Browse Source

go through and rewrite the changes files to be more user-facing

Roger Dingledine 11 years ago
parent
commit
7c39bf0e44

+ 2 - 3
changes/10582_tproxy

@@ -1,7 +1,6 @@
   o Minor features:
   o Minor features:
-
     - Add support for the TPROXY transparent proxying facility on Linux.
     - Add support for the TPROXY transparent proxying facility on Linux.
-      See documentation for the new TransProxyType option for more details.
-      Implementation by "thomo". Closes ticket 10582.
+      See documentation for the new TransProxyType option for more
+      details. Implementation by "thomo". Closes ticket 10582.
 
 
 
 

+ 5 - 6
changes/10777_netunreach

@@ -1,7 +1,6 @@
-  - Minor bugfixes:
-
-    - Treat ENETUNREACH, EACCES, and EPERM at an exit node as a
-      NOROUTE error, not an INTERNAL error, since they can apparently
-      happen when trying to connect to the wrong sort of
-      netblocks. Fixes a part of bug 10777; bugfix on 0.1.0.1-rc.
+  o Minor bugfixes:
+    - Treat ENETUNREACH, EACCES, and EPERM connection failures at an
+      exit node as a NOROUTE error, not an INTERNAL error, since they
+      can apparently happen when trying to connect to the wrong sort
+      of netblocks. Fixes part of bug 10777; bugfix on 0.1.0.1-rc.
 
 

+ 3 - 2
changes/bug10046

@@ -1,3 +1,4 @@
   o Minor bugfixes:
   o Minor bugfixes:
-    - Fix an always-true assertion in pluggable transports code. Fixes
-      issue 10046. Found by dcb.
+    - Fix an always-true assertion in pluggable transports code so it
+      actually checks what it was trying to check. Fixes bug 10046;
+      bugfix on 0.2.3.9-alpha. Found by "dcb".

+ 4 - 3
changes/bug10297

@@ -1,4 +1,5 @@
   o Minor features:
   o Minor features:
-    - Spawn background processes using the CREATE_NO_WINDOW flag on
-      Windows, in order to prevent a console window from appearing.
-      Resolves ticket 10297.
+    - On Windows, spawn background processes using the CREATE_NO_WINDOW
+      flag. Now Tor Browser Bundle 3.5 with pluggable transports enabled
+      doesn't pop up a blank console window. (In Tor Browser Bundle 2.x,
+      Vidalia set this option for us.) Implements ticket 10297.

+ 4 - 6
changes/bug10313

@@ -1,8 +1,6 @@
   o Minor bugfixes:
   o Minor bugfixes:
-    - Fixed an erroneous pointer comparison that would have allowed
-      compilers to remove a bounds check in channeltls.c. The fix
-      was to remove the check entirely, since it was impossible for
-      the code to overflow the bounds. Noticed by Jared L
-      Wong. Fixes bug 10313 and 9980. Bugfix on 0.2.0.10-alpha.
-
+    - Remove an erroneous (but impossible and thus harmless) pointer
+      comparison that would have allowed compilers to skip a bounds
+      check in channeltls.c. Fixes bugs 10313 and 9980; bugfix on
+      0.2.0.10-alpha. Noticed by Jared L Wong and David Fifield.
 
 

+ 3 - 1
changes/bug10324

@@ -1,2 +1,4 @@
   o Tool changes:
   o Tool changes:
-    - Make tor-gencert create 2048 bit signing keys. Addresses ticket #10324.
+    - Make the "tor-gencert" tool used by directory authority operators
+      create 2048-bit signing keys by default (rather than 1024-bit, since
+      1024-bit is uncomfortably small these days). Addresses ticket 10324.

+ 4 - 4
changes/bug10365

@@ -1,7 +1,7 @@
   o Minor bugfixes:
   o Minor bugfixes:
-
-    - When receving a VERSIONS cell with an odd number of bytes, close
-      the connection immediately. Fix for bug 10365; bugfix on
-      0.2.0.10-alpha. Spotted by "bobnomnom"; fix by "rl1987".
+    - When receiving a VERSIONS cell with an odd number of bytes, close
+      the connection immediately since the cell is malformed. Fixes bug
+      10365; bugfix on 0.2.0.10-alpha. Spotted by "bobnomnom"; fix by
+      "rl1987".
 
 
 
 

+ 2 - 2
changes/bug10470

@@ -1,4 +1,4 @@
   o Documentation fixes:
   o Documentation fixes:
-    - Note that all but one DirPort entry must have the NoAdvertise flag
-      set. Fix for #10470.
+    - Document that all but one DirPort entry must have the NoAdvertise
+      flag set. Fixes bug 10470; bugfix on 0.2.3.3-alpha / 0.2.3.16-alpha.
 
 

+ 0 - 8
changes/bug10485

@@ -1,12 +1,4 @@
-<<<<<<< HEAD
   o Minor bugfixes:
   o Minor bugfixes:
     - Turn "circuit handshake stats since last time" log messages into a
     - Turn "circuit handshake stats since last time" log messages into a
       heartbeat message. Fixes bug 10485; bugfix on 0.2.4.17-rc.
       heartbeat message. Fixes bug 10485; bugfix on 0.2.4.17-rc.
 
 
-||||||| merged common ancestors
-=======
-  o Minor bugfixes:
-    - Move message about circuit handshake counts into the heartbeat
-      message where it belongs, instead of logging it once per hour
-      unconditionally. Fixes bug 10485; bugfix on 0.2.4.17-rc.
->>>>>>> origin/maint-0.2.4

+ 4 - 5
changes/bug10536

@@ -1,6 +1,5 @@
 
 
-  o Minor bugfixes:
-    - Reject 0-lenth EXTEND2 cells more expicitly. Previously our code would
-      reject them a bit later than it should have. This bug is
-      harmless. Fixes bug 10536; bugfix on 0.2.4.8-alpha. Reported by
-      "cypherpunks".
+  o Code simplification and refactoring:
+    - Reject 0-length EXTEND2 cells more explicitly. Fixes bug 10536;
+      bugfix on 0.2.4.8-alpha. Reported by "cypherpunks".
+

+ 4 - 3
changes/bug10543

@@ -1,5 +1,6 @@
   o Minor bugfixes:
   o Minor bugfixes:
-    - If all nodes with the Exit flag have been disabled with the ExitNodes
-      flag, consider nodes which can exit to other ports as well.  Fixes bug
-      10543; bugfix on 0.2.4.10-alpha.
+    - If we set the ExitNodes option but it doesn't include any nodes
+      that have the Exit flag, we would choose not to bootstrap. Now we
+      bootstrap so long as ExitNodes includes nodes which can exit to
+      some port. Fixes bug 10543; bugfix on 0.2.4.10-alpha.
 
 

+ 2 - 2
changes/bug10565

@@ -1,3 +1,3 @@
   o Minor bugfixes:
   o Minor bugfixes:
-    - Fix compilation on Solaris 9, which didn't like us to have an
-      identifier namd "sun". Fixes bug 10565; bugfix in 0.2.5.1-alpha.
+    - Fix compilation on Solaris 9, which didn't like us having an
+      identifier named "sun". Fixes bug 10565; bugfix in 0.2.5.1-alpha.

+ 7 - 7
changes/bug10722

@@ -1,8 +1,8 @@
   o Minor bugfixes:
   o Minor bugfixes:
-    - Consider non-excluded hidden service directory servers before
-      excluded ones. Do not consider excluded hidden service directory
-      servers at all if StrictNodes was set.  (Previously, we would
-      sometimes decide to connect to those servers, and then realize
-      before we initiated a connection that we had excluded them.)
-      Fix for bug #10722. Bugfix on 0.2.0.10-alpha. Reported by
-      "mr-4".
+    - If ExcludeNodes is set, consider non-excluded hidden service
+      directory servers before excluded ones. Do not consider excluded
+      hidden service directory servers at all if StrictNodes is
+      set. (Previously, we would sometimes decide to connect to those
+      servers, and then realize before we initiated a connection that
+      we had excluded them.) Fixes bug 10722; bugfix on 0.2.0.10-alpha.
+      Reported by "mr-4".

+ 4 - 4
changes/bug10758

@@ -1,4 +1,4 @@
-  o Removed code
-    - Remove all code that existed to support the v2 directory system:
-      There are no longer any v2 directory authorities. Resolves
-      bug 10758.
+  o Removed code and features:
+    - Remove all code that existed to support the v2 directory system,
+      since there are no longer any v2 directory authorities. Resolves
+      ticket 10758.

+ 4 - 3
changes/bug10777_internal_024

@@ -1,4 +1,5 @@
   o Major bugfixes:
   o Major bugfixes:
-    - Do not treat END_STREAM_REASON_INTERNAL as indicating a definite
-      circuit failure, since it could also indicate an ENETUNREACH
-      error. Fixes part of bug 10777; bugfix on 0.2.4.8-alpha.
+    - Do not treat streams that fail with reason
+      END_STREAM_REASON_INTERNAL as indicating a definite circuit failure,
+      since it could also indicate an ENETUNREACH connection error. Fixes
+      part of bug 10777; bugfix on 0.2.4.8-alpha.

+ 1 - 1
changes/bug10793

@@ -1,4 +1,4 @@
   o Minor features (security):
   o Minor features (security):
-    - Always clear OpenSSL bignums before freeing them--even bignums
+    - Always clear OpenSSL bignums before freeing them -- even bignums
       that don't contain secrets. Resolves ticket 10793. Patch by
       that don't contain secrets. Resolves ticket 10793. Patch by
       Florent Daigniere.
       Florent Daigniere.

+ 5 - 4
changes/bug10842

@@ -1,4 +1,5 @@
-  o Minor bugfixes:
-    - Suppress a warning that votes and signatures cannot be uploaded to
-      other directory authorities if there's only one directory authority
-      in the network. Bugfix on 0.2.2.26-beta. Resolves ticket 10842.
+  o Minor bugfixes (log messages):
+    - Suppress a warning where, if there's only one directory authority
+      in the network, we would complain that votes and signatures cannot
+      be uploaded to other directory authorities. Fixes bug 10842;
+      bugfix on 0.2.2.26-beta.

+ 3 - 3
changes/bug10870

@@ -1,6 +1,6 @@
   o Code simplification and refactoring:
   o Code simplification and refactoring:
     - Remove data structures which were introduced to implement the
     - Remove data structures which were introduced to implement the
       CellStatistics option: they are now redundant with the addition
       CellStatistics option: they are now redundant with the addition
-      of timestamp to the regular packed_cell_t data structure, which
-      we did in 0.2.4.18-rc in order to resolve #9093. Fixes bug
-      10870.
+      of a timestamp to the regular packed_cell_t data structure, which
+      we did in 0.2.4.18-rc in order to resolve ticket 9093. Implements
+      ticket 10870.

+ 7 - 7
changes/bug10881

@@ -1,7 +1,7 @@
-  o Removed code:
-
-    - Remove code for designating authorities as "Hidden service
-      authorities". There has been no use of hidden service authorities
-      since 0.2.2.1-alpha, when we stopped uploading or downloading v0
-      hidden service descriptors. Fixes bug 10881; part of a fix for bug
-      10841.
+  o Removed config options:
+    - Remove the HSAuthoritativeDir and AlternateHSAuthority torrc
+      options, which were used for designating authorities as "Hidden
+      service authorities". There has been no use of hidden service
+      authorities since 0.2.2.1-alpha, when we stopped uploading or
+      downloading v0 hidden service descriptors. Fixes bug 10881; also
+      part of a fix for bug 10841.

+ 3 - 4
changes/bug1376

@@ -1,4 +1,3 @@
-  o Minor bugfixes:
-
-    - Added additional argument to write_chunks_to_file to optionally skip
-      using a temp file to do non-atomic writes. Implements ticket #1376.
+  o Code simplification and refactoring: 
+    - Previously we used two temporary files when writing descriptors to
+      disk; now we only use one. Implements ticket 1376.

+ 2 - 2
changes/bug4677

@@ -1,4 +1,4 @@
   o Minor bugfixes (build):
   o Minor bugfixes (build):
     - Restore the ability to compile Tor with V2_HANDSHAKE_SERVER
     - Restore the ability to compile Tor with V2_HANDSHAKE_SERVER
-      turned off. Fixes bug 4677; bugfix on 0.2.3.2-alpha. Patch
-      from "piet".
+      turned off (that is, without support for v2 link handshakes). Fixes
+      bug 4677; bugfix on 0.2.3.2-alpha. Patch from "piet".

+ 5 - 3
changes/bug5018

@@ -1,3 +1,5 @@
-  o Minor features:
-    - Don't launch pluggable transport proxies that contribute
-      transports we don't need. Resolves ticket 5018.
+  o Major features:
+    - Don't launch pluggable transport proxies if we don't have any
+      bridges configured that would use them. Now we can list many
+      pluggable transports, and Tor will dynamically start one when it
+      hears a bridge address that needs it. Resolves ticket 5018.

+ 6 - 4
changes/bug5605

@@ -1,5 +1,7 @@
-o Minor Bugfixes:
-  - No longer writing control ports to file if updating reversible
-    options fail. Fixes bug 5605; bugfix on 0.2.2.26-beta.  Patch from
-    Ryman.
+  o Minor bugfixes:
+    - If changing a config option via "setconf" fails in a recoverable
+      way, we used to nonetheless write our new control ports to the
+      file described by the "ControlPortWriteToFile" option. Now we only
+      write out that file if we successfully switch to the new config
+      option. Fixes bug 5605; bugfix on 0.2.2.26-beta. Patch from "Ryman".
 
 

+ 8 - 6
changes/bug7359

@@ -1,7 +1,9 @@
-  o Minor features (controller):
-    - Extend ORCONN controller event by ID parameter and add four new
-      controller event types CONN_BW, CIRC_BW, CELL_STATS, and TB_EMPTY
-      that shall help understand connection and circuit usage.  The new
-      events are emitted in private Tor networks only.  Implements
-      proposal 218.  Resolves ticket #7359.
+  o Major features (controller):
+    - Extend ORCONN controller event to include an "ID" parameter,
+      and add four new controller event types CONN_BW, CIRC_BW,
+      CELL_STATS, and TB_EMPTY that show connection and circuit usage.
+      The new events are emitted in private Tor networks only, with the
+      goal of being able to better track performance and load during
+      full-network simulations. Implements proposal 218. Resolves
+      ticket 7359.
 
 

+ 6 - 4
changes/bug9162

@@ -1,6 +1,8 @@
   o Minor bugfixes:
   o Minor bugfixes:
-    - Fix a get_configured_bridge_by_addr_port_digest() function so
-      that it would return a bridge with given address and port even
-      if bridge digest is not specified by caller.  Fixes bug 9162;
-      bugfix on 0.2.0.3-alpha.  Based on a patch from "rl1987".
+    - Fix a bug where the first connection works to a bridge that uses a
+      pluggable transport with client-side parameters, but we don't send
+      the client-side parameters on subsequent connections. (We don't
+      use any pluggable transports with client-side parameters yet,
+      but ScrambleSuit will soon become the first one.) Fixes bug 9162;
+      bugfix on 0.2.0.3-alpha. Based on a patch from "rl1987".
 
 

+ 4 - 4
changes/bug9206

@@ -1,6 +1,6 @@
   o Minor features (testing):
   o Minor features (testing):
+    - When bootstrapping a test network, sometimes very few relays get
+      the Guard flag. Now a new option "TestingDirAuthVoteGuard" can
+      specify a set of relays which should be voted Guard regardless of
+      their uptime or bandwidth. Addresses ticket 9206.
 
 
-    - When bootstrapping a test network, few relays get the Guard
-      flag. There is now a new option, TestingDirAuthVoteGuard, which
-      can be used to specify a set of relays which should be voted
-      Guard regardless of uptime or bandwidth. Addresses ticket 9206.

+ 5 - 4
changes/bug9578

@@ -1,6 +1,7 @@
   o Minor bugfixes:
   o Minor bugfixes:
-    - When a command-line option such as --version or --help that ordinarily
-      implies --hush appears on the command line along with --quiet, obey
-      --quiet. Previously, we obeyed --quiet only if it appeared later on the
-      command line. Fixes bug 9578; bugfix on 0.2.5.1-alpha.
+    - When a command-line option such as --version or --help that
+      ordinarily implies --hush appears on the command line along with
+      --quiet, then actually obey --quiet. Previously, we obeyed --quiet
+      only if it appeared later on the command line. Fixes bug 9578;
+      bugfix on 0.2.5.1-alpha.
 
 

+ 4 - 5
changes/bug9602

@@ -1,5 +1,4 @@
- o Bugfixes
-   - Null out orconn->chan->conn when closing orconn in case orconn is freed
-     before channel_run_cleanup() gets to orconn->chan, and handle the null
-     conn edge case correctly in channel_tls_t methods.  Fixes bug #9602;
-     bugfix on 0.2.4.4-alpha.
+  o Minor bugfixes:
+    - Avoid a segfault on SIGUSR1, where we had freed a connection but did
+      not entirely remove it from the connection lists. Fixes bug 9602;
+      bugfix on 0.2.4.4-alpha.

+ 4 - 2
changes/bug9651

@@ -1,3 +1,5 @@
   o Minor features:
   o Minor features:
-    - Warn when the Extended ORPort should be set, but it isn't. Resolves
-      ticket 9651.
+    - When ServerTransportPlugin is set on a bridge, Tor can write more
+      useful statistics about bridge use in its extrainfo descriptors,
+      but only if the Extended ORPort ("ExtORPort") is set too. Add a
+      log message to inform the user in this case. Resolves ticket 9651.

+ 8 - 4
changes/bug9859

@@ -1,6 +1,10 @@
-  o Minor Feature
-
-    - Assign status flags to bridges based on thresholds calculated
-      over all bridges. Fixes bug 9859.
+  o Major features:
+    - The bridge directory authority now assigns status flags (Stable,
+      Guard, etc) to bridges based on thresholds calculated over all
+      Running bridges. Now bridgedb can finally make use of its features
+      to e.g. include at least one Stable bridge in its answers. Fixes
+      bug 9859.
+  o Minor features:
     - Add threshold cutoffs to the networkstatus document created by
     - Add threshold cutoffs to the networkstatus document created by
       the Bridge Authority. Fixes bug 1117.
       the Bridge Authority. Fixes bug 1117.
+

+ 4 - 6
changes/bug9869

@@ -1,7 +1,5 @@
   o Minor features (build):
   o Minor features (build):
-
-    - Assume that a user using configure --host wants to cross-
-      compile and error if we cannot find a properly named tool-
-      chain. Add --disable-tool-name-check to enable the user
-      to build nevertheless. Addresses ticket 9869. Patch by
-      Benedikt Gollatz.
+    - Assume that a user using ./configure --host wants to cross-compile,
+      and give an error if we cannot find a properly named
+      tool-chain. Add a --disable-tool-name-check option to proceed
+      nevertheless. Addresses ticket 9869. Patch by Benedikt Gollatz.

+ 3 - 3
changes/bug9926

@@ -1,6 +1,6 @@
-  o Minor bugfixes:
+  o Code simplification and refactoring:
     - Remove some old fallback code designed to keep Tor clients working
     - Remove some old fallback code designed to keep Tor clients working
-      in a network with only two working nodes. Elsewhere in the code we
+      in a network with only two working relays. Elsewhere in the code we
       have long since stopped supporting such networks, so there wasn't
       have long since stopped supporting such networks, so there wasn't
-      much point in keeping it around. Fixes bug 9926.
+      much point in keeping it around. Addresses ticket 9926.
 
 

+ 4 - 3
changes/bug9934

@@ -1,4 +1,5 @@
   o Minor features (controller):
   o Minor features (controller):
-    - New DROPGUARDS command to forget all current entry guards. Not
-      recommended for ordinary use, since replacing guards too frequently
-      makes several attacks easier. Resolves ticket #9934; patch from "ra".
+    - New "DROPGUARDS" controller command to forget all current entry
+      guards. Not recommended for ordinary use, since replacing guards
+      too frequently makes several attacks easier. Resolves ticket 9934;
+      patch from "ra".

+ 3 - 5
changes/bug9948

@@ -1,6 +1,4 @@
   o Minor features (build):
   o Minor features (build):
-
-    - Check in configure whether we can link an executable when
-      stack protection is enabled so we can warn the user about a
-      potentially missing libssp. Addresses ticket 9948. Patch
-      from Benedikt Gollatz. 
+    - If we run ./configure and the compiler recognizes -fstack-protector
+      but the linker rejects it, warn the user about a potentially missing
+      libssp package. Addresses ticket 9948. Patch from Benedikt Gollatz.

