[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/release-0.3.4] remove duplicate changes from 0.3.3.5-rc to 0.3.3.9



commit 669426f3d438bd299495f9ae150ff2e2a4a0a8b1
Author: Roger Dingledine <arma@xxxxxxxxxxxxxx>
Date:   Sat Sep 8 15:21:49 2018 -0400

    remove duplicate changes from 0.3.3.5-rc to 0.3.3.9
---
 ReleaseNotes | 102 +++--------------------------------------------------------
 1 file changed, 4 insertions(+), 98 deletions(-)

diff --git a/ReleaseNotes b/ReleaseNotes
index ae419a2d9..0ee587c48 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -4,9 +4,9 @@ changes in each development snapshot, see the ChangeLog file.
 
 Changes in version 0.3.4.8  - 2018-09-10
   Tor 0.3.4.8 is the first stable release in its series; it includes
-  several compilation and portability fixes.
+  compilation and portability fixes.
 
-  The Tor 0.3.4 series includes several improvements for running Tor in
+  The Tor 0.3.4 series includes improvements for running Tor in
   low-power and embedded environments, which should help performance in
   general. We've begun work on better modularity, and included preliminary
   changes on the directory authority side to accommodate a new bandwidth
@@ -15,15 +15,8 @@ Changes in version 0.3.4.8  - 2018-09-10
   Tor's testing infrastructure.  Finally, we've continued to refine
   our anti-denial-of-service code.
 
-  Below are the changes since 0.3.3.5-rc.  For a list of only the changes
-  since 0.3.4.7-rc, see the ChangeLog
-
-  o Directory authority changes:
-    - The "Bifroest" bridge authority has been retired; the new bridge
-      authority is "Serge", and it is operated by George from the
-      TorBSD project. Closes ticket 26771.
-    - Add an IPv6 address for the "dannenberg" directory authority.
-      Closes ticket 26343.
+  Below are the changes since 0.3.3.9. For a list of only the changes
+  since 0.3.4.7-rc, see the ChangeLog file.
 
   o New system requirements:
     - Tor no longer tries to support old operating systems without
@@ -75,21 +68,12 @@ Changes in version 0.3.4.8  - 2018-09-10
       uninitialised buffer. They now log a warning about the empty file
       instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha.
 
-  o Major bugfixes (security, directory authority, denial-of-service, also in 0.3.3.6):
-    - Fix a bug that could have allowed an attacker to force a directory
-      authority to use up all its RAM by passing it a maliciously
-      crafted protocol versions string. Fixes bug 25517; bugfix on
-      0.2.9.4-alpha. This issue is also tracked as TROVE-2018-005.
-
   o Major bugfixes (crash):
     - Avoid a rare assertion failure in the circuit build timeout code
       if we fail to allow any circuits to actually complete. Fixes bug
       25733; bugfix on 0.2.2.2-alpha.
 
   o Major bugfixes (directory authority):
-    - Stop leaking memory on directory authorities when planning to
-      vote. This bug was crashing authorities by exhausting their
-      memory. Fixes bug 26435; bugfix on 0.3.3.6.
     - Avoid a crash when testing router reachability on a router that
       could have an ed25519 ID, but which does not. Fixes bug 25415;
       bugfix on 0.3.3.2-alpha.
@@ -118,11 +102,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       controlled by a consensus parameter. Fixes bug 25226; bugfix
       on 0.2.4.14-alpha.
 
-  o Major bugfixes (rust, testing):
-    - Make sure that failing tests in Rust will actually cause the build
-      to fail: previously, they were ignored. Fixes bug 26258; bugfix
-      on 0.3.3.4-alpha.
-
   o Minor features (accounting):
     - When Tor becomes dormant, it now uses a scheduled event to wake up
       at the right time. Previously, we would use the per-second timer
@@ -150,9 +129,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       Closes ticket 26006.
 
   o Minor features (compilation):
-    - When building Tor, prefer to use Python 3 over Python 2, and more
-      recent (contemplated) versions over older ones. Closes
-      ticket 26372.
     - When compiling with --enable-openbsd-malloc or --enable-tcmalloc,
       tell the compiler not to include the system malloc implementation.
       Fixes bug 20424; bugfix on 0.2.0.20-rc.
@@ -257,11 +233,6 @@ Changes in version 0.3.4.8  - 2018-09-10
     - Avoid a needless malloc()/free() pair every time we handle an ntor
       handshake. Closes ticket 25150.
 
-  o Minor features (relay, diagnostic):
-    - Add several checks to detect whether Tor relays are uploading
-      their descriptors without specifying why they regenerated them.
-      Diagnostic for ticket 25686.
-
   o Minor features (Rust, portability):
     - Rust cross-compilation is now supported. Closes ticket 25895.
 
@@ -300,13 +271,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       subsystem. Fixes bug 25675; bugfix on 0.2.7.3-rc. Found by
       Coverity; this is CID 1433643.
 
-  o Minor bugfixes (circuit path selection):
-    - Don't count path selection failures as circuit build failures.
-      This change should eliminate cases where Tor blames its guard or
-      the network for situations like insufficient microdescriptors
-      and/or overly restrictive torrc settings. Fixes bug 25705; bugfix
-      on 0.3.3.1-alpha.
-
   o Minor bugfixes (client):
     - Don't consider Tor running as a client if the ControlPort is open,
       but no actual client ports are open. Fixes bug 26062; bugfix
@@ -318,13 +282,6 @@ Changes in version 0.3.4.8  - 2018-09-10
     - Remove the unused variable n_possible from the function
       channel_get_for_extend(). Fixes bug 25645; bugfix on 0.2.4.4-alpha
 
-  o Minor bugfixes (compatibility, openssl):
-    - Work around a change in OpenSSL 1.1.1 where return values that
-      would previously indicate "no password" now indicate an empty
-      password. Without this workaround, Tor instances running with
-      OpenSSL 1.1.1 would accept descriptors that other Tor instances
-      would reject. Fixes bug 26116; bugfix on 0.2.5.16.
-
   o Minor bugfixes (compilation):
     - Silence a spurious compiler warning on the GetAdaptersAddresses
       function pointer cast. This issue is already fixed by 26481 in
@@ -338,17 +295,11 @@ Changes in version 0.3.4.8  - 2018-09-10
       code that calls routerinfo_get_my_routerinfo() twice, assuming
       that the second call will succeed if the first one did. Fixes bug
       26269; bugfix on 0.2.8.2-alpha.
-    - Fix a compilation warning on some versions of GCC when building
-      code that calls routerinfo_get_my_routerinfo() twice, assuming
-      that the second call will succeed if the first one did. Fixes bug
-      26269; bugfix on 0.2.8.2-alpha.
     - Refrain from compiling unit testing related object files when
       --disable-unittests is set to configure script. Fixes bug 24891;
       bugfix on 0.2.5.1-alpha.
     - The --enable-fatal-warnings flag now affects Rust code as well.
       Closes ticket 26245.
-    - Silence unused-const-variable warnings in zstd.h with some GCC
-      versions. Fixes bug 26272; bugfix on 0.3.1.1-alpha.
     - Avoid a compiler warning when casting the return value of
       smartlist_len() to double with DEBUG_SMARTLIST enabled. Fixes bug
       26283; bugfix on 0.2.4.10-alpha.
@@ -369,16 +320,9 @@ Changes in version 0.3.4.8  - 2018-09-10
       policy/* requests. Also, let controller know if an error is
       transient (response code 551) or not (response code 552). Fixes
       bug 25852; bugfix on 0.2.8.1-alpha.
-    - Handle the HSADDRESS= argument to the HSPOST command properly.
-      (Previously, this argument was misparsed and thus ignored.) Fixes
-      bug 26523; bugfix on 0.3.3.1-alpha. Patch by "akwizgran".
     - Parse the "HSADDRESS=" parameter in HSPOST commands properly.
       Previously, it was misparsed and ignored. Fixes bug 26523; bugfix
       on 0.3.3.1-alpha. Patch by "akwizgran".
-    - Improve accuracy of the BUILDTIMEOUT_SET control port event's
-      TIMEOUT_RATE and CLOSE_RATE fields. (We were previously
-      miscounting the total number of circuits for these field values.)
-      Fixes bug 26121; bugfix on 0.3.3.1-alpha.
     - Make CIRC_BW event reflect the total of all data sent on a
       circuit, including padding and dropped cells. Also fix a mis-
       counting bug when STREAM_BW events were enabled. Fixes bug 25400;
@@ -423,17 +367,10 @@ Changes in version 0.3.4.8  - 2018-09-10
       directory authorities have to be ahead of the client before this
       warning will occur. Fixes bug 25756; bugfix on 0.2.2.25-alpha.
 
-  o Minor bugfixes (hardening):
-    - Prevent a possible out-of-bounds smartlist read in
-      protover_compute_vote(). Fixes bug 26196; bugfix on 0.2.9.4-alpha.
-
   o Minor bugfixes (in-process restart):
     - Always call tor_free_all() when leaving tor_run_main(). When we
       did not, restarting tor in-process would cause an assertion
       failure. Fixes bug 26948; bugfix on 0.3.3.1-alpha.
-    - When shutting down, Tor now clears all the flags in the control.c
-      module. This should prevent a bug where authentication cookies are
-      not generated on restart. Fixes bug 25512; bugfix on 0.3.3.1-alpha.
 
   o Minor bugfixes (Linux seccomp2 sandbox):
     - Allow the nanosleep() system call, which glibc uses to implement
@@ -448,10 +385,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       authenticate direct connections to relays. Fixes bug 26927; bugfix
       on 0.3.0.1-alpha.
 
-  o Minor bugfixes (memory, correctness):
-    - Fix a number of small memory leaks identified by coverity. Fixes
-      bug 26467; bugfix on numerous Tor versions.
-
   o Minor bugfixes (onion service):
     - Fix a memory leak when a v3 onion service is configured and gets a
       SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha.
@@ -473,13 +406,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       miscalculating the index for next-generation onion services. Fixes
       bug 24977; bugfix on 0.3.2.1-alpha.
 
-  o Minor bugfixes (path selection):
-    - Only select relays when they have the descriptors we prefer to use
-      for them. This change fixes a bug where we could select a relay
-      because it had _some_ descriptor, but reject it later with a
-      nonfatal assertion error because it didn't have the exact one we
-      wanted. Fixes bugs 25691 and 25692; bugfix on 0.3.3.4-alpha.
-
   o Minor bugfixes (portability):
     - Fix compilation of the unit tests on GNU/Hurd, which does not
       define PATH_MAX. Fixes bug 26873; bugfix on 0.3.3.1-alpha. Patch
@@ -505,10 +431,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       here.) Fixes bug 24910; bugfix on 0.2.4.17-rc.
 
   o Minor bugfixes (relay):
-    - Relays now correctly block attempts to re-extend to the previous
-      relay by Ed25519 identity. Previously they would warn in this
-      case, but not actually reject the attempt. Fixes bug 26158; bugfix
-      on 0.3.0.1-alpha.
     - Avoid a crash when running with DirPort set but ORPort turned off.
       Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha.
 
@@ -583,21 +505,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       result files, to avoid spurious failures. Fixes bug 27295; bugfix
       on 0.2.7.3-rc.
 
-  o Minor bugfixes (testing, compatibility):
-    - When running the ntor_ref.py and hs_ntor_ref.py tests, make sure
-      only to pass strings (rather than "bytes" objects) to the Python
-      subprocess module. Python 3 on Windows seems to require this.
-      Fixes bug 26535; bugfix on 0.2.5.5-alpha (for ntor_ref.py) and
-      0.3.1.1-alpha (for hs_ntor_ref.py).
-    - When running the hs_ntor_ref.py test, make sure only to pass
-      strings (rather than "bytes" objects) to the Python subprocess
-      module. Python 3 on Windows seems to require this. Fixes bug
-      26535; bugfix on 0.3.1.1-alpha.
-    - When running the ntor_ref.py test, make sure only to pass strings
-      (rather than "bytes" objects) to the Python subprocess module.
-      Python 3 on Windows seems to require this. Fixes bug 26535; bugfix
-      on 0.2.5.5-alpha.
-
   o Minor bugfixes (testing, openssl compatibility):
     - Our "tortls/cert_matches_key" unit test no longer relies on
       OpenSSL internals. Previously, it relied on unsupported OpenSSL
@@ -733,7 +640,6 @@ Changes in version 0.3.4.8  - 2018-09-10
       Closes ticket 25268.
 
 
-
 Changes in version 0.3.3.9 - 2018-07-13
   Tor 0.3.3.9 moves to a new bridge authority, meaning people running
   bridge relays should upgrade.

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits