remove items from 0.3.3.6 that are already in 0.3.2.10
This commit is contained in:
parent
67da2d9411
commit
00e7e324d1
123
ReleaseNotes
123
ReleaseNotes
|
@ -7,7 +7,7 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
backports several important fixes from the 0.3.4.1-alpha.
|
||||
|
||||
The Tor 0.3.3 series includes several important features, including
|
||||
improved denial-of-service resistance, controller support and other
|
||||
controller support and other
|
||||
improvements for v3 onion services, and official support for embedding
|
||||
Tor within other applications. It also include our first non-trivial
|
||||
module written in the Rust programming language. (Rust is still not
|
||||
|
@ -28,20 +28,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
bugfix on 0.2.9.4-alpha. This issue is also tracked as
|
||||
TROVE-2018-005.
|
||||
|
||||
o Major features (denial-of-service mitigation):
|
||||
- Give relays some defenses against the recent network overload. We
|
||||
start with three defenses (default parameters in parentheses).
|
||||
First: if a single client address makes too many concurrent
|
||||
connections (>100), hang up on further connections. Second: if a
|
||||
single client address makes circuits too quickly (more than 3 per
|
||||
second, with an allowed burst of 90) while also having too many
|
||||
connections open (3), refuse new create cells for the next while
|
||||
(1-2 hours). Third: if a client asks to establish a rendezvous
|
||||
point to you directly, ignore the request. These defenses can be
|
||||
manually controlled by new torrc options, but relays will also
|
||||
take guidance from consensus parameters, so there's no need to
|
||||
configure anything manually. Implements ticket 24902.
|
||||
|
||||
o Major features (embedding):
|
||||
- There is now a documented stable API for programs that need to
|
||||
embed Tor. See tor_api.h for full documentation and known bugs.
|
||||
|
@ -114,12 +100,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
if we fail to allow any circuits to actually complete. Fixes bug
|
||||
25733; bugfix on 0.2.2.2-alpha.
|
||||
|
||||
o Major bugfixes (denial-of-service, directory authority):
|
||||
- Fix a protocol-list handling bug that could be used to remotely crash
|
||||
directory authorities with a null-pointer exception. Fixes bug 25074;
|
||||
bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001 and
|
||||
CVE-2018-0490.
|
||||
|
||||
o Major bugfixes (netflow padding):
|
||||
- Stop adding unneeded channel padding right after we finish
|
||||
flushing to a connection that has been trying to flush for many
|
||||
|
@ -133,18 +113,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
- Correctly detect when onion services get disabled after HUP.
|
||||
Fixes bug 25761; bugfix on 0.3.2.1.
|
||||
|
||||
o Major bugfixes (onion services, retry behavior):
|
||||
- Fix an "off by 2" error in counting rendezvous failures on the
|
||||
onion service side. While we thought we would stop the rendezvous
|
||||
attempt after one failed circuit, we were actually making three
|
||||
circuit attempts before giving up. Now switch to a default of 2,
|
||||
and allow the consensus parameter "hs_service_max_rdv_failures" to
|
||||
override. Fixes bug 24895; bugfix on 0.0.6.
|
||||
- New-style (v3) onion services now obey the "max rendezvous circuit
|
||||
attempts" logic. Previously they would make as many rendezvous
|
||||
circuit attempts as they could fit in the MAX_REND_TIMEOUT second
|
||||
window before giving up. Fixes bug 24894; bugfix on 0.3.2.1-alpha.
|
||||
|
||||
o Major bugfixes (performance, load balancing):
|
||||
- Directory authorities no longer vote in favor of the Guard flag
|
||||
for relays without directory support. Starting in Tor
|
||||
|
@ -153,31 +121,16 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
the 5%-or-so of Guards that don't advertise directory support.
|
||||
Fixes bug 22310; bugfix on 0.3.0.6.
|
||||
|
||||
o Major bugfixes (protocol versions):
|
||||
- Add Link protocol version 5 to the supported protocols list. Fixes
|
||||
bug 25070; bugfix on 0.3.1.1-alpha.
|
||||
|
||||
o Major bugfixes (relay):
|
||||
- If we have failed to connect to a relay and received a connection
|
||||
refused, timeout, or similar error (at the TCP level), do not try
|
||||
that same address/port again for 60 seconds after the failure has
|
||||
occurred. Fixes bug 24767; bugfix on 0.0.6.
|
||||
- Fix a set of false positives where relays would consider
|
||||
connections to other relays as being client-only connections (and
|
||||
thus e.g. deserving different link padding schemes) if those
|
||||
relays fell out of the consensus briefly. Now we look only at the
|
||||
initial handshake and whether the connection authenticated as a
|
||||
relay. Fixes bug 24898; bugfix on 0.3.1.1-alpha.
|
||||
|
||||
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
|
||||
- Impose a limit on circuit cell queue size. The limit can be controlled by
|
||||
a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
|
||||
|
||||
o Major bugfixes (scheduler, consensus):
|
||||
- The scheduler subsystem was failing to promptly notice changes in
|
||||
consensus parameters, making it harder to switch schedulers
|
||||
network-wide. Fixes bug 24975; bugfix on 0.3.2.1-alpha.
|
||||
|
||||
o Minor features (cleanup):
|
||||
- Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile
|
||||
when it stops. Closes ticket 23271.
|
||||
|
@ -186,13 +139,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
- Avoid some compilation warnings with recent versions
|
||||
of LibreSSL. Closes ticket 26006.
|
||||
|
||||
o Minor features (compatibility, OpenSSL):
|
||||
- Tor will now support TLS1.3 once OpenSSL 1.1.1 is released.
|
||||
Previous versions of Tor would not have worked with OpenSSL 1.1.1,
|
||||
since they neither disabled TLS 1.3 nor enabled any of the
|
||||
ciphersuites it requires. Now we enable the TLS 1.3 ciphersuites.
|
||||
Closes ticket 24978.
|
||||
|
||||
o Minor features (config options):
|
||||
- Change the way the default value for MaxMemInQueues is calculated.
|
||||
We now use 40% of the hardware RAM if the system has 8 GB RAM or
|
||||
|
@ -221,11 +167,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
node_get_ed25519_id() before returning them. Implements 24001,
|
||||
patch by "aruna1234".
|
||||
|
||||
o Minor features (denial-of-service avoidance):
|
||||
- Make our OOM handler aware of the geoip client history cache so it
|
||||
doesn't fill up the memory. This check is important for IPv6 and
|
||||
our DoS mitigation subsystem. Closes ticket 25122.
|
||||
|
||||
o Minor features (directory authority):
|
||||
- When directory authorities are unable to add signatures to a
|
||||
pending consensus, log the reason why. Closes ticket 24849.
|
||||
|
@ -334,9 +275,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
entropy-generation mechanism gives an error. Closes ticket 25120.
|
||||
- Added support for the Android logging subsystem. Closes
|
||||
ticket 24362.
|
||||
- When logging a failure to create an onion service's descriptor,
|
||||
also log what the problem with the descriptor was. Diagnostic for
|
||||
ticket 24972.
|
||||
|
||||
o Minor features (performance):
|
||||
- Support predictive circuit building for onion service circuits
|
||||
|
@ -394,9 +332,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
- Fix output of autoconf checks to display success messages for Rust
|
||||
dependencies and a suitable rustc compiler version. Fixes bug
|
||||
24612; bugfix on 0.3.1.3-alpha.
|
||||
- When building with Rust on OSX, link against libresolv, to work
|
||||
around the issue at https://github.com/rust-lang/rust/issues/46797.
|
||||
Fixes bug 24652; bugfix on 0.3.1.1-alpha.
|
||||
- Don't pass the --quiet option to cargo: it seems to suppress some
|
||||
errors, which is not what we want to do when building. Fixes bug
|
||||
24518; bugfix on 0.3.1.7.
|
||||
|
@ -409,12 +344,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
dereference. Fixes bug 25629; bugfix on 0.2.9.15. Found by
|
||||
Coverity; this is CID 1430932.
|
||||
|
||||
o Minor bugfixes (channel connection):
|
||||
- Use the actual observed address of an incoming relay connection,
|
||||
not the canonical address of the relay from its descriptor, when
|
||||
making decisions about how to handle the incoming connection.
|
||||
Fixes bug 24952; bugfix on 0.2.4.11-alpha. Patch by "ffmancera".
|
||||
|
||||
o Minor bugfixes (channel, client):
|
||||
- Better identify client connection when reporting to the geoip
|
||||
client cache. Fixes bug 24904; bugfix on 0.3.1.7.
|
||||
|
@ -454,26 +383,12 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
continue processing the cell as if the connection were open. Fixes bug
|
||||
26072; bugfix on 0.2.4.7-alpha.
|
||||
|
||||
o Minor bugfixes (denial-of-service):
|
||||
- Fix a possible crash on malformed consensus. If a consensus had
|
||||
contained an unparseable protocol line, it could have made clients
|
||||
and relays crash with a null-pointer exception. To exploit this
|
||||
issue, however, an attacker would need to be able to subvert the
|
||||
directory authority system. Fixes bug 25251; bugfix on
|
||||
0.2.9.4-alpha. Also tracked as TROVE-2018-004.
|
||||
|
||||
o Minor bugfixes (directory authorities, IPv6):
|
||||
- When creating a routerstatus (vote) from a routerinfo (descriptor),
|
||||
set the IPv6 address to the unspecified IPv6 address, and
|
||||
explicitly initialize the port to zero. Fixes bug 24488; bugfix
|
||||
on 0.2.4.1-alpha.
|
||||
|
||||
o Minor bugfixes (directory authority):
|
||||
- Directory authorities, when refusing a descriptor from a rejected
|
||||
relay, now explicitly tell the relay (in its logs) to set a valid
|
||||
ContactInfo address and contact the bad-relays@ mailing list.
|
||||
Fixes bug 25170; bugfix on 0.2.9.1.
|
||||
|
||||
o Minor bugfixes (documentation):
|
||||
- Document that the PerConnBW{Rate,Burst} options will fall back to
|
||||
their corresponding consensus parameters only if those parameters
|
||||
|
@ -530,9 +445,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha.
|
||||
|
||||
o Minor bugfixes (logging):
|
||||
- Don't treat inability to store a cached consensus object as a bug:
|
||||
it can happen normally when we are out of disk space. Fixes bug
|
||||
24859; bugfix on 0.3.1.1-alpha.
|
||||
- Fix a (mostly harmless) race condition when invoking
|
||||
LOG_PROTOCOL_WARN message from a subthread while the torrc options
|
||||
are changing. Fixes bug 23954; bugfix on 0.1.1.9-alpha.
|
||||
|
@ -578,19 +490,10 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
Fixes bug 26069; bugfix on 0.3.0.1-alpha.
|
||||
|
||||
o Minor bugfixes (onion services):
|
||||
- Remove a BUG() statement when a client fetches an onion descriptor
|
||||
that has a lower revision counter than the one in its cache. This
|
||||
can happen in normal circumstances due to HSDir desync. Fixes bug
|
||||
24976; bugfix on 0.3.2.1-alpha.
|
||||
- If we are configured to offer a single onion service, don't log
|
||||
long-term established one hop rendezvous points in the heartbeat.
|
||||
Fixes bug 25116; bugfix on 0.2.9.6-rc.
|
||||
|
||||
o Minor bugfixes (OSX):
|
||||
- Don't exit the Tor process if setrlimit() fails to change the file
|
||||
limit (which can happen sometimes on some versions of OSX). Fixes
|
||||
bug 21074; bugfix on 0.0.9pre5.
|
||||
|
||||
o Minor bugfixes (performance):
|
||||
- Reduce the number of circuits that will be opened at once during
|
||||
the circuit build timeout phase. This is done by increasing the
|
||||
|
@ -604,11 +507,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
a little, and saves a large amount of short-term memory allocation
|
||||
operations. Fixes bug 25008; bugfix on 0.2.9.4-alpha.
|
||||
|
||||
o Minor bugfixes (performance, fragile-hardening):
|
||||
- Improve the performance of our consensus-diff application code
|
||||
when Tor is built with the --enable-fragile-hardening option set.
|
||||
Fixes bug 24826; bugfix on 0.3.1.1-alpha.
|
||||
|
||||
o Minor bugfixes (performance, timeouts):
|
||||
- Consider circuits for timeout as soon as they complete a hop. This
|
||||
is more accurate than applying the timeout in
|
||||
|
@ -640,12 +538,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
list, which would waste CPU cycles. Fixes bug 24700; bugfix
|
||||
on 0.3.2.1-alpha.
|
||||
|
||||
o Minor bugfixes (spec conformance):
|
||||
- Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
|
||||
0.2.9.4-alpha.
|
||||
- Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
|
||||
bugfix on 0.2.9.4-alpha.
|
||||
|
||||
o Minor bugfixes (spelling):
|
||||
- Use the "misspell" tool to detect and fix typos throughout the
|
||||
source code. Fixes bug 23650; bugfix on various versions of Tor.
|
||||
|
@ -658,8 +550,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
on 0.3.1.3-alpha.
|
||||
- Give out Exit flags in bootstrapping networks. Fixes bug 24137;
|
||||
bugfix on 0.2.3.1-alpha.
|
||||
- Fix a memory leak in the scheduler/loop_kist unit test. Fixes bug
|
||||
25005; bugfix on 0.3.2.7-rc.
|
||||
|
||||
o Minor bugfixes (unit test, monotonic time):
|
||||
- Increase a constant (1msec to 10msec) in the monotonic time test
|
||||
|
@ -668,20 +558,12 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
when the clock_gettime() is not a VDSO on the running kernel.
|
||||
Fixes bug 25113; bugfix on 0.2.9.1.
|
||||
|
||||
o Minor bugfixes (v3 onion services):
|
||||
- Look at the "HSRend" protocol version, not the "HSDir" protocol
|
||||
version, when deciding whether a consensus entry can support the
|
||||
v3 onion service protocol as a rendezvous point. Fixes bug 25105;
|
||||
bugfix on 0.3.2.1-alpha.
|
||||
|
||||
o Code simplification and refactoring:
|
||||
- Move the list of default directory authorities to its own file.
|
||||
Closes ticket 24854. Patch by "beastr0".
|
||||
- Remove the old (deterministic) directory retry logic entirely:
|
||||
We've used exponential backoff exclusively for some time. Closes
|
||||
ticket 23814.
|
||||
- Update the "rust dependencies" submodule to be a project-level
|
||||
repository, rather than a user repository. Closes ticket 25323.
|
||||
- Remove the unused nodelist_recompute_all_hsdir_indices(). Closes
|
||||
ticket 25108.
|
||||
- Remove a series of counters used to track circuit extend attempts
|
||||
|
@ -725,9 +607,6 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
traffic. Closes ticket 24318.
|
||||
- Document that OutboundBindAddress doesn't apply to DNS requests.
|
||||
Closes ticket 22145. Patch from Aruna Maurya.
|
||||
- Document that operators who run more than one relay or bridge are
|
||||
expected to set MyFamily and ContactInfo correctly. Closes
|
||||
ticket 24526.
|
||||
|
||||
o Code simplification and refactoring (channels):
|
||||
- Remove the incoming and outgoing channel queues. These were never
|
||||
|
|
Loading…
Reference in New Issue