declare 0.2.3.x end-of-life more clearly
This commit is contained in:
parent
7fd7a2c7c3
commit
42b42605f8
31
ChangeLog
31
ChangeLog
|
@ -1,25 +1,24 @@
|
||||||
Changes in version 0.2.5.10 - 2014-10-24
|
Changes in version 0.2.5.10 - 2014-10-24
|
||||||
Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
|
Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
|
||||||
|
|
||||||
It adds several new security features, including improved DoS
|
It adds several new security features, including improved
|
||||||
resistance for relays, new compiler hardening options, and a
|
denial-of-service resistance for relays, new compiler hardening
|
||||||
system-call sandbox for hardened installations on Linux (requires
|
options, and a system-call sandbox for hardened installations on Linux
|
||||||
seccomp2). The controller protocol has several new features, resolving
|
(requires seccomp2). The controller protocol has several new features,
|
||||||
IPv6 addresses should work better than before, and relays should be a
|
resolving IPv6 addresses should work better than before, and relays
|
||||||
little more CPU-efficient. We've added support for more (Open,Free)BSD
|
should be a little more CPU-efficient. We've added support for more
|
||||||
transparent proxy types. We've improved the build system and testing
|
OpenBSD and FreeBSD transparent proxy types. We've improved the build
|
||||||
intrastructure to allow unit testing of more parts of the Tor
|
system and testing infrastructure to allow unit testing of more parts
|
||||||
codebase. Finally, we've addressed several nagging pluggable transport
|
of the Tor codebase. Finally, we've addressed several nagging pluggable
|
||||||
usability issues, and included numerous other small bugfixes and
|
transport usability issues, and included numerous other small bugfixes
|
||||||
features mentioned below.
|
and features mentioned below.
|
||||||
|
|
||||||
This release coincides with the likely end of further 0.2.3.x
|
This release marks end-of-life for Tor 0.2.3.x; those Tor versions
|
||||||
releases; see below for more information.
|
have accumulated many known flaws; everyone should upgrade.
|
||||||
|
|
||||||
o Deprecated versions:
|
o Deprecated versions:
|
||||||
- Tor 0.2.3.x is approaching its end-of-life too; we do not plan on
|
- Tor 0.2.3.x has reached end-of-life; it has received no patches or
|
||||||
releasing further updates for it except under highly unusual
|
attention for some while.
|
||||||
circumstances.
|
|
||||||
|
|
||||||
|
|
||||||
Changes in version 0.2.5.9-rc - 2014-10-20
|
Changes in version 0.2.5.9-rc - 2014-10-20
|
||||||
|
|
57
ReleaseNotes
57
ReleaseNotes
|
@ -5,43 +5,32 @@ each development snapshot, see the ChangeLog file.
|
||||||
Changes in version 0.2.5.10 - 2014-10-24
|
Changes in version 0.2.5.10 - 2014-10-24
|
||||||
Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
|
Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
|
||||||
|
|
||||||
It adds several new security features, including improved DoS
|
It adds several new security features, including improved
|
||||||
resistance for relays, new compiler hardening options, and a
|
denial-of-service resistance for relays, new compiler hardening
|
||||||
system-call sandbox for hardened installations on Linux (requires
|
options, and a system-call sandbox for hardened installations on Linux
|
||||||
seccomp2). The controller protocol has several new features, resolving
|
(requires seccomp2). The controller protocol has several new features,
|
||||||
IPv6 addresses should work better than before, and relays should be a
|
resolving IPv6 addresses should work better than before, and relays
|
||||||
little more CPU-efficient. We've added support for more (Open,Free)BSD
|
should be a little more CPU-efficient. We've added support for more
|
||||||
transparent proxy types. We've improved the build system and testing
|
OpenBSD and FreeBSD transparent proxy types. We've improved the build
|
||||||
intrastructure to allow unit testing of more parts of the Tor
|
system and testing infrastructure to allow unit testing of more parts
|
||||||
codebase. Finally, we've addressed several nagging pluggable transport
|
of the Tor codebase. Finally, we've addressed several nagging pluggable
|
||||||
usability issues, and included numerous other small bugfixes and
|
transport usability issues, and included numerous other small bugfixes
|
||||||
features mentioned below.
|
and features mentioned below.
|
||||||
|
|
||||||
This release coincides with the likely end of further 0.2.3.x
|
This release marks end-of-life for Tor 0.2.3.x; those Tor versions
|
||||||
releases; see below for more information.
|
have accumulated many known flaws; everyone should upgrade.
|
||||||
|
|
||||||
o Deprecated versions:
|
o Major features (security):
|
||||||
- Tor 0.2.2.x has reached end-of-life; it has received no patches or
|
|
||||||
attention for some while. Directory authorities no longer accept
|
|
||||||
descriptors from relays running any version of Tor prior to Tor
|
|
||||||
0.2.3.16-alpha. Resolves ticket 11149.
|
|
||||||
- Tor 0.2.3.x is approaching its end-of-life too; we do not plan on
|
|
||||||
releasing further updates for it except under highly unusual
|
|
||||||
circumstances.
|
|
||||||
|
|
||||||
o Major features (client security):
|
|
||||||
- The ntor handshake is now on-by-default, no matter what the
|
- The ntor handshake is now on-by-default, no matter what the
|
||||||
directory authorities recommend. Implements ticket 8561.
|
directory authorities recommend. Implements ticket 8561.
|
||||||
|
|
||||||
o Major features (other security):
|
|
||||||
- Disable support for SSLv3. All versions of OpenSSL in use with Tor
|
|
||||||
today support TLS 1.0 or later, so we can safely turn off support
|
|
||||||
for this old (and insecure) protocol. Fixes bug 13426.
|
|
||||||
- Warn about attempts to run hidden services and relays in the same
|
|
||||||
process: that's probably not a good idea. Closes ticket 12908.
|
|
||||||
- Make the "tor-gencert" tool used by directory authority operators
|
- Make the "tor-gencert" tool used by directory authority operators
|
||||||
create 2048-bit signing keys by default (rather than 1024-bit, since
|
create 2048-bit signing keys by default (rather than 1024-bit, since
|
||||||
1024-bit is uncomfortably small these days). Addresses ticket 10324.
|
1024-bit is uncomfortably small these days). Addresses ticket 10324.
|
||||||
|
- Warn about attempts to run hidden services and relays in the same
|
||||||
|
process: that's probably not a good idea. Closes ticket 12908.
|
||||||
|
- Disable support for SSLv3. All versions of OpenSSL in use with Tor
|
||||||
|
today support TLS 1.0 or later, so we can safely turn off support
|
||||||
|
for this old (and insecure) protocol. Fixes bug 13426.
|
||||||
|
|
||||||
o Major features (relay security, DoS-resistance):
|
o Major features (relay security, DoS-resistance):
|
||||||
- When deciding whether we have run out of memory and we need to
|
- When deciding whether we have run out of memory and we need to
|
||||||
|
@ -74,8 +63,6 @@ Changes in version 0.2.5.10 - 2014-10-24
|
||||||
even when pluggable transports are in use, and report usage
|
even when pluggable transports are in use, and report usage
|
||||||
statistics in their extra-info descriptors. Resolves tickets 4773
|
statistics in their extra-info descriptors. Resolves tickets 4773
|
||||||
and 5040.
|
and 5040.
|
||||||
|
|
||||||
o Major features (bridges):
|
|
||||||
- Don't launch pluggable transport proxies if we don't have any
|
- Don't launch pluggable transport proxies if we don't have any
|
||||||
bridges configured that would use them. Now we can list many
|
bridges configured that would use them. Now we can list many
|
||||||
pluggable transports, and Tor will dynamically start one when it
|
pluggable transports, and Tor will dynamically start one when it
|
||||||
|
@ -132,6 +119,10 @@ Changes in version 0.2.5.10 - 2014-10-24
|
||||||
are dumped to stderr (if possible) and to any logs that are
|
are dumped to stderr (if possible) and to any logs that are
|
||||||
reporting errors. Implements ticket 9299.
|
reporting errors. Implements ticket 9299.
|
||||||
|
|
||||||
|
o Deprecated versions:
|
||||||
|
- Tor 0.2.3.x has reached end-of-life; it has received no patches or
|
||||||
|
attention for some while.
|
||||||
|
|
||||||
o Major bugfixes (security, directory authorities):
|
o Major bugfixes (security, directory authorities):
|
||||||
- Directory authorities now include a digest of each relay's
|
- Directory authorities now include a digest of each relay's
|
||||||
identity key as a part of its microdescriptor.
|
identity key as a part of its microdescriptor.
|
||||||
|
@ -544,7 +535,7 @@ Changes in version 0.2.5.10 - 2014-10-24
|
||||||
write out that file if we successfully switch to the new config
|
write out that file if we successfully switch to the new config
|
||||||
option. Fixes bug 5605; bugfix on 0.2.2.26-beta. Patch from "Ryman".
|
option. Fixes bug 5605; bugfix on 0.2.2.26-beta. Patch from "Ryman".
|
||||||
|
|
||||||
o Minor bugfixes (Directory server):
|
o Minor bugfixes (directory server):
|
||||||
- No longer accept malformed http headers when parsing urls from
|
- No longer accept malformed http headers when parsing urls from
|
||||||
headers. Now we reply with Bad Request ("400"). Fixes bug 2767;
|
headers. Now we reply with Bad Request ("400"). Fixes bug 2767;
|
||||||
bugfix on 0.0.6pre1.
|
bugfix on 0.0.6pre1.
|
||||||
|
|
Loading…
Reference in New Issue