+ 7 - 3
changes/feature9777

@@ -1,3 +1,7 @@
-  o Minor features:
-    - Avoid using circuit paths if no node in the path supports the ntor
-      circuit extension handshake. Implements ticket 9777.
+  o Major features:
+    - When we choose a path for a 3-hop circuit, make sure it contains
+      at least one relay that supports the NTor circuit extension
+      handshake. Otherwise, there is a chance that we're building
+      a circuit that's worth attacking by an adversary who finds
+      breaking 1024-bit crypto doable, and that chance changes the game
+      theory. Implements ticket 9777.

+ 1 - 1
changes/prop157-require

@@ -2,4 +2,4 @@
     - Clients now reject any directory authority certificates lacking
     - Clients now reject any directory authority certificates lacking
       a dir-key-crosscert element. These have been included since
       a dir-key-crosscert element. These have been included since
       0.2.1.9-alpha, so there's no real reason for them to be optional
       0.2.1.9-alpha, so there's no real reason for them to be optional
-      any longer. Completes proposal 157.
+      any longer. Completes proposal 157. Resolves ticket 10162.

+ 7 - 6
changes/prop221

@@ -1,6 +1,7 @@
-  o Minor features:
-    - Stop sending the CREATE_FAST cells by default; instead, use a
-      parameter in the consensus to decide whether to use
-      CREATE_FAST. This can improve security on connections where
-      Tor's circuit handshake is stronger than the available TLS
-      connection security levels. Implements proposal 221.
+  o Major features:
+    - Clients now look at the "usecreatefast" consensus parameter to
+      decide whether to use CREATE_FAST or CREATE cells for the first hop
+      of their circuit. This approach can improve security on connections
+      where Tor's circuit handshake is stronger than the available TLS
+      connection security levels, but the tradeoff is more computational
+      load on guard relays. Implements proposal 221. Resolves ticket 9386.

+ 2 - 2
changes/python-tests

@@ -1,4 +1,4 @@
   o Minor features:
   o Minor features:
-    - "make check" now runs extra tests beyond the unit test scripts if
-      Python is installed.
+    - If Python is installed, "make check" now runs extra tests beyond
+      the unit test scripts.
 
 

+ 2 - 1
changes/seccomp2-fixes

@@ -1,3 +1,4 @@
   o Minor bugfixes:
   o Minor bugfixes:
     - Fix compilation warnings and startup issues when running with
     - Fix compilation warnings and startup issues when running with
-      libseccomp-2.1.0. Fixes bug 10563.
+      "Sandbox 1" and libseccomp-2.1.0. Fixes bug 10563; bugfix on
+      0.2.5.1-alpha.

+ 1 - 1
changes/stack_trace

@@ -4,5 +4,5 @@
       Unix-like operating systems), Tor can now dump stack traces
       Unix-like operating systems), Tor can now dump stack traces
       when a crash occurs or an assertion fails. By default, traces
       when a crash occurs or an assertion fails. By default, traces
       are dumped to stderr (if possible) and to any logs that are
       are dumped to stderr (if possible) and to any logs that are
-      reporting errors.
+      reporting errors. Implements ticket 9299.
 
 

+ 2 - 2
changes/ticket10060

@@ -1,5 +1,5 @@
   o Minor features:
   o Minor features:
-    - Adding --allow-missing-torrc commandline option that allows Tor to
-      run if configuration file specified by -f is not available.
+    - Add an --allow-missing-torrc commandline option that tells Tor to
+      run even if the configuration file specified by -f is not available.
       Implements ticket 10060.
       Implements ticket 10060.
 
 

+ 2 - 3
changes/ticket8510

@@ -1,4 +1,3 @@
   o Minor features:
   o Minor features:
-    - Implement the HS_DESC async control event that notifies controller on
-      activities related to hidden service descriptors. Partly resolves
-      ticket 8510.
+    - Add a new "HS_DESC" controller event that reports activities
+      related to hidden service descriptors. Resolves ticket 8510.

+ 2 - 2
changes/ticket9839

@@ -1,3 +1,3 @@
   o Documentation:
   o Documentation:
-    - Update manpage to describe some of the files one could find
-      in data directory. Fixes bug 9839.
+    - Update manpage to describe some of the files you can expect to
+      find in Tor's DataDirectory. Addresses ticket 9839.