[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/release-0.4.4] Start an 0.4.4.3-alpha changelog



commit c178d51965bd543d3973ef8d15e97c9ae1105768
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Mon Jul 27 08:59:21 2020 -0400

    Start an 0.4.4.3-alpha changelog
---
 ChangeLog           | 54 +++++++++++++++++++++++++++++++++++++++++++++++++++++
 changes/bug27315    |  6 ------
 changes/bug40020    |  9 ---------
 changes/ticket31812 |  4 ----
 changes/ticket33880 |  6 ------
 changes/ticket40030 |  7 -------
 changes/ticket40035 |  5 -----
 changes/ticket40061 |  5 -----
 8 files changed, 54 insertions(+), 42 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 1e2d2164af..982470106a 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,57 @@
+Changes in version 0.4.4.3-alpha - 2020-07-2?
+  Tor 0.4.4.3-alpha fixes several annoyances in previous versions,
+  including one affecting NSS users, and several affecting the Linux
+  seccomp2 sandbox.
+
+  o Major features (fallback directory list):
+    - Replace the 148 fallback directories originally included in Tor
+      0.4.1.4-rc (of which around 105 are still functional) with a list
+      of 144 fallbacks generated in July 2020. Closes ticket 40061.
+
+  o Major bugfixes (NSS):
+    - When running with NSS enabled, make sure that NSS knows to expect
+      nonblocking sockets. Previously, we set our TCP sockets as
+      blocking, but did not tell NSS about the fact, which in turn could
+      lead to unexpected blocking behavior. Fixes bug 40035; bugfix
+      on 0.3.5.1-alpha.
+
+  o Minor bugfixes (linux seccomp2 sandbox):
+    - Fix a regression on sandboxing rules for the openat() syscall. The
+      fix for bug 25440 fixed the problem on systems with glibc >= 2.27
+      but broke tor on previous versions of glibc. We now apply the
+      correct seccomp rule according to the running glibc version. Patch
+      from Daniel Pinto. Fixes bug 27315; bugfix on 0.3.5.11.
+    - Makes the seccomp sandbox allow the correct syscall for opendir
+      according to the running glibc version. The opendir function
+      either uses open or openat but the current code does not
+      differenciate between opendir and open calls. This adds a new
+      seccomp sandbox rule for opendir. This fixes crashes when
+      reloading torrc with sandbox enabled when running on glibc 2.15 to
+      2.21 and 2.26. Patch from Daniel Pinto. Fixes bug 40020; bugfix
+      on 0.3.5.11.
+
+  o Minor bugfixes (relay, usability):
+    - Adjust the rules for when to warn about having too many
+      connections to other relays. Previously we'd tolerate up to 1.5
+      connections per relay on average. Now we tolerate more connections
+      for directory authorities, and raise the number of total
+      connections we need to see before we warn. Fixes bug 33880; bugfix
+      on 0.3.1.1-alpha.
+
+  o Documentation:
+    - Replace most http:// URLs in our code and documentation with
+      https:// URLs. (We have left unchanged the code in src/ext/, and
+      the text in LICENSE.) Closes ticket 31812. Patch from Jeremy Rand.
+
+  o Removed features:
+    - Our "check-local" test target no longer tries to use the
+      Coccinelle semantic patching tool parse all the C files. While it
+      is a good idea to try to make sure Coccinelle works on our C
+      before we run a Coccinelle patch, doing so on every test run has
+      proven to be disruptive. You can still run this tool manually with
+      "make check-cocci". Closes ticket 40030.
+
+
 Changes in version 0.4.4.2-alpha - 2020-07-09
   This is the second alpha release in the 0.4.4.x series. It fixes a few
   bugs in the previous release, and solves a few usability,
diff --git a/changes/bug27315 b/changes/bug27315
deleted file mode 100644
index 8af3ac8559..0000000000
--- a/changes/bug27315
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (linux seccomp2 sandbox):
-    - Fix a regression on sandboxing rules for the openat() syscall.
-      The fix for bug 25440 fixed the problem on systems with glibc >=
-      2.27 but broke tor on previous versions of glibc. We now apply 
-      the correct seccomp rule according to the running glibc version.
-      Patch from Daniel Pinto. Fixes bug 27315; bugfix on 0.3.5.11.
diff --git a/changes/bug40020 b/changes/bug40020
deleted file mode 100644
index ca6ee2b85b..0000000000
--- a/changes/bug40020
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Minor bugfixes (linux seccomp2 sandbox):
-    - Makes the seccomp sandbox allow the correct syscall for opendir
-      according to the running glibc version. The opendir function
-      either uses open or openat but the current code does not
-      differenciate between opendir and open calls. This adds a new
-      seccomp sandbox rule for opendir. This fixes crashes when 
-      reloading torrc with sandbox enabled when running on glibc
-      2.15 to 2.21 and 2.26. Patch from Daniel Pinto. Fixes bug 40020; 
-      bugfix on 0.3.5.11.
diff --git a/changes/ticket31812 b/changes/ticket31812
deleted file mode 100644
index 869e494892..0000000000
--- a/changes/ticket31812
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Documentation:
-    - Replace most http:// URLs in our code and documentation with https://
-      URLs.  (We have left unchanged the code in src/ext/, and the text in
-      LICENSE.)  Closes ticket 31812. Patch from Jeremy Rand.
diff --git a/changes/ticket33880 b/changes/ticket33880
deleted file mode 100644
index c1889bb134..0000000000
--- a/changes/ticket33880
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (relay, usability):
-    - Adjust the rules for when to warn about having too many connections
-      to other relays. Previously we'd tolerate up to 1.5 connections
-      per relay on average.  Now we tolerate more connections for directory
-      authorities, and raise the number of total connections we need
-      to see before we warn.  Fixes bug 33880; bugfix on 0.3.1.1-alpha.
diff --git a/changes/ticket40030 b/changes/ticket40030
deleted file mode 100644
index c5f3ca4ff9..0000000000
--- a/changes/ticket40030
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Removed features:
-    - Our "check-local" test target no longer tries to use the Coccinelle
-      semantic patching tool parse all the C files.  While it is a good idea
-      to try to make sure Coccinelle works on our C before we run a
-      Coccinelle patch, doing so on every test run has proven to be disruptive.
-      You can still run this tool manually with "make check-cocci". Closes
-      ticket 40030.
diff --git a/changes/ticket40035 b/changes/ticket40035
deleted file mode 100644
index 8cdd447199..0000000000
--- a/changes/ticket40035
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes (NSS):
-    - When running with NSS enabled, make sure that NSS knows to expect
-      nonblocking sockets. Previously, we set our TCP sockets as blocking,
-      but did not tell NSS about the fact, which in turn could lead to
-      unexpected blocking behavior. Fixes bug 40035; bugfix on 0.3.5.1-alpha.
diff --git a/changes/ticket40061 b/changes/ticket40061
deleted file mode 100644
index 227664d010..0000000000
--- a/changes/ticket40061
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major feature (fallback directory list):
-    - Replace the 148 fallback directories originally included in
-      Tor 0.4.1.4-rc (of which around 105 are still functional) with
-      a list of 144 fallbacks generated in July 2020.
-      Closes ticket 40061.



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits