declare 0.2.3.x end-of-life more clearly

This commit is contained in:
Roger Dingledine 2014-10-23 22:05:54 -04:00
parent 7fd7a2c7c3
commit 42b42605f8
2 changed files with 39 additions and 49 deletions

View File

@ -1,25 +1,24 @@
Changes in version 0.2.5.10 - 2014-10-24 Changes in version 0.2.5.10 - 2014-10-24
Tor 0.2.5.10 is the first stable release in the 0.2.5 series. Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
It adds several new security features, including improved DoS It adds several new security features, including improved
resistance for relays, new compiler hardening options, and a denial-of-service resistance for relays, new compiler hardening
system-call sandbox for hardened installations on Linux (requires options, and a system-call sandbox for hardened installations on Linux
seccomp2). The controller protocol has several new features, resolving (requires seccomp2). The controller protocol has several new features,
IPv6 addresses should work better than before, and relays should be a resolving IPv6 addresses should work better than before, and relays
little more CPU-efficient. We've added support for more (Open,Free)BSD should be a little more CPU-efficient. We've added support for more
transparent proxy types. We've improved the build system and testing OpenBSD and FreeBSD transparent proxy types. We've improved the build
intrastructure to allow unit testing of more parts of the Tor system and testing infrastructure to allow unit testing of more parts
codebase. Finally, we've addressed several nagging pluggable transport of the Tor codebase. Finally, we've addressed several nagging pluggable
usability issues, and included numerous other small bugfixes and transport usability issues, and included numerous other small bugfixes
features mentioned below. and features mentioned below.
This release coincides with the likely end of further 0.2.3.x This release marks end-of-life for Tor 0.2.3.x; those Tor versions
releases; see below for more information. have accumulated many known flaws; everyone should upgrade.
o Deprecated versions: o Deprecated versions:
- Tor 0.2.3.x is approaching its end-of-life too; we do not plan on - Tor 0.2.3.x has reached end-of-life; it has received no patches or
releasing further updates for it except under highly unusual attention for some while.
circumstances.
Changes in version 0.2.5.9-rc - 2014-10-20 Changes in version 0.2.5.9-rc - 2014-10-20

View File

@ -5,43 +5,32 @@ each development snapshot, see the ChangeLog file.
Changes in version 0.2.5.10 - 2014-10-24 Changes in version 0.2.5.10 - 2014-10-24
Tor 0.2.5.10 is the first stable release in the 0.2.5 series. Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
It adds several new security features, including improved DoS It adds several new security features, including improved
resistance for relays, new compiler hardening options, and a denial-of-service resistance for relays, new compiler hardening
system-call sandbox for hardened installations on Linux (requires options, and a system-call sandbox for hardened installations on Linux
seccomp2). The controller protocol has several new features, resolving (requires seccomp2). The controller protocol has several new features,
IPv6 addresses should work better than before, and relays should be a resolving IPv6 addresses should work better than before, and relays
little more CPU-efficient. We've added support for more (Open,Free)BSD should be a little more CPU-efficient. We've added support for more
transparent proxy types. We've improved the build system and testing OpenBSD and FreeBSD transparent proxy types. We've improved the build
intrastructure to allow unit testing of more parts of the Tor system and testing infrastructure to allow unit testing of more parts
codebase. Finally, we've addressed several nagging pluggable transport of the Tor codebase. Finally, we've addressed several nagging pluggable
usability issues, and included numerous other small bugfixes and transport usability issues, and included numerous other small bugfixes
features mentioned below. and features mentioned below.
This release coincides with the likely end of further 0.2.3.x This release marks end-of-life for Tor 0.2.3.x; those Tor versions
releases; see below for more information. have accumulated many known flaws; everyone should upgrade.
o Deprecated versions: o Major features (security):
- Tor 0.2.2.x has reached end-of-life; it has received no patches or
attention for some while. Directory authorities no longer accept
descriptors from relays running any version of Tor prior to Tor
0.2.3.16-alpha. Resolves ticket 11149.
- Tor 0.2.3.x is approaching its end-of-life too; we do not plan on
releasing further updates for it except under highly unusual
circumstances.
o Major features (client security):
- The ntor handshake is now on-by-default, no matter what the - The ntor handshake is now on-by-default, no matter what the
directory authorities recommend. Implements ticket 8561. directory authorities recommend. Implements ticket 8561.
o Major features (other security):
- Disable support for SSLv3. All versions of OpenSSL in use with Tor
today support TLS 1.0 or later, so we can safely turn off support
for this old (and insecure) protocol. Fixes bug 13426.
- Warn about attempts to run hidden services and relays in the same
process: that's probably not a good idea. Closes ticket 12908.
- Make the "tor-gencert" tool used by directory authority operators - Make the "tor-gencert" tool used by directory authority operators
create 2048-bit signing keys by default (rather than 1024-bit, since create 2048-bit signing keys by default (rather than 1024-bit, since
1024-bit is uncomfortably small these days). Addresses ticket 10324. 1024-bit is uncomfortably small these days). Addresses ticket 10324.
- Warn about attempts to run hidden services and relays in the same
process: that's probably not a good idea. Closes ticket 12908.
- Disable support for SSLv3. All versions of OpenSSL in use with Tor
today support TLS 1.0 or later, so we can safely turn off support
for this old (and insecure) protocol. Fixes bug 13426.
o Major features (relay security, DoS-resistance): o Major features (relay security, DoS-resistance):
- When deciding whether we have run out of memory and we need to - When deciding whether we have run out of memory and we need to
@ -74,8 +63,6 @@ Changes in version 0.2.5.10 - 2014-10-24
even when pluggable transports are in use, and report usage even when pluggable transports are in use, and report usage
statistics in their extra-info descriptors. Resolves tickets 4773 statistics in their extra-info descriptors. Resolves tickets 4773
and 5040. and 5040.
o Major features (bridges):
- Don't launch pluggable transport proxies if we don't have any - Don't launch pluggable transport proxies if we don't have any
bridges configured that would use them. Now we can list many bridges configured that would use them. Now we can list many
pluggable transports, and Tor will dynamically start one when it pluggable transports, and Tor will dynamically start one when it
@ -132,6 +119,10 @@ Changes in version 0.2.5.10 - 2014-10-24
are dumped to stderr (if possible) and to any logs that are are dumped to stderr (if possible) and to any logs that are
reporting errors. Implements ticket 9299. reporting errors. Implements ticket 9299.
o Deprecated versions:
- Tor 0.2.3.x has reached end-of-life; it has received no patches or
attention for some while.
o Major bugfixes (security, directory authorities): o Major bugfixes (security, directory authorities):
- Directory authorities now include a digest of each relay's - Directory authorities now include a digest of each relay's
identity key as a part of its microdescriptor. identity key as a part of its microdescriptor.
@ -544,7 +535,7 @@ Changes in version 0.2.5.10 - 2014-10-24
write out that file if we successfully switch to the new config write out that file if we successfully switch to the new config
option. Fixes bug 5605; bugfix on 0.2.2.26-beta. Patch from "Ryman". option. Fixes bug 5605; bugfix on 0.2.2.26-beta. Patch from "Ryman".
o Minor bugfixes (Directory server): o Minor bugfixes (directory server):
- No longer accept malformed http headers when parsing urls from - No longer accept malformed http headers when parsing urls from
headers. Now we reply with Bad Request ("400"). Fixes bug 2767; headers. Now we reply with Bad Request ("400"). Fixes bug 2767;
bugfix on 0.0.6pre1. bugfix on 0.0.6pre1.