[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/main] changelog: ChangeLog for 0.4.7.2-alpha release
commit 78f5c96272bba39a9bd43944e588ced4728266ae
Author: David Goulet <dgoulet@xxxxxxxxxxxxxx>
Date: Mon Oct 25 10:13:46 2021 -0400
changelog: ChangeLog for 0.4.7.2-alpha release
Signed-off-by: David Goulet <dgoulet@xxxxxxxxxxxxxx>
---
ChangeLog | 153 +++++++++++++++++++++++++++++++++++++++++++++++++
changes/bug40400 | 6 --
changes/bug40400_part2 | 5 --
changes/bug40400_part3 | 7 ---
changes/bug40465 | 3 -
changes/bug40471 | 4 --
changes/bug40486 | 5 --
changes/bug40488 | 4 --
changes/issue11477 | 8 ---
changes/issue16803 | 2 -
changes/prop335 | 11 ----
changes/ticket30477 | 4 --
changes/ticket34083 | 5 --
changes/ticket40182 | 4 --
changes/ticket40450 | 3 -
changes/ticket40469 | 4 --
changes/ticket40474 | 5 --
changes/ticket40476 | 7 ---
changes/ticket40480 | 3 -
changes/ticket40484 | 5 --
changes/ticket40485 | 3 -
changes/ticket40490 | 5 --
changes/ticket40491 | 7 ---
changes/ticket40493 | 2 -
24 files changed, 153 insertions(+), 112 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 2340716696..6d3d8f8700 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,156 @@
+Changes in version 0.4.7.2-alpha - 2021-10-26
+ This version is the second alpha release of the 0.4.7.x series. Two
+ major features were added which are congestion control (prop334) for
+ network performance and the MiddleOnly flag (prop335) voted by the
+ authorities used to pin relays to the middle position for various
+ network health reasons. This version also fixes numerous bugfixes.
+
+ The congestion control feature, detailed in proposal 324, still needs
+ more work before we can enabled it by default. It is currently in its
+ testing and tuning phase which means that you should expect more
+ 0.4.7.x alphas as congestion control gets stabilized and tuned for
+ optimal performance. And so, at this release, it can not be used
+ without a custom patch.
+
+ o Major features (congestion control):
+ - Implement support for flow control over congestion controlled
+ circuits. This work comes from proposal 324. Closes ticket 40450.
+
+ o Major features (directory authority):
+ - Add a new consensus method to handle MiddleOnly specially. When
+ enough authorities are using this method, then any relay tagged
+ with the MiddleOnly flag will have its Exit, Guard, HSDir, and
+ V2Dir flags automatically cleared, and will have its BadExit flag
+ automatically set. Implements part of proposal 335.
+ - Authorities can now be configured to label relays as "MiddleOnly".
+ When voting for this flag, authorities automatically vote against
+ Exit, Guard, HSDir, and V2Dir; and in favor of BadExit. Implements
+ part of proposal 335. Based on a patch from Neel Chauhan.
+
+ o Major bugfix (relay, metrics):
+ - On the MetricsPort, the DNS error statistics are not reported by
+ record type ("record=...") anymore due to a libevent bug
+ (https://github.com/libevent/libevent/issues/1219). Fixes bug
+ 40490; bugfix on 0.4.7.1-alpha.
+
+ o Major bugfixes (relay, overload state):
+ - Report the general overload state for DNS timeout errors only if
+ X% of all DNS queries over Y seconds are errors. Before that, it
+ only took 1 timeout to report the overload state which was just
+ too low of a threshold. The X and Y values are 1% and 10 minutes
+ respectively but they are also controlled by consensus parameters.
+ Fixes bug 40491; bugfix on 0.4.6.1-alpha.
+
+ o Minor feature (authority, relay):
+ - Reject End-Of-Life relays running version 0.4.2.x, 0.4.3.x,
+ 0.4.4.x and 0.4.5 alphas/rc. Closes ticket 40480.
+
+ o Minor feature (onion service v2):
+ - Onion service v2 addresses are now not recognized anymore by tor
+ meaning a bad hostname is returned when attempting to pass it on a
+ SOCKS connection. No more deprecation log is emitted client side.
+ Closes ticket 40476.
+ - See https://blog.torproject.org/v2-deprecation-timeline for
+ details on how to transition from v2 to v3.
+
+ o Minor features (bridge):
+ - We now announce the URL to Tor's new bridge status at
+ https://bridges.torproject.org/ when Tor is configured to run as a
+ bridge relay. Closes ticket 30477.
+
+ o Minor features (fallbackdir):
+ - Regenerate fallback directories for October 2021. Close
+ ticket 40493.
+
+ o Minor features (logging, heartbeat):
+ - When a relay receives a cell that isn't encrypted properly for it,
+ but the relay is the last hop on the circuit, the relay now counts
+ how many cells of this kind it receives, on how many circuits, and
+ reports this information in the log. Previously, we'd log each
+ cell at PROTOCOL_WARN level, which is far too verbose to be
+ useful. Fixes part of ticket 40400.
+
+ o Minor features (testing):
+ - We now have separate fuzzers for the inner layers of v3 onion
+ service descriptors, to prevent future bugs like 40392. Closes
+ ticket 40488.
+
+ o Minor bugfixes (compilation):
+ - Fix compilation error when __NR_time is not defined. Fixes bug
+ 40465; bugfix on 0.2.5.5-alpha. Patch by Daniel Pinto.
+
+ o Minor bugfixes (dirauth, bandwidth scanner):
+ - Add the AuthDirDontVoteOnDirAuthBandwidth dirauth config parameter
+ to avoid voting on bandwidth scanner weights to v3 directory
+ authorities. Fixes bug 40471; bugfix on 0.2.2.1-alpha. Patch by
+ Neel Chauhan.
+
+ o Minor bugfixes (fragile-hardening, sandbox):
+ - When building with --enable-fragile-hardening, add or relax Linux
+ seccomp rules to allow AddressSanitizer to execute normally if the
+ process terminates with the sandbox active. This has the side
+ effect of disabling the filtering of file- and directory-open
+ requests on most systems and dilutes the effectiveness of the
+ sandbox overall, as a wider range of system calls must be
+ permitted. Fixes bug 11477; bugfix on 0.2.5.4-alpha.
+
+ o Minor bugfixes (logging):
+ - If a channel has never received, transmitted a cell or seen a
+ client, do not calculate time diffs against 1/1/1970 but log
+ another prettier message. Fixes bug 40182; bugfix on 0.2.4.4.
+
+ o Minor bugfixes (onion service):
+ - Fix a warning BUG that would occur often on heavily loaded onion
+ service leading to filling the logs with useless warnings. Fixes
+ bug 34083; bugfix on 0.3.2.1-alpha.
+
+ o Minor bugfixes (onion service, config):
+ - Fix a memory leak for a small config line string that could occur
+ if the service failed to be configured from file properly. Fixes
+ bug 40484; bugfix on 0.3.2.1-alpha.
+
+ o Minor bugfixes (onion service, TROVE-2021-008):
+ - Only log once any v2 access attempts in order to not pollute the
+ logs with warnings and avoid recording the times on disk when v2
+ access was attempted. Important to note that the onion address was
+ _never_ logged. That is a Low security issue. Fixes bug 40474;
+ bugfix on 0.4.5.8.
+ - Note that due to #40476 which removes v2 support entirely, this
+ log line is not emitted anymore. We still mention this in the
+ changelog because it is a low security TROVE.
+
+ o Minor bugfixes (usability):
+ - Do not log "RENDEZVOUS1 cell with unrecognized rendezvous cookie"
+ at LOG_PROTOCOL_WARN; instead log it at DEBUG. This warning can
+ happen naturally if a client gives up on a rendezvous circuit
+ after sending INTRODUCE1. Fixes part of bug 40400; bugfix
+ on 0.1.1.13-alpha.
+ - Do not log "circuit_receive_relay_cell failed" at
+ LOG_PROTOCOL_WARN; instead log it at DEBUG. In every case where we
+ would want to log this as a protocol warning, we are already
+ logging another warning from inside circuit_receive_relay_cell.
+ Fixes part of bug 40400; bugfix on 0.1.1.9-alpha.
+
+ o Code simplification and refactoring:
+ - Lower the official maximum for "guard-extreme-restriction-percent"
+ to 100. This has no effect on when the guard code will generate a
+ warning, but it makes the intent of the option clearer. Fixes bug
+ 40486; bugfix on 0.3.0.1-alpha.
+
+ o Testing:
+ - Add unit tests for the Linux seccomp sandbox. Resolves
+ issue 16803.
+
+ o Code simplification and refactoring (rust):
+ - Remove Rust support and its associated code. It is unsupported and
+ Rust focus should be shifted to arti. Closes 40469.
+
+ o Testing (CI, chutney):
+ - Bump the data size that chutney transmit to 5MB in order to
+ trigger flow control and congestion window code. Closes
+ ticket 40485.
+
+
Changes in version 0.4.7.1-alpha - 2021-09-17
This version is the first alpha release of the 0.4.7.x series. One
major feature is Vanguards Lite, from proposal 333, to help mitigate
diff --git a/changes/bug40400 b/changes/bug40400
deleted file mode 100644
index 47bb1e6a1e..0000000000
--- a/changes/bug40400
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (usability):
- - Do not log "circuit_receive_relay_cell failed" at LOG_PROTOCOL_WARN;
- instead log it at DEBUG. In every case where we would want to log
- this as a protocol warning, we are already logging another warning
- from inside circuit_receive_relay_cell. Fixes part of bug 40400;
- bugfix on 0.1.1.9-alpha.
diff --git a/changes/bug40400_part2 b/changes/bug40400_part2
deleted file mode 100644
index 9b834d5ea1..0000000000
--- a/changes/bug40400_part2
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (usability):
- - Do not log "RENDEZVOUS1 cell with unrecognized rendezvous cookie"
- at LOG_PROTOCOL_WARN; instead log it at DEBUG. This warning can happen
- naturally if a client gives up on a rendezvous circuit after sending
- INTRODUCE1. Fixes part of bug 40400; bugfix on 0.1.1.13-alpha.
diff --git a/changes/bug40400_part3 b/changes/bug40400_part3
deleted file mode 100644
index b78e800229..0000000000
--- a/changes/bug40400_part3
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor features (logging, heartbeat):
- - When a relay receives a cell that isn't encrypted properly for
- it, but the relay is the last hop on the circuit, the relay
- now counts how many cells of this kind it receives, on how
- many circuits, and reports this information in the log.
- Previously, we'd log each cell at PROTOCOL_WARN level, which
- is far too verbose to be useful. Fixes part of ticket 40400.
diff --git a/changes/bug40465 b/changes/bug40465
deleted file mode 100644
index d4d225c62e..0000000000
--- a/changes/bug40465
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix compilation error when __NR_time is not defined. Fixes bug
- 40465; bugfix on 0.2.5.5-alpha. Patch by Daniel Pinto.
diff --git a/changes/bug40471 b/changes/bug40471
deleted file mode 100644
index 323e049599..0000000000
--- a/changes/bug40471
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (dirauth, bandwidth scanner):
- - Add the AuthDirDontVoteOnDirAuthBandwidth dirauth config parameter to
- avoid voting on bandwidth scanner weights to v3 directory authorities.
- Fixes bug 40471; bugfix on 0.2.2.1-alpha. Patch by Neel Chauhan.
diff --git a/changes/bug40486 b/changes/bug40486
deleted file mode 100644
index 83315bfb2b..0000000000
--- a/changes/bug40486
+++ /dev/null
@@ -1,5 +0,0 @@
- o Code simplification and refactoring:
- - Lower the official maximum for "guard-extreme-restriction-percent" to
- 100. This has no effect on when the guard code will generate a warning,
- but it makes the intent of the option clearer. Fixes bug 40486; bugfix
- on 0.3.0.1-alpha.
diff --git a/changes/bug40488 b/changes/bug40488
deleted file mode 100644
index 6fc265cc20..0000000000
--- a/changes/bug40488
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (testing):
- - We now have separate fuzzers for the inner layers of v3 onion
- service descriptors, to prevent future bugs like 40392.
- Closes ticket 40488.
diff --git a/changes/issue11477 b/changes/issue11477
deleted file mode 100644
index bb5d9e4099..0000000000
--- a/changes/issue11477
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (fragile-hardening, sandbox):
- - When building with --enable-fragile-hardening, add or relax Linux
- seccomp rules to allow AddressSanitizer to execute normally if the
- process terminates with the sandbox active. This has the side
- effect of disabling the filtering of file- and directory-open
- requests on most systems and dilutes the effectiveness of the
- sandbox overall, as a wider range of system calls must be
- permitted. Fixes bug 11477; bugfix on 0.2.5.4-alpha.
diff --git a/changes/issue16803 b/changes/issue16803
deleted file mode 100644
index 7d0dd833e2..0000000000
--- a/changes/issue16803
+++ /dev/null
@@ -1,2 +0,0 @@
- o Testing:
- - Add unit tests for the Linux seccomp sandbox. Resolves issue 16803.
diff --git a/changes/prop335 b/changes/prop335
deleted file mode 100644
index 4fa61ca2e9..0000000000
--- a/changes/prop335
+++ /dev/null
@@ -1,11 +0,0 @@
- o Major features (directory authority):
- - Authorities can now be configured to label relays as "MiddleOnly".
- When voting for this flag, authorities automatically vote against
- Exit, Guard, HSDir, and V2Dir; and in favor of BadExit.
- Implements part of proposal 335. Based on a patch from Neel
- Chauhan.
- - Add a new consensus method to handle MiddleOnly specially. When
- enough authorities are using this method, then any relay
- tagged with the MiddleOnly flag will have its Exit, Guard, HSDir,
- and V2Dir flags automatically cleared, and will have its BadExit flag
- automatically set. Implements part of proposal 335.
diff --git a/changes/ticket30477 b/changes/ticket30477
deleted file mode 100644
index 379fc4e7eb..0000000000
--- a/changes/ticket30477
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (bridge):
- - We now announce the URL to Tor's new bridge status at
- https://bridges.torproject.org/ when Tor is configured to run as a bridge
- relay. Closes ticket 30477.
diff --git a/changes/ticket34083 b/changes/ticket34083
deleted file mode 100644
index 417d01c5a5..0000000000
--- a/changes/ticket34083
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (onion service):
- - Fix a warning BUG that would occur often on heavily loaded onion service
- leading to filling the logs with useless warnings. Fixes bug 34083; bugfix
- on 0.3.2.1-alpha.
-
diff --git a/changes/ticket40182 b/changes/ticket40182
deleted file mode 100644
index ad75c38534..0000000000
--- a/changes/ticket40182
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (logging):
- - If a channel has never received, transmitted a cell or seen a client, do
- not calculate time diffs against 1/1/1970 but log another prettier
- message. Fixes bug 40182; bugfix on 0.2.4.4.
diff --git a/changes/ticket40450 b/changes/ticket40450
deleted file mode 100644
index 6753bd04f5..0000000000
--- a/changes/ticket40450
+++ /dev/null
@@ -1,3 +0,0 @@
- o Major features (congestion control):
- - Implement support for flow control over congestion controlled circuits.
- This work comes from proposal 324. Closes ticket 40450.
diff --git a/changes/ticket40469 b/changes/ticket40469
deleted file mode 100644
index 1cb792b4ba..0000000000
--- a/changes/ticket40469
+++ /dev/null
@@ -1,4 +0,0 @@
- o Code simplification and refactoring (rust):
- - Remove Rust support and its associated code. It is unsupported and Rust
- focus should be shifted to arti. Closes 40469.
-
diff --git a/changes/ticket40474 b/changes/ticket40474
deleted file mode 100644
index d2a7231106..0000000000
--- a/changes/ticket40474
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (onion service, TROVE-2021-008):
- - Only log once any v2 access attempts in order to not pollute the logs
- with warnings and avoid recording the times on disk when v2 access was
- attempted. Important to note that the onion address was _never_ logged.
- That is a Low security issue. Fixes bug 40474; bugfix on 0.4.5.8.
diff --git a/changes/ticket40476 b/changes/ticket40476
deleted file mode 100644
index 7179d8b1c6..0000000000
--- a/changes/ticket40476
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor feature (onion service v2):
- - Onion service v2 address are now not recognized anymore by tor meaning a
- bad hostname is returned when attempting to pass it on a SOCKS
- connection. No more deprecation log is emitted client side. Closes
- ticket 40476.
- - See https://blog.torproject.org/v2-deprecation-timeline for details on
- how to transition from v2 to v3.
diff --git a/changes/ticket40480 b/changes/ticket40480
deleted file mode 100644
index 525e848a1f..0000000000
--- a/changes/ticket40480
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor feature (authority, relay):
- - Reject End-Of-Life relays running version 0.4.2.x, 0.4.3.x, 0.4.4.x and
- 0.4.5 alphas and rc. Closes ticket 40480.
diff --git a/changes/ticket40484 b/changes/ticket40484
deleted file mode 100644
index 9a9ffdf448..0000000000
--- a/changes/ticket40484
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (onion service, config):
- - Fix a memory leak for a small config line string that could occur if the
- service failed to be configured from file properly. Fixes bug 40484;
- bugfix on 0.3.2.1-alpha.
-
diff --git a/changes/ticket40485 b/changes/ticket40485
deleted file mode 100644
index 849ee0719f..0000000000
--- a/changes/ticket40485
+++ /dev/null
@@ -1,3 +0,0 @@
- o Testing (CI, chutney):
- - Bump the data size that chutney transmit to 5MB in order to trigger flow
- control and congestion window code. Closes ticket 40485.
diff --git a/changes/ticket40490 b/changes/ticket40490
deleted file mode 100644
index 6e9ef50b42..0000000000
--- a/changes/ticket40490
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfix (relay, metrics):
- - On the MetricsPort, the DNS error statistics are not reported by record
- type ("record=...") anymore due to a libevent bug
- (https://github.com/libevent/libevent/issues/1219). Fixes bug 40490;
- bugfix on 0.4.7.1-alpha.
diff --git a/changes/ticket40491 b/changes/ticket40491
deleted file mode 100644
index 01c6c7d748..0000000000
--- a/changes/ticket40491
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (relay, overload state):
- - Report the general overload state for DNS timeout errors only if X% of all
- DNS queries over Y seconds are errors. Before that, it only took 1 timeout
- to report the overload state which was just too low of a threshold. The X
- and Y values are 1% and 10 minutes respectively but they are also
- controlled by consensus parameters. Fixes bug 40491; bugfix on
- 0.4.6.1-alpha.
diff --git a/changes/ticket40493 b/changes/ticket40493
deleted file mode 100644
index eb9baf916b..0000000000
--- a/changes/ticket40493
+++ /dev/null
@@ -1,2 +0,0 @@
- o Minor features (fallbackdir):
- - Regenerate fallback directories for October 2021. Close ticket 40493.
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits