From f1c43a1e6491d82ebc7aead7fe109e351ff55d4d Mon Sep 17 00:00:00 2001 From: Roger Dingledine Date: Mon, 16 May 2011 19:35:28 -0400 Subject: [PATCH] fold in new changes entries --- ChangeLog | 22 ++++++++++++++++------ changes/check-fetched-rend-desc-service-id | 7 ------- changes/check-public-key-exponents | 5 ----- 3 files changed, 16 insertions(+), 18 deletions(-) delete mode 100644 changes/check-fetched-rend-desc-service-id delete mode 100644 changes/check-public-key-exponents diff --git a/ChangeLog b/ChangeLog index e799ded92..8a74bcf54 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,5 +1,19 @@ Changes in version 0.2.1.31 - 2011-05-?? + Tor 0.2.1.31 fixes a variety of potential privacy problems. + o Security/privacy fixes (also included in 0.2.2.x): + - Replace all potentially sensitive memory comparison operations + with versions whose runtime does not depend on the data being + compared. This will help resist a class of attacks where an + adversary can use variations in timing information to learn + sensitive data. Fix for one case of bug 3122. (Safe memcmp + implementation by Robert Ransom based partially on code by DJB.) + - When receiving a hidden service descriptor, check that it is for + the hidden service we wanted. Previously, Tor would store any + hidden service descriptors that a directory gave it, whether it + wanted them or not. This wouldn't have let an attacker impersonate + a hidden service, but it did let directories pre-seed a client + with descriptors that it didn't want. Bugfix on 0.0.6. - Avoid linkability based on cached hidden service descriptors: forget all hidden service descriptors cached as a client when processing a SIGNAL NEWNYM command. Fixes bug 3000; bugfix on 0.0.6. @@ -10,12 +24,6 @@ Changes in version 0.2.1.31 - 2011-05-?? - Fix an assert in parsing router descriptors containing IPv6 addresses. This one took down the directory authorities when somebody tried some experimental code. Bugfix on 0.2.1.3-alpha. - - Replace all potentially sensitive memory comparison operations - with versions whose runtime does not depend on the data being - compared. This will help resist a class of attacks where an - adversary can use variations in timing information to learn - sensitive data. Fix for one case of bug 3122. (Safe memcmp - implementation by Robert Ransom based partially on code by DJB.) o Minor bugfixes (also included in 0.2.2.x): - When we restart our relay, we might get a successful connection @@ -39,6 +47,8 @@ Changes in version 0.2.1.31 - 2011-05-?? heavy load. Fixes bug 2933; bugfix on 0.2.0.1-alpha. - When warning about missing zlib development packages during compile, give the correct package names. Bugfix on 0.2.0.1-alpha. + - Require that introduction point keys and onion keys have public + exponent 65537. Bugfix on 0.2.0.10-alpha. - Do not crash when our configuration file becomes unreadable, for example due to a permissions change, between when we start up and when a controller calls SAVECONF. Fixes bug 3135; bugfix diff --git a/changes/check-fetched-rend-desc-service-id b/changes/check-fetched-rend-desc-service-id deleted file mode 100644 index 2f37c3021..000000000 --- a/changes/check-fetched-rend-desc-service-id +++ /dev/null @@ -1,7 +0,0 @@ - o Security fixes: - - When fetching a hidden service descriptor, check that it is for - the hidden service we were trying to connect to, in order to - stop a directory from pre-seeding a client with a descriptor for - a hidden service that they didn't want. Bugfix on 0.0.6. - - diff --git a/changes/check-public-key-exponents b/changes/check-public-key-exponents deleted file mode 100644 index a8d00673b..000000000 --- a/changes/check-public-key-exponents +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes: - - Require that introduction point keys and onion keys have public - exponent 65537. Bugfix on 0.2.0.10-alpha. - -