give it a release blurb
This commit is contained in:
parent
eccda448a7
commit
9ac1695844
|
@ -1,4 +1,8 @@
|
||||||
Changes in version 0.2.4.23 - 2014-07-28
|
Changes in version 0.2.4.23 - 2014-07-28
|
||||||
|
Tor 0.2.4.23 brings us a big step closer to slowing down the risk from
|
||||||
|
guard rotation, and also backports several important fixes from the
|
||||||
|
Tor 0.2.5 alpha release series.
|
||||||
|
|
||||||
o Major features:
|
o Major features:
|
||||||
- Clients now look at the "usecreatefast" consensus parameter to
|
- Clients now look at the "usecreatefast" consensus parameter to
|
||||||
decide whether to use CREATE_FAST or CREATE cells for the first hop
|
decide whether to use CREATE_FAST or CREATE cells for the first hop
|
||||||
|
|
46
ReleaseNotes
46
ReleaseNotes
|
@ -3,9 +3,51 @@ This document summarizes new features and bugfixes in each stable release
|
||||||
of Tor. If you want to see more detailed descriptions of the changes in
|
of Tor. If you want to see more detailed descriptions of the changes in
|
||||||
each development snapshot, see the ChangeLog file.
|
each development snapshot, see the ChangeLog file.
|
||||||
|
|
||||||
Changes in version 0.2.4.23 - 2014-07-2?
|
Changes in version 0.2.4.23 - 2014-07-28
|
||||||
|
Tor 0.2.4.23 brings us a big step closer to slowing down the risk from
|
||||||
|
guard rotation, and also backports several important fixes from the
|
||||||
|
Tor 0.2.5 alpha release series.
|
||||||
|
|
||||||
|
o Major features:
|
||||||
|
- Clients now look at the "usecreatefast" consensus parameter to
|
||||||
|
decide whether to use CREATE_FAST or CREATE cells for the first hop
|
||||||
|
of their circuit. This approach can improve security on connections
|
||||||
|
where Tor's circuit handshake is stronger than the available TLS
|
||||||
|
connection security levels, but the tradeoff is more computational
|
||||||
|
load on guard relays. Implements proposal 221. Resolves ticket 9386.
|
||||||
|
- Make the number of entry guards configurable via a new
|
||||||
|
NumEntryGuards consensus parameter, and the number of directory
|
||||||
|
guards configurable via a new NumDirectoryGuards consensus
|
||||||
|
parameter. Implements ticket 12688.
|
||||||
|
|
||||||
|
o Major bugfixes:
|
||||||
|
- Fix a bug in the bounds-checking in the 32-bit curve25519-donna
|
||||||
|
implementation that caused incorrect results on 32-bit
|
||||||
|
implementations when certain malformed inputs were used along with
|
||||||
|
a small class of private ntor keys. This bug does not currently
|
||||||
|
appear to allow an attacker to learn private keys or impersonate a
|
||||||
|
Tor server, but it could provide a means to distinguish 32-bit Tor
|
||||||
|
implementations from 64-bit Tor implementations. Fixes bug 12694;
|
||||||
|
bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
|
||||||
|
Adam Langley.
|
||||||
|
|
||||||
|
o Minor bugfixes:
|
||||||
|
- Warn and drop the circuit if we receive an inbound 'relay early'
|
||||||
|
cell. Those used to be normal to receive on hidden service circuits
|
||||||
|
due to bug 1038, but the buggy Tor versions are long gone from
|
||||||
|
the network so we can afford to resume watching for them. Resolves
|
||||||
|
the rest of bug 1038; bugfix on 0.2.1.19.
|
||||||
|
- Correct a confusing error message when trying to extend a circuit
|
||||||
|
via the control protocol but we don't know a descriptor or
|
||||||
|
microdescriptor for one of the specified relays. Fixes bug 12718;
|
||||||
|
bugfix on 0.2.3.1-alpha.
|
||||||
|
- Avoid an illegal read from stack when initializing the TLS
|
||||||
|
module using a version of OpenSSL without all of the ciphers
|
||||||
|
used by the v2 link handshake. Fixes bug 12227; bugfix on
|
||||||
|
0.2.4.8-alpha. Found by "starlight".
|
||||||
|
|
||||||
o Minor features:
|
o Minor features:
|
||||||
- Update geoip and geoip6 to the July 10 2014 Maxmind GeoLite2
|
- Update geoip and geoip6 to the July 10 2014 Maxmind GeoLite2
|
||||||
Country database.
|
Country database.
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue