|  | @@ -1,9 +1,9 @@
 | 
	
		
			
				|  |  |  Changes in version 0.3.0.2-alpha - 2017-01-23
 | 
	
		
			
				|  |  |    Tor 0.3.0.2-alpha fixes a denial-of-service bug where an attacker could
 | 
	
		
			
				|  |  | -  cause relays and clients (including hidden services) to crash, even if
 | 
	
		
			
				|  |  | -  they were not built with the --enable-expensive-hardening option.
 | 
	
		
			
				|  |  | -  This bug affects all 0.2.9.x versions, and also affects 0.3.0.1-alpha:
 | 
	
		
			
				|  |  | -  all relays running an affected version should upgrade.
 | 
	
		
			
				|  |  | +  cause relays and clients to crash, even if they were not built with
 | 
	
		
			
				|  |  | +  the --enable-expensive-hardening option. This bug affects all 0.2.9.x
 | 
	
		
			
				|  |  | +  versions, and also affects 0.3.0.1-alpha: all relays running an affected
 | 
	
		
			
				|  |  | +  version should upgrade.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |    Tor 0.3.0.2-alpha also improves how exit relays and clients handle DNS
 | 
	
		
			
				|  |  |    time-to-live values, makes directory authorities enforce the 1-to-1
 | 
	
	
		
			
				|  | @@ -226,6 +226,49 @@ Changes in version 0.3.0.2-alpha - 2017-01-23
 | 
	
		
			
				|  |  |        HiddenService options. Closes ticket 21058.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | +Changes in version 0.2.9.9 - 2017-01-23
 | 
	
		
			
				|  |  | +  Tor 0.2.9.9 fixes a denial-of-service bug where an attacker could
 | 
	
		
			
				|  |  | +  cause relays and clients to crash, even if they were not built with
 | 
	
		
			
				|  |  | +  the --enable-expensive-hardening option. This bug affects all 0.2.9.x
 | 
	
		
			
				|  |  | +  versions, and also affects 0.3.0.1-alpha: all relays running an affected
 | 
	
		
			
				|  |  | +  version should upgrade.
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +  This release also resolves a client-side onion service reachability
 | 
	
		
			
				|  |  | +  bug, and resolves a pair of small portability issues.
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +  o Major bugfixes (security):
 | 
	
		
			
				|  |  | +    - Downgrade the "-ftrapv" option from "always on" to "only on when
 | 
	
		
			
				|  |  | +      --enable-expensive-hardening is provided." This hardening option,
 | 
	
		
			
				|  |  | +      like others, can turn survivable bugs into crashes -- and having
 | 
	
		
			
				|  |  | +      it on by default made a (relatively harmless) integer overflow bug
 | 
	
		
			
				|  |  | +      into a denial-of-service bug. Fixes bug 21278 (TROVE-2017-001);
 | 
	
		
			
				|  |  | +      bugfix on 0.2.9.1-alpha.
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +  o Major bugfixes (client, onion service):
 | 
	
		
			
				|  |  | +    - Fix a client-side onion service reachability bug, where multiple
 | 
	
		
			
				|  |  | +      socks requests to an onion service (or a single slow request)
 | 
	
		
			
				|  |  | +      could cause us to mistakenly mark some of the service's
 | 
	
		
			
				|  |  | +      introduction points as failed, and we cache that failure so
 | 
	
		
			
				|  |  | +      eventually we run out and can't reach the service. Also resolves a
 | 
	
		
			
				|  |  | +      mysterious "Remote server sent bogus reason code 65021" log
 | 
	
		
			
				|  |  | +      warning. The bug was introduced in ticket 17218, where we tried to
 | 
	
		
			
				|  |  | +      remember the circuit end reason as a uint16_t, which mangled
 | 
	
		
			
				|  |  | +      negative values. Partially fixes bug 21056 and fixes bug 20307;
 | 
	
		
			
				|  |  | +      bugfix on 0.2.8.1-alpha.
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +  o Minor features (geoip):
 | 
	
		
			
				|  |  | +    - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
 | 
	
		
			
				|  |  | +      Country database.
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +  o Minor bugfixes (portability):
 | 
	
		
			
				|  |  | +    - Avoid crashing when Tor is built using headers that contain
 | 
	
		
			
				|  |  | +      CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
 | 
	
		
			
				|  |  | +      without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix
 | 
	
		
			
				|  |  | +      on 0.2.9.1-alpha.
 | 
	
		
			
				|  |  | +    - Fix Libevent detection on platforms without Libevent 1 headers
 | 
	
		
			
				|  |  | +      installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  |  Changes in version 0.3.0.1-alpha - 2016-12-19
 | 
	
		
			
				|  |  |    Tor 0.3.0.1-alpha is the first alpha release in the 0.3.0 development
 | 
	
		
			
				|  |  |    series. It strengthens Tor's link and circuit handshakes by
 |