Start on an 0.2.4.14-alpha changelog
This commit is contained in:
parent
4a9ccb5d59
commit
ce168e7800
24
ChangeLog
24
ChangeLog
|
@ -1,3 +1,27 @@
|
||||||
|
Changes in version 0.2.4.14-alpha - 2013-06-18
|
||||||
|
Tor 0.2.4.13-alpha fixes a pair of client guard enumeration problems
|
||||||
|
present in 0.2.4.13-alpha.
|
||||||
|
|
||||||
|
o Major bugfixes:
|
||||||
|
- When we have too much memory queued in circuits (according to a new
|
||||||
|
MaxMemInCellQueues option), close the circuits consuming the most
|
||||||
|
memory. This prevents us from running out of memory as a relay if
|
||||||
|
circuits fill up faster than they can be drained. Fixes
|
||||||
|
bug 9063; bugfix on the 54th commit of Tor. This bug is a further
|
||||||
|
fix beyond bug 6252, whose fix was merged into 0.2.3.21-rc.
|
||||||
|
|
||||||
|
This change also fixes an earlier approach taken in 0.2.4.13-alpha,
|
||||||
|
where we tried to solve this issue simply by imposing an upper limit on
|
||||||
|
the number of queued cells for a single circuit. That approach proved
|
||||||
|
to be problematic, since there are ways to provoke clients to send a
|
||||||
|
number of cells in excess of any such reasonable limit. Fixes bug
|
||||||
|
9072; bugfix on 0.2.4.13-alpha.
|
||||||
|
|
||||||
|
- Limit hidden service descriptors to at most ten introduction
|
||||||
|
points, to slow one kind of guard enumeration. Fixes bug 9002;
|
||||||
|
bugfix on 0.1.1.11-alpha.
|
||||||
|
|
||||||
|
|
||||||
Changes in version 0.2.4.13-alpha - 2013-06-14
|
Changes in version 0.2.4.13-alpha - 2013-06-14
|
||||||
Tor 0.2.4.13-alpha fixes a variety of potential remote crash
|
Tor 0.2.4.13-alpha fixes a variety of potential remote crash
|
||||||
vulnerabilities, makes socks5 username/password circuit isolation
|
vulnerabilities, makes socks5 username/password circuit isolation
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
o Major bugfixes:
|
|
||||||
- Limit hidden service descriptors to at most ten introduction
|
|
||||||
points, to slow one kind of guard enumeration. Fixes bug 9002;
|
|
||||||
bugfix on 0.1.1.11-alpha.
|
|
|
@ -1,15 +0,0 @@
|
||||||
o Major bugfixes:
|
|
||||||
- When we have too much memory queued in circuits (according to a new
|
|
||||||
MaxMemInCellQueues option), close the circuits consuming the most
|
|
||||||
memory. This prevents us from running out of memory as a relay if
|
|
||||||
circuits fill up faster than they can be drained. Fixes
|
|
||||||
bug 9063; bugfix on the 54th commit of Tor. This bug is a further
|
|
||||||
fix beyond bug 6252, whose fix was merged into 0.2.3.21-rc.
|
|
||||||
|
|
||||||
Also fixes an earlier approach taken in 0.2.4.13-alpha, where we
|
|
||||||
tried to solve this issue simply by imposing an upper limit on the
|
|
||||||
number of queued cells for a single circuit. That approach proved to
|
|
||||||
be problematic, since there are ways to provoke clients to send a
|
|
||||||
number of cells in excess of any such reasonable limit.
|
|
||||||
Fixes bug 9072; bugfix on 0.2.4.13-alpha.
|
|
||||||
|
|
|
@ -1,3 +0,0 @@
|
||||||
o Critical bugfixes:
|
|
||||||
- Disable middle relay queue overfill detection code due to possible
|
|
||||||
guard discovery attack, pending further analysis. Fixes bug #9072.
|
|
Loading…
Reference in New Issue