Browse Source

Reflow the changelog

Nick Mathewson 7 years ago
parent
commit
7f074c3fa7
1 changed files with 129 additions and 134 deletions
  1. 129 134
      ChangeLog

+ 129 - 134
ChangeLog

@@ -1,9 +1,9 @@
 Changes in version 0.2.9.3-alpha - 2016-09-2?
 Changes in version 0.2.9.3-alpha - 2016-09-2?
-  Tor 0.2.9.3-alpha adds improved support for entities that
-  want to make high-performance services available through the Tor .onion
-  mechanism without themselves receiving anonymity as they host those
-  services.  It also tries harder to ensure that all steps on a circuit are
-  using the strongest crypto possible, strengthens some TLS properties, and
+  Tor 0.2.9.3-alpha adds improved support for entities that want to make
+  high-performance services available through the Tor .onion mechanism
+  without themselves receiving anonymity as they host those services. It
+  also tries harder to ensure that all steps on a circuit are using the
+  strongest crypto possible, strengthens some TLS properties, and
   resolves several bugs -- including a pair of crash bugs from the 0.2.8
   resolves several bugs -- including a pair of crash bugs from the 0.2.8
   series. Anybody running an earlier version of 0.2.9.x should upgrade.
   series. Anybody running an earlier version of 0.2.9.x should upgrade.
 
 
@@ -12,40 +12,39 @@ Changes in version 0.2.9.3-alpha - 2016-09-2?
   o Major features (circuit building, security):
   o Major features (circuit building, security):
     - Authorities, relays and clients specifically check that each
     - Authorities, relays and clients specifically check that each
       descriptor has an ntor key.
       descriptor has an ntor key.
-    - Circuit-building code assumes that all hops can use ntor,
-      except for rare hidden service protocol cases.
+    - Circuit-building code assumes that all hops can use ntor, except
+      for rare hidden service protocol cases.
     - Client code never chooses nodes without ntor keys: they will not
     - Client code never chooses nodes without ntor keys: they will not
       be selected during circuit-building, or as guards, or as directory
       be selected during circuit-building, or as guards, or as directory
       mirrors, or as introduction or rendezvous points.
       mirrors, or as introduction or rendezvous points.
-    - Clients avoid downloading a descriptor if the relay version is
-      too old to support ntor.
+    - Clients avoid downloading a descriptor if the relay version is too
+      old to support ntor.
     - Tor authorities, relays, and clients only use ntor, except for
     - Tor authorities, relays, and clients only use ntor, except for
       rare cases in the hidden service protocol.
       rare cases in the hidden service protocol.
 
 
   o Major features (onion services):
   o Major features (onion services):
     - Add experimental HiddenServiceSingleHopMode and
     - Add experimental HiddenServiceSingleHopMode and
-      HiddenServiceNonAnonymousMode options. When both are set to 1, every
-      hidden service on a tor instance becomes a non-anonymous Single Onion
-      Service. Single Onions make one-hop (direct) connections to their
-      introduction and renzedvous points. One-hop circuits make Single Onion
-      servers easily locatable, but clients remain location-anonymous.
-      This is compatible with the existing hidden service implementation, and
-      works on the current tor network without any changes to older relays or
-      clients.
-      Implements proposal 260, completes ticket 17178. Patch by teor and asn.
+      HiddenServiceNonAnonymousMode options. When both are set to 1,
+      every hidden service on a tor instance becomes a non-anonymous
+      Single Onion Service. Single Onions make one-hop (direct)
+      connections to their introduction and renzedvous points. One-hop
+      circuits make Single Onion servers easily locatable, but clients
+      remain location-anonymous. This is compatible with the existing
+      hidden service implementation, and works on the current tor
+      network without any changes to older relays or clients. Implements
+      proposal 260, completes ticket 17178. Patch by teor and asn.
 
 
   o Major features (resource management):
   o Major features (resource management):
-    - Tor now includes support for noticing when we are about to run out of
-      sockets, and preemptively closing connections of lower priority.
-      (This feature is off by default for now, since the current prioritizing
-      method is not mature enough yet. You can enable it by setting
-      "DisableOOSCheck 0".) Closes ticket 18640.
+    - Tor now includes support for noticing when we are about to run out
+      of sockets, and preemptively closing connections of lower
+      priority. (This feature is off by default for now, since the
+      current prioritizing method is not mature enough yet. You can
+      enable it by setting "DisableOOSCheck 0".) Closes ticket 18640.
 
 
   o Major bugfixes (circuit building):
   o Major bugfixes (circuit building):
-    - Hidden service client-to-intro-point and service-to-rendezvous-point
-      cicruitss use the TAP key supplied by the protocol, to avoid
-      epistemic attacks.
-      Fixes bug 19163; bugfix on 0.2.4.18-rc.
+    - Hidden service client-to-intro-point and service-to-rendezvous-
+      point cicruitss use the TAP key supplied by the protocol, to avoid
+      epistemic attacks. Fixes bug 19163; bugfix on 0.2.4.18-rc.
 
 
   o Major bugfixes (compilation, OpenBSD):
   o Major bugfixes (compilation, OpenBSD):
     - Fix a Libevent-detection bug in our autoconf script that would
     - Fix a Libevent-detection bug in our autoconf script that would
@@ -53,105 +52,88 @@ Changes in version 0.2.9.3-alpha - 2016-09-2?
       rubiate. Fixes bug 19902; bugfix on 0.2.9.1-alpha.
       rubiate. Fixes bug 19902; bugfix on 0.2.9.1-alpha.
 
 
   o Major bugfixes (hidden services):
   o Major bugfixes (hidden services):
-    - Clients require hidden services to include the TAP keys
-      for their intro points in the hidden service descriptor.
-      This prevents an inadvertent upgrade to ntor, which a
-      malicious hidden service could use to discover which
-      consensus a client has.
-      Fixes bug 20012; bugfix on 0.2.4.8-alpha. Patch by teor.
+    - Clients require hidden services to include the TAP keys for their
+      intro points in the hidden service descriptor. This prevents an
+      inadvertent upgrade to ntor, which a malicious hidden service
+      could use to discover which consensus a client has. Fixes bug
+      20012; bugfix on 0.2.4.8-alpha. Patch by teor.
 
 
-  o Minor feature (port flags):
-    - Add *Port flags NoDNSRequest and NoOnionTraffic, and
-      the synthetic flag OnionTrafficOnly, which is equivalent to
-      NoDNSRequest, NoIPv4Traffic, and NoIPv6Traffic.
-      Closes enhancement 18693; patch by "teor".
+  o Minor features (security, TLS):
+    - Servers no longer support clients that do not provide AES
+      ciphersuites. (3DES is no longer considered an acceptable cipher.)
+      We believe that no such clients currently exist, since we have
+      required OpenSSL 0.9.7 or later since 2009. Closes ticket 19998.
 
 
-  o Minor features (testing, ipv6):
-    - Add the single-onion and single-onion-ipv6 chutney targets to
-      make test-network-all. This requires a recent chutney version
-      with the single onion network flavours (git c72a652 or later).
-      Closes ticket 20072; patch by teor.
-    - Add the hs-ipv6 chutney target to make test-network-all's IPv6
-      tests. Remove bridges+hs, as it's somewhat redundant.
-      This requires a recent chutney version that supports IPv6 clients,
-      relays, and authorities.
-      Closes ticket 20069; patch by teor.
+  o Minor feature (port flags):
+    - Add *Port flags NoDNSRequest and NoOnionTraffic, and the synthetic
+      flag OnionTrafficOnly, which is equivalent to NoDNSRequest,
+      NoIPv4Traffic, and NoIPv6Traffic. Closes enhancement 18693; patch
+      by "teor".
 
 
   o Minor features (directory authority):
   o Minor features (directory authority):
-    - After voting, if the authorities decide that a relay is not "Valid",
-      they no longer include it in the consensus at all. Closes ticket
-      20002; implements part of proposal 272.
-
-  o Minor features (security, TLS):
-    - Servers no longer support clients that do not provide AES
-      ciphersuites. (3DES is no longer considered an acceptable
-      cipher.) We believe that no such clients currently exist,
-      since we have required OpenSSL 0.9.7 or later since 2009.
-      Closes ticket 19998.
+    - After voting, if the authorities decide that a relay is not
+      "Valid", they no longer include it in the consensus at all. Closes
+      ticket 20002; implements part of proposal 272.
 
