[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/master] Start on an 0.3.5.2-alpha changelog



commit de066b76a536b7c8deacdc1beddadd2f2bd200dd
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Thu Sep 20 16:35:36 2018 -0400

    Start on an 0.3.5.2-alpha changelog
---
 ChangeLog           | 63 +++++++++++++++++++++++++++++++++++++++++++++++++++++
 changes/bug23512    |  6 -----
 changes/bug27073    |  4 ----
 changes/bug27139    | 14 ------------
 changes/bug27206    |  4 ----
 changes/bug27764    |  4 ----
 changes/bug27782    |  4 ----
 changes/bug27795    |  5 -----
 changes/ticket27410 |  5 -----
 changes/ticket27799 |  3 ---
 10 files changed, 63 insertions(+), 49 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index bde75efa2..1a3428cf0 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,66 @@
+Changes in version 0.3.5.2-alpha - 2018-09-2?
+  Tor 0.3.5.2-alpha fixes several bugs in 0.3.5.1-alpha, including one
+  that made Tor think it had run out of sockets. Anybody running a relay
+  or an onion service on 0.3.5.1-alpha should upgrade.
+
+  o Major bugfixes (relay bandwidth statistics):
+    - When we close relayed circuits, report the data in the circuit
+      queues as being written in our relay bandwidth stats. This
+      mitigates guard discovery and other attacks that close circuits
+      for the explicit purpose of noticing this discrepancy in
+      statistics. Fixes bug 23512; bugfix on 0.0.8pre3.
+
+  o Major bugfixes (socket accounting):
+    - In our socket accounting code, count a socket as closed even when
+      it is closed indirectly by the TLS layer. Previously, we would
+      count these sockets as still in use, and incorrectly believe that
+      we had run out of sockets. Fixes bug 27795; bugfix
+      on 0.3.5.1-alpha.
+
+  o Minor bugfixes (32-bit OSX and iOS, timing):
+    - Fix an integer overflow bug in our optimized 32-bit millisecond-
+      difference algorithm for 32-bit Apple platforms. Previously, it
+      would overflow when calculating the difference between two times
+      more than 47 days apart. Fixes part of bug 27139; bugfix
+      on 0.3.4.1-alpha.
+    - Improve the precision of our 32-bit millisecond difference
+      algorithm for 32-bit Apple platforms. Fixes part of bug 27139;
+      bugfix on 0.3.4.1-alpha.
+    - Relax the tolerance on the mainloop/update_time_jumps test when
+      running on 32-bit Apple platforms. Fixes part of bug 27139; bugfix
+      on 0.3.4.1-alpha.
+
+  o Minor bugfixes (onion service v3):
+    - Close all SOCKS request (for the same .onion) if the newly fetched
+      descriptor is unusable. Before that, we would close only the first
+      one leaving the other hanging and let to time out by themselves.
+      Fixes bug 27410; bugfix on 0.3.2.1-alpha.
+
+  o Minor bugfixes (memory leak):
+    - Fix an unlikely memory leak when trying to read a private key from
+      a ridiculously large file. Fixes bug 27764; bugfix on
+      0.3.5.1-alpha. This is CID 1439488.
+
+  o Minor bugfixes (NSS):
+    - Correctly detect failure to open a dummy TCP socket when stealing
+      ownership of an fd from the NSS layer. Fixes bug 27782; bugfix
+      on 0.3.5.1-alpha.
+
+  o Minor bugfixes (rust):
+    - protover_all_supported() would attempt to allocate up to 16GB on
+      some inputs, leading to a potential memory DoS. Fixes bug 27206;
+      bugfix on 0.3.3.5-rc.
+
+  o Minor bugfixes (testing):
+    - Revise the "conditionvar_timeout" test so that it succeeds even on
+      heavily loaded systems where the test threads are not scheduled
+      within 200 msec. Fixes bug 27073; bugfix on 0.2.6.3-alpha.
+
+  o Code simplification and refactoring:
+    - Divide the routerlist.c and dirserv.c modules into smaller parts.
+      Closes ticket 27799.
+
+
 Changes in version 0.3.5.1-alpha - 2018-09-18
   Tor 0.3.5.1-alpha is the first release of the 0.3.5.x series. It adds
   client authorization for modern (v3) onion services, improves
diff --git a/changes/bug23512 b/changes/bug23512
deleted file mode 100644
index 91b2786de..000000000
--- a/changes/bug23512
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfix (Relay bandwidth statistics):
-    - When we close relayed circuits, report the data in the circuit queues
-      as being written in our relay bandwidth stats. This mitigates guard
-      discovery and other attacks that close circuits for the explicit purpose
-      of noticing this discrepancy in statistics. Fixes bug 23512; bugfix
-      on 0.0.8pre3.
diff --git a/changes/bug27073 b/changes/bug27073
deleted file mode 100644
index 851e7f0df..000000000
--- a/changes/bug27073
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (testing):
-    - Revise the "conditionvar_timeout" test so that it succeeds even
-      on heavily loaded systems where the test threads are not scheduled
-      within 200 msec. Fixes bug 27073; bugfix on 0.2.6.3-alpha.
diff --git a/changes/bug27139 b/changes/bug27139
deleted file mode 100644
index 0d1e3b432..000000000
--- a/changes/bug27139
+++ /dev/null
@@ -1,14 +0,0 @@
-  o Minor bugfixes (32-bit OSX and iOS, timing):
-    - Fix an integer overflow bug in our optimized 32-bit millisecond-
-      difference algorithm for 32-bit Apple platforms. Previously, it
-      would overflow when calculating the difference between two times
-      more than 47 days apart.  Fixes part of bug 27139; bugfix on
-      0.3.4.1-alpha.
-    - Improve the precision of our 32-bit millisecond difference
-      algorithm for 32-bit Apple platforms. Fixes part of bug 27139;
-      bugfix on 0.3.4.1-alpha.
-    - Relax the tolerance on the mainloop/update_time_jumps test
-      when running on 32-bit Apple platforms. Fixes part of bug 27139;
-      bugfix on 0.3.4.1-alpha.
-
-
diff --git a/changes/bug27206 b/changes/bug27206
deleted file mode 100644
index c0fbbed70..000000000
--- a/changes/bug27206
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (rust):
-    - protover_all_supported() would attempt to allocate up to 16GB on some
-      inputs, leading to a potential memory DoS. Fixes bug 27206; bugfix on
-      0.3.3.5-rc.
diff --git a/changes/bug27764 b/changes/bug27764
deleted file mode 100644
index f23fdf2e6..000000000
--- a/changes/bug27764
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (memory leak):
-    - Fix an unlikely memory leak when trying to read a private key
-      from a ridiculously large file. Fixes bug 27764; bugfix on
-      0.3.5.1-alpha. This is CID 1439488.
diff --git a/changes/bug27782 b/changes/bug27782
deleted file mode 100644
index 3564c34b6..000000000
--- a/changes/bug27782
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (NSS):
-    - Correctly detect failure to open a dummy TCP socket when
-      stealing ownership of an fd from the NSS layer. Fixes bug 27782;
-      bugfix on 0.3.5.1-alpha.
diff --git a/changes/bug27795 b/changes/bug27795
deleted file mode 100644
index 43bb1ba16..000000000
--- a/changes/bug27795
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes (socket accounting):
-    - In our socket accounting code, count a socket as closed even
-      when it is closed indirectly by the TLS layer. Previously, we
-      would count these sockets as still in use, and incorrectly believe that
-      we had run out of sockets. Fixes bug 27795; bugfix on 0.3.5.1-alpha.
diff --git a/changes/ticket27410 b/changes/ticket27410
deleted file mode 100644
index a21fdde58..000000000
--- a/changes/ticket27410
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (hidden service v3):
-    - Close all SOCKS request (for the same .onion) if the newly fetched
-      descriptor is unusable. Before that, we would close only the first one
-      leaving the other hanging and let to time out by themselves. Fixes bug
-      27410; bugfix on 0.3.2.1-alpha.
diff --git a/changes/ticket27799 b/changes/ticket27799
deleted file mode 100644
index 31b89d8c6..000000000
--- a/changes/ticket27799
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Code simplification and refactoring:
-    - Divide the routerlist.c and dirserv.c modules into smaller
-      parts. Closes ticket 27799.

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits