[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/release-0.4.6] 0456 ReleaseNotes: remove entries that appeared in 0.4.4.{6, 7}
commit 16954b3ec0bbf16660f5967b0866c4d9f269f11b
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Mon Feb 15 09:52:00 2021 -0500
0456 ReleaseNotes: remove entries that appeared in 0.4.4.{6,7}
---
ChangeLog | 2 +-
ReleaseNotes | 107 +----------------------------------------------------------
2 files changed, 2 insertions(+), 107 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 0deec36d53..a234784d85 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -2,7 +2,7 @@ Changes in version 0.4.5.6 - 2021-02-15
BLURB
Below are the changes since 0.4.4.4-rc. For a complete list of changes
- since 0.4.4.XXXX, see the ReleaseNotes file.
+ since 0.4.4.7, see the ReleaseNotes file.
o Major bugfixes (IPv6, relay):
- Fix a bug that prevented a relay from publishing its descriptor if
diff --git a/ReleaseNotes b/ReleaseNotes
index 9accb4b658..ac1dd796d7 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -5,15 +5,9 @@ changes in each development snapshot, see the ChangeLog file.
Changes in version 0.4.5.6 - 2021-02-15
BLURB
- Below are the changes since 0.4.4.5. For a list only of the changes
+ Below are the changes since 0.4.4.7. For a list only of the changes
since 0.4.5.5-rc, see the ChangeLog file.
- o Major feature (exit):
- - Re-entry into the network is now denied at the Exit level to all
- relays' ORPorts and authorities' ORPorts and DirPorts. This change
- should help mitgate a set of denial-of-service attacks. Closes
- ticket 2667.
-
o Major features (build):
- When building Tor, first link all object files into a single
static library. This may help with embedding Tor in other
@@ -52,27 +46,12 @@ Changes in version 0.4.5.6 - 2021-02-15
to be enabled at configure time. See documentation in
doc/HACKING/Tracing.md. Closes ticket 32910.
- o Major bugfixes (security):
- - When completing a channel, relays now check more thoroughly to
- make sure that it matches any pending circuits before attaching
- those circuits. Previously, address correctness and Ed25519
- identities were not checked in this case, but only when extending
- circuits on an existing channel. Fixes bug 40080; bugfix on
- 0.2.7.2-alpha. Resolves TROVE-2020-005.
-
o Major bugfixes (directory cache, performance, windows):
- Limit the number of items in the consensus diff cache to 64 on
Windows. We hope this will mitigate an issue where Windows relay
operators reported Tor using 100% CPU, while we investigate better
solutions. Fixes bug 24857; bugfix on 0.3.1.1-alpha.
- o Major bugfixes (onion service v3):
- - Stop requiring a live consensus for v3 clients and services, and
- allow a "reasonably live" consensus instead. This allows v3 onion
- services to work even if the authorities fail to generate a
- consensus for more than 2 hours in a row. Fixes bug 40237; bugfix
- on 0.3.5.1-alpha.
-
o Major bugfixes (relay, windows):
- Fix a bug in our implementation of condition variables on Windows.
Previously, a relay on Windows would use 100% CPU after running
@@ -88,11 +67,6 @@ Changes in version 0.4.5.6 - 2021-02-15
and not check for more data until the next mainloop event. Fixes
bug 40006; bugfix on 0.1.0.5-rc.
- o Minor feature (build system):
- - New "make lsp" command to generate the compile_commands.json file
- used by the ccls language server. The "bear" program is needed for
- this. Closes ticket 40227.
-
o Minor features (address discovery):
- If no Address statements are found, relays now prioritize guessing
their address by looking at the local interface instead of the
@@ -124,12 +98,6 @@ Changes in version 0.4.5.6 - 2021-02-15
- If the configure script has given any warnings, remind the user
about them at the end of the script. Related to 40138.
- o Minor features (compilation):
- - Disable deprecation warnings when building with OpenSSL 3.0.0 or
- later. There are a number of APIs newly deprecated in OpenSSL
- 3.0.0 that Tor still requires. (A later version of Tor will try to
- stop depending on these APIs.) Closes ticket 40165.
-
o Minor features (configuration):
- Allow using wildcards (* and ?) with the %include option on
configuration files. Closes ticket 25140. Patch by Daniel Pinto.
@@ -157,30 +125,13 @@ Changes in version 0.4.5.6 - 2021-02-15
address. We keep "GETINFO address" for backwards-compatibility.
Closes ticket 40039. Patch by Neel Chauhan.
- o Minor features (crypto):
- - Fix undefined behavior on our Keccak library. The bug only
- appeared on platforms with 32-byte CPU cache lines (e.g. armv5tel)
- and would result in wrong digests. Fixes bug 40210; bugfix on
- 0.2.8.1-alpha. Thanks to Bernhard Ã?belacker, Arnd Bergmann and
- weasel for diagnosing this.
-
o Minor features (directory authorities):
- - Authorities now list a different set of protocols as required and
- recommended. These lists have been chosen so that only truly
- recommended and/or required protocols are included, and so that
- clients using 0.2.9 or later will continue to work (even though
- they are not supported), whereas only relays running 0.3.5 or
- later will meet the requirements. Closes ticket 40162.
- Add a new consensus method 30 that removes the unnecessary "="
padding from ntor-onion-key. Closes ticket 7869. Patch by
Daniel Pinto.
- Directory authorities now reject descriptors from relays running
Tor versions from the obsolete 0.4.1 series. Resolves ticket
34357. Patch by Neel Chauhan.
- - Make it possible to specify multiple ConsensusParams torrc lines.
- Now directory authority operators can for example put the main
- ConsensusParams config in one torrc file and then add to it from a
- different torrc file. Closes ticket 40164.
- The AssumeReachable option no longer stops directory authorities
from checking whether other relays are running. A new
AuthDirTestReachability option can be used to disable these
@@ -302,10 +253,6 @@ Changes in version 0.4.5.6 - 2021-02-15
if statistics are enabled. Closes ticket 33263.
o Minor features (subprotocol versions):
- - Tor no longer allows subprotocol versions larger than 63.
- Previously version numbers up to UINT32_MAX were allowed, which
- significantly complicated our code. Implements proposal 318;
- closes ticket 40133.
- Use the new limitations on subprotocol versions due to proposal
318 to simplify our implementation. Part of ticket 40133.
@@ -319,14 +266,6 @@ Changes in version 0.4.5.6 - 2021-02-15
- Added unit tests for channel_matches_target_addr_for_extend().
Closes Ticket 33919. Patch by MrSquanchee.
- o Minor features (tests, v2 onion services):
- - Fix a rendezvous cache unit test that was triggering an underflow
- on the global rend cache allocation. Fixes bug 40125; bugfix
- on 0.2.8.1-alpha.
- - Fix another rendezvous cache unit test that was triggering an
- underflow on the global rend cache allocation. Fixes bug 40126;
- bugfix on 0.2.8.1-alpha.
-
o Minor bugfixes (circuit padding):
- When circpad_send_padding_cell_for_callback is called,
`is_padding_timer_scheduled` flag was not reset. Now it is set to
@@ -349,29 +288,13 @@ Changes in version 0.4.5.6 - 2021-02-15
objects, potentially leading to bugs. Fixes bug 32880; bugfix on
0.2.3.6-alpha. Patch by Neel Chauhan.
- o Minor bugfixes (compatibility):
- - Strip '\r' characters when reading text files on Unix platforms.
- This should resolve an issue where a relay operator migrates a
- relay from Windows to Unix, but does not change the line ending of
- Tor's various state files to match the platform, and the CRLF line
- endings from Windows end up leaking into other files such as the
- extra-info document. Fixes bug 33781; bugfix on 0.0.9pre5.
-
o Minor bugfixes (compilation):
- Change the linker flag ordering in our library search code so that
it works for compilers that need the libraries to be listed in the
right order. Fixes bug 33624; bugfix on 0.1.1.0-alpha.
- - Fix a compilation warning about unreachable fallthrough
- annotations when building with "--enable-all-bugs-are-fatal" on
- some compilers. Fixes bug 40241; bugfix on 0.3.5.4-alpha.
- Fix the "--enable-static-tor" switch to properly set the "-static"
compile option onto the tor binary only. Fixes bug 40111; bugfix
on 0.2.3.1-alpha.
- - Fix compiler warnings that would occur when building with
- "--enable-all-bugs-are-fatal" and "--disable-module-relay" at the
- same time. Fixes bug 40129; bugfix on 0.4.4.1-alpha.
- - Resolve a compilation warning that could occur in
- test_connection.c. Fixes bug 40113; bugfix on 0.2.9.3-alpha.
o Minor bugfixes (configuration):
- Exit Tor on a misconfiguration when the Bridge line is configured
@@ -404,8 +327,6 @@ Changes in version 0.4.5.6 - 2021-02-15
- Turn warning-level log message about SENDME failure into a debug-
level message. (This event can happen naturally, and is no reason
for concern). Fixes bug 40142; bugfix on 0.4.1.1-alpha.
- - Remove a debug logging statement that uselessly spammed the logs.
- Fixes bug 40135; bugfix on 0.3.5.0-alpha.
- When logging a rate-limited message about how many messages have
been suppressed in the last N seconds, give an accurate value for
N, rounded up to the nearest minute. Previously we would report
@@ -418,11 +339,6 @@ Changes in version 0.4.5.6 - 2021-02-15
establishing a circuit to an onion service. Fixes bug 32666;
bugfix on 0.3.0.3-alpha.
- o Minor bugfixes (relay configuration, crash):
- - Avoid a fatal assert() when failing to create a listener
- connection for an address that was in use. Fixes bug 40073; bugfix
- on 0.3.5.1-alpha.
-
o Minor bugfixes (rust, protocol versions):
- Declare support for the onion service introduction point denial of
service extensions when building with Rust. Fixes bug 34248;
@@ -438,11 +354,6 @@ Changes in version 0.4.5.6 - 2021-02-15
evidence that we're reachable on some other address. Fixes bug
20165; bugfix on 0.1.0.1-rc.
- o Minor bugfixes (SOCKS5):
- - Handle partial SOCKS5 messages correctly. Previously, our code
- would send an incorrect error message if it got a SOCKS5 request
- that wasn't complete. Fixes bug 40190; bugfix on 0.3.5.1-alpha.
-
o Minor bugfixes (spec conformance):
- Use the correct key type when generating signing->link
certificates. Fixes bug 40124; bugfix on 0.2.7.2-alpha.
@@ -456,22 +367,6 @@ Changes in version 0.4.5.6 - 2021-02-15
protocols_known being set. Fixes bug 34232; bugfix on
0.3.3.2-alpha. Patch by Neel Chauhan.
- o Minor bugfixes (testing):
- - Fix the `config/parse_tcp_proxy_line` test so that it works
- correctly on systems where the DNS provider hijacks invalid
- queries. Fixes part of bug 40179; bugfix on 0.4.3.1-alpha.
- - Fix our Python reference-implementation for the v3 onion service
- handshake so that it works correctly with the version of hashlib
- provided by Python 3.9. Fixes part of bug 40179; bugfix
- on 0.3.1.6-rc.
- - Fix the `tortls/openssl/log_one_error` test to work with OpenSSL
- 3.0.0. Fixes bug 40170; bugfix on 0.2.8.1-alpha.
-
- o Minor bugfixes (v2 onion services):
- - For HSFETCH commands on v2 onion services addresses, check the
- length of bytes decoded, not the base32 length. Fixes bug 34400;
- bugfix on 0.4.1.1-alpha. Patch by Neel Chauhan.
-
o Code simplification and refactoring:
- Add and use a set of functions to perform down-casts on constant
connection and channel pointers. Closes ticket 40046.
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits