Edit changelog.

This commit is contained in:
Nick Mathewson 2017-09-05 09:27:41 -04:00
parent cf0124b238
commit efc306c59a
1 changed files with 31 additions and 29 deletions

View File

@ -1,51 +1,53 @@
Changes in version 0.3.1.6-rc - 2017-09-05
Tor 0.3.1.6-rc fixes a few small bugs and annoyances in the 0.3.1
release series.
release series, including a bug that produced weird behavior on
Windows directory caches.
This is the first release candidate in the Tor 0.3.1 series. If we
find no new bugs or regressions here, the first stable 0.3.1 release
will be nearly identical to it.
o Major bugfixes (windows, directory cache):
- On windows, do not try to delete cached consensus documents and
diffs, until they unmapped from memory. Allow the diff storage
directory to grow larger in order to handle files that might need
to stay around longer. Fixes bug 22752; bugfix on 0.3.1.1-alpha.
- On Windows, do not try to delete cached consensus documents and
diffs before they are unmapped from memory--Windows won't allow
that. Instead, allow the consensus cache directory to grow larger,
to hold files that might need to stay around longer. Fixes bug
22752; bugfix on 0.3.1.1-alpha.
o Minor features (directory authority):
- Improve the message that authorities report to relays when the
RSA/Ed25519 key pair they present conflicts with a previously
pinned key. Closes ticket 22348.
- Improve the message that authorities report to relays that present
RSA/Ed25519 keypairs that conflict with previously pinned keys.
Closes ticket 22348.
o Minor features (geoip):
- Update geoip and geoip6 to the August 3 2017 Maxmind GeoLite2
Country database.
o Minor features (testing):
- Add a couple more tests for compression backend initialization.
Closes ticket 22286.
- Add more tests for compression backend initialization. Closes
ticket 22286.
o Minor bugfixes (directory cache):
- Fix a memory leak in the code that recovers space in the consensus
directory cache. Fixes bug 23139; bugfix on 0.3.1.1-alpha.
- Fix a memory leak when recovering space in the consensus cache.
Fixes bug 23139; bugfix on 0.3.1.1-alpha.
o Minor bugfixes (hidden service):
- A service is allowed to open a maximum number of circuits for a
specific period of time. That value was lower than it should be (8
vs 12) in the normal case of 3 introduction points. Fixes bug
22159; bugfix on 0.3.0.5-rc.
- Fix a BUG alert during HSv3 descriptor decoding that could trigger
with a specially crafted descriptor. Fixes bug 23233; bugfix on
0.3.0.1-alpha. Bug found by "haxxpop".
- Rate limit the log if we ever go above the maximum number of
- Increase the number of circuits that a service is allowed to
open over a specific period of time. The value was lower than it
should be (8 vs 12) in the normal case of 3 introduction points.
Fixes bug 22159; bugfix on 0.3.0.5-rc.
- Fix a BUG warning during HSv3 descriptor decoding that could be
cause by a specially crafted descriptor. Fixes bug 23233; bugfix
on 0.3.0.1-alpha. Bug found by "haxxpop".
- Rate-limit the log messages if we exceed the maximum number of
allowed intro circuits. Fixes bug 22159; bugfix on 0.3.1.1-alpha.
o Minor bugfixes (logging, relay):
- Remove a log_warn() that has been forgotten when an introduction
point successfully established a hidden service prop224 circuit
with a client.
- Three other log_warn() for an introduction point have been changed
to protocol warning because they can be failure from the network
- Remove a forgotten debugging message when an introduction point
successfully establishes a hidden service prop224 circuit with
a client.
- Change three other log_warn() for an introduction point to
protocol warnings, because they can be failure from the network
and are not relevant to the operator. Fixes bug 23078; bugfix on
0.3.0.1-alpha and 0.3.0.2-alpha.
@ -58,12 +60,12 @@ Changes in version 0.3.1.6-rc - 2017-09-05
o Minor bugfixes (robustness, error handling):
- Improve our handling of the cases where OpenSSL encounters a
memory error while encoding keys and certificates. We haven't
observed these happening in the wild, but if they do happen, we
now detect and respond better. Fixes bug 19418; bugfix on all
versions of Tor. Reported by Guido Vranken.
observed these errors in the wild, but if they do happen, we now
detect and respond better. Fixes bug 19418; bugfix on all versions
of Tor. Reported by Guido Vranken.
o Minor bugfixes (stability):
- Avoid crashing on double-free when unable to load or process an
- Avoid crashing on a double-free when unable to load or process an
included file. Fixes bug 23155; bugfix on 0.3.1.1-alpha. Found
with the clang static analyzer.