Lightly edit the changelog

This commit is contained in:
Nick Mathewson 2016-09-23 13:29:53 -04:00
parent 0e1630a3e8
commit 43b9db7bde
1 changed files with 43 additions and 41 deletions

View File

@ -22,22 +22,17 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
this one.
o Major features (circuit building, security):
- Authorities, relays and clients specifically check that each
descriptor has an ntor key.
- Circuit-building code assumes that all hops can use ntor, except
for rare hidden service protocol cases.
- Client code never chooses nodes without ntor keys: they will not
be selected during circuit-building, or as guards, or as directory
mirrors, or as introduction or rendezvous points.
- Clients avoid downloading a descriptor if the relay version is too
old to support ntor.
- Authorities, relays and clients now require ntor keys in all
descriptors, for all hops (except for rare hidden service protocol
cases), for all circuits, and for all other roles. Part of
ticket 19163.
- Tor authorities, relays, and clients only use ntor, except for
rare cases in the hidden service protocol.
rare cases in the hidden service protocol. Part of ticket 19163.
o Major features (onion services):
o Major features (single-hop "hidden" services):
- Add experimental HiddenServiceSingleHopMode and
HiddenServiceNonAnonymousMode options. When both are set to 1,
every hidden service on a tor instance becomes a non-anonymous
every hidden service on a Tor instance becomes a non-anonymous
Single Onion Service. Single Onions make one-hop (direct)
connections to their introduction and renzedvous points. One-hop
circuits make Single Onion servers easily locatable, but clients
@ -47,15 +42,16 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
proposal 260, completes ticket 17178. Patch by teor and asn.
o Major features (resource management):
- Tor now includes support for noticing when we are about to run out
of sockets, and preemptively closing connections of lower
- Tor can now notice it is about to run out
of sockets, and preemptively close connections of lower
priority. (This feature is off by default for now, since the
current prioritizing method is not mature enough yet. You can
enable it by setting "DisableOOSCheck 0".) Closes ticket 18640.
current prioritizing method is yet not mature enough. You can
enable it by setting "DisableOOSCheck 0", but watch out: it might close
some sockets you would rather have it keep.) Closes ticket 18640.
o Major bugfixes (circuit building):
- Hidden service client-to-intro-point and service-to-rendezvous-
point cicruitss use the TAP key supplied by the protocol, to avoid
point cicruits use the TAP key supplied by the protocol, to avoid
epistemic attacks. Fixes bug 19163; bugfix on 0.2.4.18-rc.
o Major bugfixes (compilation, OpenBSD):
@ -64,20 +60,20 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
rubiate. Fixes bug 19902; bugfix on 0.2.9.1-alpha.
o Major bugfixes (hidden services):
- Clients require hidden services to include the TAP keys for their
- Clients now require hidden services to include the TAP keys for their
intro points in the hidden service descriptor. This prevents an
inadvertent upgrade to ntor, which a malicious hidden service
could use to discover which consensus a client has. Fixes bug
could use to distinguish clients by consensus version. Fixes bug
20012; bugfix on 0.2.4.8-alpha. Patch by teor.
o Minor features (security, TLS):
- Servers no longer support clients that do not provide AES
- Servers no longer support clients that without AES
ciphersuites. (3DES is no longer considered an acceptable cipher.)
We believe that no such clients currently exist, since we have
We believe that no such Tor clients currently exist, since Tor has
required OpenSSL 0.9.7 or later since 2009. Closes ticket 19998.
o Minor feature (fallback directories):
- Remove broken fallbacks from the hard-coded fallback directory
- Remove broken entries from the hard-coded fallback directory
list. Closes ticket 20190; patch by teor.
o Minor features (geoip, also in 0.2.8.8):
@ -85,7 +81,9 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
Country database.
o Minor feature (port flags):
- Add *Port flags NoDNSRequest and NoOnionTraffic, and the synthetic
- Add new flags to the *Port options to finer control over which
requests are allowed. The flags are NoDNSRequest, NoOnionTraffic, and
the synthetic
flag OnionTrafficOnly, which is equivalent to NoDNSRequest,
NoIPv4Traffic, and NoIPv6Traffic. Closes enhancement 18693; patch
by "teor".
@ -96,13 +94,15 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
ticket 20002; implements part of proposal 272.
o Minor features (testing):
- Disable memory protections on OpenBSD when testing memwipe(). The
test deliberately invokes undefined behaviour which the protections
interfere with. Patch from "rubiate". Closes ticket 20066.
- Disable memory protections on OpenBSD when performing our unit tests
for memwipe(). The
test deliberately invokes undefined behavior, and the OpenBSD
protections interfere with this.
Patch from "rubiate". Closes ticket 20066.
o Minor features (testing, ipv6):
- Add the single-onion and single-onion-ipv6 chutney targets to make
test-network-all. This requires a recent chutney version with the
- Add the single-onion and single-onion-ipv6 chutney targets to "make
test-network-all". This requires a recent chutney version with the
single onion network flavours (git c72a652 or later). Closes
ticket 20072; patch by teor.
- Add the hs-ipv6 chutney target to make test-network-all's IPv6
@ -116,26 +116,28 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
0.2.8.7. Implements feature 20034. Patch by teor.
o Minor features (unit tests):
- Our link-handshake unit tests now check, that when invalid
- We've done significant work to make the unit tests run faster.
- Our link-handshake unit tests now check that when invalid
handshakes fail, they fail with the error messages we expected.
- Our unit testing code that captures log messages no longer
prevents them from being written out if the user asked for them
(by passing --debug or --info or or --notice --warn to the "test"
binary). This change will prevent us from missing unexpected log
binary). This change prevents us from missing unexpected log
messages simply because we were looking for others. Related to
ticket 19999.
- The unit tests now log all warning messages with the "BUG" flag.
Previously, they only logged errors by default. This change will
help us make our testing code more correct, and make sure that we
only hit this code when we mean to. This is preparatory work for
only hit this code when we mean to. In the meantime, however, there
will be more warnings in the unit test logs than before. This is preparatory work for
ticket 19999.
- The unit tests now treat any failure of a "tor_assert_nonfatal()"
assertion as a test failure.
- We've done significant work to make the unit tests run faster.
o Minor bug fixes (circuits):
- Use CircuitBuildTimeout whenever LearnCircuitBuildTimeout is
disabled. Fixes bug 19678; bugfix on commit 5b0b51ca3 in
- Use the CircuitBuildTimeout option whenever LearnCircuitBuildTimeout is
disabled. Previously, we would respect the option when a user disabled
it, but not when it was disabled because some other option was set. Fixes bug 20073; bugfix on
0.2.4.12-alpha. Patch by teor.
o Minor bugfixes (allocation):
@ -147,7 +149,7 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
Sometimes, it includes macros that affect the behavior of the
standard headers. Fixes bug 19767; bugfix on 0.2.9.1-alpha (the
first version to use AC_USE_SYSTEM_EXTENSIONS).
- Fix a syntax error in the IF_BUG_ONCE__() macro in non- GCC-
- Fix a syntax error in the IF_BUG_ONCE__() macro in non-GCC-
compatible compilers. Fixes bug 20141; bugfix on 0.2.9.1-alpha.
Patch from Gisle Vanem.
- Stop trying to build with Clang 4.0's -Wthread-safety warnings.
@ -156,7 +158,7 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
wrappers. Fixes bug 20110; bugfix on 0.2.9.1-alpha.
o Minor bugfixes (directory authority):
- Die with a useful error when the operator forgets to place the
- Die with a more useful error when the operator forgets to place the
authority_signing_key file into the keys directory. This avoids an
uninformative assert & traceback about having an invalid key.
Fixes bug 20065; bugfix on 0.2.0.1-alpha.
@ -186,7 +188,7 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
- Add permission to run the sched_yield() and sigaltstack() system
calls, in order to support versions of Tor compiled with asan or
ubsan code that use these calls. Now "sandbox 1" and
"--enable-expensive-hardening" should be compatible. Fixes bug
"--enable-expensive-hardening" should be compatible on more systems. Fixes bug
20063; bugfix on 0.2.5.1-alpha.
o Minor bugfixes (logging):
@ -207,7 +209,7 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
o Minor bugfixes (options):
- Check the consistency of UseEntryGuards and EntryNodes more
reliably. Fixes bug 20074; bugfix on commit 686aaa5c in tor-
reliably. Fixes bug 20074; bugfix on tor-
0.2.4.12-alpha. Patch by teor.
- Stop changing the configured value of UseEntryGuards on
authorities and Tor2web clients. Fixes bug 20074; bugfix on
@ -220,12 +222,12 @@ Changes in version 0.2.9.3-alpha - 2016-09-23
19678. Patch by teor.
o Minor bugfixes (unit tests):
- Fix shared random unit test that was failing on big endian
architecture due to internal representation of a integer copied to
- Fix a shared-random unit test that was failing on big endian
architectures due to internal representation of a integer copied to
a buffer. The test is changed to take a full 32 bytes of data and
use the output of a python script that make the COMMIT and REVEAL
calculation according to the spec. Fixes bug 19977; bugfix
on tor-0.2.9.1-alpha.
on 0.2.9.1-alpha.
- The tor_tls_server_info_callback unit test no longer crashes when
debug-level logging is turned on. Fixes bug 20041; bugfix
on 0.2.8.1-alpha.