[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/release-0.3.3] 033 releasenotes: minor sorting
commit 7760162b8cf7d7a66b2e7416618d30876654568f
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Mon May 21 09:16:28 2018 -0400
033 releasenotes: minor sorting
---
ReleaseNotes | 108 +++++++++++++++++++++++++----------------------------------
1 file changed, 46 insertions(+), 62 deletions(-)
diff --git a/ReleaseNotes b/ReleaseNotes
index be177d31f..ba9621421 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -65,6 +65,12 @@ Changes in version 0.3.3.6 - 2018-05-??
hop. These options are for use in conjunction with experiments
with "vanguards" for preventing guard enumeration attacks. Closes
ticket 13837.
+ - When v3 onion service clients send introduce cells, they now
+ include the IPv6 address of the rendezvous point, if it has one.
+ Current v3 onion services running 0.3.2 ignore IPv6 addresses, but
+ in future Tor versions, IPv6-only v3 single onion services will be
+ able to use IPv6 addresses to connect directly to the rendezvous
+ point. Closes ticket 23577. Patch by Neel Chauhan.
o Major features (rust, portability, experimental):
- Tor now ships with an optional implementation of one of its
@@ -81,14 +87,6 @@ Changes in version 0.3.3.6 - 2018-05-??
the storage location for relay's keys can be overridden with the
KeyDirectory option. Closes ticket 22703.
- o Major features (v3 onion services, ipv6):
- - When v3 onion service clients send introduce cells, they now
- include the IPv6 address of the rendezvous point, if it has one.
- Current v3 onion services running 0.3.2 ignore IPv6 addresses, but
- in future Tor versions, IPv6-only v3 single onion services will be
- able to use IPv6 addresses to connect directly to the rendezvous
- point. Closes ticket 23577. Patch by Neel Chauhan.
-
o Major bugfixes (directory authorities, security, backport from 0.3.4.1-alpha):
- When directory authorities read a zero-byte bandwidth file, they
would previously log a warning with the contents of an
@@ -143,17 +141,11 @@ Changes in version 0.3.3.6 - 2018-05-??
- Add Link protocol version 5 to the supported protocols list. Fixes
bug 25070; bugfix on 0.3.1.1-alpha.
- o Major bugfixes (relay, connection):
+ o Major bugfixes (relay):
- If we have failed to connect to a relay and received a connection
refused, timeout, or similar error (at the TCP level), do not try
that same address/port again for 60 seconds after the failure has
occurred. Fixes bug 24767; bugfix on 0.0.6.
-
- o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
- - Impose a limit on circuit cell queue size. The limit can be controlled by
- a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
-
- o Major bugfixes (relays):
- Fix a set of false positives where relays would consider
connections to other relays as being client-only connections (and
thus e.g. deserving different link padding schemes) if those
@@ -161,23 +153,15 @@ Changes in version 0.3.3.6 - 2018-05-??
initial handshake and whether the connection authenticated as a
relay. Fixes bug 24898; bugfix on 0.3.1.1-alpha.
+ o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
+ - Impose a limit on circuit cell queue size. The limit can be controlled by
+ a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
+
o Major bugfixes (scheduler, consensus):
- The scheduler subsystem was failing to promptly notice changes in
consensus parameters, making it harder to switch schedulers
network-wide. Fixes bug 24975; bugfix on 0.3.2.1-alpha.
- o Minor feature (continuous integration):
- - Update the Travis CI configuration to use the stable Rust channel,
- now that we have decided to require that. Closes ticket 25714.
-
- o Minor feature (IPv6):
- - Make IPv6-only clients wait for microdescs for relays, even if we
- were previously using descriptors (or were using them as a bridge)
- and have a cached descriptor for them. Implements 23827.
- - When a consensus has IPv6 ORPorts, make IPv6-only clients use
- them, rather than waiting to download microdescriptors.
- Implements 23827.
-
o Minor features (cleanup):
- Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile
when it stops. Closes ticket 23271.
@@ -199,6 +183,10 @@ Changes in version 0.3.3.6 - 2018-05-??
more. Otherwise we use the former value of 75%. Closes
ticket 24782.
+ o Minor features (continuous integration):
+ - Update the Travis CI configuration to use the stable Rust channel,
+ now that we have decided to require that. Closes ticket 25714.
+
o Minor features (continuous integration, backport from 0.3.4.1-alpha):
- Our .travis.yml configuration now includes support for testing
the results of "make distcheck". (It's not uncommon for "make check" to
@@ -296,12 +284,6 @@ Changes in version 0.3.3.6 - 2018-05-??
o Minor features (geoip):
- Update geoip and geoip6 to the May 1 2018 Maxmind GeoLite2
Country database. Closes ticket 26104.
- - Update geoip and geoip6 to the April 3 2018 Maxmind GeoLite2
- Country database. Closes ticket 25718.
- - Update geoip and geoip6 to the March 8 2018 Maxmind GeoLite2
- Country database. Closes ticket 25469.
- - Update geoip and geoip6 to the February 7 2018 Maxmind GeoLite2
- Country database.
o Minor features (heartbeat):
- Add onion service information to our heartbeat logs, displaying
@@ -314,6 +296,14 @@ Changes in version 0.3.3.6 - 2018-05-??
heartbeat messages. We hope to use this to improve Tor's behavior
when it's trying to sleep. Closes ticket 24605.
+ o Minor features (IPv6):
+ - Make IPv6-only clients wait for microdescs for relays, even if we
+ were previously using descriptors (or were using them as a bridge)
+ and have a cached descriptor for them. Implements 23827.
+ - When a consensus has IPv6 ORPorts, make IPv6-only clients use
+ them, rather than waiting to download microdescriptors.
+ Implements 23827.
+
o Minor features (log messages):
- Improve log message in the out-of-memory handler to include
information about memory usage from the different compression
@@ -326,12 +316,8 @@ Changes in version 0.3.3.6 - 2018-05-??
o Minor features (logging):
- Clarify the log messages produced when getrandom() or a related
entropy-generation mechanism gives an error. Closes ticket 25120.
-
- o Minor features (logging, android):
- Added support for the Android logging subsystem. Closes
ticket 24362.
-
- o Minor features (logging, diagnostic):
- When logging a failure to create an onion service's descriptor,
also log what the problem with the descriptor was. Diagnostic for
ticket 24972.
@@ -388,28 +374,6 @@ Changes in version 0.3.3.6 - 2018-05-??
really meant for developers only. It will likely be removed in a
future release. Implements ticket 24583.
- o Minor bugfix (channel connection):
- - Use the actual observed address of an incoming relay connection,
- not the canonical address of the relay from its descriptor, when
- making decisions about how to handle the incoming connection.
- Fixes bug 24952; bugfix on 0.2.4.11-alpha. Patch by "ffmancera".
-
- o Minor bugfix (directory authority):
- - Directory authorities, when refusing a descriptor from a rejected
- relay, now explicitly tell the relay (in its logs) to set a valid
- ContactInfo address and contact the bad-relays@ mailing list.
- Fixes bug 25170; bugfix on 0.2.9.1.
-
- o Minor bugfix (network IPv6 test):
- - Tor's test scripts now check if "ping -6 ::1" works when the user
- runs "make test-network-all". Fixes bug 24677; bugfix on
- 0.2.9.3-alpha. Patch by "ffmancera".
-
- o Minor bugfixes (all versions of Tor):
- - Use the "misspell" tool to detect and fix typos throughout the
- source code. Fixes bug 23650; bugfix on various versions of Tor.
- Patch from Deepesh Pathak.
-
o Minor bugfixes (build, rust):
- Fix output of autoconf checks to display success messages for Rust
dependencies and a suitable rustc compiler version. Fixes bug
@@ -429,6 +393,12 @@ Changes in version 0.3.3.6 - 2018-05-??
dereference. Fixes bug 25629; bugfix on 0.2.9.15. Found by
Coverity; this is CID 1430932.
+ o Minor bugfixes (channel connection):
+ - Use the actual observed address of an incoming relay connection,
+ not the canonical address of the relay from its descriptor, when
+ making decisions about how to handle the incoming connection.
+ Fixes bug 24952; bugfix on 0.2.4.11-alpha. Patch by "ffmancera".
+
o Minor bugfixes (channel, client):
- Better identify client connection when reporting to the geoip
client cache. Fixes bug 24904; bugfix on 0.3.1.7.
@@ -453,8 +423,6 @@ Changes in version 0.3.3.6 - 2018-05-??
- Restore the correct operation of the RESOLVE command, which had
been broken since we added the ability to enable/disable DNS on
specific listener ports. Fixes bug 25617; bugfix on 0.2.9.3-alpha.
-
- o Minor bugfixes (controller, reliability):
- Avoid a (nonfatal) assertion failure when extending a one-hop
circuit from the controller to become a multihop circuit. Fixes
bug 24903; bugfix on 0.2.5.2-alpha.
@@ -484,6 +452,12 @@ Changes in version 0.3.3.6 - 2018-05-??
explicitly initialize the port to zero. Fixes bug 24488; bugfix
on 0.2.4.1-alpha.
+ o Minor bugfixes (directory authority):
+ - Directory authorities, when refusing a descriptor from a rejected
+ relay, now explicitly tell the relay (in its logs) to set a valid
+ ContactInfo address and contact the bad-relays@ mailing list.
+ Fixes bug 25170; bugfix on 0.2.9.1.
+
o Minor bugfixes (documentation):
- Document that the PerConnBW{Rate,Burst} options will fall back to
their corresponding consensus parameters only if those parameters
@@ -530,7 +504,7 @@ Changes in version 0.3.3.6 - 2018-05-??
router descriptors when updating addresses for a bridge. Closes
ticket 24572; bugfix on 0.2.4.5-alpha. Patch by "ffmancera".
- o Minor bugfixes (linux seccomp2 sandbox):
+ o Minor bugfixes (Linux seccomp2 sandbox):
- When running with the sandbox enabled, reload configuration files
correctly even when %include was used. Previously we would crash.
Fixes bug 22605; bugfix on 0.3.1. Patch from Daniel Pinto.
@@ -560,6 +534,11 @@ Changes in version 0.3.3.6 - 2018-05-??
- Fix a harmless memory leak in tor-resolve. Fixes bug 24582; bugfix
on 0.2.1.1-alpha.
+ o Minor bugfixes (network IPv6 test):
+ - Tor's test scripts now check if "ping -6 ::1" works when the user
+ runs "make test-network-all". Fixes bug 24677; bugfix on
+ 0.2.9.3-alpha. Patch by "ffmancera".
+
o Minor bugfixes (networking):
- Tor will no longer reject IPv6 address strings from TorBrowser
when they are passed as hostnames in SOCKS5 requests. Fixes bug
@@ -651,6 +630,11 @@ Changes in version 0.3.3.6 - 2018-05-??
- Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
bugfix on 0.2.9.4-alpha.
+ o Minor bugfixes (spelling):
+ - Use the "misspell" tool to detect and fix typos throughout the
+ source code. Fixes bug 23650; bugfix on various versions of Tor.
+ Patch from Deepesh Pathak.
+
o Minor bugfixes (testing):
- Avoid intermittent test failures due to a test that had relied on
onion service introduction point creation finishing within 5
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits