL_get_selected_srtp_profile().
  1806. Fixes bug 14220; this is OpenSSL's bug, not ours.
  1807. o Minor bugfixes (directory authority):
  1808. - Allow directory authorities to fetch more data from one another if
  1809. they find themselves missing lots of votes. Previously, they had
  1810. been bumping against the 10 MB queued data limit. Fixes bug 14261;
  1811. bugfix on 0.1.2.5-alpha.
  1812. - Enlarge the buffer to read bwauth generated files to avoid an
  1813. issue when parsing the file in dirserv_read_measured_bandwidths().
  1814. Fixes bug 14125; bugfix on 0.2.2.1-alpha.
  1815. o Minor bugfixes (statistics):
  1816. - Increase period over which bandwidth observations are aggregated
  1817. from 15 minutes to 4 hours. Fixes bug 13988; bugfix on 0.0.8pre1.
  1818. o Minor bugfixes (preventative security, C safety):
  1819. - When reading a hexadecimal, base-32, or base-64 encoded value from
  1820. a string, always overwrite the whole output buffer. This prevents
  1821. some bugs where we would look at (but fortunately, not reveal)
  1822. uninitialized memory on the stack. Fixes bug 14013; bugfix on all
  1823. versions of Tor.
  1824. Changes in version 0.2.4.26 - 2015-03-17
  1825. Tor 0.2.4.26 includes an updated list of directory authorities. It
  1826. also backports a couple of stability and security bugfixes from 0.2.5
  1827. and beyond.
  1828. o Directory authority changes:
  1829. - Remove turtles as a directory authority.
  1830. - Add longclaw as a new (v3) directory authority. This implements
  1831. ticket 13296. This keeps the directory authority count at 9.
  1832. - The directory authority Faravahar has a new IP address. This
  1833. closes ticket 14487.
  1834. o Major bugfixes (exit node stability, also in 0.2.6.3-alpha):
  1835. - Fix an assertion failure that could occur under high DNS load.
  1836. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1837. diagnosed and fixed by "cypherpunks".
  1838. o Major bugfixes (relay, stability, possible security, also in 0.2.6.4-rc):
  1839. - Fix a bug that could lead to a relay crashing with an assertion
  1840. failure if a buffer of exactly the wrong layout was passed to
  1841. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1842. 0.2.0.10-alpha. Patch from 'cypherpunks'.
  1843. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1844. very end of the buffer; log a BUG message instead. Only assert if
  1845. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1846. o Minor features (geoip):
  1847. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1848. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1849. Country database.
  1850. Changes in version 0.2.6.4-rc - 2015-03-09
  1851. Tor 0.2.6.4-alpha fixes an issue in the directory code that an
  1852. attacker might be able to use in order to crash certain Tor
  1853. directories. It also resolves some minor issues left over from, or
  1854. introduced in, Tor 0.2.6.3-alpha or earlier.
  1855. o Major bugfixes (crash, OSX, security):
  1856. - Fix a remote denial-of-service opportunity caused by a bug in
  1857. OSX's _strlcat_chk() function. Fixes bug 15205; bug first appeared
  1858. in OSX 10.9.
  1859. o Major bugfixes (relay, stability, possible security):
  1860. - Fix a bug that could lead to a relay crashing with an assertion
  1861. failure if a buffer of exactly the wrong layout is passed to
  1862. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1863. 0.2.0.10-alpha. Patch from "cypherpunks".
  1864. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1865. very end of the buffer; log a BUG message instead. Only assert if
  1866. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1867. o Major bugfixes (FreeBSD IPFW transparent proxy):
  1868. - Fix address detection with FreeBSD transparent proxies, when
  1869. "TransProxyType ipfw" is in use. Fixes bug 15064; bugfix
  1870. on 0.2.5.4-alpha.
  1871. o Major bugfixes (Linux seccomp2 sandbox):
  1872. - Pass IPPROTO_TCP rather than 0 to socket(), so that the Linux
  1873. seccomp2 sandbox doesn't fail. Fixes bug 14989; bugfix
  1874. on 0.2.6.3-alpha.
  1875. - Allow AF_UNIX hidden services to be used with the seccomp2
  1876. sandbox. Fixes bug 15003; bugfix on 0.2.6.3-alpha.
  1877. - Upon receiving sighup with the seccomp2 sandbox enabled, do not
  1878. crash during attempts to call wait4. Fixes bug 15088; bugfix on
  1879. 0.2.5.1-alpha. Patch from "sanic".
  1880. o Minor features (controller):
  1881. - Messages about problems in the bootstrap process now include
  1882. information about the server we were trying to connect to when we
  1883. noticed the problem. Closes ticket 15006.
  1884. o Minor features (geoip):
  1885. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1886. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1887. Country database.
  1888. o Minor features (logs):
  1889. - Quiet some log messages in the heartbeat and at startup. Closes
  1890. ticket 14950.
  1891. o Minor bugfixes (certificate handling):
  1892. - If an authority operator accidentally makes a signing certificate
  1893. with a future publication time, do not discard its real signing
  1894. certificates. Fixes bug 11457; bugfix on 0.2.0.3-alpha.
  1895. - Remove any old authority certificates that have been superseded
  1896. for at least two days. Previously, we would keep superseded
  1897. certificates until they expired, if they were published close in
  1898. time to the certificate that superseded them. Fixes bug 11454;
  1899. bugfix on 0.2.1.8-alpha.
  1900. o Minor bugfixes (compilation):
  1901. - Fix a compilation warning on s390. Fixes bug 14988; bugfix
  1902. on 0.2.5.2-alpha.
  1903. - Fix a compilation warning on FreeBSD. Fixes bug 15151; bugfix
  1904. on 0.2.6.2-alpha.
  1905. o Minor bugfixes (testing):
  1906. - Fix endianness issues in unit test for resolve_my_address() to
  1907. have it pass on big endian systems. Fixes bug 14980; bugfix on
  1908. Tor 0.2.6.3-alpha.
  1909. - Avoid a side-effect in a tor_assert() in the unit tests. Fixes bug
  1910. 15188; bugfix on 0.1.2.3-alpha. Patch from Tom van der Woerdt.
  1911. - When running the new 'make test-stem' target, use the configured
  1912. python binary. Fixes bug 15037; bugfix on 0.2.6.3-alpha. Patch
  1913. from "cypherpunks".
  1914. - When running the zero-length-keys tests, do not use the default
  1915. torrc file. Fixes bug 15033; bugfix on 0.2.6.3-alpha. Reported
  1916. by "reezer".
  1917. o Directory authority IP change:
  1918. - The directory authority Faravahar has a new IP address. This
  1919. closes ticket 14487.
  1920. o Removed code:
  1921. - Remove some lingering dead code that once supported mempools.
  1922. Mempools were disabled by default in 0.2.5, and removed entirely
  1923. in 0.2.6.3-alpha. Closes more of ticket 14848; patch
  1924. by "cypherpunks".
  1925. Changes in version 0.2.6.3-alpha - 2015-02-19
  1926. Tor 0.2.6.3-alpha is the third (and hopefully final) alpha release in
  1927. the 0.2.6.x series. It introduces support for more kinds of sockets,
  1928. makes it harder to accidentally run an exit, improves our
  1929. multithreading backend, incorporates several fixes for the
  1930. AutomapHostsOnResolve option, and fixes numerous other bugs besides.
  1931. If no major regressions or security holes are found in this version,
  1932. the next version will be a release candidate.
  1933. o Deprecated versions:
  1934. - Tor relays older than 0.2.4.18-rc are no longer allowed to
  1935. advertise themselves on the network. Closes ticket 13555.
  1936. o Major features (security, unix domain sockets):
  1937. - Allow SocksPort to be an AF_UNIX Unix Domain Socket. Now high risk
  1938. applications can reach Tor without having to create AF_INET or
  1939. AF_INET6 sockets, meaning they can completely disable their
  1940. ability to make non-Tor network connections. To create a socket of
  1941. this type, use "SocksPort unix:/path/to/socket". Implements
  1942. ticket 12585.
  1943. - Support mapping hidden service virtual ports to AF_UNIX sockets.
  1944. The syntax is "HiddenServicePort 80 unix:/path/to/socket".
  1945. Implements ticket 11485.
  1946. o Major features (changed defaults):
  1947. - Prevent relay operators from unintentionally running exits: When a
  1948. relay is configured as an exit node, we now warn the user unless
  1949. the "ExitRelay" option is set to 1. We warn even more loudly if
  1950. the relay is configured with the default exit policy, since this
  1951. can indicate accidental misconfiguration. Setting "ExitRelay 0"
  1952. stops Tor from running as an exit relay. Closes ticket 10067.
  1953. o Major features (directory system):
  1954. - When downloading server- or microdescriptors from a directory
  1955. server, we no longer launch multiple simultaneous requests to the
  1956. same server. This reduces load on the directory servers,
  1957. especially when directory guards are in use. Closes ticket 9969.
  1958. - When downloading server- or microdescriptors over a tunneled
  1959. connection, do not limit the length of our requests to what the
  1960. Squid proxy is willing to handle. Part of ticket 9969.
  1961. - Authorities can now vote on the correct digests and latest
  1962. versions for different software packages. This allows packages
  1963. that include Tor to use the Tor authority system as a way to get
  1964. notified of updates and their correct digests. Implements proposal
  1965. 227. Closes ticket 10395.
  1966. o Major features (guards):
  1967. - Introduce the Guardfraction feature to improves load balancing on
  1968. guard nodes. Specifically, it aims to reduce the traffic gap that
  1969. guard nodes experience when they first get the Guard flag. This is
  1970. a required step if we want to increase the guard lifetime to 9
  1971. months or greater. Closes ticket 9321.
  1972. o Major features (performance):
  1973. - Make the CPU worker implementation more efficient by avoiding the
  1974. kernel and lengthening pipelines. The original implementation used
  1975. sockets to transfer data from the main thread to the workers, and
  1976. didn't allow any thread to be assigned more than a single piece of
  1977. work at once. The new implementation avoids communications
  1978. overhead by making requests in shared memory, avoiding kernel IO
  1979. where possible, and keeping more requests in flight at once.
  1980. Implements ticket 9682.
  1981. o Major features (relay):
  1982. - Raise the minimum acceptable configured bandwidth rate for bridges
  1983. to 50 KiB/sec and for relays to 75 KiB/sec. (The old values were
  1984. 20 KiB/sec.) Closes ticket 13822.
  1985. o Major bugfixes (exit node stability):
  1986. - Fix an assertion failure that could occur under high DNS load.
  1987. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1988. diagnosed and fixed by "cypherpunks".
  1989. o Major bugfixes (mixed relay-client operation):
  1990. - When running as a relay and client at the same time (not
  1991. recommended), if we decide not to use a new guard because we want
  1992. to retry older guards, only close the locally-originating circuits
  1993. passing through that guard. Previously we would close all the
  1994. circuits through that guard. Fixes bug 9819; bugfix on
  1995. 0.2.1.1-alpha. Reported by "skruffy".
  1996. o Minor features (build):
  1997. - New --disable-system-torrc compile-time option to prevent Tor from
  1998. looking for the system-wide torrc or torrc-defaults files.
  1999. Resolves ticket 13037.
  2000. o Minor features (controller):
  2001. - Include SOCKS_USERNAME and SOCKS_PASSWORD values in controller
  2002. events so controllers can observe circuit isolation inputs. Closes
  2003. ticket 8405.
  2004. - ControlPort now supports the unix:/path/to/socket syntax as an
  2005. alternative to the ControlSocket option, for consistency with
  2006. SocksPort and HiddenServicePort. Closes ticket 14451.
  2007. - New "GETINFO bw-event-cache" to get information about recent
  2008. bandwidth events. Closes ticket 14128. Useful for controllers to
  2009. get recent bandwidth history after the fix for ticket 13988.
  2010. o Minor features (Denial of service resistance):
  2011. - Count the total number of bytes used storing hidden service
  2012. descriptors against the value of MaxMemInQueues. If we're low on
  2013. memory, and more than 20% of our memory is used holding hidden
  2014. service descriptors, free them until no more than 10% of our
  2015. memory holds hidden service descriptors. Free the least recently
  2016. fetched descriptors first. Resolves ticket 13806.
  2017. - When we have recently been under memory pressure (over 3/4 of
  2018. MaxMemInQueues is allocated), then allocate smaller zlib objects
  2019. for small requests. Closes ticket 11791.
  2020. o Minor features (geoip):
  2021. - Update geoip and geoip6 files to the January 7 2015 Maxmind
  2022. GeoLite2 Country database.
  2023. o Minor features (guard nodes):
  2024. - Reduce the time delay before saving guard status to disk from 10
  2025. minutes to 30 seconds (or from one hour to 10 minutes if
  2026. AvoidDiskWrites is set). Closes ticket 12485.
  2027. o Minor features (hidden service):
  2028. - Make Sybil attacks against hidden services harder by changing the
  2029. minimum time required to get the HSDir flag from 25 hours up to 96
  2030. hours. Addresses ticket 14149.
  2031. - New option "HiddenServiceAllowUnknownPorts" to allow hidden
  2032. services to disable the anti-scanning feature introduced in
  2033. 0.2.6.2-alpha. With this option not set, a connection to an
  2034. unlisted port closes the circuit. With this option set, only a
  2035. RELAY_DONE cell is sent. Closes ticket 14084.
  2036. o Minor features (interface):
  2037. - Implement "-f -" command-line option to read torrc configuration
  2038. from standard input, if you don't want to store the torrc file in
  2039. the file system. Implements feature 13865.
  2040. o Minor features (logging):
  2041. - Add a count of unique clients to the bridge heartbeat message.
  2042. Resolves ticket 6852.
  2043. - Suppress "router info incompatible with extra info" message when
  2044. reading extrainfo documents from cache. (This message got loud
  2045. around when we closed bug 9812 in 0.2.6.2-alpha.) Closes
  2046. ticket 13762.
  2047. - Elevate hidden service authorized-client message from DEBUG to
  2048. INFO. Closes ticket 14015.
  2049. o Minor features (stability):
  2050. - Add assertions in our hash-table iteration code to check for
  2051. corrupted values that could cause infinite loops. Closes
  2052. ticket 11737.
  2053. o Minor features (systemd):
  2054. - Various improvements and modernizations in systemd hardening
  2055. support. Closes ticket 13805. Patch from Craig Andrews.
  2056. o Minor features (testing networks):
  2057. - Drop the minimum RendPostPeriod on a testing network to 5 seconds,
  2058. and the default on a testing network to 2 minutes. Drop the
  2059. MIN_REND_INITIAL_POST_DELAY on a testing network to 5 seconds, but
  2060. keep the default on a testing network at 30 seconds. This reduces
  2061. HS bootstrap time to around 25 seconds. Also, change the default
  2062. time in test-network.sh to match. Closes ticket 13401. Patch
  2063. by "teor".
  2064. - Create TestingDirAuthVoteHSDir to correspond to
  2065. TestingDirAuthVoteExit/Guard. Ensures that authorities vote the
  2066. HSDir flag for the listed relays regardless of uptime or ORPort
  2067. connectivity. Respects the value of VoteOnHidServDirectoriesV2.
  2068. Partial implementation for ticket 14067. Patch by "teor".
  2069. o Minor features (tor2web mode):
  2070. - Introduce the config option Tor2webRendezvousPoints, which allows
  2071. clients in Tor2webMode to select a specific Rendezvous Point to be
  2072. used in HS circuits. This might allow better performance for
  2073. Tor2Web nodes. Implements ticket 12844.
  2074. o Minor bugfixes (client DNS):
  2075. - Report the correct cached DNS expiration times on SOCKS port or in
  2076. DNS replies. Previously, we would report everything as "never
  2077. expires." Fixes bug 14193; bugfix on 0.2.3.17-beta.
  2078. - Avoid a small memory leak when we find a cached answer for a
  2079. reverse DNS lookup in a client-side DNS cache. (Remember, client-
  2080. side DNS caching is off by default, and is not recommended.) Fixes
  2081. bug 14259; bugfix on 0.2.0.1-alpha.
  2082. o Minor bugfixes (client, automapping):
  2083. - Avoid crashing on torrc lines for VirtualAddrNetworkIPv[4|6] when
  2084. no value follows the option. Fixes bug 14142; bugfix on
  2085. 0.2.4.7-alpha. Patch by "teor".
  2086. - Fix a memory leak when using AutomapHostsOnResolve. Fixes bug
  2087. 14195; bugfix on 0.1.0.1-rc.
  2088. - Prevent changes to other options from removing the wildcard value
  2089. "." from "AutomapHostsSuffixes". Fixes bug 12509; bugfix
  2090. on 0.2.0.1-alpha.
  2091. - Allow MapAddress and AutomapHostsOnResolve to work together when
  2092. an address is mapped into another address type (like .onion) that
  2093. must be automapped at resolve time. Fixes bug 7555; bugfix
  2094. on 0.2.0.1-alpha.
  2095. o Minor bugfixes (client, bridges):
  2096. - When we are using bridges and we had a network connectivity
  2097. problem, only retry connecting to our currently configured
  2098. bridges, not all bridges we know about and remember using. Fixes
  2099. bug 14216; bugfix on 0.2.2.17-alpha.
  2100. o Minor bugfixes (client, IPv6):
  2101. - Reject socks requests to literal IPv6 addresses when IPv6Traffic
  2102. flag is not set; and not because the NoIPv4Traffic flag was set.
  2103. Previously we'd looked at the NoIPv4Traffic flag for both types of
  2104. literal addresses. Fixes bug 14280; bugfix on 0.2.4.7-alpha.
  2105. o Minor bugfixes (compilation):
  2106. - The address of an array in the middle of a structure will always
  2107. be non-NULL. clang recognises this and complains. Disable the
  2108. tautologous and redundant check to silence this warning. Fixes bug
  2109. 14001; bugfix on 0.2.1.2-alpha.
  2110. - Avoid warnings when building with systemd 209 or later. Fixes bug
  2111. 14072; bugfix on 0.2.6.2-alpha. Patch from "h.venev".
  2112. - Compile correctly with (unreleased) OpenSSL 1.1.0 headers.
  2113. Addresses ticket 14188.
  2114. - Build without warnings with the stock OpenSSL srtp.h header, which
  2115. has a duplicate declaration of SSL_get_selected_srtp_profile().
  2116. Fixes bug 14220; this is OpenSSL's bug, not ours.
  2117. - Do not compile any code related to Tor2Web mode when Tor2Web mode
  2118. is not enabled at compile time. Previously, this code was included
  2119. in a disabled state. See discussion on ticket 12844.
  2120. - Remove the --disable-threads configure option again. It was
  2121. accidentally partially reintroduced in 29ac883606d6d. Fixes bug
  2122. 14819; bugfix on 0.2.6.2-alpha.
  2123. o Minor bugfixes (controller):
  2124. - Report "down" in response to the "GETINFO entry-guards" command
  2125. when relays are down with an unreachable_since value. Previously,
  2126. we would report "up". Fixes bug 14184; bugfix on 0.1.2.2-alpha.
  2127. - Avoid crashing on a malformed EXTENDCIRCUIT command. Fixes bug
  2128. 14116; bugfix on 0.2.2.9-alpha.
  2129. - Add a code for the END_CIRC_REASON_IP_NOW_REDUNDANT circuit close
  2130. reason. Fixes bug 14207; bugfix on 0.2.6.2-alpha.
  2131. o Minor bugfixes (directory authority):
  2132. - Allow directory authorities to fetch more data from one another if
  2133. they find themselves missing lots of votes. Previously, they had
  2134. been bumping against the 10 MB queued data limit. Fixes bug 14261;
  2135. bugfix on 0.1.2.5-alpha.
  2136. - Do not attempt to download extrainfo documents which we will be
  2137. unable to validate with a matching server descriptor. Fixes bug
  2138. 13762; bugfix on 0.2.0.1-alpha.
  2139. - Fix a bug that was truncating AUTHDIR_NEWDESC events sent to the
  2140. control port. Fixes bug 14953; bugfix on 0.2.0.1-alpha.
  2141. - Enlarge the buffer to read bwauth generated files to avoid an
  2142. issue when parsing the file in dirserv_read_measured_bandwidths().
  2143. Fixes bug 14125; bugfix on 0.2.2.1-alpha.
  2144. o Minor bugfixes (file handling):
  2145. - Stop failing when key files are zero-length. Instead, generate new
  2146. keys, and overwrite the empty key files. Fixes bug 13111; bugfix
  2147. on all versions of Tor. Patch by "teor".
  2148. - Stop generating a fresh .old RSA onion key file when the .old file
  2149. is missing. Fixes part of 13111; bugfix on 0.0.6rc1.
  2150. - Avoid overwriting .old key files with empty key files.
  2151. - Skip loading zero-length extrainfo store, router store, stats,
  2152. state, and key files.
  2153. - Avoid crashing when trying to reload a torrc specified as a
  2154. relative path with RunAsDaemon turned on. Fixes bug 13397; bugfix
  2155. on 0.2.3.11-alpha.
  2156. o Minor bugfixes (hidden services):
  2157. - Close the introduction circuit when we have no more usable intro
  2158. points, instead of waiting for it to time out. This also ensures
  2159. that no follow-up HS descriptor fetch is triggered when the
  2160. circuit eventually times out. Fixes bug 14224; bugfix on 0.0.6.
  2161. - When fetching a hidden service descriptor for a down service that
  2162. was recently up, do not keep refetching until we try the same
  2163. replica twice in a row. Fixes bug 14219; bugfix on 0.2.0.10-alpha.
  2164. - Successfully launch Tor with a nonexistent hidden service
  2165. directory. Our fix for bug 13942 didn't catch this case. Fixes bug
  2166. 14106; bugfix on 0.2.6.2-alpha.
  2167. o Minor bugfixes (logging):
  2168. - Avoid crashing when there are more log domains than entries in
  2169. domain_list. Bugfix on 0.2.3.1-alpha.
  2170. - Add a string representation for LD_SCHED. Fixes bug 14740; bugfix
  2171. on 0.2.6.1-alpha.
  2172. - Don't log messages to stdout twice when starting up. Fixes bug
  2173. 13993; bugfix on 0.2.6.1-alpha.
  2174. o Minor bugfixes (parsing):
  2175. - Stop accepting milliseconds (or other junk) at the end of
  2176. descriptor publication times. Fixes bug 9286; bugfix on 0.0.2pre25.
  2177. - Support two-number and three-number version numbers correctly, in
  2178. case we change the Tor versioning system in the future. Fixes bug
  2179. 13661; bugfix on 0.0.8pre1.
  2180. o Minor bugfixes (path counting):
  2181. - When deciding whether the consensus lists any exit nodes, count
  2182. the number listed in the consensus, not the number we have
  2183. descriptors for. Fixes part of bug 14918; bugfix on 0.2.6.2-alpha.
  2184. - When deciding whether we have any exit nodes, only examine
  2185. ExitNodes when the ExitNodes option is actually set. Fixes part of
  2186. bug 14918; bugfix on 0.2.6.2-alpha.
  2187. - Get rid of redundant and possibly scary warnings that we are
  2188. missing directory information while we bootstrap. Fixes part of
  2189. bug 14918; bugfix on 0.2.6.2-alpha.
  2190. o Minor bugfixes (portability):
  2191. - Fix the ioctl()-based network interface lookup code so that it
  2192. will work on systems that have variable-length struct ifreq, for
  2193. example Mac OS X.
  2194. - Fix scheduler compilation on targets where char is unsigned. Fixes
  2195. bug 14764; bugfix on 0.2.6.2-alpha. Reported by Christian Kujau.
  2196. o Minor bugfixes (sandbox):
  2197. - Allow glibc fatal errors to be sent to stderr before Tor exits.
  2198. Previously, glibc would try to write them to /dev/tty, and the
  2199. sandbox would trap the call and make Tor exit prematurely. Fixes
  2200. bug 14759; bugfix on 0.2.5.1-alpha.
  2201. o Minor bugfixes (shutdown):
  2202. - When shutting down, always call event_del() on lingering read or
  2203. write events before freeing them. Otherwise, we risk double-frees
  2204. or read-after-frees in event_base_free(). Fixes bug 12985; bugfix
  2205. on 0.1.0.2-rc.
  2206. o Minor bugfixes (small memory leaks):
  2207. - Avoid leaking memory when using IPv6 virtual address mappings.
  2208. Fixes bug 14123; bugfix on 0.2.4.7-alpha. Patch by Tom van
  2209. der Woerdt.
  2210. o Minor bugfixes (statistics):
  2211. - Increase period over which bandwidth observations are aggregated
  2212. from 15 minutes to 4 hours. Fixes bug 13988; bugfix on 0.0.8pre1.
  2213. o Minor bugfixes (systemd support):
  2214. - Fix detection and operation of systemd watchdog. Fixes part of bug
  2215. 14141; bugfix on 0.2.6.2-alpha. Patch from Tomasz Torcz.
  2216. - Run correctly under systemd with the RunAsDaemon option set. Fixes
  2217. part of bug 14141; bugfix on 0.2.5.7-rc. Patch from Tomasz Torcz.
  2218. - Inform the systemd supervisor about more changes in the Tor
  2219. process status. Implements part of ticket 14141. Patch from
  2220. Tomasz Torcz.
  2221. - Cause the "--disable-systemd" option to actually disable systemd
  2222. support. Fixes bug 14350; bugfix on 0.2.6.2-alpha. Patch
  2223. from "blueness".
  2224. o Minor bugfixes (TLS):
  2225. - Check more thoroughly throughout the TLS code for possible
  2226. unlogged TLS errors. Possible diagnostic or fix for bug 13319.
  2227. o Minor bugfixes (transparent proxy):
  2228. - Use getsockname, not getsockopt, to retrieve the address for a
  2229. TPROXY-redirected connection. Fixes bug 13796; bugfix
  2230. on 0.2.5.2-alpha.
  2231. o Code simplification and refactoring:
  2232. - Move fields related to isolating and configuring client ports into
  2233. a shared structure. Previously, they were duplicated across
  2234. port_cfg_t, listener_connection_t, and edge_connection_t. Failure
  2235. to copy them correctly had been the cause of at least one bug in
  2236. the past. Closes ticket 8546.
  2237. - Refactor the get_interface_addresses_raw() doom-function into
  2238. multiple smaller and simpler subfunctions. Cover the resulting
  2239. subfunctions with unit-tests. Fixes a significant portion of
  2240. issue 12376.
  2241. - Remove workaround in dirserv_thinks_router_is_hs_dir() that was
  2242. only for version <= 0.2.2.24 which is now deprecated. Closes
  2243. ticket 14202.
  2244. - Remove a test for a long-defunct broken version-one
  2245. directory server.
  2246. o Documentation:
  2247. - Adding section on OpenBSD to our TUNING document. Thanks to mmcc
  2248. for writing the OpenBSD-specific tips. Resolves ticket 13702.
  2249. - Make the tor-resolve documentation match its help string and its
  2250. options. Resolves part of ticket 14325.
  2251. - Log a more useful error message from tor-resolve when failing to
  2252. look up a hidden service address. Resolves part of ticket 14325.
  2253. o Downgraded warnings:
  2254. - Don't warn when we've attempted to contact a relay using the wrong
  2255. ntor onion key. Closes ticket 9635.
  2256. o Removed features:
  2257. - To avoid confusion with the "ExitRelay" option, "ExitNode" is no
  2258. longer silently accepted as an alias for "ExitNodes".
  2259. - The --enable-mempool and --enable-buf-freelists options, which
  2260. were originally created to work around bad malloc implementations,
  2261. no longer exist. They were off-by-default in 0.2.5. Closes
  2262. ticket 14848.
  2263. o Testing:
  2264. - Make the checkdir/perms test complete successfully even if the
  2265. global umask is not 022. Fixes bug 14215; bugfix on 0.2.6.2-alpha.
  2266. - Test that tor does not fail when key files are zero-length. Check
  2267. that tor generates new keys, and overwrites the empty key files.
  2268. - Test that tor generates new keys when keys are missing
  2269. (existing behavior).
  2270. - Test that tor does not overwrite key files that already contain
  2271. data (existing behavior). Tests bug 13111. Patch by "teor".
  2272. - New "make test-stem" target to run stem integration tests.
  2273. Requires that the "STEM_SOURCE_DIR" environment variable be set.
  2274. Closes ticket 14107.
  2275. - Make the test_cmdline_args.py script work correctly on Windows.
  2276. Patch from Gisle Vanem.
  2277. - Move the slower unit tests into a new "./src/test/test-slow"
  2278. binary that can be run independently of the other tests. Closes
  2279. ticket 13243.
  2280. - Avoid undefined behavior when sampling huge values from the
  2281. Laplace distribution. This made unittests fail on Raspberry Pi.
  2282. Bug found by Device. Fixes bug 14090; bugfix on 0.2.6.2-alpha.
  2283. Changes in version 0.2.6.2-alpha - 2014-12-31
  2284. Tor 0.2.6.2-alpha is the second alpha release in the 0.2.6.x series.
  2285. It introduces a major new backend for deciding when to send cells on
  2286. channels, which should lead down the road to big performance
  2287. increases. It contains security and statistics features for better
  2288. work on hidden services, and numerous bugfixes.
  2289. This release contains many new unit tests, along with major
  2290. performance improvements for running testing networks using Chutney.
  2291. Thanks to a series of patches contributed by "teor", testing networks
  2292. should now bootstrap in seconds, rather than minutes.
  2293. o Major features (relay, infrastructure):
  2294. - Complete revision of the code that relays use to decide which cell
  2295. to send next. Formerly, we selected the best circuit to write on
  2296. each channel, but we didn't select among channels in any
  2297. sophisticated way. Now, we choose the best circuits globally from
  2298. among those whose channels are ready to deliver traffic.
  2299. This patch implements a new inter-cmux comparison API, a global
  2300. high/low watermark mechanism and a global scheduler loop for
  2301. transmission prioritization across all channels as well as among
  2302. circuits on one channel. This schedule is currently tuned to
  2303. (tolerantly) avoid making changes in network performance, but it
  2304. should form the basis for major circuit performance increases in
  2305. the future. Code by Andrea; tuning by Rob Jansen; implements
  2306. ticket 9262.
  2307. o Major features (hidden services):
  2308. - Make HS port scanning more difficult by immediately closing the
  2309. circuit when a user attempts to connect to a nonexistent port.
  2310. Closes ticket 13667.
  2311. - Add a HiddenServiceStatistics option that allows Tor relays to
  2312. gather and publish statistics about the overall size and volume of
  2313. hidden service usage. Specifically, when this option is turned on,
  2314. an HSDir will publish an approximate number of hidden services
  2315. that have published descriptors to it the past 24 hours. Also, if
  2316. a relay has acted as a hidden service rendezvous point, it will
  2317. publish the approximate amount of rendezvous cells it has relayed
  2318. the past 24 hours. The statistics themselves are obfuscated so
  2319. that the exact values cannot be derived. For more details see
  2320. proposal 238, "Better hidden service stats from Tor relays". This
  2321. feature is currently disabled by default. Implements feature 13192.
  2322. o Major bugfixes (client, automap):
  2323. - Repair automapping with IPv6 addresses. This automapping should
  2324. have worked previously, but one piece of debugging code that we
  2325. inserted to detect a regression actually caused the regression to
  2326. manifest itself again. Fixes bug 13811 and bug 12831; bugfix on
  2327. 0.2.4.7-alpha. Diagnosed and fixed by Francisco Blas
  2328. Izquierdo Riera.
  2329. o Major bugfixes (hidden services):
  2330. - When closing an introduction circuit that was opened in parallel
  2331. with others, don't mark the introduction point as unreachable.
  2332. Previously, the first successful connection to an introduction
  2333. point would make the other introduction points get marked as
  2334. having timed out. Fixes bug 13698; bugfix on 0.0.6rc2.
  2335. o Directory authority changes:
  2336. - Remove turtles as a directory authority.
  2337. - Add longclaw as a new (v3) directory authority. This implements
  2338. ticket 13296. This keeps the directory authority count at 9.
  2339. o Major removed features:
  2340. - Tor clients no longer support connecting to hidden services
  2341. running on Tor 0.2.2.x and earlier; the Support022HiddenServices
  2342. option has been removed. (There shouldn't be any hidden services
  2343. running these versions on the network.) Closes ticket 7803.
  2344. o Minor features (client):
  2345. - Validate hostnames in SOCKS5 requests more strictly. If SafeSocks
  2346. is enabled, reject requests with IP addresses as hostnames.
  2347. Resolves ticket 13315.
  2348. o Minor features (controller):
  2349. - Add a "SIGNAL HEARTBEAT" controller command that tells Tor to
  2350. write an unscheduled heartbeat message to the log. Implements
  2351. feature 9503.
  2352. o Minor features (geoip):
  2353. - Update geoip and geoip6 to the November 15 2014 Maxmind GeoLite2
  2354. Country database.
  2355. o Minor features (hidden services):
  2356. - When re-enabling the network, don't try to build introduction
  2357. circuits until we have successfully built a circuit. This makes
  2358. hidden services come up faster when the network is re-enabled.
  2359. Patch from "akwizgran". Closes ticket 13447.
  2360. - When we fail to retrieve a hidden service descriptor, send the
  2361. controller an "HS_DESC FAILED" controller event. Implements
  2362. feature 13212.
  2363. - New HiddenServiceDirGroupReadable option to cause hidden service
  2364. directories and hostname files to be created group-readable. Patch
  2365. from "anon", David Stainton, and "meejah". Closes ticket 11291.
  2366. o Minor features (systemd):
  2367. - Where supported, when running with systemd, report successful
  2368. startup to systemd. Part of ticket 11016. Patch by Michael Scherer.
  2369. - When running with systemd, support systemd watchdog messages. Part
  2370. of ticket 11016. Patch by Michael Scherer.
  2371. o Minor features (transparent proxy):
  2372. - Update the transparent proxy option checks to allow for both ipfw
  2373. and pf on OS X. Closes ticket 14002.
  2374. - Use the correct option when using IPv6 with transparent proxy
  2375. support on Linux. Resolves 13808. Patch by Francisco Blas
  2376. Izquierdo Riera.
  2377. o Minor bugfixes (preventative security, C safety):
  2378. - When reading a hexadecimal, base-32, or base-64 encoded value from
  2379. a string, always overwrite the whole output buffer. This prevents
  2380. some bugs where we would look at (but fortunately, not reveal)
  2381. uninitialized memory on the stack. Fixes bug 14013; bugfix on all
  2382. versions of Tor.
  2383. - Clear all memory targetted by tor_addr_{to,from}_sockaddr(), not
  2384. just the part that's used. This makes it harder for data leak bugs
  2385. to occur in the event of other programming failures. Resolves
  2386. ticket 14041.
  2387. o Minor bugfixes (client, microdescriptors):
  2388. - Use a full 256 bits of the SHA256 digest of a microdescriptor when
  2389. computing which microdescriptors to download. This keeps us from
  2390. erroneous download behavior if two microdescriptor digests ever
  2391. have the same first 160 bits. Fixes part of bug 13399; bugfix
  2392. on 0.2.3.1-alpha.
  2393. - Reset a router's status if its microdescriptor digest changes,
  2394. even if the first 160 bits remain the same. Fixes part of bug
  2395. 13399; bugfix on 0.2.3.1-alpha.
  2396. o Minor bugfixes (compilation):
  2397. - Silence clang warnings under --enable-expensive-hardening,
  2398. including implicit truncation of 64 bit values to 32 bit, const
  2399. char assignment to self, tautological compare, and additional
  2400. parentheses around equality tests. Fixes bug 13577; bugfix
  2401. on 0.2.5.4-alpha.
  2402. - Fix a clang warning about checking whether an address in the
  2403. middle of a structure is NULL. Fixes bug 14001; bugfix
  2404. on 0.2.1.2-alpha.
  2405. o Minor bugfixes (hidden services):
  2406. - Correctly send a controller event when we find that a rendezvous
  2407. circuit has finished. Fixes bug 13936; bugfix on 0.1.1.5-alpha.
  2408. - Pre-check directory permissions for new hidden-services to avoid
  2409. at least one case of "Bug: Acting on config options left us in a
  2410. broken state. Dying." Fixes bug 13942; bugfix on 0.0.6pre1.
  2411. - When adding a new hidden service (for example, via SETCONF), Tor
  2412. no longer congratulates the user for running a relay. Fixes bug
  2413. 13941; bugfix on 0.2.6.1-alpha.
  2414. - When fetching hidden service descriptors, we now check not only
  2415. for whether we got the hidden service we had in mind, but also
  2416. whether we got the particular descriptors we wanted. This prevents
  2417. a class of inefficient but annoying DoS attacks by hidden service
  2418. directories. Fixes bug 13214; bugfix on 0.2.1.6-alpha. Reported
  2419. by "special".
  2420. o Minor bugfixes (Linux seccomp2 sandbox):
  2421. - Make transparent proxy support work along with the seccomp2
  2422. sandbox. Fixes part of bug 13808; bugfix on 0.2.5.1-alpha. Patch
  2423. by Francisco Blas Izquierdo Riera.
  2424. - Fix a memory leak in tor-resolve when running with the sandbox
  2425. enabled. Fixes bug 14050; bugfix on 0.2.5.9-rc.
  2426. o Minor bugfixes (logging):
  2427. - Downgrade warnings about RSA signature failures to info log level.
  2428. Emit a warning when an extra info document is found incompatible
  2429. with a corresponding router descriptor. Fixes bug 9812; bugfix
  2430. on 0.0.6rc3.
  2431. - Make connection_ap_handshake_attach_circuit() log the circuit ID
  2432. correctly. Fixes bug 13701; bugfix on 0.0.6.
  2433. o Minor bugfixes (misc):
  2434. - Stop allowing invalid address patterns like "*/24" that contain
  2435. both a wildcard address and a bit prefix length. This affects all
  2436. our address-range parsing code. Fixes bug 7484; bugfix
  2437. on 0.0.2pre14.
  2438. o Minor bugfixes (testing networks, fast startup):
  2439. - Allow Tor to build circuits using a consensus with no exits. If
  2440. the consensus has no exits (typical of a bootstrapping test
  2441. network), allow Tor to build circuits once enough descriptors have
  2442. been downloaded. This assists in bootstrapping a testing Tor
  2443. network. Fixes bug 13718; bugfix on 0.2.4.10-alpha. Patch
  2444. by "teor".
  2445. - When V3AuthVotingInterval is low, give a lower If-Modified-Since
  2446. header to directory servers. This allows us to obtain consensuses
  2447. promptly when the consensus interval is very short. This assists
  2448. in bootstrapping a testing Tor network. Fixes parts of bugs 13718
  2449. and 13963; bugfix on 0.2.0.3-alpha. Patch by "teor".
  2450. - Stop assuming that private addresses are local when checking
  2451. reachability in a TestingTorNetwork. Instead, when testing, assume
  2452. all OR connections are remote. (This is necessary due to many test
  2453. scenarios running all relays on localhost.) This assists in
  2454. bootstrapping a testing Tor network. Fixes bug 13924; bugfix on
  2455. 0.1.0.1-rc. Patch by "teor".
  2456. - Avoid building exit circuits from a consensus with no exits. Now
  2457. thanks to our fix for 13718, we accept a no-exit network as not
  2458. wholly lost, but we need to remember not to try to build exit
  2459. circuits on it. Closes ticket 13814; patch by "teor".
  2460. - Stop requiring exits to have non-zero bandwithcapacity in a
  2461. TestingTorNetwork. Instead, when TestingMinExitFlagThreshold is 0,
  2462. ignore exit bandwidthcapacity. This assists in bootstrapping a
  2463. testing Tor network. Fixes parts of bugs 13718 and 13839; bugfix
  2464. on 0.2.0.3-alpha. Patch by "teor".
  2465. - Add "internal" to some bootstrap statuses when no exits are
  2466. available. If the consensus does not contain Exits, Tor will only
  2467. build internal circuits. In this case, relevant statuses will
  2468. contain the word "internal" as indicated in the Tor control-
  2469. spec.txt. When bootstrap completes, Tor will be ready to build
  2470. internal circuits. If a future consensus contains Exits, exit
  2471. circuits may become available. Fixes part of bug 13718; bugfix on
  2472. 0.2.4.10-alpha. Patch by "teor".
  2473. - Decrease minimum consensus interval to 10 seconds when
  2474. TestingTorNetwork is set, or 5 seconds for the first consensus.
  2475. Fix assumptions throughout the code that assume larger intervals.
  2476. Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha. Patch
  2477. by "teor".
  2478. - Avoid excluding guards from path building in minimal test
  2479. networks, when we're in a test network and excluding guards would
  2480. exclude all relays. This typically occurs in incredibly small tor
  2481. networks, and those using "TestingAuthVoteGuard *". Fixes part of
  2482. bug 13718; bugfix on 0.1.1.11-alpha. Patch by "teor".
  2483. o Code simplification and refactoring:
  2484. - Stop using can_complete_circuits as a global variable; access it
  2485. with a function instead.
  2486. - Avoid using operators directly as macro arguments: this lets us
  2487. apply coccinelle transformations to our codebase more directly.
  2488. Closes ticket 13172.
  2489. - Combine the functions used to parse ClientTransportPlugin and
  2490. ServerTransportPlugin into a single function. Closes ticket 6456.
  2491. - Add inline functions and convenience macros for inspecting channel
  2492. state. Refactor the code to use convenience macros instead of
  2493. checking channel state directly. Fixes issue 7356.
  2494. - Document all members of was_router_added_t and rename
  2495. ROUTER_WAS_NOT_NEW to ROUTER_IS_ALREADY_KNOWN to make it less
  2496. confusable with ROUTER_WAS_TOO_OLD. Fixes issue 13644.
  2497. - In connection_exit_begin_conn(), use END_CIRC_REASON_TORPROTOCOL
  2498. constant instead of hardcoded value. Fixes issue 13840.
  2499. - Refactor our generic strmap and digestmap types into a single
  2500. implementation, so that we can add a new digest256map
  2501. type trivially.
  2502. o Documentation:
  2503. - Document the bridge-authority-only 'networkstatus-bridges' file.
  2504. Closes ticket 13713; patch from "tom".
  2505. - Fix typo in PredictedPortsRelevanceTime option description in
  2506. manpage. Resolves issue 13707.
  2507. - Stop suggesting that users specify relays by nickname: it isn't a
  2508. good idea. Also, properly cross-reference how to specify relays in
  2509. all parts of manual documenting options that take a list of
  2510. relays. Closes ticket 13381.
  2511. - Clarify the HiddenServiceDir option description in manpage to make
  2512. it clear that relative paths are taken with respect to the current
  2513. working directory. Also clarify that this behavior is not
  2514. guaranteed to remain indefinitely. Fixes issue 13913.
  2515. o Testing:
  2516. - New tests for many parts of channel, relay, and circuitmux
  2517. functionality. Code by Andrea; part of 9262.
  2518. - New tests for parse_transport_line(). Part of ticket 6456.
  2519. - In the unit tests, use chgrp() to change the group of the unit
  2520. test temporary directory to the current user, so that the sticky
  2521. bit doesn't interfere with tests that check directory groups.
  2522. Closes 13678.
  2523. - Add unit tests for resolve_my_addr(). Part of ticket 12376; patch
  2524. by 'rl1987'.
  2525. Changes in version 0.2.6.1-alpha - 2014-10-30
  2526. Tor 0.2.6.1-alpha is the first release in the Tor 0.2.6.x series. It
  2527. includes numerous code cleanups and new tests, and fixes a large
  2528. number of annoying bugs. Out-of-memory conditions are handled better
  2529. than in 0.2.5, pluggable transports have improved proxy support, and
  2530. clients now use optimistic data for contacting hidden services. Also,
  2531. we are now more robust to changes in what we consider a parseable
  2532. directory object, so that tightening restrictions does not have a risk
  2533. of introducing infinite download loops.
  2534. This is the first alpha release in a new series, so expect there to be
  2535. bugs. Users who would rather test out a more stable branch should stay
  2536. with 0.2.5.x for now.
  2537. o New compiler and system requirements:
  2538. - Tor 0.2.6.x requires that your compiler support more of the C99
  2539. language standard than before. The 'configure' script now detects
  2540. whether your compiler supports C99 mid-block declarations and
  2541. designated initializers. If it does not, Tor will not compile.
  2542. We may revisit this requirement if it turns out that a significant
  2543. number of people need to build Tor with compilers that don't
  2544. bother implementing a 15-year-old standard. Closes ticket 13233.
  2545. - Tor no longer supports systems without threading support. When we
  2546. began working on Tor, there were several systems that didn't have
  2547. threads, or where the thread support wasn't able to run the
  2548. threads of a single process on multiple CPUs. That no longer
  2549. holds: every system where Tor needs to run well now has threading
  2550. support. Resolves ticket 12439.
  2551. o Removed platform support:
  2552. - We no longer include special code to build on Windows CE; as far
  2553. as we know, nobody has used Tor on Windows CE in a very long time.
  2554. Closes ticket 11446.
  2555. o Major features (bridges):
  2556. - Expose the outgoing upstream HTTP/SOCKS proxy to pluggable
  2557. transports if they are configured via the "TOR_PT_PROXY"
  2558. environment variable. Implements proposal 232. Resolves
  2559. ticket 8402.
  2560. o Major features (client performance, hidden services):
  2561. - Allow clients to use optimistic data when connecting to a hidden
  2562. service, which should remove a round-trip from hidden service
  2563. initialization. See proposal 181 for details. Implements
  2564. ticket 13211.
  2565. o Major features (directory system):
  2566. - Upon receiving an unparseable directory object, if its digest
  2567. matches what we expected, then don't try to download it again.
  2568. Previously, when we got a descriptor we didn't like, we would keep
  2569. trying to download it over and over. Closes ticket 11243.
  2570. o Major features (sample torrc):
  2571. - Add a new, infrequently-changed "torrc.minimal". This file is
  2572. similar to torrc.sample, but it will change as infrequently as
  2573. possible, for the benefit of users whose systems prompt them for
  2574. intervention whenever a default configuration file is changed.
  2575. Making this change allows us to update torrc.sample to be a more
  2576. generally useful "sample torrc".
  2577. o Major bugfixes (directory authorities):
  2578. - Do not assign the HSDir flag to relays if they are not Valid, or
  2579. currently hibernating. Fixes 12573; bugfix on 0.2.0.10-alpha.
  2580. o Major bugfixes (directory bandwidth performance):
  2581. - Don't flush the zlib buffer aggressively when compressing
  2582. directory information for clients. This should save about 7% of
  2583. the bandwidth currently used for compressed descriptors and
  2584. microdescriptors. Fixes bug 11787; bugfix on 0.1.1.23.
  2585. o Minor features (security, memory wiping):
  2586. - Ensure we securely wipe keys from memory after
  2587. crypto_digest_get_digest and init_curve25519_keypair_from_file
  2588. have finished using them. Resolves ticket 13477.
  2589. o Minor features (security, out-of-memory handling):
  2590. - When handling an out-of-memory condition, allocate less memory for
  2591. temporary data structures. Fixes issue 10115.
  2592. - When handling an out-of-memory condition, consider more types of
  2593. buffers, including those on directory connections, and zlib
  2594. buffers. Resolves ticket 11792.
  2595. o Minor features:
  2596. - When identity keypair is generated for first time, log a
  2597. congratulatory message that links to the new relay lifecycle
  2598. document. Implements feature 10427.
  2599. o Minor features (client):
  2600. - Clients are now willing to send optimistic data (before they
  2601. receive a 'connected' cell) to relays of any version. (Relays
  2602. without support for optimistic data are no longer supported on the
  2603. Tor network.) Resolves ticket 13153.
  2604. o Minor features (directory authorities):
  2605. - Don't list relays with a bandwidth estimate of 0 in the consensus.
  2606. Implements a feature proposed during discussion of bug 13000.
  2607. - In tor-gencert, report an error if the user provides the same
  2608. argument more than once.
  2609. - If a directory authority can't find a best consensus method in the
  2610. votes that it holds, it now falls back to its favorite consensus
  2611. method. Previously, it fell back to method 1. Neither of these is
  2612. likely to get enough signatures, but "fall back to favorite"
  2613. doesn't require us to maintain support an obsolete consensus
  2614. method. Implements part of proposal 215.
  2615. o Minor features (logging):
  2616. - On Unix-like systems, you can now use named pipes as the target of
  2617. the Log option, and other options that try to append to files.
  2618. Closes ticket 12061. Patch from "carlo von lynX".
  2619. - When opening a log file at startup, send it every log message that
  2620. we generated between startup and opening it. Previously, log
  2621. messages that were generated before opening the log file were only
  2622. logged to stdout. Closes ticket 6938.
  2623. - Add a TruncateLogFile option to overwrite logs instead of
  2624. appending to them. Closes ticket 5583.
  2625. o Minor features (portability, Solaris):
  2626. - Threads are no longer disabled by default on Solaris; we believe
  2627. that the versions of Solaris with broken threading support are all
  2628. obsolete by now. Resolves ticket 9495.
  2629. o Minor features (relay):
  2630. - Re-check our address after we detect a changed IP address from
  2631. getsockname(). This ensures that the controller command "GETINFO
  2632. address" will report the correct value. Resolves ticket 11582.
  2633. Patch from "ra".
  2634. - A new AccountingRule option lets Relays set whether they'd like
  2635. AccountingMax to be applied separately to inbound and outbound
  2636. traffic, or applied to the sum of inbound and outbound traffic.
  2637. Resolves ticket 961. Patch by "chobe".
  2638. o Minor features (testing networks):
  2639. - Add the TestingDirAuthVoteExit option, which lists nodes to assign
  2640. the "Exit" flag regardless of their uptime, bandwidth, or exit
  2641. policy. TestingTorNetwork must be set for this option to have any
  2642. effect. Previously, authorities would take up to 35 minutes to
  2643. give nodes the Exit flag in a test network. Partially implements
  2644. ticket 13161.
  2645. o Minor features (validation):
  2646. - Check all date/time values passed to tor_timegm and
  2647. parse_rfc1123_time for validity, taking leap years into account.
  2648. Improves HTTP header validation. Implemented with bug 13476.
  2649. - In correct_tm(), limit the range of values returned by system
  2650. localtime(_r) and gmtime(_r) to be between the years 1 and 8099.
  2651. This means we don't have to deal with negative or too large dates,
  2652. even if a clock is wrong. Otherwise we might fail to read a file
  2653. written by us which includes such a date. Fixes bug 13476.
  2654. o Minor bugfixes (bridge clients):
  2655. - When configured to use a bridge without an identity digest (not
  2656. recommended), avoid launching an extra channel to it when
  2657. bootstrapping. Fixes bug 7733; bugfix on 0.2.4.4-alpha.
  2658. o Minor bugfixes (bridges):
  2659. - When DisableNetwork is set, do not launch pluggable transport
  2660. plugins, and if any are running, terminate them. Fixes bug 13213;
  2661. bugfix on 0.2.3.6-alpha.
  2662. o Minor bugfixes (C correctness):
  2663. - Fix several instances of possible integer overflow/underflow/NaN.
  2664. Fixes bug 13104; bugfix on 0.2.3.1-alpha and later. Patches
  2665. from "teor".
  2666. - In circuit_build_times_calculate_timeout() in circuitstats.c,
  2667. avoid dividing by zero in the pareto calculations. This traps
  2668. under clang's "undefined-trap" sanitizer. Fixes bug 13290; bugfix
  2669. on 0.2.2.2-alpha.
  2670. - Fix an integer overflow in format_time_interval(). Fixes bug
  2671. 13393; bugfix on 0.2.0.10-alpha.
  2672. - Set the correct day of year value when the system's localtime(_r)
  2673. or gmtime(_r) functions fail to set struct tm. Not externally
  2674. visible. Fixes bug 13476; bugfix on 0.0.2pre14.
  2675. - Avoid unlikely signed integer overflow in tor_timegm on systems
  2676. with 32-bit time_t. Fixes bug 13476; bugfix on 0.0.2pre14.
  2677. o Minor bugfixes (client):
  2678. - Fix smartlist_choose_node_by_bandwidth() so that relays with the
  2679. BadExit flag are not considered worthy candidates. Fixes bug
  2680. 13066; bugfix on 0.1.2.3-alpha.
  2681. - Use the consensus schedule for downloading consensuses, and not
  2682. the generic schedule. Fixes bug 11679; bugfix on 0.2.2.6-alpha.
  2683. - Handle unsupported or malformed SOCKS5 requests properly by
  2684. responding with the appropriate error message before closing the
  2685. connection. Fixes bugs 12971 and 13314; bugfix on 0.0.2pre13.
  2686. o Minor bugfixes (client, torrc):
  2687. - Stop modifying the value of our DirReqStatistics torrc option just
  2688. because we're not a bridge or relay. This bug was causing Tor
  2689. Browser users to write "DirReqStatistics 0" in their torrc files
  2690. as if they had chosen to change the config. Fixes bug 4244; bugfix
  2691. on 0.2.3.1-alpha.
  2692. - When GeoIPExcludeUnknown is enabled, do not incorrectly decide
  2693. that our options have changed every time we SIGHUP. Fixes bug
  2694. 9801; bugfix on 0.2.4.10-alpha. Patch from "qwerty1".
  2695. o Minor bugfixes (controller):
  2696. - Return an error when the second or later arguments of the
  2697. "setevents" controller command are invalid events. Previously we
  2698. would return success while silently skipping invalid events. Fixes
  2699. bug 13205; bugfix on 0.2.3.2-alpha. Reported by "fpxnns".
  2700. o Minor bugfixes (directory system):
  2701. - Always believe that v3 directory authorities serve extra-info
  2702. documents, whether they advertise "caches-extra-info" or not.
  2703. Fixes part of bug 11683; bugfix on 0.2.0.1-alpha.
  2704. - When running as a v3 directory authority, advertise that you serve
  2705. extra-info documents so that clients who want them can find them
  2706. from you too. Fixes part of bug 11683; bugfix on 0.2.0.1-alpha.
  2707. - Check the BRIDGE_DIRINFO flag bitwise rather than using equality.
  2708. Previously, directories offering BRIDGE_DIRINFO and some other
  2709. flag (i.e. microdescriptors or extrainfo) would be ignored when
  2710. looking for bridges. Partially fixes bug 13163; bugfix
  2711. on 0.2.0.7-alpha.
  2712. o Minor bugfixes (networking):
  2713. - Check for orconns and use connection_or_close_for_error() rather
  2714. than connection_mark_for_close() directly in the getsockopt()
  2715. failure case of connection_handle_write_impl(). Fixes bug 11302;
  2716. bugfix on 0.2.4.4-alpha.
  2717. o Minor bugfixes (relay):
  2718. - When generating our family list, remove spaces from around the
  2719. entries. Fixes bug 12728; bugfix on 0.2.1.7-alpha.
  2720. - If our previous bandwidth estimate was 0 bytes, allow publishing a
  2721. new relay descriptor immediately. Fixes bug 13000; bugfix
  2722. on 0.1.1.6-alpha.
  2723. o Minor bugfixes (testing networks):
  2724. - Fix TestingDirAuthVoteGuard to properly give out Guard flags in a
  2725. testing network. Fixes bug 13064; bugfix on 0.2.5.2-alpha.
  2726. - Stop using the default authorities in networks which provide both
  2727. AlternateDirAuthority and AlternateBridgeAuthority. Partially
  2728. fixes bug 13163; bugfix on 0.2.0.13-alpha.
  2729. o Minor bugfixes (testing):
  2730. - Stop spawn test failures due to a race condition between the
  2731. SIGCHLD handler updating the process status, and the test reading
  2732. it. Fixes bug 13291; bugfix on 0.2.3.3-alpha.
  2733. o Minor bugfixes (testing, Windows):
  2734. - Avoid passing an extra backslash when creating a temporary
  2735. directory for running the unit tests on Windows. Fixes bug 12392;
  2736. bugfix on 0.2.2.25-alpha. Patch from Gisle Vanem.
  2737. o Minor bugfixes (windows):
  2738. - Remove code to special-case handling of NTE_BAD_KEYSET when
  2739. acquiring windows CryptoAPI context. This error can't actually
  2740. occur for the parameters we're providing. Fixes bug 10816; bugfix
  2741. on 0.0.2pre26.
  2742. o Minor bugfixes (zlib):
  2743. - Avoid truncating a zlib stream when trying to finalize it with an
  2744. empty output buffer. Fixes bug 11824; bugfix on 0.1.1.23.
  2745. o Build fixes:
  2746. - Allow our configure script to build correctly with autoconf 2.62
  2747. again. Fixes bug 12693; bugfix on 0.2.5.2-alpha.
  2748. - Improve the error message from ./configure to make it clear that
  2749. when asciidoc has not been found, the user will have to either add
  2750. --disable-asciidoc argument or install asciidoc. Resolves
  2751. ticket 13228.
  2752. o Code simplification and refactoring:
  2753. - Change the entry_is_live() function to take named bitfield
  2754. elements instead of an unnamed list of booleans. Closes
  2755. ticket 12202.
  2756. - Refactor and unit-test entry_is_time_to_retry() in entrynodes.c.
  2757. Resolves ticket 12205.
  2758. - Use calloc and reallocarray functions instead of multiply-
  2759. then-malloc. This makes it less likely for us to fall victim to an
  2760. integer overflow attack when allocating. Resolves ticket 12855.
  2761. - Use the standard macro name SIZE_MAX, instead of our
  2762. own SIZE_T_MAX.
  2763. - Document usage of the NO_DIRINFO and ALL_DIRINFO flags clearly in
  2764. functions which take them as arguments. Replace 0 with NO_DIRINFO
  2765. in a function call for clarity. Seeks to prevent future issues
  2766. like 13163.
  2767. - Avoid 4 null pointer errors under clang static analysis by using
  2768. tor_assert() to prove that the pointers aren't null. Fixes
  2769. bug 13284.
  2770. - Rework the API of policies_parse_exit_policy() to use a bitmask to
  2771. represent parsing options, instead of a confusing mess of
  2772. booleans. Resolves ticket 8197.
  2773. - Introduce a helper function to parse ExitPolicy in
  2774. or_options_t structure.
  2775. o Documentation:
  2776. - Add a doc/TUNING document with tips for handling large numbers of
  2777. TCP connections when running busy Tor relay. Update the warning
  2778. message to point to this file when running out of sockets
  2779. operating system is allowing to use simultaneously. Resolves
  2780. ticket 9708.
  2781. o Removed features:
  2782. - We no longer remind the user about configuration options that have
  2783. been obsolete since 0.2.3.x or earlier. Patch by Adrien Bak.
  2784. - Remove our old, non-weighted bandwidth-based node selection code.
  2785. Previously, we used it as a fallback when we couldn't perform
  2786. weighted bandwidth-based node selection. But that would only
  2787. happen in the cases where we had no consensus, or when we had a
  2788. consensus generated by buggy or ancient directory authorities. In
  2789. either case, it's better to use the more modern, better maintained
  2790. algorithm, with reasonable defaults for the weights. Closes
  2791. ticket 13126.
  2792. - Remove the --disable-curve25519 configure option. Relays and
  2793. clients now are required to support curve25519 and the
  2794. ntor handshake.
  2795. - The old "StrictEntryNodes" and "StrictExitNodes" options, which
  2796. used to be deprecated synonyms for "StrictNodes", are now marked
  2797. obsolete. Resolves ticket 12226.
  2798. - Clients don't understand the BadDirectory flag in the consensus
  2799. anymore, and ignore it.
  2800. o Testing:
  2801. - Refactor the function that chooses guard nodes so that it can more
  2802. easily be tested; write some tests for it.
  2803. - Fix and re-enable the fgets_eagain unit test. Fixes bug 12503;
  2804. bugfix on 0.2.3.1-alpha. Patch from "cypherpunks."
  2805. - Create unit tests for format_time_interval(). With bug 13393.
  2806. - Add unit tests for tor_timegm signed overflow, tor_timegm and
  2807. parse_rfc1123_time validity checks, correct_tm year clamping. Unit
  2808. tests (visible) fixes in bug 13476.
  2809. - Add a "coverage-html" make target to generate HTML-visualized
  2810. coverage results when building with --enable-coverage. (Requires
  2811. lcov.) Patch from Kevin Murray.
  2812. - Enable the backtrace handler (where supported) when running the
  2813. unit tests.
  2814. - Revise all unit tests that used the legacy test_* macros to
  2815. instead use the recommended tt_* macros. This patch was generated
  2816. with coccinelle, to avoid manual errors. Closes ticket 13119.
  2817. o Distribution (systemd):
  2818. - systemd unit file: only allow tor to write to /var/lib/tor and
  2819. /var/log/tor. The rest of the filesystem is accessible for reading
  2820. only. Patch by intrigeri; resolves ticket 12751.
  2821. - systemd unit file: ensure that the process and all its children
  2822. can never gain new privileges. Patch by intrigeri; resolves
  2823. ticket 12939.
  2824. - systemd unit file: set up /var/run/tor as writable for the Tor
  2825. service. Patch by intrigeri; resolves ticket 13196.
  2826. o Removed features (directory authorities):
  2827. - Remove code that prevented authorities from listing Tor relays
  2828. affected by CVE-2011-2769 as guards. These relays are already
  2829. rejected altogether due to the minimum version requirement of
  2830. 0.2.3.16-alpha. Closes ticket 13152.
  2831. - The "AuthDirRejectUnlisted" option no longer has any effect, as
  2832. the fingerprints file (approved-routers) has been deprecated.
  2833. - Directory authorities do not support being Naming dirauths anymore.
  2834. The "NamingAuthoritativeDir" config option is now obsolete.
  2835. - Directory authorities do not support giving out the BadDirectory
  2836. flag anymore.
  2837. - Directory authorities no longer advertise or support consensus
  2838. methods 1 through 12 inclusive. These consensus methods were
  2839. obsolete and/or insecure: maintaining the ability to support them
  2840. served no good purpose. Implements part of proposal 215; closes
  2841. ticket 10163.
  2842. o Testing (test-network.sh):
  2843. - Stop using "echo -n", as some shells' built-in echo doesn't
  2844. support "-n". Instead, use "/bin/echo -n". Partially fixes
  2845. bug 13161.
  2846. - Stop an apparent test-network hang when used with make -j2. Fixes
  2847. bug 13331.
  2848. - Add a --delay option to test-network.sh, which configures the
  2849. delay before the chutney network tests for data transmission.
  2850. Partially implements ticket 13161.
  2851. Changes in version 0.2.5.10 - 2014-10-24
  2852. Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
  2853. It adds several new security features, including improved
  2854. denial-of-service resistance for relays, new compiler hardening
  2855. options, and a system-call sandbox for hardened installations on Linux
  2856. (requires seccomp2). The controller protocol has several new features,
  2857. resolving IPv6 addresses should work better than before, and relays
  2858. should be a little more CPU-efficient. We've added support for more
  2859. OpenBSD and FreeBSD transparent proxy types. We've improved the build
  2860. system and testing infrastructure to allow unit testing of more parts
  2861. of the Tor codebase. Finally, we've addressed several nagging pluggable
  2862. transport usability issues, and included numerous other small bugfixes
  2863. and features mentioned below.
  2864. This release marks end-of-life for Tor 0.2.3.x; those Tor versions
  2865. have accumulated many known flaws; everyone should upgrade.
  2866. o Deprecated versions:
  2867. - Tor 0.2.3.x has reached end-of-life; it has received no patches or
  2868. attention for some while.
  2869. Changes in version 0.2.5.9-rc - 2014-10-20
  2870. Tor 0.2.5.9-rc is the third release candidate for the Tor 0.2.5.x
  2871. series. It disables SSL3 in response to the recent "POODLE" attack
  2872. (even though POODLE does not affect Tor). It also works around a crash
  2873. bug caused by some operating systems' response to the "POODLE" attack
  2874. (which does affect Tor). It also contains a few miscellaneous fixes.
  2875. o Major security fixes:
  2876. - Disable support for SSLv3. All versions of OpenSSL in use with Tor
  2877. today support TLS 1.0 or later, so we can safely turn off support
  2878. for this old (and insecure) protocol. Fixes bug 13426.
  2879. o Major bugfixes (openssl bug workaround):
  2880. - Avoid crashing when using OpenSSL version 0.9.8zc, 1.0.0o, or
  2881. 1.0.1j, built with the 'no-ssl3' configuration option. Fixes bug
  2882. 13471. This is a workaround for an OpenSSL bug.
  2883. o Minor bugfixes:
  2884. - Disable the sandbox name resolver cache when running tor-resolve:
  2885. tor-resolve doesn't use the sandbox code, and turning it on was
  2886. breaking attempts to do tor-resolve on a non-default server on
  2887. Linux. Fixes bug 13295; bugfix on 0.2.5.3-alpha.
  2888. o Compilation fixes:
  2889. - Build and run correctly on systems like OpenBSD-current that have
  2890. patched OpenSSL to remove get_cipher_by_char and/or its
  2891. implementations. Fixes issue 13325.
  2892. o Downgraded warnings:
  2893. - Downgrade the severity of the 'unexpected sendme cell from client'
  2894. from 'warn' to 'protocol warning'. Closes ticket 8093.
  2895. Changes in version 0.2.4.25 - 2014-10-20
  2896. Tor 0.2.4.25 disables SSL3 in response to the recent "POODLE" attack
  2897. (even though POODLE does not affect Tor). It also works around a crash
  2898. bug caused by some operating systems' response to the "POODLE" attack
  2899. (which does affect Tor).
  2900. o Major security fixes (also in 0.2.5.9-rc):
  2901. - Disable support for SSLv3. All versions of OpenSSL in use with Tor
  2902. today support TLS 1.0 or later, so we can safely turn off support
  2903. for this old (and insecure) protocol. Fixes bug 13426.
  2904. o Major bugfixes (openssl bug workaround, also in 0.2.5.9-rc):
  2905. - Avoid crashing when using OpenSSL version 0.9.8zc, 1.0.0o, or
  2906. 1.0.1j, built with the 'no-ssl3' configuration option. Fixes bug
  2907. 13471. This is a workaround for an OpenSSL bug.
  2908. Changes in version 0.2.5.8-rc - 2014-09-22
  2909. Tor 0.2.5.8-rc is the second release candidate for the Tor 0.2.5.x
  2910. series. It fixes a bug that affects consistency and speed when
  2911. connecting to hidden services, and it updates the location of one of
  2912. the directory authorities.
  2913. o Major bugfixes:
  2914. - Clients now send the correct address for their chosen rendezvous
  2915. point when trying to access a hidden service. They used to send
  2916. the wrong address, which would still work some of the time because
  2917. they also sent the identity digest of the rendezvous point, and if
  2918. the hidden service happened to try connecting to the rendezvous
  2919. point from a relay that already had a connection open to it,
  2920. the relay would reuse that connection. Now connections to hidden
  2921. services should be more robust and faster. Also, this bug meant
  2922. that clients were leaking to the hidden service whether they were
  2923. on a little-endian (common) or big-endian (rare) system, which for
  2924. some users might have reduced their anonymity. Fixes bug 13151;
  2925. bugfix on 0.2.1.5-alpha.
  2926. o Directory authority changes:
  2927. - Change IP address for gabelmoo (v3 directory authority).
  2928. Changes in version 0.2.4.24 - 2014-09-22
  2929. Tor 0.2.4.24 fixes a bug that affects consistency and speed when
  2930. connecting to hidden services, and it updates the location of one of
  2931. the directory authorities.
  2932. o Major bugfixes:
  2933. - Clients now send the correct address for their chosen rendezvous
  2934. point when trying to access a hidden service. They used to send
  2935. the wrong address, which would still work some of the time because
  2936. they also sent the identity digest of the rendezvous point, and if
  2937. the hidden service happened to try connecting to the rendezvous
  2938. point from a relay that already had a connection open to it,
  2939. the relay would reuse that connection. Now connections to hidden
  2940. services should be more robust and faster. Also, this bug meant
  2941. that clients were leaking to the hidden service whether they were
  2942. on a little-endian (common) or big-endian (rare) system, which for
  2943. some users might have reduced their anonymity. Fixes bug 13151;
  2944. bugfix on 0.2.1.5-alpha.
  2945. o Directory authority changes:
  2946. - Change IP address for gabelmoo (v3 directory authority).
  2947. o Minor features (geoip):
  2948. - Update geoip and geoip6 to the August 7 2014 Maxmind GeoLite2
  2949. Country database.
  2950. Changes in version 0.2.5.7-rc - 2014-09-11
  2951. Tor 0.2.5.7-rc fixes several regressions from earlier in the 0.2.5.x
  2952. release series, and some long-standing bugs related to ORPort reachability
  2953. testing and failure to send CREATE cells. It is the first release
  2954. candidate for the Tor 0.2.5.x series.
  2955. o Major bugfixes (client, startup):
  2956. - Start making circuits as soon as DisabledNetwork is turned off.
  2957. When Tor started with DisabledNetwork set, it would correctly
  2958. conclude that it shouldn't build circuits, but it would mistakenly
  2959. cache this conclusion, and continue believing it even when
  2960. DisableNetwork is set to 0. Fixes the bug introduced by the fix
  2961. for bug 11200; bugfix on 0.2.5.4-alpha.
  2962. - Resume expanding abbreviations for command-line options. The fix
  2963. for bug 4647 accidentally removed our hack from bug 586 that
  2964. rewrote HashedControlPassword to __HashedControlSessionPassword
  2965. when it appears on the commandline (which allowed the user to set
  2966. her own HashedControlPassword in the torrc file while the
  2967. controller generates a fresh session password for each run). Fixes
  2968. bug 12948; bugfix on 0.2.5.1-alpha.
  2969. - Warn about attempts to run hidden services and relays in the same
  2970. process: that's probably not a good idea. Closes ticket 12908.
  2971. o Major bugfixes (relay):
  2972. - Avoid queuing or sending destroy cells for circuit ID zero when we
  2973. fail to send a CREATE cell. Fixes bug 12848; bugfix on 0.0.8pre1.
  2974. Found and fixed by "cypherpunks".
  2975. - Fix ORPort reachability detection on relays running behind a
  2976. proxy, by correctly updating the "local" mark on the controlling
  2977. channel when changing the address of an or_connection_t after the
  2978. handshake. Fixes bug 12160; bugfix on 0.2.4.4-alpha.
  2979. o Minor features (bridge):
  2980. - Add an ExtORPortCookieAuthFileGroupReadable option to make the
  2981. cookie file for the ExtORPort g+r by default.
  2982. o Minor features (geoip):
  2983. - Update geoip and geoip6 to the August 7 2014 Maxmind GeoLite2
  2984. Country database.
  2985. o Minor bugfixes (logging):
  2986. - Reduce the log severity of the "Pluggable transport proxy does not
  2987. provide any needed transports and will not be launched." message,
  2988. since Tor Browser includes several ClientTransportPlugin lines in
  2989. its torrc-defaults file, leading every Tor Browser user who looks
  2990. at her logs to see these notices and wonder if they're dangerous.
  2991. Resolves bug 13124; bugfix on 0.2.5.3-alpha.
  2992. - Downgrade "Unexpected onionskin length after decryption" warning
  2993. to a protocol-warn, since there's nothing relay operators can do
  2994. about a client that sends them a malformed create cell. Resolves
  2995. bug 12996; bugfix on 0.0.6rc1.
  2996. - Log more specific warnings when we get an ESTABLISH_RENDEZVOUS
  2997. cell on a cannibalized or non-OR circuit. Resolves ticket 12997.
  2998. - When logging information about an EXTEND2 or EXTENDED2 cell, log
  2999. their names correctly. Fixes part of bug 12700; bugfix
  3000. on 0.2.4.8-alpha.
  3001. - When logging information about a relay cell whose command we don't
  3002. recognize, log its command as an integer. Fixes part of bug 12700;
  3003. bugfix on 0.2.1.10-alpha.
  3004. - Escape all strings from the directory connection before logging
  3005. them. Fixes bug 13071; bugfix on 0.1.1.15. Patch from "teor".
  3006. o Minor bugfixes (controller):
  3007. - Restore the functionality of CookieAuthFileGroupReadable. Fixes
  3008. bug 12864; bugfix on 0.2.5.1-alpha.
  3009. - Actually send TRANSPORT_LAUNCHED and HS_DESC events to
  3010. controllers. Fixes bug 13085; bugfix on 0.2.5.1-alpha. Patch
  3011. by "teor".
  3012. o Minor bugfixes (compilation):
  3013. - Fix compilation of test.h with MSVC. Patch from Gisle Vanem;
  3014. bugfix on 0.2.5.5-alpha.
  3015. - Make the nmake make files work again. Fixes bug 13081. Bugfix on
  3016. 0.2.5.1-alpha. Patch from "NewEraCracker".
  3017. - In routerlist_assert_ok(), don't take the address of a
  3018. routerinfo's cache_info member unless that routerinfo is non-NULL.
  3019. Fixes bug 13096; bugfix on 0.1.1.9-alpha. Patch by "teor".
  3020. - Fix a large number of false positive warnings from the clang
  3021. analyzer static analysis tool. This should make real warnings
  3022. easier for clang analyzer to find. Patch from "teor". Closes
  3023. ticket 13036.
  3024. o Distribution (systemd):
  3025. - Verify configuration file via ExecStartPre in the systemd unit
  3026. file. Patch from intrigeri; resolves ticket 12730.
  3027. - Explicitly disable RunAsDaemon in the systemd unit file. Our
  3028. current systemd unit uses "Type = simple", so systemd does not
  3029. expect tor to fork. If the user has "RunAsDaemon 1" in their
  3030. torrc, then things won't work as expected. This is e.g. the case
  3031. on Debian (and derivatives), since there we pass "--defaults-torrc
  3032. /usr/share/tor/tor-service-defaults-torrc" (that contains
  3033. "RunAsDaemon 1") by default. Patch by intrigeri; resolves
  3034. ticket 12731.
  3035. o Documentation:
  3036. - Adjust the URLs in the README to refer to the new locations of
  3037. several documents on the website. Fixes bug 12830. Patch from
  3038. Matt Pagan.
  3039. - Document 'reject6' and 'accept6' ExitPolicy entries. Resolves
  3040. ticket 12878.
  3041. Changes in version 0.2.5.6-alpha - 2014-07-28
  3042. Tor 0.2.5.6-alpha brings us a big step closer to slowing down the
  3043. risk from guard rotation, and fixes a variety of other issues to get
  3044. us closer to a release candidate.
  3045. o Major features (also in 0.2.4.23):
  3046. - Make the number of entry guards configurable via a new
  3047. NumEntryGuards consensus parameter, and the number of directory
  3048. guards configurable via a new NumDirectoryGuards consensus
  3049. parameter. Implements ticket 12688.
  3050. o Major bugfixes (also in 0.2.4.23):
  3051. - Fix a bug in the bounds-checking in the 32-bit curve25519-donna
  3052. implementation that caused incorrect results on 32-bit
  3053. implementations when certain malformed inputs were used along with
  3054. a small class of private ntor keys. This bug does not currently
  3055. appear to allow an attacker to learn private keys or impersonate a
  3056. Tor server, but it could provide a means to distinguish 32-bit Tor
  3057. implementations from 64-bit Tor implementations. Fixes bug 12694;
  3058. bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
  3059. Adam Langley.
  3060. o Major bugfixes:
  3061. - Perform circuit cleanup operations even when circuit
  3062. construction operations are disabled (because the network is
  3063. disabled, or because there isn't enough directory information).
  3064. Previously, when we were not building predictive circuits, we
  3065. were not closing expired circuits either. Fixes bug 8387; bugfix on
  3066. 0.1.1.11-alpha. This bug became visible in 0.2.4.10-alpha when we
  3067. became more strict about when we have "enough directory information
  3068. to build circuits".
  3069. o Minor features:
  3070. - Authorities now assign the Guard flag to the fastest 25% of the
  3071. network (it used to be the fastest 50%). Also raise the consensus
  3072. weight that guarantees the Guard flag from 250 to 2000. For the
  3073. current network, this results in about 1100 guards, down from 2500.
  3074. This step paves the way for moving the number of entry guards
  3075. down to 1 (proposal 236) while still providing reasonable expected
  3076. performance for most users. Implements ticket 12690.
  3077. - Update geoip and geoip6 to the July 10 2014 Maxmind GeoLite2
  3078. Country database.
  3079. - Slightly enhance the diagnostic message for bug 12184.
  3080. o Minor bugfixes (also in 0.2.4.23):
  3081. - Warn and drop the circuit if we receive an inbound 'relay early'
  3082. cell. Those used to be normal to receive on hidden service circuits
  3083. due to bug 1038, but the buggy Tor versions are long gone from
  3084. the network so we can afford to resume watching for them. Resolves
  3085. the rest of bug 1038; bugfix on 0.2.1.19.
  3086. - Correct a confusing error message when trying to extend a circuit
  3087. via the control protocol but we don't know a descriptor or
  3088. microdescriptor for one of the specified relays. Fixes bug 12718;
  3089. bugfix on 0.2.3.1-alpha.
  3090. o Minor bugfixes:
  3091. - Fix compilation when building with bufferevents enabled. (This
  3092. configuration is still not expected to work, however.)
  3093. Fixes bugs 12438, 12474, 11578; bugfixes on 0.2.5.1-alpha and
  3094. 0.2.5.3-alpha. Patches from Anthony G. Basile and Sathyanarayanan
  3095. Gunasekaran.
  3096. - Compile correctly with builds and forks of OpenSSL (such as
  3097. LibreSSL) that disable compression. Fixes bug 12602; bugfix on
  3098. 0.2.1.1-alpha. Patch from "dhill".
  3099. Changes in version 0.2.4.23 - 2014-07-28
  3100. Tor 0.2.4.23 brings us a big step closer to slowing down the risk from
  3101. guard rotation, and also backports several important fixes from the
  3102. Tor 0.2.5 alpha release series.
  3103. o Major features:
  3104. - Clients now look at the "usecreatefast" consensus parameter to
  3105. decide whether to use CREATE_FAST or CREATE cells for the first hop
  3106. of their circuit. This approach can improve security on connections
  3107. where Tor's circuit handshake is stronger than the available TLS
  3108. connection security levels, but the tradeoff is more computational
  3109. load on guard relays. Implements proposal 221. Resolves ticket 9386.
  3110. - Make the number of entry guards configurable via a new
  3111. NumEntryGuards consensus parameter, and the number of directory
  3112. guards configurable via a new NumDirectoryGuards consensus
  3113. parameter. Implements ticket 12688.
  3114. o Major bugfixes:
  3115. - Fix a bug in the bounds-checking in the 32-bit curve25519-donna
  3116. implementation that caused incorrect results on 32-bit
  3117. implementations when certain malformed inputs were used along with
  3118. a small class of private ntor keys. This bug does not currently
  3119. appear to allow an attacker to learn private keys or impersonate a
  3120. Tor server, but it could provide a means to distinguish 32-bit Tor
  3121. implementations from 64-bit Tor implementations. Fixes bug 12694;
  3122. bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
  3123. Adam Langley.
  3124. o Minor bugfixes:
  3125. - Warn and drop the circuit if we receive an inbound 'relay early'
  3126. cell. Those used to be normal to receive on hidden service circuits
  3127. due to bug 1038, but the buggy Tor versions are long gone from
  3128. the network so we can afford to resume watching for them. Resolves
  3129. the rest of bug 1038; bugfix on 0.2.1.19.
  3130. - Correct a confusing error message when trying to extend a circuit
  3131. via the control protocol but we don't know a descriptor or
  3132. microdescriptor for one of the specified relays. Fixes bug 12718;
  3133. bugfix on 0.2.3.1-alpha.
  3134. - Avoid an illegal read from stack when initializing the TLS
  3135. module using a version of OpenSSL without all of the ciphers
  3136. used by the v2 link handshake. Fixes bug 12227; bugfix on
  3137. 0.2.4.8-alpha. Found by "starlight".
  3138. o Minor features:
  3139. - Update geoip and geoip6 to the July 10 2014 Maxmind GeoLite2
  3140. Country database.
  3141. Changes in version 0.2.5.5-alpha - 2014-06-18
  3142. Tor 0.2.5.5-alpha fixes a wide variety of remaining issues in the Tor
  3143. 0.2.5.x release series, including a couple of DoS issues, some
  3144. performance regressions, a large number of bugs affecting the Linux
  3145. seccomp2 sandbox code, and various other bugfixes. It also adds
  3146. diagnostic bugfixes for a few tricky issues that we're trying to
  3147. track down.
  3148. o Major features (security, traffic analysis resistance):
  3149. - Several major improvements to the algorithm used to decide when to
  3150. close TLS connections. Previous versions of Tor closed connections
  3151. at a fixed interval after the last time a non-padding cell was
  3152. sent over the connection, regardless of the target of the
  3153. connection. Now, we randomize the intervals by adding up to 50% of
  3154. their base value, we measure the length of time since connection
  3155. last had at least one circuit, and we allow connections to known
  3156. ORs to remain open a little longer (15 minutes instead of 3
  3157. minutes minimum). These changes should improve Tor's resistance
  3158. against some kinds of traffic analysis, and lower some overhead
  3159. from needlessly closed connections. Fixes ticket 6799.
  3160. Incidentally fixes ticket 12023; bugfix on 0.2.5.1-alpha.
  3161. o Major bugfixes (security, OOM, new since 0.2.5.4-alpha, also in 0.2.4.22):
  3162. - Fix a memory leak that could occur if a microdescriptor parse
  3163. fails during the tokenizing step. This bug could enable a memory
  3164. exhaustion attack by directory servers. Fixes bug 11649; bugfix
  3165. on 0.2.2.6-alpha.
  3166. o Major bugfixes (security, directory authorities):
  3167. - Directory authorities now include a digest of each relay's
  3168. identity key as a part of its microdescriptor.
  3169. This is a workaround for bug 11743 (reported by "cypherpunks"),
  3170. where Tor clients do not support receiving multiple
  3171. microdescriptors with the same SHA256 digest in the same
  3172. consensus. When clients receive a consensus like this, they only
  3173. use one of the relays. Without this fix, a hostile relay could
  3174. selectively disable some client use of target relays by
  3175. constructing a router descriptor with a different identity and the
  3176. same microdescriptor parameters and getting the authorities to
  3177. list it in a microdescriptor consensus. This fix prevents an
  3178. attacker from causing a microdescriptor collision, because the
  3179. router's identity is not forgeable.
  3180. o Major bugfixes (relay):
  3181. - Use a direct dirport connection when uploading non-anonymous
  3182. descriptors to the directory authorities. Previously, relays would
  3183. incorrectly use tunnel connections under a fairly wide variety of
  3184. circumstances. Fixes bug 11469; bugfix on 0.2.4.3-alpha.
  3185. - When a circuit accidentally has the same circuit ID for its
  3186. forward and reverse direction, correctly detect the direction of
  3187. cells using that circuit. Previously, this bug made roughly one
  3188. circuit in a million non-functional. Fixes bug 12195; this is a
  3189. bugfix on every version of Tor.
  3190. o Major bugfixes (client, pluggable transports):
  3191. - When managing pluggable transports, use OS notification facilities
  3192. to learn if they have crashed, and don't attempt to kill any
  3193. process that has already exited. Fixes bug 8746; bugfix
  3194. on 0.2.3.6-alpha.
  3195. o Minor features (diagnostic):
  3196. - When logging a warning because of bug 7164, additionally check the
  3197. hash table for consistency (as proposed on ticket 11737). This may
  3198. help diagnose bug 7164.
  3199. - When we log a heartbeat, log how many one-hop circuits we have
  3200. that are at least 30 minutes old, and log status information about
  3201. a few of them. This is an attempt to track down bug 8387.
  3202. - When encountering an unexpected CR while writing text to a file on
  3203. Windows, log the name of the file. Should help diagnosing
  3204. bug 11233.
  3205. - Give more specific warnings when a client notices that an onion
  3206. handshake has failed. Fixes ticket 9635.
  3207. - Add significant new logging code to attempt to diagnose bug 12184,
  3208. where relays seem to run out of available circuit IDs.
  3209. - Improve the diagnostic log message for bug 8387 even further to
  3210. try to improve our odds of figuring out why one-hop directory
  3211. circuits sometimes do not get closed.
  3212. o Minor features (security, memory management):
  3213. - Memory allocation tricks (mempools and buffer freelists) are now
  3214. disabled by default. You can turn them back on with
  3215. --enable-mempools and --enable-buf-freelists respectively. We're
  3216. disabling these features because malloc performance is good enough
  3217. on most platforms, and a similar feature in OpenSSL exacerbated
  3218. exploitation of the Heartbleed attack. Resolves ticket 11476.
  3219. o Minor features (security):
  3220. - Apply the secure SipHash-2-4 function to the hash table mapping
  3221. circuit IDs and channels to circuits. We missed this one when we
  3222. were converting all the other hash functions to use SipHash back
  3223. in 0.2.5.3-alpha. Resolves ticket 11750.
  3224. o Minor features (build):
  3225. - The configure script has a --disable-seccomp option to turn off
  3226. support for libseccomp on systems that have it, in case it (or
  3227. Tor's use of it) is broken. Resolves ticket 11628.
  3228. o Minor features (other):
  3229. - Update geoip and geoip6 to the June 4 2014 Maxmind GeoLite2
  3230. Country database.
  3231. o Minor bugfixes (security, new since 0.2.5.4-alpha, also in 0.2.4.22):
  3232. - When running a hidden service, do not allow TunneledDirConns 0;
  3233. this will keep the hidden service from running, and also
  3234. make it publish its descriptors directly over HTTP. Fixes bug 10849;
  3235. bugfix on 0.2.1.1-alpha.
  3236. o Minor bugfixes (performance):
  3237. - Avoid a bug where every successful connection made us recompute
  3238. the flag telling us whether we have sufficient information to
  3239. build circuits. Previously, we would forget our cached value
  3240. whenever we successfully opened a channel (or marked a router as
  3241. running or not running for any other reason), regardless of
  3242. whether we had previously believed the router to be running. This
  3243. forced us to run an expensive update operation far too often.
  3244. Fixes bug 12170; bugfix on 0.1.2.1-alpha.
  3245. - Avoid using tor_memeq() for checking relay cell integrity. This
  3246. removes a possible performance bottleneck. Fixes part of bug
  3247. 12169; bugfix on 0.2.1.31.
  3248. o Minor bugfixes (compilation):
  3249. - Fix compilation of test_status.c when building with MVSC. Bugfix
  3250. on 0.2.5.4-alpha. Patch from Gisle Vanem.
  3251. - Resolve GCC complaints on OpenBSD about discarding constness in
  3252. TO_{ORIGIN,OR}_CIRCUIT functions. Fixes part of bug 11633; bugfix
  3253. on 0.1.1.23. Patch from Dana Koch.
  3254. - Resolve clang complaints on OpenBSD with -Wshorten-64-to-32 due to
  3255. treatment of long and time_t as comparable types. Fixes part of
  3256. bug 11633. Patch from Dana Koch.
  3257. - Make Tor compile correctly with --disable-buf-freelists. Fixes bug
  3258. 11623; bugfix on 0.2.5.3-alpha.
  3259. - When deciding whether to build the 64-bit curve25519
  3260. implementation, detect platforms where we can compile 128-bit
  3261. arithmetic but cannot link it. Fixes bug 11729; bugfix on
  3262. 0.2.4.8-alpha. Patch from "conradev".
  3263. - Fix compilation when DNS_CACHE_DEBUG is enabled. Fixes bug 11761;
  3264. bugfix on 0.2.3.13-alpha. Found by "cypherpunks".
  3265. - Fix compilation with dmalloc. Fixes bug 11605; bugfix
  3266. on 0.2.4.10-alpha.
  3267. o Minor bugfixes (Directory server):
  3268. - When sending a compressed set of descriptors or microdescriptors,
  3269. make sure to finalize the zlib stream. Previously, we would write
  3270. all the compressed data, but if the last descriptor we wanted to
  3271. send was missing or too old, we would not mark the stream as
  3272. finished. This caused problems for decompression tools. Fixes bug
  3273. 11648; bugfix on 0.1.1.23.
  3274. o Minor bugfixes (Linux seccomp sandbox):
  3275. - Make the seccomp sandbox code compile under ARM Linux. Fixes bug
  3276. 11622; bugfix on 0.2.5.1-alpha.
  3277. - Avoid crashing when re-opening listener ports with the seccomp
  3278. sandbox active. Fixes bug 12115; bugfix on 0.2.5.1-alpha.
  3279. - Avoid crashing with the seccomp sandbox enabled along with
  3280. ConstrainedSockets. Fixes bug 12139; bugfix on 0.2.5.1-alpha.
  3281. - When we receive a SIGHUP with the sandbox enabled, correctly
  3282. support rotating our log files. Fixes bug 12032; bugfix
  3283. on 0.2.5.1-alpha.
  3284. - Avoid crash when running with sandboxing enabled and
  3285. DirReqStatistics not disabled. Fixes bug 12035; bugfix
  3286. on 0.2.5.1-alpha.
  3287. - Fix a "BUG" warning when trying to write bridge-stats files with
  3288. the Linux syscall sandbox filter enabled. Fixes bug 12041; bugfix
  3289. on 0.2.5.1-alpha.
  3290. - Prevent the sandbox from crashing on startup when run with the
  3291. --enable-expensive-hardening configuration option. Fixes bug
  3292. 11477; bugfix on 0.2.5.4-alpha.
  3293. - When running with DirPortFrontPage and sandboxing both enabled,
  3294. reload the DirPortFrontPage correctly when restarting. Fixes bug
  3295. 12028; bugfix on 0.2.5.1-alpha.
  3296. - Don't try to enable the sandbox when using the Tor binary to check
  3297. its configuration, hash a passphrase, or so on. Doing so was
  3298. crashing on startup for some users. Fixes bug 11609; bugfix
  3299. on 0.2.5.1-alpha.
  3300. - Avoid warnings when running with sandboxing and node statistics
  3301. enabled at the same time. Fixes part of 12064; bugfix on
  3302. 0.2.5.1-alpha. Patch from Michael Wolf.
  3303. - Avoid warnings when running with sandboxing enabled at the same
  3304. time as cookie authentication, hidden services, or directory
  3305. authority voting. Fixes part of 12064; bugfix on 0.2.5.1-alpha.
  3306. - Do not allow options that require calls to exec to be enabled
  3307. alongside the seccomp2 sandbox: they will inevitably crash. Fixes
  3308. bug 12043; bugfix on 0.2.5.1-alpha.
  3309. - Handle failures in getpwnam()/getpwuid() when running with the
  3310. User option set and the Linux syscall sandbox enabled. Fixes bug
  3311. 11946; bugfix on 0.2.5.1-alpha.
  3312. - Refactor the getaddrinfo workaround that the seccomp sandbox uses
  3313. to avoid calling getaddrinfo() after installing the sandbox
  3314. filters. Previously, it preloaded a cache with the IPv4 address
  3315. for our hostname, and nothing else. Now, it loads the cache with
  3316. every address that it used to initialize the Tor process. Fixes
  3317. bug 11970; bugfix on 0.2.5.1-alpha.
  3318. o Minor bugfixes (pluggable transports):
  3319. - Enable the ExtORPortCookieAuthFile option, to allow changing the
  3320. default location of the authentication token for the extended OR
  3321. Port as used by sever-side pluggable transports. We had
  3322. implemented this option before, but the code to make it settable
  3323. had been omitted. Fixes bug 11635; bugfix on 0.2.5.1-alpha.
  3324. - Avoid another 60-second delay when starting Tor in a pluggable-
  3325. transport-using configuration when we already have cached
  3326. descriptors for our bridges. Fixes bug 11965; bugfix
  3327. on 0.2.3.6-alpha.
  3328. o Minor bugfixes (client):
  3329. - Avoid "Tried to open a socket with DisableNetwork set" warnings
  3330. when starting a client with bridges configured and DisableNetwork
  3331. set. (Tor launcher starts Tor with DisableNetwork set the first
  3332. time it runs.) Fixes bug 10405; bugfix on 0.2.3.9-alpha.
  3333. o Minor bugfixes (testing):
  3334. - The Python parts of the test scripts now work on Python 3 as well
  3335. as Python 2, so systems where '/usr/bin/python' is Python 3 will
  3336. no longer have the tests break. Fixes bug 11608; bugfix
  3337. on 0.2.5.2-alpha.
  3338. - When looking for versions of python that we could run the tests
  3339. with, check for "python2.7" and "python3.3"; previously we were
  3340. only looking for "python", "python2", and "python3". Patch from
  3341. Dana Koch. Fixes bug 11632; bugfix on 0.2.5.2-alpha.
  3342. - Fix all valgrind warnings produced by the unit tests. There were
  3343. over a thousand memory leak warnings previously, mostly produced
  3344. by forgetting to free things in the unit test code. Fixes bug
  3345. 11618, bugfixes on many versions of Tor.
  3346. o Minor bugfixes (tor-fw-helper):
  3347. - Give a correct log message when tor-fw-helper fails to launch.
  3348. (Previously, we would say something like "tor-fw-helper sent us a
  3349. string we could not parse".) Fixes bug 9781; bugfix
  3350. on 0.2.4.2-alpha.
  3351. o Minor bugfixes (relay, threading):
  3352. - Check return code on spawn_func() in cpuworker code, so that we
  3353. don't think we've spawned a nonworking cpuworker and write junk to
  3354. it forever. Fix related to bug 4345; bugfix on all released Tor
  3355. versions. Found by "skruffy".
  3356. - Use a pthread_attr to make sure that spawn_func() cannot return an
  3357. error while at the same time launching a thread. Fix related to
  3358. bug 4345; bugfix on all released Tor versions. Reported
  3359. by "cypherpunks".
  3360. o Minor bugfixes (relay, oom prevention):
  3361. - Correctly detect the total available system memory. We tried to do
  3362. this in 0.2.5.4-alpha, but the code was set up to always return an
  3363. error value, even on success. Fixes bug 11805; bugfix
  3364. on 0.2.5.4-alpha.
  3365. o Minor bugfixes (relay, other):
  3366. - We now drop CREATE cells for already-existent circuit IDs and for
  3367. zero-valued circuit IDs, regardless of other factors that might
  3368. otherwise have called for DESTROY cells. Fixes bug 12191; bugfix
  3369. on 0.0.8pre1.
  3370. - Avoid an illegal read from stack when initializing the TLS module
  3371. using a version of OpenSSL without all of the ciphers used by the
  3372. v2 link handshake. Fixes bug 12227; bugfix on 0.2.4.8-alpha. Found
  3373. by "starlight".
  3374. - When rejecting DATA cells for stream_id zero, still count them
  3375. against the circuit's deliver window so that we don't fail to send
  3376. a SENDME. Fixes bug 11246; bugfix on 0.2.4.10-alpha.
  3377. o Minor bugfixes (logging):
  3378. - Fix a misformatted log message about delayed directory fetches.
  3379. Fixes bug 11654; bugfix on 0.2.5.3-alpha.
  3380. - Squelch a spurious LD_BUG message "No origin circuit for
  3381. successful SOCKS stream" in certain hidden service failure cases;
  3382. fixes bug 10616.
  3383. o Distribution:
  3384. - Include a tor.service file in contrib/dist for use with systemd.
  3385. Some distributions will be able to use this file unmodified;
  3386. others will need to tweak it, or write their own. Patch from Jamie
  3387. Nguyen; resolves ticket 8368.
  3388. o Documentation:
  3389. - Clean up several option names in the manpage to match their real
  3390. names, add the missing documentation for a couple of testing and
  3391. directory authority options, remove the documentation for a
  3392. V2-directory fetching option that no longer exists. Resolves
  3393. ticket 11634.
  3394. - Correct the documenation so that it lists the correct directory
  3395. for the stats files. (They are in a subdirectory called "stats",
  3396. not "status".)
  3397. - In the manpage, move more authority-only options into the
  3398. directory authority section so that operators of regular directory
  3399. caches don't get confused.
  3400. o Package cleanup:
  3401. - The contrib directory has been sorted and tidied. Before, it was
  3402. an unsorted dumping ground for useful and not-so-useful things.
  3403. Now, it is divided based on functionality, and the items which
  3404. seemed to be nonfunctional or useless have been removed. Resolves
  3405. ticket 8966; based on patches from "rl1987".
  3406. o Removed code:
  3407. - Remove /tor/dbg-stability.txt URL that was meant to help debug WFU
  3408. and MTBF calculations, but that nobody was using. Fixes ticket 11742.
  3409. - The TunnelDirConns and PreferTunnelledDirConns options no longer
  3410. exist; tunneled directory connections have been available since
  3411. 0.1.2.5-alpha, and turning them off is not a good idea. This is a
  3412. brute-force fix for 10849, where "TunnelDirConns 0" would break
  3413. hidden services.
  3414. Changes in version 0.2.4.22 - 2014-05-16
  3415. Tor 0.2.4.22 backports numerous high-priority fixes from the Tor 0.2.5
  3416. alpha release series. These include blocking all authority signing
  3417. keys that may have been affected by the OpenSSL "heartbleed" bug,
  3418. choosing a far more secure set of TLS ciphersuites by default, closing
  3419. a couple of memory leaks that could be used to run a target relay out
  3420. of RAM, and several others.
  3421. o Major features (security, backport from 0.2.5.4-alpha):
  3422. - Block authority signing keys that were used on authorities
  3423. vulnerable to the "heartbleed" bug in OpenSSL (CVE-2014-0160). (We
  3424. don't have any evidence that these keys _were_ compromised; we're
  3425. doing this to be prudent.) Resolves ticket 11464.
  3426. o Major bugfixes (security, OOM):
  3427. - Fix a memory leak that could occur if a microdescriptor parse
  3428. fails during the tokenizing step. This bug could enable a memory
  3429. exhaustion attack by directory servers. Fixes bug 11649; bugfix
  3430. on 0.2.2.6-alpha.
  3431. o Major bugfixes (TLS cipher selection, backport from 0.2.5.4-alpha):
  3432. - The relay ciphersuite list is now generated automatically based on
  3433. uniform criteria, and includes all OpenSSL ciphersuites with
  3434. acceptable strength and forward secrecy. Previously, we had left
  3435. some perfectly fine ciphersuites unsupported due to omission or
  3436. typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
  3437. 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
  3438. - Relays now trust themselves to have a better view than clients of
  3439. which TLS ciphersuites are better than others. (Thanks to bug
  3440. 11513, the relay list is now well-considered, whereas the client
  3441. list has been chosen mainly for anti-fingerprinting purposes.)
  3442. Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
  3443. CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
  3444. AES128. Resolves ticket 11528.
  3445. - Clients now try to advertise the same list of ciphersuites as
  3446. Firefox 28. This change enables selection of (fast) GCM
  3447. ciphersuites, disables some strange old ciphers, and stops
  3448. advertising the ECDH (not to be confused with ECDHE) ciphersuites.
  3449. Resolves ticket 11438.
  3450. o Minor bugfixes (configuration, security):
  3451. - When running a hidden service, do not allow TunneledDirConns 0:
  3452. trying to set that option together with a hidden service would
  3453. otherwise prevent the hidden service from running, and also make
  3454. it publish its descriptors directly over HTTP. Fixes bug 10849;
  3455. bugfix on 0.2.1.1-alpha.
  3456. o Minor bugfixes (controller, backport from 0.2.5.4-alpha):
  3457. - Avoid sending a garbage value to the controller when a circuit is
  3458. cannibalized. Fixes bug 11519; bugfix on 0.2.3.11-alpha.
  3459. o Minor bugfixes (exit relay, backport from 0.2.5.4-alpha):
  3460. - Stop leaking memory when we successfully resolve a PTR record.
  3461. Fixes bug 11437; bugfix on 0.2.4.7-alpha.
  3462. o Minor bugfixes (bridge client, backport from 0.2.5.4-alpha):
  3463. - Avoid 60-second delays in the bootstrapping process when Tor is
  3464. launching for a second time while using bridges. Fixes bug 9229;
  3465. bugfix on 0.2.0.3-alpha.
  3466. o Minor bugfixes (relays and bridges, backport from 0.2.5.4-alpha):
  3467. - Give the correct URL in the warning message when trying to run a
  3468. relay on an ancient version of Windows. Fixes bug 9393.
  3469. o Minor bugfixes (compilation):
  3470. - Fix a compilation error when compiling with --disable-curve25519.
  3471. Fixes bug 9700; bugfix on 0.2.4.17-rc.
  3472. o Minor bugfixes:
  3473. - Downgrade the warning severity for the the "md was still
  3474. referenced 1 node(s)" warning. Tor 0.2.5.4-alpha has better code
  3475. for trying to diagnose this bug, and the current warning in
  3476. earlier versions of tor achieves nothing useful. Addresses warning
  3477. from bug 7164.
  3478. o Minor features (log verbosity, backport from 0.2.5.4-alpha):
  3479. - When we run out of usable circuit IDs on a channel, log only one
  3480. warning for the whole channel, and describe how many circuits
  3481. there were on the channel. Fixes part of ticket 11553.
  3482. o Minor features (security, backport from 0.2.5.4-alpha):
  3483. - Decrease the lower limit of MaxMemInCellQueues to 256 MBytes (but
  3484. leave the default at 8GBytes), to better support Raspberry Pi
  3485. users. Fixes bug 9686; bugfix on 0.2.4.14-alpha.
  3486. o Documentation (backport from 0.2.5.4-alpha):
  3487. - Correctly document that we search for a system torrc file before
  3488. looking in ~/.torrc. Fixes documentation side of 9213; bugfix on
  3489. 0.2.3.18-rc.
  3490. Changes in version 0.2.5.4-alpha - 2014-04-25
  3491. Tor 0.2.5.4-alpha includes several security and performance
  3492. improvements for clients and relays, including blacklisting authority
  3493. signing keys that were used while susceptible to the OpenSSL
  3494. "heartbleed" bug, fixing two expensive functions on busy relays,
  3495. improved TLS ciphersuite preference lists, support for run-time
  3496. hardening on compilers that support AddressSanitizer, and more work on
  3497. the Linux sandbox code.
  3498. There are also several usability fixes for clients (especially clients
  3499. that use bridges), two new TransPort protocols supported (one on
  3500. OpenBSD, one on FreeBSD), and various other bugfixes.
  3501. This release marks end-of-life for Tor 0.2.2.x; those Tor versions
  3502. have accumulated many known flaws; everyone should upgrade.
  3503. o Major features (security):
  3504. - If you don't specify MaxMemInQueues yourself, Tor now tries to
  3505. pick a good value based on your total system memory. Previously,
  3506. the default was always 8 GB. You can still override the default by
  3507. setting MaxMemInQueues yourself. Resolves ticket 11396.
  3508. - Block authority signing keys that were used on authorities
  3509. vulnerable to the "heartbleed" bug in OpenSSL (CVE-2014-0160). (We
  3510. don't have any evidence that these keys _were_ compromised; we're
  3511. doing this to be prudent.) Resolves ticket 11464.
  3512. o Major features (relay performance):
  3513. - Speed up server-side lookups of rendezvous and introduction point
  3514. circuits by using hashtables instead of linear searches. These
  3515. functions previously accounted between 3 and 7% of CPU usage on
  3516. some busy relays. Resolves ticket 9841.
  3517. - Avoid wasting CPU when extending a circuit over a channel that is
  3518. nearly out of circuit IDs. Previously, we would do a linear scan
  3519. over possible circuit IDs before finding one or deciding that we
  3520. had exhausted our possibilities. Now, we try at most 64 random
  3521. circuit IDs before deciding that we probably won't succeed. Fixes
  3522. a possible root cause of ticket 11553.
  3523. o Major features (seccomp2 sandbox, Linux only):
  3524. - The seccomp2 sandbox can now run a test network for multiple hours
  3525. without crashing. The sandbox is still experimental, and more bugs
  3526. will probably turn up. To try it, enable "Sandbox 1" on a Linux
  3527. host. Resolves ticket 11351.
  3528. - Strengthen sandbox code: the sandbox can now test the arguments
  3529. for rename(), and blocks _sysctl() entirely. Resolves another part
  3530. of ticket 11351.
  3531. - When the sandbox blocks a system call, it now tries to log a stack
  3532. trace before exiting. Resolves ticket 11465.
  3533. o Major bugfixes (TLS cipher selection):
  3534. - The relay ciphersuite list is now generated automatically based on
  3535. uniform criteria, and includes all OpenSSL ciphersuites with
  3536. acceptable strength and forward secrecy. Previously, we had left
  3537. some perfectly fine ciphersuites unsupported due to omission or
  3538. typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
  3539. 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
  3540. - Relays now trust themselves to have a better view than clients of
  3541. which TLS ciphersuites are better than others. (Thanks to bug
  3542. 11513, the relay list is now well-considered, whereas the client
  3543. list has been chosen mainly for anti-fingerprinting purposes.)
  3544. Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
  3545. CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
  3546. AES128. Resolves ticket 11528.
  3547. - Clients now try to advertise the same list of ciphersuites as
  3548. Firefox 28. This change enables selection of (fast) GCM
  3549. ciphersuites, disables some strange old ciphers, and stops
  3550. advertising the ECDH (not to be confused with ECDHE) ciphersuites.
  3551. Resolves ticket 11438.
  3552. o Major bugfixes (bridge client):
  3553. - Avoid 60-second delays in the bootstrapping process when Tor is
  3554. launching for a second time while using bridges. Fixes bug 9229;
  3555. bugfix on 0.2.0.3-alpha.
  3556. o Minor features (transparent proxy, *BSD):
  3557. - Support FreeBSD's ipfw firewall interface for TransPort ports on
  3558. FreeBSD. To enable it, set "TransProxyType ipfw". Resolves ticket
  3559. 10267; patch from "yurivict".
  3560. - Support OpenBSD's divert-to rules with the pf firewall for
  3561. transparent proxy ports. To enable it, set "TransProxyType
  3562. pf-divert". This allows Tor to run a TransPort transparent proxy
  3563. port on OpenBSD 4.4 or later without root privileges. See the
  3564. pf.conf(5) manual page for information on configuring pf to use
  3565. divert-to rules. Closes ticket 10896; patch from Dana Koch.
  3566. o Minor features (security):
  3567. - New --enable-expensive-hardening option to enable security
  3568. hardening options that consume nontrivial amounts of CPU and
  3569. memory. Right now, this includes AddressSanitizer and UbSan, which
  3570. are supported in newer versions of GCC and Clang. Closes ticket
  3571. 11477.
  3572. o Minor features (log verbosity):
  3573. - Demote the message that we give when a flushing connection times
  3574. out for too long from NOTICE to INFO. It was usually meaningless.
  3575. Resolves ticket 5286.
  3576. - Don't log so many notice-level bootstrapping messages at startup
  3577. about downloading descriptors. Previously, we'd log a notice
  3578. whenever we learned about more routers. Now, we only log a notice
  3579. at every 5% of progress. Fixes bug 9963.
  3580. - Warn less verbosely when receiving a malformed
  3581. ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279.
  3582. - When we run out of usable circuit IDs on a channel, log only one
  3583. warning for the whole channel, and describe how many circuits
  3584. there were on the channel. Fixes part of ticket 11553.
  3585. o Minor features (relay):
  3586. - If a circuit timed out for at least 3 minutes, check if we have a
  3587. new external IP address, and publish a new descriptor with the new
  3588. IP address if it changed. Resolves ticket 2454.
  3589. o Minor features (controller):
  3590. - Make the entire exit policy available from the control port via
  3591. GETINFO exit-policy/*. Implements enhancement 7952. Patch from
  3592. "rl1987".
  3593. - Because of the fix for ticket 11396, the real limit for memory
  3594. usage may no longer match the configured MaxMemInQueues value. The
  3595. real limit is now exposed via GETINFO limits/max-mem-in-queues.
  3596. o Minor features (bridge client):
  3597. - Report a more useful failure message when we can't connect to a
  3598. bridge because we don't have the right pluggable transport
  3599. configured. Resolves ticket 9665. Patch from Fábio J. Bertinatto.
  3600. o Minor features (diagnostic):
  3601. - Add more log messages to diagnose bug 7164, which causes
  3602. intermittent "microdesc_free() called but md was still referenced"
  3603. warnings. We now include more information, to figure out why we
  3604. might be cleaning a microdescriptor for being too old if it's
  3605. still referenced by a live node_t object.
  3606. o Minor bugfixes (client, DNSPort):
  3607. - When using DNSPort, try to respond to AAAA requests with AAAA
  3608. answers. Previously, we hadn't looked at the request type when
  3609. deciding which answer type to prefer. Fixes bug 10468; bugfix on
  3610. 0.2.4.7-alpha.
  3611. - When receiving a DNS query for an unsupported record type, reply
  3612. with no answer rather than with a NOTIMPL error. This behavior
  3613. isn't correct either, but it will break fewer client programs, we
  3614. hope. Fixes bug 10268; bugfix on 0.2.0.1-alpha. Original patch
  3615. from "epoch".
  3616. o Minor bugfixes (exit relay):
  3617. - Stop leaking memory when we successfully resolve a PTR record.
  3618. Fixes bug 11437; bugfix on 0.2.4.7-alpha.
  3619. o Minor bugfixes (bridge client):
  3620. - Stop accepting bridge lines containing hostnames. Doing so would
  3621. cause clients to perform DNS requests on the hostnames, which was
  3622. not sensible behavior. Fixes bug 10801; bugfix on 0.2.0.1-alpha.
  3623. - Avoid a 60-second delay in the bootstrapping process when a Tor
  3624. client with pluggable transports re-reads its configuration at
  3625. just the wrong time. Re-fixes bug 11156; bugfix on 0.2.5.3-alpha.
  3626. o Minor bugfixes (client, logging during bootstrap):
  3627. - Warn only once if we start logging in an unsafe way. Previously,
  3628. we complain as many times as we had problems. Fixes bug 9870;
  3629. bugfix on 0.2.5.1-alpha.
  3630. - Only report the first fatal bootstrap error on a given OR
  3631. connection. This stops us from telling the controller bogus error
  3632. messages like "DONE". Fixes bug 10431; bugfix on 0.2.1.1-alpha.
  3633. - Be more helpful when trying to run sandboxed on Linux without
  3634. libseccomp. Instead of saying "Sandbox is not implemented on this
  3635. platform", we now explain that we need to be built with
  3636. libseccomp. Fixes bug 11543; bugfix on 0.2.5.1-alpha.
  3637. - Avoid generating spurious warnings when starting with
  3638. DisableNetwork enabled. Fixes bug 11200 and bug 10405; bugfix on
  3639. 0.2.3.9-alpha.
  3640. o Minor bugfixes (closing OR connections):
  3641. - If write_to_buf() in connection_write_to_buf_impl_() ever fails,
  3642. check if it's an or_connection_t and correctly call
  3643. connection_or_close_for_error() rather than
  3644. connection_mark_for_close() directly. Fixes bug 11304; bugfix on
  3645. 0.2.4.4-alpha.
  3646. - When closing all connections on setting DisableNetwork to 1, use
  3647. connection_or_close_normally() rather than closing OR connections
  3648. out from under the channel layer. Fixes bug 11306; bugfix on
  3649. 0.2.4.4-alpha.
  3650. o Minor bugfixes (controller):
  3651. - Avoid sending a garbage value to the controller when a circuit is
  3652. cannibalized. Fixes bug 11519; bugfix on 0.2.3.11-alpha.
  3653. o Minor bugfixes (tor-fw-helper):
  3654. - Allow tor-fw-helper to build again by adding src/ext to its
  3655. CPPFLAGS. Fixes bug 11296; bugfix on 0.2.5.3-alpha.
  3656. o Minor bugfixes (bridges):
  3657. - Avoid potential crashes or bad behavior when launching a
  3658. server-side managed proxy with ORPort or ExtORPort temporarily
  3659. disabled. Fixes bug 9650; bugfix on 0.2.3.16-alpha.
  3660. o Minor bugfixes (platform-specific):
  3661. - Fix compilation on Solaris, which does not have <endian.h>. Fixes
  3662. bug 11426; bugfix on 0.2.5.3-alpha.
  3663. - When dumping a malformed directory object to disk, save it in
  3664. binary mode on Windows, not text mode. Fixes bug 11342; bugfix on
  3665. 0.2.2.1-alpha.
  3666. - Don't report failures from make_socket_reuseable() on incoming
  3667. sockets on OSX: this can happen when incoming connections close
  3668. early. Fixes bug 10081.
  3669. o Minor bugfixes (trivial memory leaks):
  3670. - Fix a small memory leak when signing a directory object. Fixes bug
  3671. 11275; bugfix on 0.2.4.13-alpha.
  3672. - Free placeholder entries in our circuit table at exit; fixes a
  3673. harmless memory leak. Fixes bug 11278; bugfix on 0.2.5.1-alpha.
  3674. - Don't re-initialize a second set of OpenSSL mutexes when starting
  3675. up. Previously, we'd make one set of mutexes, and then immediately
  3676. replace them with another. Fixes bug 11726; bugfix on
  3677. 0.2.5.3-alpha.
  3678. - Resolve some memory leaks found by coverity in the unit tests, on
  3679. exit in tor-gencert, and on a failure to compute digests for our
  3680. own keys when generating a v3 networkstatus vote. These leaks
  3681. should never have affected anyone in practice.
  3682. o Minor bugfixes (hidden service):
  3683. - Only retry attempts to connect to a chosen rendezvous point 8
  3684. times, not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
  3685. o Minor bugfixes (misc code correctness):
  3686. - Fix various instances of undefined behavior in channeltls.c,
  3687. tor_memmem(), and eventdns.c that would cause us to construct
  3688. pointers to memory outside an allocated object. (These invalid
  3689. pointers were not accessed, but C does not even allow them to
  3690. exist.) Fixes bug 10363; bugfixes on 0.1.1.1-alpha, 0.1.2.1-alpha,
  3691. 0.2.0.10-alpha, and 0.2.3.6-alpha. Reported by "bobnomnom".
  3692. - Use the AddressSanitizer and Ubsan sanitizers (in clang-3.4) to
  3693. fix some miscellaneous errors in our tests and codebase. Fixes bug
  3694. 11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
  3695. - Always check return values for unlink, munmap, UnmapViewOfFile;
  3696. check strftime return values more often. In some cases all we can
  3697. do is report a warning, but this may help prevent deeper bugs from
  3698. going unnoticed. Closes ticket 8787; bugfixes on many, many tor
  3699. versions.
  3700. - Fix numerous warnings from the clang "scan-build" static analyzer.
  3701. Some of these are programming style issues; some of them are false
  3702. positives that indicated awkward code; some are undefined behavior
  3703. cases related to constructing (but not using) invalid pointers;
  3704. some are assumptions about API behavior; some are (harmlessly)
  3705. logging sizeof(ptr) bytes from a token when sizeof(*ptr) would be
  3706. correct; and one or two are genuine bugs that weren't reachable
  3707. from the rest of the program. Fixes bug 8793; bugfixes on many,
  3708. many tor versions.
  3709. o Documentation:
  3710. - Build the torify.1 manpage again. Previously, we were only trying
  3711. to build it when also building tor-fw-helper. That's why we didn't
  3712. notice that we'd broken the ability to build it. Fixes bug 11321;
  3713. bugfix on 0.2.5.1-alpha.
  3714. - Fix the layout of the SOCKSPort flags in the manpage. Fixes bug
  3715. 11061; bugfix on 0.2.4.7-alpha.
  3716. - Correctly document that we search for a system torrc file before
  3717. looking in ~/.torrc. Fixes documentation side of 9213; bugfix on
  3718. 0.2.3.18-rc.
  3719. - Resolve warnings from Doxygen.
  3720. o Code simplifications and refactoring:
  3721. - Remove is_internal_IP() function. Resolves ticket 4645.
  3722. - Remove unused function circuit_dump_by_chan from circuitlist.c.
  3723. Closes issue 9107; patch from "marek".
  3724. - Change our use of the ENUM_BF macro to avoid declarations that
  3725. confuse Doxygen.
  3726. o Deprecated versions:
  3727. - Tor 0.2.2.x has reached end-of-life; it has received no patches or
  3728. attention for some while. Directory authorities no longer accept
  3729. descriptors from relays running any version of Tor prior to Tor
  3730. 0.2.3.16-alpha. Resolves ticket 11149.
  3731. o Testing:
  3732. - New macros in test.h to simplify writing mock-functions for unit
  3733. tests. Part of ticket 11507. Patch from Dana Koch.
  3734. - Complete tests for the status.c module. Resolves ticket 11507.
  3735. Patch from Dana Koch.
  3736. o Removed code:
  3737. - Remove all code for the long unused v1 directory protocol.
  3738. Resolves ticket 11070.
  3739. Changes in version 0.2.5.3-alpha - 2014-03-22
  3740. Tor 0.2.5.3-alpha includes all the fixes from 0.2.4.21. It contains
  3741. two new anti-DoS features for Tor relays, resolves a bug that kept
  3742. SOCKS5 support for IPv6 from working, fixes several annoying usability
  3743. issues for bridge users, and removes more old code for unused
  3744. directory formats.
  3745. The Tor 0.2.5.x release series is now in patch-freeze: no feature
  3746. patches not already written will be considered for inclusion in 0.2.5.x.
  3747. o Major features (relay security, DoS-resistance):
  3748. - When deciding whether we have run out of memory and we need to
  3749. close circuits, also consider memory allocated in buffers for
  3750. streams attached to each circuit.
  3751. This change, which extends an anti-DoS feature introduced in
  3752. 0.2.4.13-alpha and improved in 0.2.4.14-alpha, lets Tor exit relays
  3753. better resist more memory-based DoS attacks than before. Since the
  3754. MaxMemInCellQueues option now applies to all queues, it is renamed
  3755. to MaxMemInQueues. This feature fixes bug 10169.
  3756. - Avoid hash-flooding denial-of-service attacks by using the secure
  3757. SipHash-2-4 hash function for our hashtables. Without this
  3758. feature, an attacker could degrade performance of a targeted
  3759. client or server by flooding their data structures with a large
  3760. number of entries to be stored at the same hash table position,
  3761. thereby slowing down the Tor instance. With this feature, hash
  3762. table positions are derived from a randomized cryptographic key,
  3763. and an attacker cannot predict which entries will collide. Closes
  3764. ticket 4900.
  3765. - Decrease the lower limit of MaxMemInQueues to 256 MBytes (but leave
  3766. the default at 8GBytes), to better support Raspberry Pi users. Fixes
  3767. bug 9686; bugfix on 0.2.4.14-alpha.
  3768. o Minor features (bridges, pluggable transports):
  3769. - Bridges now write the SHA1 digest of their identity key
  3770. fingerprint (that is, a hash of a hash of their public key) to
  3771. notice-level logs, and to a new hashed-fingerprint file. This
  3772. information will help bridge operators look up their bridge in
  3773. Globe and similar tools. Resolves ticket 10884.
  3774. - Improve the message that Tor displays when running as a bridge
  3775. using pluggable transports without an Extended ORPort listener.
  3776. Also, log the message in the log file too. Resolves ticket 11043.
  3777. o Minor features (other):
  3778. - Add a new option, PredictedPortsRelevanceTime, to control how long
  3779. after having received a request to connect to a given port Tor
  3780. will try to keep circuits ready in anticipation of future requests
  3781. for that port. Patch from "unixninja92"; implements ticket 9176.
  3782. - Generate a warning if any ports are listed in the SocksPolicy,
  3783. DirPolicy, AuthDirReject, AuthDirInvalid, AuthDirBadDir, or
  3784. AuthDirBadExit options. (These options only support address
  3785. ranges.) Fixes part of ticket 11108.
  3786. - Update geoip and geoip6 to the February 7 2014 Maxmind GeoLite2
  3787. Country database.
  3788. o Minor bugfixes (new since 0.2.5.2-alpha, also in 0.2.4.21):
  3789. - Build without warnings under clang 3.4. (We have some macros that
  3790. define static functions only some of which will get used later in
  3791. the module. Starting with clang 3.4, these give a warning unless the
  3792. unused attribute is set on them.) Resolves ticket 10904.
  3793. - Fix build warnings about missing "a2x" comment when building the
  3794. manpages from scratch on OpenBSD; OpenBSD calls it "a2x.py".
  3795. Fixes bug 10929; bugfix on 0.2.2.9-alpha. Patch from Dana Koch.
  3796. o Minor bugfixes (client):
  3797. - Improve the log message when we can't connect to a hidden service
  3798. because all of the hidden service directory nodes hosting its
  3799. descriptor are excluded. Improves on our fix for bug 10722, which
  3800. was a bugfix on 0.2.0.10-alpha.
  3801. - Raise a control port warning when we fail to connect to all of
  3802. our bridges. Previously, we didn't inform the controller, and
  3803. the bootstrap process would stall. Fixes bug 11069; bugfix on
  3804. 0.2.1.2-alpha.
  3805. - Exit immediately when a process-owning controller exits.
  3806. Previously, tor relays would wait for a little while after their
  3807. controller exited, as if they had gotten an INT signal -- but this
  3808. was problematic, since there was no feedback for the user. To do a
  3809. clean shutdown, controllers should send an INT signal and give Tor
  3810. a chance to clean up. Fixes bug 10449; bugfix on 0.2.2.28-beta.
  3811. - Stop attempting to connect to bridges before our pluggable
  3812. transports are configured (harmless but resulted in some erroneous
  3813. log messages). Fixes bug 11156; bugfix on 0.2.3.2-alpha.
  3814. - Fix connections to IPv6 addresses over SOCKS5. Previously, we were
  3815. generating incorrect SOCKS5 responses, and confusing client
  3816. applications. Fixes bug 10987; bugfix on 0.2.4.7-alpha.
  3817. o Minor bugfixes (relays and bridges):
  3818. - Avoid crashing on a malformed resolv.conf file when running a
  3819. relay using Libevent 1. Fixes bug 8788; bugfix on 0.1.1.23.
  3820. - Non-exit relays no longer launch mock DNS requests to check for
  3821. DNS hijacking. This has been unnecessary since 0.2.1.7-alpha, when
  3822. non-exit relays stopped servicing DNS requests. Fixes bug 965;
  3823. bugfix on 0.2.1.7-alpha. Patch from Matt Pagan.
  3824. - Bridges now report complete directory request statistics. Related
  3825. to bug 5824; bugfix on 0.2.2.1-alpha.
  3826. - Bridges now never collect statistics that were designed for
  3827. relays. Fixes bug 5824; bugfix on 0.2.3.8-alpha.
  3828. - Stop giving annoying warning messages when we decide not to launch
  3829. a pluggable transport proxy that we don't need (because there are
  3830. no bridges configured to use it). Resolves ticket 5018; bugfix
  3831. on 0.2.5.2-alpha.
  3832. - Give the correct URL in the warning message when trying to run a
  3833. relay on an ancient version of Windows. Fixes bug 9393.
  3834. o Minor bugfixes (backtrace support):
  3835. - Support automatic backtraces on more platforms by using the
  3836. "-fasynchronous-unwind-tables" compiler option. This option is
  3837. needed for platforms like 32-bit Intel where "-fomit-frame-pointer"
  3838. is on by default and table generation is not. This doesn't yet
  3839. add Windows support; only Linux, OSX, and some BSDs are affected.
  3840. Reported by 'cypherpunks'; fixes bug 11047; bugfix on 0.2.5.2-alpha.
  3841. - Avoid strange behavior if two threads hit failed assertions at the
  3842. same time and both try to log backtraces at once. (Previously, if
  3843. this had happened, both threads would have stored their intermediate
  3844. results in the same buffer, and generated junk outputs.) Reported by
  3845. "cypherpunks". Fixes bug 11048; bugfix on 0.2.5.2-alpha.
  3846. - Fix a compiler warning in format_number_sigsafe(). Bugfix on
  3847. 0.2.5.2-alpha; patch from Nick Hopper.
  3848. o Minor bugfixes (unit tests):
  3849. - Fix a small bug in the unit tests that might have made the tests
  3850. call 'chmod' with an uninitialized bitmask. Fixes bug 10928;
  3851. bugfix on 0.2.5.1-alpha. Patch from Dana Koch.
  3852. o Removed code:
  3853. - Remove all remaining code related to version-0 hidden service
  3854. descriptors: they have not been in use since 0.2.2.1-alpha. Fixes
  3855. the rest of bug 10841.
  3856. o Documentation:
  3857. - Document in the manpage that "KBytes" may also be written as
  3858. "kilobytes" or "KB", that "Kbits" may also be written as
  3859. "kilobits", and so forth. Closes ticket 9222.
  3860. - Document that the ClientOnly config option overrides ORPort.
  3861. Our old explanation made ClientOnly sound as though it did
  3862. nothing at all. Resolves bug 9059.
  3863. - Explain that SocksPolicy, DirPolicy, and similar options don't
  3864. take port arguments. Fixes the other part of ticket 11108.
  3865. - Fix a comment about the rend_server_descriptor_t.protocols field
  3866. to more accurately describe its range. Also, make that field
  3867. unsigned, to more accurately reflect its usage. Fixes bug 9099;
  3868. bugfix on 0.2.1.5-alpha.
  3869. - Fix the manpage's description of HiddenServiceAuthorizeClient:
  3870. the maximum client name length is 16, not 19. Fixes bug 11118;
  3871. bugfix on 0.2.1.6-alpha.
  3872. o Code simplifications and refactoring:
  3873. - Get rid of router->address, since in all cases it was just the
  3874. string representation of router->addr. Resolves ticket 5528.
  3875. o Test infrastructure:
  3876. - Update to the latest version of tinytest.
  3877. - Improve the tinytest implementation of string operation tests so
  3878. that comparisons with NULL strings no longer crash the tests; they
  3879. now just fail, normally. Fixes bug 9004; bugfix on 0.2.2.4-alpha.
  3880. Changes in version 0.2.4.21 - 2014-02-28
  3881. Tor 0.2.4.21 further improves security against potential adversaries who
  3882. find breaking 1024-bit crypto doable, and backports several stability
  3883. and robustness patches from the 0.2.5 branch.
  3884. o Major features (client security):
  3885. - When we choose a path for a 3-hop circuit, make sure it contains
  3886. at least one relay that supports the NTor circuit extension
  3887. handshake. Otherwise, there is a chance that we're building
  3888. a circuit that's worth attacking by an adversary who finds
  3889. breaking 1024-bit crypto doable, and that chance changes the game
  3890. theory. Implements ticket 9777.
  3891. o Major bugfixes:
  3892. - Do not treat streams that fail with reason
  3893. END_STREAM_REASON_INTERNAL as indicating a definite circuit failure,
  3894. since it could also indicate an ENETUNREACH connection error. Fixes
  3895. part of bug 10777; bugfix on 0.2.4.8-alpha.
  3896. o Code simplification and refactoring:
  3897. - Remove data structures which were introduced to implement the
  3898. CellStatistics option: they are now redundant with the new timestamp
  3899. field in the regular packed_cell_t data structure, which we did
  3900. in 0.2.4.18-rc in order to resolve bug 9093. Resolves ticket 10870.
  3901. o Minor features:
  3902. - Always clear OpenSSL bignums before freeing them -- even bignums
  3903. that don't contain secrets. Resolves ticket 10793. Patch by
  3904. Florent Daigniere.
  3905. - Build without warnings under clang 3.4. (We have some macros that
  3906. define static functions only some of which will get used later in
  3907. the module. Starting with clang 3.4, these give a warning unless the
  3908. unused attribute is set on them.) Resolves ticket 10904.
  3909. - Update geoip and geoip6 files to the February 7 2014 Maxmind
  3910. GeoLite2 Country database.
  3911. o Minor bugfixes:
  3912. - Set the listen() backlog limit to the largest actually supported
  3913. on the system, not to the value in a header file. Fixes bug 9716;
  3914. bugfix on every released Tor.
  3915. - Treat ENETUNREACH, EACCES, and EPERM connection failures at an
  3916. exit node as a NOROUTE error, not an INTERNAL error, since they
  3917. can apparently happen when trying to connect to the wrong sort
  3918. of netblocks. Fixes part of bug 10777; bugfix on 0.1.0.1-rc.
  3919. - Fix build warnings about missing "a2x" comment when building the
  3920. manpages from scratch on OpenBSD; OpenBSD calls it "a2x.py".
  3921. Fixes bug 10929; bugfix on 0.2.2.9-alpha. Patch from Dana Koch.
  3922. - Avoid a segfault on SIGUSR1, where we had freed a connection but did
  3923. not entirely remove it from the connection lists. Fixes bug 9602;
  3924. bugfix on 0.2.4.4-alpha.
  3925. - Fix a segmentation fault in our benchmark code when running with
  3926. Fedora's OpenSSL package, or any other OpenSSL that provides
  3927. ECDH but not P224. Fixes bug 10835; bugfix on 0.2.4.8-alpha.
  3928. - Turn "circuit handshake stats since last time" log messages into a
  3929. heartbeat message. Fixes bug 10485; bugfix on 0.2.4.17-rc.
  3930. o Documentation fixes:
  3931. - Document that all but one DirPort entry must have the NoAdvertise
  3932. flag set. Fixes bug 10470; bugfix on 0.2.3.3-alpha / 0.2.3.16-alpha.
  3933. Changes in version 0.2.5.2-alpha - 2014-02-13
  3934. Tor 0.2.5.2-alpha includes all the fixes from 0.2.4.18-rc and 0.2.4.20,
  3935. like the "poor random number generation" fix and the "building too many
  3936. circuits" fix. It also further improves security against potential
  3937. adversaries who find breaking 1024-bit crypto doable, and launches
  3938. pluggable transports on demand (which gets us closer to integrating
  3939. pluggable transport support by default -- not to be confused with Tor
  3940. bundles enabling pluggable transports and bridges by default).
  3941. o Major features (client security):
  3942. - When we choose a path for a 3-hop circuit, make sure it contains
  3943. at least one relay that supports the NTor circuit extension
  3944. handshake. Otherwise, there is a chance that we're building
  3945. a circuit that's worth attacking by an adversary who finds
  3946. breaking 1024-bit crypto doable, and that chance changes the game
  3947. theory. Implements ticket 9777.
  3948. - Clients now look at the "usecreatefast" consensus parameter to
  3949. decide whether to use CREATE_FAST or CREATE cells for the first hop
  3950. of their circuit. This approach can improve security on connections
  3951. where Tor's circuit handshake is stronger than the available TLS
  3952. connection security levels, but the tradeoff is more computational
  3953. load on guard relays. Implements proposal 221. Resolves ticket 9386.
  3954. o Major features (bridges):
  3955. - Don't launch pluggable transport proxies if we don't have any
  3956. bridges configured that would use them. Now we can list many
  3957. pluggable transports, and Tor will dynamically start one when it
  3958. hears a bridge address that needs it. Resolves ticket 5018.
  3959. - The bridge directory authority now assigns status flags (Stable,
  3960. Guard, etc) to bridges based on thresholds calculated over all
  3961. Running bridges. Now bridgedb can finally make use of its features
  3962. to e.g. include at least one Stable bridge in its answers. Fixes
  3963. bug 9859.
  3964. o Major features (other):
  3965. - Extend ORCONN controller event to include an "ID" parameter,
  3966. and add four new controller event types CONN_BW, CIRC_BW,
  3967. CELL_STATS, and TB_EMPTY that show connection and circuit usage.
  3968. The new events are emitted in private Tor networks only, with the
  3969. goal of being able to better track performance and load during
  3970. full-network simulations. Implements proposal 218 and ticket 7359.
  3971. - On some platforms (currently: recent OSX versions, glibc-based
  3972. platforms that support the ELF format, and a few other
  3973. Unix-like operating systems), Tor can now dump stack traces
  3974. when a crash occurs or an assertion fails. By default, traces
  3975. are dumped to stderr (if possible) and to any logs that are
  3976. reporting errors. Implements ticket 9299.
  3977. o Major bugfixes:
  3978. - Avoid a segfault on SIGUSR1, where we had freed a connection but did
  3979. not entirely remove it from the connection lists. Fixes bug 9602;
  3980. bugfix on 0.2.4.4-alpha.
  3981. - Do not treat streams that fail with reason
  3982. END_STREAM_REASON_INTERNAL as indicating a definite circuit failure,
  3983. since it could also indicate an ENETUNREACH connection error. Fixes
  3984. part of bug 10777; bugfix on 0.2.4.8-alpha.
  3985. o Major bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.20):
  3986. - Do not allow OpenSSL engines to replace the PRNG, even when
  3987. HardwareAccel is set. The only default builtin PRNG engine uses
  3988. the Intel RDRAND instruction to replace the entire PRNG, and
  3989. ignores all attempts to seed it with more entropy. That's
  3990. cryptographically stupid: the right response to a new alleged
  3991. entropy source is never to discard all previously used entropy
  3992. sources. Fixes bug 10402; works around behavior introduced in
  3993. OpenSSL 1.0.0. Diagnosis and investigation thanks to "coderman"
  3994. and "rl1987".
  3995. - Fix assertion failure when AutomapHostsOnResolve yields an IPv6
  3996. address. Fixes bug 10465; bugfix on 0.2.4.7-alpha.
  3997. - Avoid launching spurious extra circuits when a stream is pending.
  3998. This fixes a bug where any circuit that _wasn't_ unusable for new
  3999. streams would be treated as if it were, causing extra circuits to
  4000. be launched. Fixes bug 10456; bugfix on 0.2.4.12-alpha.
  4001. o Major bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  4002. - No longer stop reading or writing on cpuworker connections when
  4003. our rate limiting buckets go empty. Now we should handle circuit
  4004. handshake requests more promptly. Resolves bug 9731.
  4005. - Stop trying to bootstrap all our directory information from
  4006. only our first guard. Discovered while fixing bug 9946; bugfix
  4007. on 0.2.4.8-alpha.
  4008. o Minor features (bridges, pluggable transports):
  4009. - Add threshold cutoffs to the networkstatus document created by
  4010. the Bridge Authority. Fixes bug 1117.
  4011. - On Windows, spawn background processes using the CREATE_NO_WINDOW
  4012. flag. Now Tor Browser Bundle 3.5 with pluggable transports enabled
  4013. doesn't pop up a blank console window. (In Tor Browser Bundle 2.x,
  4014. Vidalia set this option for us.) Implements ticket 10297.
  4015. o Minor features (security):
  4016. - Always clear OpenSSL bignums before freeing them -- even bignums
  4017. that don't contain secrets. Resolves ticket 10793. Patch by
  4018. Florent Daignière.
  4019. o Minor features (config options and command line):
  4020. - Add an --allow-missing-torrc commandline option that tells Tor to
  4021. run even if the configuration file specified by -f is not available.
  4022. Implements ticket 10060.
  4023. - Add support for the TPROXY transparent proxying facility on Linux.
  4024. See documentation for the new TransProxyType option for more
  4025. details. Implementation by "thomo". Closes ticket 10582.
  4026. o Minor features (controller):
  4027. - Add a new "HS_DESC" controller event that reports activities
  4028. related to hidden service descriptors. Resolves ticket 8510.
  4029. - New "DROPGUARDS" controller command to forget all current entry
  4030. guards. Not recommended for ordinary use, since replacing guards
  4031. too frequently makes several attacks easier. Resolves ticket 9934;
  4032. patch from "ra".
  4033. o Minor features (build):
  4034. - Assume that a user using ./configure --host wants to cross-compile,
  4035. and give an error if we cannot find a properly named
  4036. tool-chain. Add a --disable-tool-name-check option to proceed
  4037. nevertheless. Addresses ticket 9869. Patch by Benedikt Gollatz.
  4038. - If we run ./configure and the compiler recognizes -fstack-protector
  4039. but the linker rejects it, warn the user about a potentially missing
  4040. libssp package. Addresses ticket 9948. Patch from Benedikt Gollatz.
  4041. o Minor features (testing):
  4042. - If Python is installed, "make check" now runs extra tests beyond
  4043. the unit test scripts.
  4044. - When bootstrapping a test network, sometimes very few relays get
  4045. the Guard flag. Now a new option "TestingDirAuthVoteGuard" can
  4046. specify a set of relays which should be voted Guard regardless of
  4047. their uptime or bandwidth. Addresses ticket 9206.
  4048. o Minor features (log messages):
  4049. - When ServerTransportPlugin is set on a bridge, Tor can write more
  4050. useful statistics about bridge use in its extrainfo descriptors,
  4051. but only if the Extended ORPort ("ExtORPort") is set too. Add a
  4052. log message to inform the user in this case. Resolves ticket 9651.
  4053. - When receiving a new controller connection, log the origin address.
  4054. Resolves ticket 9698; patch from "sigpipe".
  4055. - When logging OpenSSL engine status at startup, log the status of
  4056. more engines. Fixes ticket 10043; patch from Joshua Datko.
  4057. - Turn "circuit handshake stats since last time" log messages into a
  4058. heartbeat message. Fixes bug 10485; bugfix on 0.2.4.17-rc.
  4059. o Minor features (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  4060. - Improve the circuit queue out-of-memory handler. Previously, when
  4061. we ran low on memory, we'd close whichever circuits had the most
  4062. queued cells. Now, we close those that have the *oldest* queued
  4063. cells, on the theory that those are most responsible for us
  4064. running low on memory. Based on analysis from a forthcoming paper
  4065. by Jansen, Tschorsch, Johnson, and Scheuermann. Fixes bug 9093.
  4066. - Generate bootstrapping status update events correctly when fetching
  4067. microdescriptors. Fixes bug 9927.
  4068. - Update to the October 2 2013 Maxmind GeoLite Country database.
  4069. o Minor bugfixes (clients):
  4070. - When closing a channel that has already been open, do not close
  4071. pending circuits that were waiting to connect to the same relay.
  4072. Fixes bug 9880; bugfix on 0.2.5.1-alpha. Thanks to skruffy for
  4073. finding this bug.
  4074. o Minor bugfixes (relays):
  4075. - Treat ENETUNREACH, EACCES, and EPERM connection failures at an
  4076. exit node as a NOROUTE error, not an INTERNAL error, since they
  4077. can apparently happen when trying to connect to the wrong sort
  4078. of netblocks. Fixes part of bug 10777; bugfix on 0.1.0.1-rc.
  4079. o Minor bugfixes (bridges):
  4080. - Fix a bug where the first connection works to a bridge that uses a
  4081. pluggable transport with client-side parameters, but we don't send
  4082. the client-side parameters on subsequent connections. (We don't
  4083. use any pluggable transports with client-side parameters yet,
  4084. but ScrambleSuit will soon become the first one.) Fixes bug 9162;
  4085. bugfix on 0.2.0.3-alpha. Based on a patch from "rl1987".
  4086. o Minor bugfixes (node selection):
  4087. - If ExcludeNodes is set, consider non-excluded hidden service
  4088. directory servers before excluded ones. Do not consider excluded
  4089. hidden service directory servers at all if StrictNodes is
  4090. set. (Previously, we would sometimes decide to connect to those
  4091. servers, and then realize before we initiated a connection that
  4092. we had excluded them.) Fixes bug 10722; bugfix on 0.2.0.10-alpha.
  4093. Reported by "mr-4".
  4094. - If we set the ExitNodes option but it doesn't include any nodes
  4095. that have the Exit flag, we would choose not to bootstrap. Now we
  4096. bootstrap so long as ExitNodes includes nodes which can exit to
  4097. some port. Fixes bug 10543; bugfix on 0.2.4.10-alpha.
  4098. o Minor bugfixes (controller and command-line):
  4099. - If changing a config option via "setconf" fails in a recoverable
  4100. way, we used to nonetheless write our new control ports to the
  4101. file described by the "ControlPortWriteToFile" option. Now we only
  4102. write out that file if we successfully switch to the new config
  4103. option. Fixes bug 5605; bugfix on 0.2.2.26-beta. Patch from "Ryman".
  4104. - When a command-line option such as --version or --help that
  4105. ordinarily implies --hush appears on the command line along with
  4106. --quiet, then actually obey --quiet. Previously, we obeyed --quiet
  4107. only if it appeared later on the command line. Fixes bug 9578;
  4108. bugfix on 0.2.5.1-alpha.
  4109. o Minor bugfixes (code correctness):
  4110. - Previously we used two temporary files when writing descriptors to
  4111. disk; now we only use one. Fixes bug 1376.
  4112. - Remove an erroneous (but impossible and thus harmless) pointer
  4113. comparison that would have allowed compilers to skip a bounds
  4114. check in channeltls.c. Fixes bugs 10313 and 9980; bugfix on
  4115. 0.2.0.10-alpha. Noticed by Jared L Wong and David Fifield.
  4116. - Fix an always-true assertion in pluggable transports code so it
  4117. actually checks what it was trying to check. Fixes bug 10046;
  4118. bugfix on 0.2.3.9-alpha. Found by "dcb".
  4119. o Minor bugfixes (protocol correctness):
  4120. - When receiving a VERSIONS cell with an odd number of bytes, close
  4121. the connection immediately since the cell is malformed. Fixes bug
  4122. 10365; bugfix on 0.2.0.10-alpha. Spotted by "bobnomnom"; fix by
  4123. "rl1987".
  4124. o Minor bugfixes (build):
  4125. - Restore the ability to compile Tor with V2_HANDSHAKE_SERVER
  4126. turned off (that is, without support for v2 link handshakes). Fixes
  4127. bug 4677; bugfix on 0.2.3.2-alpha. Patch from "piet".
  4128. - Fix compilation warnings and startup issues when running with
  4129. "Sandbox 1" and libseccomp-2.1.0. Fixes bug 10563; bugfix on
  4130. 0.2.5.1-alpha.
  4131. - Fix compilation on Solaris 9, which didn't like us having an
  4132. identifier named "sun". Fixes bug 10565; bugfix in 0.2.5.1-alpha.
  4133. o Minor bugfixes (testing):
  4134. - Fix a segmentation fault in our benchmark code when running with
  4135. Fedora's OpenSSL package, or any other OpenSSL that provides
  4136. ECDH but not P224. Fixes bug 10835; bugfix on 0.2.4.8-alpha.
  4137. o Minor bugfixes (log messages):
  4138. - Fix a bug where clients using bridges would report themselves
  4139. as 50% bootstrapped even without a live consensus document.