 
   o Minor features (testing):
   o Minor features (testing):
-    - Disable memory protections on OpenBSD when testing memwipe().
-      The test deliberately invokes undefined behaviour which the
-      protections interfere with. Patch from "rubiate". Closes ticket
-      20066.
+    - Disable memory protections on OpenBSD when testing memwipe(). The
+      test deliberately invokes undefined behaviour which the protections
+      interfere with. Patch from "rubiate". Closes ticket 20066.
+
+  o Minor features (testing, ipv6):
+    - Add the single-onion and single-onion-ipv6 chutney targets to make
+      test-network-all. This requires a recent chutney version with the
+      single onion network flavours (git c72a652 or later). Closes
+      ticket 20072; patch by teor.
+    - Add the hs-ipv6 chutney target to make test-network-all's IPv6
+      tests. Remove bridges+hs, as it's somewhat redundant. This
+      requires a recent chutney version that supports IPv6 clients,
+      relays, and authorities. Closes ticket 20069; patch by teor.
 
 
   o Minor features (Tor2web):
   o Minor features (Tor2web):
-    - Make Tor2web clients respect ReachableAddresses.
-      This feature was inadvertently enabled in 0.2.8.6, then removed
-      by bugfix 19973 on 0.2.8.7.
-      Implements feature 20034. Patch by teor.
+    - Make Tor2web clients respect ReachableAddresses. This feature was
+      inadvertently enabled in 0.2.8.6, then removed by bugfix 19973 on
+      0.2.8.7. Implements feature 20034. Patch by teor.
 
 
   o Minor features (unit tests):
   o Minor features (unit tests):
     - Our link-handshake unit tests now check, that when invalid
     - Our link-handshake unit tests now check, that when invalid
-      handshakes fail, they fail with the error messages we
-      expected.
-    - Our unit testing code that captures log messages no longer prevents
-      them from being written out if the user asked for them (by passing
-      --debug or --info or or --notice --warn to the "test" binary). This
-      change will prevent us from missing unexpected log messages simply
-      because we were looking for others. Related to ticket 19999.
+      handshakes fail, they fail with the error messages we expected.
+    - Our unit testing code that captures log messages no longer
+      prevents them from being written out if the user asked for them
+      (by passing --debug or --info or or --notice --warn to the "test"
+      binary). This change will prevent us from missing unexpected log
+      messages simply because we were looking for others. Related to
+      ticket 19999.
     - The unit tests now log all warning messages with the "BUG" flag.
     - The unit tests now log all warning messages with the "BUG" flag.
       Previously, they only logged errors by default. This change will
       Previously, they only logged errors by default. This change will
-      help us make our testing code more correct, and make sure that
-      we only hit this code when we mean to. This is preparatory work
-      for ticket 19999.
+      help us make our testing code more correct, and make sure that we
+      only hit this code when we mean to. This is preparatory work for
+      ticket 19999.
     - The unit tests now treat any failure of a "tor_assert_nonfatal()"
     - The unit tests now treat any failure of a "tor_assert_nonfatal()"
       assertion as a test failure.
       assertion as a test failure.
     - We've done significant work to make the unit tests run faster.
     - We've done significant work to make the unit tests run faster.
 
 
   o Minor bug fixes (circuits):
   o Minor bug fixes (circuits):
-    - Use CircuitBuildTimeout whenever LearnCircuitBuildTimeout is disabled.
-      Fixes bug 19678; bugfix on commit 5b0b51ca3 in 0.2.4.12-alpha. Patch by teor.
-
-  o Minor bugfixes (options):
-    - Check the consistency of UseEntryGuards and EntryNodes more reliably.
-      Fixes bug 20074; bugfix on commit 686aaa5c in tor-0.2.4.12-alpha. Patch by teor.
-    - Stop changing the configured value of UseEntryGuards on authorities
-      and Tor2web clients.
-      Fixes bug 20074; bugfix on commits 51fc6799 in tor-0.1.1.16-rc and
-      acda1735 in tor-0.2.4.3-alpha. Patch by teor.
-
-  o Minor bugfixes (Tor2web):
-    - Prevent Tor2web clients running hidden services, these services are
-      not anonymous due to the one-hop client paths.
-      Fixes bug 19678. Patch by teor.
+    - Use CircuitBuildTimeout whenever LearnCircuitBuildTimeout is
+      disabled. Fixes bug 19678; bugfix on commit 5b0b51ca3 in
+      0.2.4.12-alpha. Patch by teor.
 
 
   o Minor bugfixes (allocation):
   o Minor bugfixes (allocation):
-    - Change how we allocate memory for large chunks on buffers, to avoid
-      a (currently impossible) integer overflow, and to waste less space
-      when allocating unusually large chunks. Fixes bug 20081; bugfix on
-      0.2.0.16-alpha. Issue identified by Guido Vranken.
+    - Change how we allocate memory for large chunks on buffers, to
+      avoid a (currently impossible) integer overflow, and to waste less
+      space when allocating unusually large chunks. Fixes bug 20081;
+      bugfix on 0.2.0.16-alpha. Issue identified by Guido Vranken.
     - Always include orconfig.h before including any other C headers.
     - Always include orconfig.h before including any other C headers.
       Sometimes, it includes macros that affect the behavior of the
       Sometimes, it includes macros that affect the behavior of the
-      standard headers. Fixes bug 19767; bugfix on 0.2.9.1-alpha (the first
-      version to use AC_USE_SYSTEM_EXTENSIONS).
-    - Fix a syntax error in the IF_BUG_ONCE__() macro in non-
-      GCC-compatible compilers. Fixes bug 20141; bugfix on
-      0.2.9.1-alpha. Patch from Gisle Vanem.
-    - Stop trying to build with Clang 4.0's -Wthread-safety
-      warnings. They apparently require a set of annotations that we
-      aren't currently using, and they create false positives in our
-      pthreads wrappers. Fixes bug 20110; bugfix on 0.2.9.1-alpha.
+      standard headers. Fixes bug 19767; bugfix on 0.2.9.1-alpha (the
+      first version to use AC_USE_SYSTEM_EXTENSIONS).
+    - Fix a syntax error in the IF_BUG_ONCE__() macro in non- GCC-
+      compatible compilers. Fixes bug 20141; bugfix on 0.2.9.1-alpha.
+      Patch from Gisle Vanem.
+    - Stop trying to build with Clang 4.0's -Wthread-safety warnings.
+      They apparently require a set of annotations that we aren't
+      currently using, and they create false positives in our pthreads
+      wrappers. Fixes bug 20110; bugfix on 0.2.9.1-alpha.
 
 
   o Minor bugfixes (directory authority):
   o Minor bugfixes (directory authority):
     - Die with a useful error when the operator forgets to place the
     - Die with a useful error when the operator forgets to place the
@@ -159,24 +141,22 @@ Changes in version 0.2.9.3-alpha - 2016-09-2?
       uninformative assert & traceback about having an invalid key.
       uninformative assert & traceback about having an invalid key.
       Fixes bug 20065; bugfix on 0.2.0.1-alpha.
       Fixes bug 20065; bugfix on 0.2.0.1-alpha.
     - When allowing private addresses, mark Exits that only exit to
     - When allowing private addresses, mark Exits that only exit to
-      private locations as such. Fixes bug 20064; bugfix on
-      0.2.2.9-alpha.
+      private locations as such. Fixes bug 20064; bugfix
+      on 0.2.2.9-alpha.
 
 
   o Minor bugfixes (documentation):
   o Minor bugfixes (documentation):
-    - Document the default PathsNeededToBuildCircuits value that's
-      used by clients when the directory authorities don't set
-      min_paths_for_circs_pct.
-      Fixes bug 20117; bugfix on 02c320916e02 in tor-0.2.4.10-alpha.
-      Patch by teor, reported by Jesse V.
+    - Document the default PathsNeededToBuildCircuits value that's used
+      by clients when the directory authorities don't set
+      min_paths_for_circs_pct. Fixes bug 20117; bugfix on 02c320916e02
+      in tor-0.2.4.10-alpha. Patch by teor, reported by Jesse V.
     - Fix manual for the User option: it takes a username, not a UID.
     - Fix manual for the User option: it takes a username, not a UID.
       Fixes bug 19122; bugfix on 0.0.2pre16 (the first version to have
       Fixes bug 19122; bugfix on 0.0.2pre16 (the first version to have
       a manpage!).
       a manpage!).
 
 
   o Minor bugfixes (hidden services):
   o Minor bugfixes (hidden services):
-    - Stop logging intro point details to the client log on
-      certain error conditions.
-      Fixed as part of bug 20012; bugfix on 0.2.4.8-alpha.
-      Patch by teor.
+    - Stop logging intro point details to the client log on certain
+      error conditions. Fixed as part of bug 20012; bugfix on
+      0.2.4.8-alpha. Patch by teor.
 
 
   o Minor bugfixes (IPv6, testing):
   o Minor bugfixes (IPv6, testing):
     - Check for IPv6 correctly on Linux when running test networks.
     - Check for IPv6 correctly on Linux when running test networks.
@@ -184,36 +164,51 @@ Changes in version 0.2.9.3-alpha - 2016-09-2?
 
 
   o Minor bugfixes (Linux seccomp2 sandbox):
   o Minor bugfixes (Linux seccomp2 sandbox):
     - Add permission to run the sched_yield() and sigaltstack() system
     - Add permission to run the sched_yield() and sigaltstack() system
-      calls, in order to support versions of Tor compiled with
-      asan or ubsan code that use these calls. Now "sandbox 1" and
-      "--enable-expensive-hardening" should be compatible.
-      Fixes bug 20063; bugfix on 0.2.5.1-alpha.
+      calls, in order to support versions of Tor compiled with asan or
+      ubsan code that use these calls. Now "sandbox 1" and
+      "--enable-expensive-hardening" should be compatible. Fixes bug
+      20063; bugfix on 0.2.5.1-alpha.
 
 
   o Minor bugfixes (logging):
   o Minor bugfixes (logging):
-    - When logging a message from the BUG() macro, be explicit about what
-      we were asserting. Previously we were confusing what we were asserting
-      with what the bug was. Fixes bug 20093; bugfix on 0.2.9.1-alpha.
+    - When logging a message from the BUG() macro, be explicit about
+      what we were asserting. Previously we were confusing what we were
+      asserting with what the bug was. Fixes bug 20093; bugfix
+      on 0.2.9.1-alpha.
     - When we are unable to remove the bw_accounting file, do not warn
     - When we are unable to remove the bw_accounting file, do not warn
       if the reason we couldn't remove it was that it didn't exist.
       if the reason we couldn't remove it was that it didn't exist.
-      Fixes bug 19964; bugfix on 0.2.5.4-alpha. Patch
-      from 'pastly'.
+      Fixes bug 19964; bugfix on 0.2.5.4-alpha. Patch from 'pastly'.
 
 
   o Minor bugfixes (option parsing):
   o Minor bugfixes (option parsing):
     - Count unix sockets when counting client listeners (SOCKS, Trans,
     - Count unix sockets when counting client listeners (SOCKS, Trans,
       NATD, and DNS). This has no user-visible behaviour changes: these
       NATD, and DNS). This has no user-visible behaviour changes: these
-      options are set once, and never read.
-      Required for correct behaviour in ticket 17178.
-      Fixes bug 19677; bugfix on 0.2.6.3-alpha.  Patch by teor.
+      options are set once, and never read. Required for correct
+      behaviour in ticket 17178. Fixes bug 19677; bugfix on
+      0.2.6.3-alpha. Patch by teor.
+
+  o Minor bugfixes (options):
+    - Check the consistency of UseEntryGuards and EntryNodes more
+      reliably. Fixes bug 20074; bugfix on commit 686aaa5c in tor-
+      0.2.4.12-alpha. Patch by teor.
+    - Stop changing the configured value of UseEntryGuards on
+      authorities and Tor2web clients. Fixes bug 20074; bugfix on
+      commits 51fc6799 in tor-0.1.1.16-rc and acda1735 in tor-0.2.4.3-
+      alpha. Patch by teor.
+
+  o Minor bugfixes (Tor2web):
+    - Prevent Tor2web clients running hidden services, these services
+      are not anonymous due to the one-hop client paths. Fixes bug
+      19678. Patch by teor.
 
 
   o Minor bugfixes (unit tests):
   o Minor bugfixes (unit tests):
-    - Fix shared random unit test that was failing on big endian architecture
-      due to internal representation of a integer copied to a buffer. The test
-      is changed to take a full 32 bytes of data and use the output of a
-      python script that make the COMMIT and REVEAL calculation according to
-      the spec.  Fixes bug 19977; bugfix on tor-0.2.9.1-alpha.
+    - Fix shared random unit test that was failing on big endian
+      architecture due to internal representation of a integer copied to
+      a buffer. The test is changed to take a full 32 bytes of data and
+      use the output of a python script that make the COMMIT and REVEAL
+      calculation according to the spec. Fixes bug 19977; bugfix
+      on tor-0.2.9.1-alpha.
     - The tor_tls_server_info_callback unit test no longer crashes when
     - The tor_tls_server_info_callback unit test no longer crashes when
-      debug-level logging is turned on. Fixes bug 20041; bugfix on
-      0.2.8.1-alpha.
+      debug-level logging is turned on. Fixes bug 20041; bugfix
+      on 0.2.8.1-alpha.
 
 
 
 
 Changes in version 0.2.9.2-alpha - 2016-08-24
 Changes in version 0.2.9.2-alpha - 2016-08-24