  4140. Fixes bug 9922; bugfix on 0.2.1.1-alpha.
  4141. - Suppress a warning where, if there's only one directory authority
  4142. in the network, we would complain that votes and signatures cannot
  4143. be uploaded to other directory authorities. Fixes bug 10842;
  4144. bugfix on 0.2.2.26-beta.
  4145. - Report bootstrapping progress correctly when we're downloading
  4146. microdescriptors. We had updated our "do we have enough microdescs
  4147. to begin building circuits?" logic most recently in 0.2.4.10-alpha
  4148. (see bug 5956), but we left the bootstrap status event logic at
  4149. "how far through getting 1/4 of them are we?" Fixes bug 9958;
  4150. bugfix on 0.2.2.36, which is where they diverged (see bug 5343).
  4151. o Minor bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.20):
  4152. - Avoid a crash bug when starting with a corrupted microdescriptor
  4153. cache file. Fixes bug 10406; bugfix on 0.2.2.6-alpha.
  4154. - If we fail to dump a previously cached microdescriptor to disk, avoid
  4155. freeing duplicate data later on. Fixes bug 10423; bugfix on
  4156. 0.2.4.13-alpha. Spotted by "bobnomnom".
  4157. o Minor bugfixes on 0.2.4.x (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  4158. - Correctly log long IPv6 exit policies, instead of truncating them
  4159. or reporting an error. Fixes bug 9596; bugfix on 0.2.4.7-alpha.
  4160. - Our default TLS ecdhe groups were backwards: we meant to be using
  4161. P224 for relays (for performance win) and P256 for bridges (since
  4162. it is more common in the wild). Instead we had it backwards. After
  4163. reconsideration, we decided that the default should be P256 on all
  4164. hosts, since its security is probably better, and since P224 is
  4165. reportedly used quite little in the wild. Found by "skruffy" on
  4166. IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.
  4167. - Free directory authority certificate download statuses on exit
  4168. rather than leaking them. Fixes bug 9644; bugfix on 0.2.4.13-alpha.
  4169. o Minor bugfixes on 0.2.3.x (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  4170. - If the guard we choose first doesn't answer, we would try the
  4171. second guard, but once we connected to the second guard we would
  4172. abandon it and retry the first one, slowing down bootstrapping.
  4173. The fix is to treat all our initially chosen guards as acceptable
  4174. to use. Fixes bug 9946; bugfix on 0.1.1.11-alpha.
  4175. - Fix an assertion failure that would occur when disabling the
  4176. ORPort setting on a running Tor process while accounting was
  4177. enabled. Fixes bug 6979; bugfix on 0.2.2.18-alpha.
  4178. - When examining the list of network interfaces to find our address,
  4179. do not consider non-running or disabled network interfaces. Fixes
  4180. bug 9904; bugfix on 0.2.3.11-alpha. Patch from "hantwister".
  4181. - Avoid an off-by-one error when checking buffer boundaries when
  4182. formatting the exit status of a pluggable transport helper.
  4183. This is probably not an exploitable bug, but better safe than
  4184. sorry. Fixes bug 9928; bugfix on 0.2.3.18-rc. Bug found by
  4185. Pedro Ribeiro.
  4186. o Removed code and features:
  4187. - Clients now reject any directory authority certificates lacking
  4188. a dir-key-crosscert element. These have been included since
  4189. 0.2.1.9-alpha, so there's no real reason for them to be optional
  4190. any longer. Completes proposal 157. Resolves ticket 10162.
  4191. - Remove all code that existed to support the v2 directory system,
  4192. since there are no longer any v2 directory authorities. Resolves
  4193. ticket 10758.
  4194. - Remove the HSAuthoritativeDir and AlternateHSAuthority torrc
  4195. options, which were used for designating authorities as "Hidden
  4196. service authorities". There has been no use of hidden service
  4197. authorities since 0.2.2.1-alpha, when we stopped uploading or
  4198. downloading v0 hidden service descriptors. Fixes bug 10881; also
  4199. part of a fix for bug 10841.
  4200. o Code simplification and refactoring:
  4201. - Remove some old fallback code designed to keep Tor clients working
  4202. in a network with only two working relays. Elsewhere in the code we
  4203. have long since stopped supporting such networks, so there wasn't
  4204. much point in keeping it around. Addresses ticket 9926.
  4205. - Reject 0-length EXTEND2 cells more explicitly. Fixes bug 10536;
  4206. bugfix on 0.2.4.8-alpha. Reported by "cypherpunks".
  4207. - Remove data structures which were introduced to implement the
  4208. CellStatistics option: they are now redundant with the addition
  4209. of a timestamp to the regular packed_cell_t data structure, which
  4210. we did in 0.2.4.18-rc in order to resolve ticket 9093. Implements
  4211. ticket 10870.
  4212. o Documentation (man page) fixes:
  4213. - Update manpage to describe some of the files you can expect to
  4214. find in Tor's DataDirectory. Addresses ticket 9839.
  4215. - Document that all but one DirPort entry must have the NoAdvertise
  4216. flag set. Fixes bug 10470; bugfix on 0.2.3.3-alpha / 0.2.3.16-alpha.
  4217. o Documentation fixes (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  4218. - Clarify the usage and risks of setting the ContactInfo torrc line
  4219. for your relay or bridge. Resolves ticket 9854.
  4220. - Add anchors to the manpage so we can link to the html version of
  4221. the documentation for specific options. Resolves ticket 9866.
  4222. - Replace remaining references to DirServer in man page and
  4223. log entries. Resolves ticket 10124.
  4224. o Tool changes:
  4225. - Make the "tor-gencert" tool used by directory authority operators
  4226. create 2048-bit signing keys by default (rather than 1024-bit, since
  4227. 1024-bit is uncomfortably small these days). Addresses ticket 10324.
  4228. Changes in version 0.2.4.20 - 2013-12-22
  4229. Tor 0.2.4.20 fixes potentially poor random number generation for users
  4230. who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their
  4231. torrc file, 3) have "Sandy Bridge" or "Ivy Bridge" Intel processors,
  4232. and 4) have no state file in their DataDirectory (as would happen on
  4233. first start). Users who generated relay or hidden service identity
  4234. keys in such a situation should discard them and generate new ones.
  4235. This release also fixes a logic error that caused Tor clients to build
  4236. many more preemptive circuits than they actually need.
  4237. o Major bugfixes:
  4238. - Do not allow OpenSSL engines to replace the PRNG, even when
  4239. HardwareAccel is set. The only default builtin PRNG engine uses
  4240. the Intel RDRAND instruction to replace the entire PRNG, and
  4241. ignores all attempts to seed it with more entropy. That's
  4242. cryptographically stupid: the right response to a new alleged
  4243. entropy source is never to discard all previously used entropy
  4244. sources. Fixes bug 10402; works around behavior introduced in
  4245. OpenSSL 1.0.0. Diagnosis and investigation thanks to "coderman"
  4246. and "rl1987".
  4247. - Fix assertion failure when AutomapHostsOnResolve yields an IPv6
  4248. address. Fixes bug 10465; bugfix on 0.2.4.7-alpha.
  4249. - Avoid launching spurious extra circuits when a stream is pending.
  4250. This fixes a bug where any circuit that _wasn't_ unusable for new
  4251. streams would be treated as if it were, causing extra circuits to
  4252. be launched. Fixes bug 10456; bugfix on 0.2.4.12-alpha.
  4253. o Minor bugfixes:
  4254. - Avoid a crash bug when starting with a corrupted microdescriptor
  4255. cache file. Fixes bug 10406; bugfix on 0.2.2.6-alpha.
  4256. - If we fail to dump a previously cached microdescriptor to disk, avoid
  4257. freeing duplicate data later on. Fixes bug 10423; bugfix on
  4258. 0.2.4.13-alpha. Spotted by "bobnomnom".
  4259. Changes in version 0.2.4.19 - 2013-12-11
  4260. The Tor 0.2.4 release series is dedicated to the memory of Aaron Swartz
  4261. (1986-2013). Aaron worked on diverse projects including helping to guide
  4262. Creative Commons, playing a key role in stopping SOPA/PIPA, bringing
  4263. transparency to the U.S government's PACER documents, and contributing
  4264. design and development for Tor and Tor2Web. Aaron was one of the latest
  4265. martyrs in our collective fight for civil liberties and human rights,
  4266. and his death is all the more painful because he was one of us.
  4267. Tor 0.2.4.19, the first stable release in the 0.2.4 branch, features
  4268. a new circuit handshake and link encryption that use ECC to provide
  4269. better security and efficiency; makes relays better manage circuit
  4270. creation requests; uses "directory guards" to reduce client enumeration
  4271. risks; makes bridges collect and report statistics about the pluggable
  4272. transports they support; cleans up and improves our geoip database;
  4273. gets much closer to IPv6 support for clients, bridges, and relays; makes
  4274. directory authorities use measured bandwidths rather than advertised
  4275. ones when computing flags and thresholds; disables client-side DNS
  4276. caching to reduce tracking risks; and fixes a big bug in bridge
  4277. reachability testing. This release introduces two new design
  4278. abstractions in the code: a new "channel" abstraction between circuits
  4279. and or_connections to allow for implementing alternate relay-to-relay
  4280. transports, and a new "circuitmux" abstraction storing the queue of
  4281. circuits for a channel. The release also includes many stability,
  4282. security, and privacy fixes.
  4283. Changes in version 0.2.4.18-rc - 2013-11-16
  4284. Tor 0.2.4.18-rc is the fourth release candidate for the Tor 0.2.4.x
  4285. series. It takes a variety of fixes from the 0.2.5.x branch to improve
  4286. stability, performance, and better handling of edge cases.
  4287. o Major features:
  4288. - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
  4289. Resolves ticket 6055. (OpenSSL before 1.0.1 didn't have TLS 1.1 or
  4290. 1.2, and OpenSSL from 1.0.1 through 1.0.1d had bugs that prevented
  4291. renegotiation from working with TLS 1.1 or 1.2, so we had disabled
  4292. them to solve bug 6033.)
  4293. o Major bugfixes:
  4294. - No longer stop reading or writing on cpuworker connections when
  4295. our rate limiting buckets go empty. Now we should handle circuit
  4296. handshake requests more promptly. Resolves bug 9731.
  4297. - If we are unable to save a microdescriptor to the journal, do not
  4298. drop it from memory and then reattempt downloading it. Fixes bug
  4299. 9645; bugfix on 0.2.2.6-alpha.
  4300. - Stop trying to bootstrap all our directory information from
  4301. only our first guard. Discovered while fixing bug 9946; bugfix
  4302. on 0.2.4.8-alpha.
  4303. - The new channel code sometimes lost track of in-progress circuits,
  4304. causing long-running clients to stop building new circuits. The
  4305. fix is to always call circuit_n_chan_done(chan, 0) from
  4306. channel_closed(). Fixes bug 9776; bugfix on 0.2.4.17-rc.
  4307. o Minor bugfixes (on 0.2.4.x):
  4308. - Correctly log long IPv6 exit policies, instead of truncating them
  4309. or reporting an error. Fixes bug 9596; bugfix on 0.2.4.7-alpha.
  4310. - Our default TLS ecdhe groups were backwards: we meant to be using
  4311. P224 for relays (for performance win) and P256 for bridges (since
  4312. it is more common in the wild). Instead we had it backwards. After
  4313. reconsideration, we decided that the default should be P256 on all
  4314. hosts, since its security is probably better, and since P224 is
  4315. reportedly used quite little in the wild. Found by "skruffy" on
  4316. IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.
  4317. - Free directory authority certificate download statuses on exit
  4318. rather than leaking them. Fixes bug 9644; bugfix on 0.2.4.13-alpha.
  4319. o Minor bugfixes (on 0.2.3.x and earlier):
  4320. - If the guard we choose first doesn't answer, we would try the
  4321. second guard, but once we connected to the second guard we would
  4322. abandon it and retry the first one, slowing down bootstrapping.
  4323. The fix is to treat all our initially chosen guards as acceptable
  4324. to use. Fixes bug 9946; bugfix on 0.1.1.11-alpha.
  4325. - Fix an assertion failure that would occur when disabling the
  4326. ORPort setting on a running Tor process while accounting was
  4327. enabled. Fixes bug 6979; bugfix on 0.2.2.18-alpha.
  4328. - When examining the list of network interfaces to find our address,
  4329. do not consider non-running or disabled network interfaces. Fixes
  4330. bug 9904; bugfix on 0.2.3.11-alpha. Patch from "hantwister".
  4331. - Avoid an off-by-one error when checking buffer boundaries when
  4332. formatting the exit status of a pluggable transport helper.
  4333. This is probably not an exploitable bug, but better safe than
  4334. sorry. Fixes bug 9928; bugfix on 0.2.3.18-rc. Bug found by
  4335. Pedro Ribeiro.
  4336. o Minor features (protecting client timestamps):
  4337. - Clients no longer send timestamps in their NETINFO cells. These were
  4338. not used for anything, and they provided one small way for clients
  4339. to be distinguished from each other as they moved from network to
  4340. network or behind NAT. Implements part of proposal 222.
  4341. - Clients now round timestamps in INTRODUCE cells down to the nearest
  4342. 10 minutes. If a new Support022HiddenServices option is set to 0, or
  4343. if it's set to "auto" and the feature is disabled in the consensus,
  4344. the timestamp is sent as 0 instead. Implements part of proposal 222.
  4345. - Stop sending timestamps in AUTHENTICATE cells. This is not such
  4346. a big deal from a security point of view, but it achieves no actual
  4347. good purpose, and isn't needed. Implements part of proposal 222.
  4348. - Reduce down accuracy of timestamps in hidden service descriptors.
  4349. Implements part of proposal 222.
  4350. o Minor features (other):
  4351. - Improve the circuit queue out-of-memory handler. Previously, when
  4352. we ran low on memory, we'd close whichever circuits had the most
  4353. queued cells. Now, we close those that have the *oldest* queued
  4354. cells, on the theory that those are most responsible for us
  4355. running low on memory. Based on analysis from a forthcoming paper
  4356. by Jansen, Tschorsch, Johnson, and Scheuermann. Fixes bug 9093.
  4357. - Generate bootstrapping status update events correctly when fetching
  4358. microdescriptors. Fixes bug 9927.
  4359. - Update to the October 2 2013 Maxmind GeoLite Country database.
  4360. o Documentation fixes:
  4361. - Clarify the usage and risks of setting the ContactInfo torrc line
  4362. for your relay or bridge. Resolves ticket 9854.
  4363. - Add anchors to the manpage so we can link to the html version of
  4364. the documentation for specific options. Resolves ticket 9866.
  4365. - Replace remaining references to DirServer in man page and
  4366. log entries. Resolves ticket 10124.
  4367. Changes in version 0.2.5.1-alpha - 2013-10-02
  4368. Tor 0.2.5.1-alpha introduces experimental support for syscall sandboxing
  4369. on Linux, allows bridges that offer pluggable transports to report usage
  4370. statistics, fixes many issues to make testing easier, and provides
  4371. a pile of minor features and bugfixes that have been waiting for a
  4372. release of the new branch.
  4373. This is the first alpha release in a new series, so expect there to
  4374. be bugs. Users who would rather test out a more stable branch should
  4375. stay with 0.2.4.x for now.
  4376. o Major features (security):
  4377. - Use the seccomp2 syscall filtering facility on Linux to limit
  4378. which system calls Tor can invoke. This is an experimental,
  4379. Linux-only feature to provide defense-in-depth against unknown
  4380. attacks. To try turning it on, set "Sandbox 1" in your torrc
  4381. file. Please be ready to report bugs. We hope to add support
  4382. for better sandboxing in the future, including more fine-grained
  4383. filters, better division of responsibility, and support for more
  4384. platforms. This work has been done by Cristian-Matei Toader for
  4385. Google Summer of Code.
  4386. - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
  4387. Resolves ticket 6055. (OpenSSL before 1.0.1 didn't have TLS 1.1 or
  4388. 1.2, and OpenSSL from 1.0.1 through 1.0.1d had bugs that prevented
  4389. renegotiation from working with TLS 1.1 or 1.2, so we had disabled
  4390. them to solve bug 6033.)
  4391. o Major features (other):
  4392. - Add support for passing arguments to managed pluggable transport
  4393. proxies. Implements ticket 3594.
  4394. - Bridges now track GeoIP information and the number of their users
  4395. even when pluggable transports are in use, and report usage
  4396. statistics in their extra-info descriptors. Resolves tickets 4773
  4397. and 5040.
  4398. - Make testing Tor networks bootstrap better: lower directory fetch
  4399. retry schedules and maximum interval without directory requests,
  4400. and raise maximum download tries. Implements ticket 6752.
  4401. - Add make target 'test-network' to run tests on a Chutney network.
  4402. Implements ticket 8530.
  4403. - The ntor handshake is now on-by-default, no matter what the
  4404. directory authorities recommend. Implements ticket 8561.
  4405. o Major bugfixes:
  4406. - Instead of writing destroy cells directly to outgoing connection
  4407. buffers, queue them and intersperse them with other outgoing cells.
  4408. This can prevent a set of resource starvation conditions where too
  4409. many pending destroy cells prevent data cells from actually getting
  4410. delivered. Reported by "oftc_must_be_destroyed". Fixes bug 7912;
  4411. bugfix on 0.2.0.1-alpha.
  4412. - If we are unable to save a microdescriptor to the journal, do not
  4413. drop it from memory and then reattempt downloading it. Fixes bug
  4414. 9645; bugfix on 0.2.2.6-alpha.
  4415. - The new channel code sometimes lost track of in-progress circuits,
  4416. causing long-running clients to stop building new circuits. The
  4417. fix is to always call circuit_n_chan_done(chan, 0) from
  4418. channel_closed(). Fixes bug 9776; bugfix on 0.2.4.17-rc.
  4419. o Build features:
  4420. - Tor now builds each source file in two modes: a mode that avoids
  4421. exposing identifiers needlessly, and another mode that exposes
  4422. more identifiers for testing. This lets the compiler do better at
  4423. optimizing the production code, while enabling us to take more
  4424. radical measures to let the unit tests test things.
  4425. - The production builds no longer include functions used only in
  4426. the unit tests; all functions exposed from a module only for
  4427. unit-testing are now static in production builds.
  4428. - Add an --enable-coverage configuration option to make the unit
  4429. tests (and a new src/or/tor-cov target) to build with gcov test
  4430. coverage support.
  4431. o Testing:
  4432. - We now have rudimentary function mocking support that our unit
  4433. tests can use to test functions in isolation. Function mocking
  4434. lets the tests temporarily replace a function's dependencies with
  4435. stub functions, so that the tests can check the function without
  4436. invoking the other functions it calls.
  4437. - Add more unit tests for the <circid,channel>->circuit map, and
  4438. the destroy-cell-tracking code to fix bug 7912.
  4439. - Unit tests for failing cases of the TAP onion handshake.
  4440. - More unit tests for address-manipulation functions.
  4441. o Minor features (protecting client timestamps):
  4442. - Clients no longer send timestamps in their NETINFO cells. These were
  4443. not used for anything, and they provided one small way for clients
  4444. to be distinguished from each other as they moved from network to
  4445. network or behind NAT. Implements part of proposal 222.
  4446. - Clients now round timestamps in INTRODUCE cells down to the nearest
  4447. 10 minutes. If a new Support022HiddenServices option is set to 0, or
  4448. if it's set to "auto" and the feature is disabled in the consensus,
  4449. the timestamp is sent as 0 instead. Implements part of proposal 222.
  4450. - Stop sending timestamps in AUTHENTICATE cells. This is not such
  4451. a big deal from a security point of view, but it achieves no actual
  4452. good purpose, and isn't needed. Implements part of proposal 222.
  4453. - Reduce down accuracy of timestamps in hidden service descriptors.
  4454. Implements part of proposal 222.
  4455. o Minor features (config options):
  4456. - Config (torrc) lines now handle fingerprints which are missing
  4457. their initial '$'. Resolves ticket 4341; improvement over 0.0.9pre5.
  4458. - Support a --dump-config option to print some or all of the
  4459. configured options. Mainly useful for debugging the command-line
  4460. option parsing code. Helps resolve ticket 4647.
  4461. - Raise awareness of safer logging: notify user of potentially
  4462. unsafe config options, like logging more verbosely than severity
  4463. "notice" or setting SafeLogging to 0. Resolves ticket 5584.
  4464. - Add a new configuration option TestingV3AuthVotingStartOffset
  4465. that bootstraps a network faster by changing the timing for
  4466. consensus votes. Addresses ticket 8532.
  4467. - Add a new torrc option "ServerTransportOptions" that allows
  4468. bridge operators to pass configuration pa